HOME
*





Main Core
Main Core is an alleged American government database containing information on those believed to be threats to national security. History The existence of the database was first asserted in May 2008 by Christopher Ketcham and again in July 2008 by Tim Shorrock. Description The Main Core data, which is believed to come from the NSA, FBI, CIA, and other sources, is collected and stored without warrants or court orders. The database's name derives from the fact that it contains "copies of the 'main core' or essence of each item of intelligence information on Americans produced by the FBI and the other agencies of the U.S. intelligence community". , there were allegedly eight million Americans listed in the database as possible threats, often for trivial reasons, whom the government may choose to track, question, or detain in a time of crisis.Christopher Ketcham, , RADAR Online, 15 May 2008 See also * Disposition Matrix * Rex 84 * FBI Index * Investigative Data Warehouse * Nati ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Database
In computing, a database is an organized collection of data stored and accessed electronically. Small databases can be stored on a file system, while large databases are hosted on computer clusters or cloud storage. The design of databases spans formal techniques and practical considerations, including data modeling, efficient data representation and storage, query languages, security and privacy of sensitive data, and distributed computing issues, including supporting concurrent access and fault tolerance. A database management system (DBMS) is the software that interacts with end users, applications, and the database itself to capture and analyze the data. The DBMS software additionally encompasses the core facilities provided to administer the database. The sum total of the database, the DBMS and the associated applications can be referred to as a database system. Often the term "database" is also used loosely to refer to any of the DBMS, the database system or an appli ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

FBI Index
The FBI Indexes, or Index List, was a system used to track American citizens and other people by the Federal Bureau of Investigation (FBI) before the adoption of computerized databases. The Index List was originally made of paper index cards, first compiled by J. Edgar Hoover at the Bureau of Investigations before he was appointed director of the FBI. The Index List was used to track U.S. citizens and others believed by the FBI to be dangerous to national security, and was subdivided into various divisions which generally were rated based on different classes of danger the subject was thought to represent. General Intelligence Division In 1919, during the First Red Scare, William J. Flynn of the Bureau of Investigation appointed J. Edgar Hoover chief of the General Intelligence Division (GID). Hoover used his experience working as a library clerk at the National Archives to create the system using extensive cross-referencing. The GID took files from the Bureau of Investigations ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Federal Emergency Management Agency
The Federal Emergency Management Agency (FEMA) is an agency of the United States Department of Homeland Security (DHS), initially created under President Jimmy Carter by Presidential Reorganization Plan No. 3 of 1978 and implemented by two Executive Orders on April 1, 1979. The agency's primary purpose is to coordinate the response to a disaster that has occurred in the United States and that overwhelms the resources of local and state authorities. The governor of the state in which the disaster occurs must declare a state of emergency and formally request from the President that FEMA and the federal government respond to the disaster. The only exception to the state's gubernatorial declaration requirement occurs when an emergency or disaster takes place on federal property or to a federal asset—for example, the 1995 bombing of the Alfred P. Murrah Federal Building in Oklahoma City, Oklahoma, or the Space Shuttle ''Columbia'' in the 2003 return-flight disaster. While on-th ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Espionage
Espionage, spying, or intelligence gathering is the act of obtaining secret or confidential information (intelligence) from non-disclosed sources or divulging of the same without the permission of the holder of the information for a tangible benefit. A person who commits espionage is called an ''espionage agent'' or ''spy''. Any individual or spy ring (a cooperating group of spies), in the service of a government, company, criminal organization, or independent operation, can commit espionage. The practice is clandestine, as it is by definition unwelcome. In some circumstances, it may be a legal tool of law enforcement and in others, it may be illegal and punishable by law. Espionage is often part of an institutional effort by a government or commercial concern. However, the term tends to be associated with state spying on potential or actual enemies for military purposes. Spying involving corporations is known as industrial espionage. One of the most effective ways to gath ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


1980s Establishments In The United States
__NOTOC__ Year 198 (CXCVIII) was a common year starting on Sunday (link will display the full calendar) of the Julian calendar. At the time, it was known as the Year of the Consulship of Sergius and Gallus (or, less frequently, year 951 '' Ab urbe condita''). The denomination 198 for this year has been used since the early medieval period, when the Anno Domini calendar era became the prevalent method in Europe for naming years. Events By place Roman Empire *January 28 **Publius Septimius Geta, son of Septimius Severus, receives the title of Caesar. **Caracalla, son of Septimius Severus, is given the title of Augustus. China *Winter – Battle of Xiapi: The allied armies led by Cao Cao and Liu Bei defeat Lü Bu; afterward Cao Cao has him executed. By topic Religion * Marcus I succeeds Olympianus as Patriarch of Constantinople (until 211). Births * Lu Kai (or Jingfeng), Chinese official and general (d. 269) * Quan Cong, Chinese general and advisor (d. ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


PRISM (surveillance Program)
Prism usually refers to: * Prism (optics), a transparent optical component with flat surfaces that refract light * Prism (geometry), a kind of polyhedron Prism may also refer to: Science and mathematics * Prism (geology), a type of sedimentary deposit * Prism correction, a component of some eyeglass prescriptions Government * PRISM, a surveillance program run by the US National Security Agency * PRISM (website), an educational portal website for Indiana teachers * Oregon Performance Reporting Information System, a state agency Media and entertainment Publications * Prism (comics), a Marvel Comics character * ''Prism International'', a Canadian literary magazine * ''PRism'' (journal), an academic journal covering public relations * ''ASEE Prism'', the flagship publication of the American Society for Engineering Education * Prism Comics, an organization that supports LGBT people in the comics industry * ''The Prism Pentad'', a series of Dungeons & Dragons novels by Troy Denni ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

NSA Warrantless Surveillance Controversy
The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collection, and processing of information and data for foreign and domestic intelligence and counterintelligence purposes, specializing in a discipline known as signals intelligence (SIGINT). The NSA is also tasked with the protection of U.S. communications networks and information systems. The NSA relies on a variety of measures to accomplish its mission, the majority of which are clandestine. The existence of the NSA was not revealed until 1975. The NSA has roughly 32,000 employees. Originating as a unit to decipher coded communications in World War II, it was officially formed as the NSA by President Harry S. Truman in 1952. Between then and the end of the Cold War, it became the largest of the U.S. intelligence organizations in terms of person ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


National Security And Homeland Security Presidential Directive
The National Security and Homeland Security Presidential Directive (National Security Presidential Directive NSPD 51/Homeland Security Presidential Directive HSPD-20, sometimes called simply "Executive Directive 51" for short), signed by President of the United States George W. Bush on May 4, 2007, is a Presidential Directive establishing a comprehensive policy on the federal government structures and operations in the event of a "catastrophic emergency". Such an emergency is defined as "any incident, regardless of location, that results in extraordinary levels of mass casualties, damage, or disruption severely affecting the U.S. population, infrastructure, environment, economy, or government functions." The unclassified portion of the directive (which replaced President Bill Clinton's 1998 ''Presidential Decision Directive 67''), was posted on the White House website on May 9, 2007, without any further announcement or press briefings, although Special Assistant to George W. Bu ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




Investigative Data Warehouse
Investigative Data Warehouse (IDW) is a searchable database operated by the FBI. It was created in 2004. Much of the nature and scope of the database is classified. The database is a centralization of multiple federal and state databases, including criminal records from various law enforcement agencies, the U.S. Department of the Treasury's Financial Crimes Enforcement Network (FinCEN), and public records databases. According to Michael Morehart's testimony before the House Committee on Financial Services in 2006, the "IDW is a centralized, web-enabled, closed system repository for intelligence and investigative data. This system, maintained by the FBI, allows appropriately trained and authorized personnel throughout the country to query for information of relevance to investigative and intelligence matters."Morehart 2005, op. cit. Overview The size of the database appears to be growing rapidly. In 2004, according to a government solicitation for bids to manage the project, ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Rex 84
Rex 84, short for Readiness Exercise 1984, was a classified scenario and drill developed by the United States federal government to detain large numbers of United States citizens deemed to be "national security threats" in the event that the president declared a National Emergency. The plan was first revealed in detail in a major daily newspaper by reporter Alfonso Chardy in the July 5, 1987 edition of the ''Miami Herald''. Possible reasons for such a roundup were reported to be widespread opposition to a U.S. military invasion abroad, such as if the United States were to directly invade Central America. To combat what the government perceived as "subversive activities", the plan also authorized the military to direct ordered movements of civilian populations at state and regional levels, according to Professor Diana Reynolds. Existence of master military contingency plans (of which REX-84 was a part), " Operation Garden Plot" and a similar earlier exercise, "Lantern Spike", were o ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

National Security
National security, or national defence, is the security and defence of a sovereign state, including its citizens, economy, and institutions, which is regarded as a duty of government. Originally conceived as protection against military attack, national security is widely understood to include also non-military dimensions, including the security from terrorism, minimization of crime, economic security, energy security, environmental security, food security, and cyber-security. Similarly, national security risks include, in addition to the actions of other nation states, action by violent non-state actors, by narcotic cartels, and by multinational corporations, and also the effects of natural disasters. Governments rely on a range of measures, including political, economic, and military power, as well as diplomacy, to safeguard the security of a nation state. They may also act to build the conditions of security regionally and internationally by reducing transnational caus ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Disposition Matrix
The Disposition Matrix, informally known as a kill list, is a database of information for tracking, capturing, rendering, or killing suspected enemies of the United States. Developed by the Obama administration beginning in 2010, it goes beyond existing kill lists and is intended to become a permanent fixture of U.S. policy. The process determining criteria for killing is not public and was heavily shaped by National Counterterrorism Director and former Central Intelligence Agency (CIA) Director John O. Brennan. Though White House, National Counterterrorism Center (NCTC), and CIA spokespeople have declined to comment on the database, officials have stated privately that kill lists will expand "for at least another decade", if not indefinitely. One official stated "it's a necessary part of what we do". Paul R. Pillar, the former deputy director of the CIA's counterterrorism center, has stated, "We are looking at something that is potentially indefinite". The database's exist ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]