Difference between revisions of "Mass surveillance"

From Wikispooks
Jump to navigation Jump to search
(Internet Surveillance)
(format -> shuffle videos and pitures around)
 
(73 intermediate revisions by 6 users not shown)
Line 1: Line 1:
 
{{concept
 
{{concept
|wikipedia=http://en.wikipedia.org/wiki/Mass_surveillance
+
|wikipedia=https://en.wikipedia.org/wiki/Mass_surveillance
|description=Wholesale surveillance of the citizenry is the new normal, introduced under the smokescreen of the "war on terror".
+
|image=Mass surveillance2.jpg
 +
|image_width = 400px
 +
|image_caption = Surveillance center for Venice, Italy.
 +
|constitutes=social control, Civil_unrest/Preparation
 +
|description=Wholesale surveillance of the citizenry is the [[new normal]], introduced under the smokescreen of the "[[war on terror]]". In the "art of warfare" surveillance is taught as a preparatory act for more invasive measures such as the suspension of habeas corpus (i.e. the [[Patriot Act]]) or other covert operations.
 +
|key_properties=Display_date/Description
 +
|key_property_headers=Date/Description
 
}}
 
}}
Rhetoric about the "[[war on terror]]" and repeated [[false flag]] terror attacks have been used in conjunction the {{ccm}} to instill fear in populations. This fear has been used to quell dissent and justofy the introduction of mass surveillance techniques. This has been particularly useful in countries such as the [[USA]] and the [[UK]] which had laws and traditions about privacy which, if enforced, could have prevented such surveillance. Few (if any?) serious commentators regard such objections to mass surveillance as effective - the only remaining limitations on data collection are purely technical in nature.
+
'''Mass surveillance''' is increasingly carried out by governments the world over. The most common purported justification is the "[[war on terror]]". The extent is not publicly disclosed, but rapid development in [[mass surveillance technologies]] and large budgets which remain classified behind veils of "[[national security]]" suggest that its extent and sophistication may be more than is generally realised. In military or intelligence terms surveillance is often a preparation for an attack.
 +
{{SMWQ
 +
|text=Extreme forms of monitoring, whether by the [[KGB]] in the [[Soviet Union]], the [[Stasi]] in [[East Germany]], or [[Big Brother]] in 1984, are essential elements of all tyrannies, and technology is making both monitoring and the consolidation of surveillance data easier than ever.
 +
|subjects=mass surveillance, social control, tyranny, KGB, stasi
 +
|authors=Robert Epstein
 +
|source_URL=https://www.globalresearch.ca/the-new-mind-control-subliminal-stimulation-controlling-people-without-their-knowledge/5511628
 +
|source_name=Global Research
 +
|date=18 February 2016
 +
}}
 +
 
 +
==Official narrative==
 +
{{YouTubeVideo
 +
|code=LQqACPeH_sY
 +
|align=right
 +
|width=
 +
|caption=10 Surprising Ways the Government is Spying on You - The InfoGraphics Show
 +
|date=
 +
}}
 +
Mass surveillance is usually presented by the {{ccm}} as being a necessary evil to fight the "[[war on terror]]". The {{oon}} - the other end of the spectrum of opinion presented by [[corporate media]] - does not question that [[civil rights]] must be trade off for protection against "[[terrorism]]", so if differs only about only how much mass surveillance is an acceptable compromise between safety and liberty. Both the official narrative and its opposition neglect to mention that, since [[Edward Snowden]]'s revelations have demonstrated that illegal mass surveillance was being carried out widely and systematically, and since no one has been charged - or even accused - as a result, it is reasonable to assume that the major limitations to mass surveillance are technical rather than legal.
 +
 
 +
===Problems===
 +
No evidence has been presented that mass surveillance was intended to stopping "[[terrorism]]". Several [[NSA]] [[whistleblowers]] such as [[William Binney]], [[Russell Tice]] and [[Thomas Drake]] have directly challenged this claim, arguing that by contrast, it makes the US public less safe rather than more.<ref>http://www.911truth.org/trump-bush-had-advanced-notice-of-911/</ref> The "''[[Surveillance State Repeal Act]]''" was introduced into [[US Congress]] in March 2015, to end the [[US PATRIOT Act]] and reform the [[NSA]].
 +
 
 +
=="Corrupt power grab?"==
 +
A simpler explanation suggests that it is "a corrupt power grab... not an effort aimed at stopping terrorism".<ref>http://www.911truth.org/trump-bush-had-advanced-notice-of-911/</ref> In 2017, the [[United Nations' Special Rapporteur on the right to privacy]] echoed this sentiment in more diplomat terms. Criticising recent mass surveillance laws in [[France]], [[Germany]], the [[UK]] and the [[USA]], he stated that they are "predicated on the... disproportionate though understandable [[fear]] that electorates may have in the face of the threat of [[terrorism]]" but are informed by "little or no evidence" of their "efficacy or... proportionality".<ref>http://www.theregister.co.uk/2017/03/10/united_nations_special_rapporteur_on_privacy_report/</ref>
 +
{{YouTubeVideo
 +
|align=left
 +
|code=qB3KR8fWNh0
 +
|caption=[[William Binney]] on mass surveillance
 +
|subjects=
 +
}}
 +
 
 +
==="War on Terror"===
 +
{{FA|War on Terror}}
 +
The "[[War on Terror]]" has repeatedly used [[false flag]] terror attacks, in conjunction with a compliant {{ccm}} to try to instill [[fear]] in people. Deliberate vagueness about laws and increasing use of guilt by association are intended to chill dissent in an effort to introduce new [[mass surveillance technologies]]. This has been particularly useful in countries such as the [[USA]] and the [[UK]] which had laws and traditions about privacy which, if enforced, would have prevented such surveillance. A widespread culture of impunity for those who control the structures of Western nation states mean that few (if any?) serious commentators regard such objections to mass surveillance as effective in practice - the only remaining limitations on data collection are purely technical in nature. [[UN Special Rapporteur on Privacy]], [[Joseph Cannataci]] referred UK's oversight of surveillance as “worse than a bad joke.”<ref>http://www.rt.com/uk/314157-britain-surveillance-dangerous-un/</ref>
 +
 
 +
==Origins==
 +
[[Harry S. Truman]] was concerned about the power accrued by both the [[CIA]] and the [[FBI]]. In [[1947]] he wrote about the FBI: "[[Edgar Hoover]]'s orgnization would make a good start toward a citizen spy system. Not for me."<ref>Robert H. Ferrell (ed.) ''Dear Bess: The Letters from Harry to Bess Truman, 1910-1959'' (New York: W. W. Norton, 1983), 550.</ref>
 +
 
 +
==Emerging surveillance Technologies==
 +
[[image:Wifi_location.jpg|360px|thumbnail|A screenshot from the 2014 video game ''[[Watch Dogs]]''.<ref>https://en.wikipedia.org/wiki/Watch_Dogs</ref><ref>https://me-en.kaspersky.com/about/press-releases/2014_ubisoft-consulted-with-kaspersky-lab-to-authenticate-watch-dogs-script</ref> The game depicts a future in witch a city is completely monitored 24/7, including the living quarters of all citizens. Research by [[MIT]] professor [[Dina Katabi]]<ref>http://people.csail.mit.edu/fadel/papers/wivi-paper.pdf</ref> in 2020 is in such an advanced stage, that a signal emitting device can monitor the breathing of a person.<ref>https://www.technologyreview.com/2018/09/12/140293/dina-katabi-emerald-walls/</ref> Papers have been published which show, that from regular [[Wi-Fi]] signals alone, the movement of a person can be calculated.<ref>https://medium.com/syncedreview/seeing-through-walls-with-adversarial-wifi-sensing-attack-and-defence-strategies-7ee2559a7f8</ref><ref>https://arxiv.org/pdf/1810.10109.pdf</ref>]]
 +
 
 +
{{FA|Mass surveillance/Technology}}
  
[[GCHQ]], for example, have admitted to collecting enormous numbers of images from unwitting computer users webcams, some of which are pornographic in nature. <ref>http://mashable.com/2014/02/27/gchq-webcam-yahoo-images/</ref>
+
The US military has developed new surveillance technologies which - with or without trialing in war zones overseas - are being rolled out across the country. Legal barriers are no effective impediment in what many have termed a [[police state]]. These include surveillance by Reaper Drones<ref>http://www.defensenews.com/story/defense/international/europe/2014/12/17/italian-reaper-drones-to-be-used-for-crowd-monitoring/20528495/</ref>, Hand Held Radar<ref>http://www.usatoday.com/story/news/2015/01/19/police-radar-see-through-walls/22007615/</ref>, Cellphone Surveillance Tools<ref>https://www.eff.org/deeplinks/2013/02/secretive-stingray-surveillance-tool-becomes-more-pervasive-questions-over-its</ref>, X-Ray vans<ref>http://www.propublica.org/article/judge-orders-nypd-to-release-records-on-x-ray-vans</ref> and automatic recognitino of faces, car license plates and other data from [[CCTV]] by computers.<ref>http://21stcenturywire.com/2015/01/29/revealed-the-tsas-new-computerized-facial-and-emotional-recognition-system/</ref><ref>http://motherboard.vice.com/read/us-customs-quietly-launches-facial-recognition-experiment-at-dc-airport</ref>
  
In 2014 the LAPD argued in a US court that all license plate data was required to aid in ongoing investigations.
+
==Modern Methods==
{{QB|"Taken to an extreme, the agencies’ arguments would allow law enforcement to conduct around-the-clock surveillance on every aspect of our lives and store those records indefinitely on the off-chance they may aid in solving a crime at some previously undetermined date in the future. If the court accepts their arguments, the agencies would then be able to hide all this data from the public." - ''EFF, 2014''<ref>https://www.eff.org/deeplinks/2014/03/los-angeles-cops-argue-all-cars-la-are-under-investigation</ref>}}
+
The rise of electronic communication methods have lead to a burgeoning of the mass surveillance in the 21<sup>st</sup> century. The blatant - and unpunished - disregard for the law by both [[NSA]] and [[GCHQ]] should leave little doubt that legal restrictions are mostly left for show.
  
==Internet Surveillance==
+
===Audio Surveillance===
While the internet was designed to be decentralised, and so non-trivial to censor/monitor, the [[NSA]] has been consistently trying for decades to stifle an effective roll out of cryptography for decades. Several [[whistleblower]]s have revealed that the NSA has fiber optic splitters which allow for monitoring of huge amounts of data, and the NSA routinely backdoors networking hardware exported from the USA.<ref>http://www.theguardian.com/books/2014/may/12/glenn-greenwald-nsa-tampers-us-internet-routers-snowden</ref> In May 2014, New Zealand announced that ISPs would have to used specified hardware for their networking and would only be allowed to build a network subject to certain specifications.<ref name="May2014NZ">http://www.itnews.com.au/News/385149,tough-nz-comms-interception-network-security-law-kicks-in.aspx</ref>
+
Various electronic devices have made audio recordings and for internet behavior.<ref>https://techcrunch.com/2019/07/26/siri-recordings-regularly-sent-to-apple-contractors-for-analysis-claims-whistleblower/</ref><ref>https://www.naturalnews.com/2019-01-10-google-caught-secretly-recording-conversations-mobile-device.html</ref>
  
==Watch lists==
+
====Voiceprint====
 +
[[File:Voiceprint.png|thumb|left]]
 +
The [[NSA]] can, from audio recordings, create a voiceprint that makes it possible to track a person globally when he/she makes a call via regular connection, cell or landline.<ref>https://www.cnbc.com/2018/01/20/the-nsa-can-recognize-you-by-just-your-voice-predating-apple-amazon.html</ref> The [[technology]] was developed from the mid-[[2000s]] onwards,<ref>https://www.biometricupdate.com/201801/nsa-voice-recognition-capabilities-appear-to-be-more-advanced-than-previously-thought</ref><ref>http://archive.today/2024.11.01-161853/http://www.nbmachinetool.com/content-about-the-power-of-the-3145.html</ref> while “machine transcribed speech” was discovered in patents back in [[1999]].<ref>https://theintercept.com/2015/05/11/speech-recognition-nsa-best-kept-secret/</ref>
 +
 
 +
[[image:RANGE-R.png|360px|thumb|right|The Range-R system is one of a number of such devices that have been developed in recent years.<ref>https://web.archive.org/web/20200911200826/https://assets.documentcloud.org/documents/1505138/00-wallsensorreport-508.pdf</ref> These are battlefield technology that is becoming available for police forces.<ref>https://reason.com/2015/01/20/police-use-radar-device-to-see-inside-yo/</ref>]]
 +
 
 +
====Televisions====
 +
[[Television|Television sets]] have been [[hacked]] to bring them into a "fake off mode".<ref>https://www.consumerreports.org/electronics-computers/privacy/a-closer-look-at-the-tvs-from-the-cia-vault-7-hack-a1864416431/</ref>
 +
 
 +
====XBoxes====
 +
In August 2019, ''Motherboard'' wrote that Microsoft contractors have admitted to listening to users of [[XBox]]es they "said that recordings were sometimes triggered and recorded by mistake".<ref>https://www.vice.com/en_us/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana</ref>
 +
 
 +
===Internet Surveillance===
 +
{{FA|Internet/Surveillance}}
 +
While the [[Internet]] was designed to be decentralised, and so non-trivial to censor/monitor, the [[NSA]] has been consistently trying for decades to stifle an effective roll out of [[cryptography]] for decades. Several [[whistleblower]]s have revealed that the [[NSA]] has fiber optic splitters which allow for monitoring of huge amounts of data. The connection with internet [[censorship]] is clear; when everyone's posting is watched, unwanted content is easily removed, moreover, [[self-censorship]] may become endemic due to fear of reprisals - [[Webster Tarpley]] and others have suggested that this perspective may help understand the [[Edward Snowden Affair]], and would tally with a large number of disclosures of mass surveillance of other natures made recently.
 +
 
 +
====Operating System====
 +
Common [[operating systems]] on the market like [[Microsoft]]s [[Windows]], [[Apple]]s [[IOS]] and [[Google]]s [[Android]] are mostly used with an online connection. The devices that run these operating systems, by design will become the first functioning part of the data collection process over the Internet which the user has no real overview of.
 +
 
 +
===Watch lists===
 
{{FA|Watch lists}}
 
{{FA|Watch lists}}
 
The {{on}} of watch lists is that they help assist law enforcement in prevention of [[terrorist]] activity. In practice, however, they are better understood as a means of mass surveillance (because ''everyone'' has to give their details, to prove that they are not on a watch list). Since the management of these lists is completely opaque, they can also be understood as a precursor to the enforcement of a heavy-handed [[police state]] - one in which individual rights are conditional and can be revoked at a moment's notice without the need for such matters as evidence of wrong doing.
 
The {{on}} of watch lists is that they help assist law enforcement in prevention of [[terrorist]] activity. In practice, however, they are better understood as a means of mass surveillance (because ''everyone'' has to give their details, to prove that they are not on a watch list). Since the management of these lists is completely opaque, they can also be understood as a precursor to the enforcement of a heavy-handed [[police state]] - one in which individual rights are conditional and can be revoked at a moment's notice without the need for such matters as evidence of wrong doing.
  
==Mendacious Justification==
+
===Postal surveillance===
[[image:The_54_NSA_events.png|400px|right|thumb]]
+
{{FA|Mail Isolation Control and Tracking}}
[[NSA]] director [[Keith Alexander]] has repeatedly lied about the illegal mass surveillance programmes, including the spurious but often repeated claim that mass surveillance has thwarted 54 terror events. The correct figure would appear to be zero.<ref>http://www.pclob.gov/SiteAssets/Pages/default/PCLOB-Report-on-the-Telephone-Records-Program.pdf</ref>
+
After the [[2001 anthrax attacks]], which were initially blamed on "Islamic terrorists", although the anthrax was later proved to have come from a US military laboratory, the US government secretly instituted a program to photograph all the mail sent in the US. This went undisclosed to the general public for over a decade. In 2015, it was revealed that the [[US Postal Inspection Service]] had installed a utility box "positioned to capture and record the license plates and facial features of customers leaving a Golden Post Office."  <ref>http://gizmodo.com/u-s-post-offices-have-installed-hidden-spy-cameras-to-1691112318</ref>
 +
 
 +
===Cellphone location data===
 +
In 2013, in response to a subpoena for cellphone data, the [[NSA]] claimed that "The government does not possess the records the defendant seeks", i.e. specifically denied that they had collected cellphone data, although the [[Foreign Intelligence Surveillance Act court]] order stated that they could have collected this data.<ref>http://www.motherjones.com/kevin-drum/2013/06/nsa-claims-it-doesnt-track-movements-cell-phone-users</ref> At the same time all of this type surveillance data is available for the cellphone network providers, whose data the NSA may access with ease, irregardless of any legal regulation. [[Apple]] and others do have a history of collecting [[location data]] secretly.<ref>http://web.archive.org/web/20150417071618/http://radar.oreilly.com/2011/04/apple-location-tracking.html</ref><ref>http://archive.today/2020.12.04-174303/https://www.wsj.com/articles/SB10001424052748703983704576277101723453610</ref>
 +
 
 +
====Covid-19 pandemic====
 +
Many governments of the world admitted to using cellphone data during the [[Covid-19 pandemic]], prompting questions about whether it would ever be rolled back.<ref>https://www.theregister.co.uk/2020/04/14/contact_tracing_exit_strategy/</ref><ref>https://medium.com/@caityjohnstone/they-are-rolling-out-the-architecture-of-oppression-now-because-they-fear-the-people-d0d374509d</ref><ref>https://www.vice.com/en_us/article/bvge5q/snowden-warns-governments-are-using-coronavirus-to-build-the-architecture-of-oppression</ref>
 +
 
 +
{{SMWQ
 +
|subjects=Smartphone,WEF
 +
|text=Always keen to get the latest [[smartphone]]? Soon it won’t matter, said [[Mike Bechtel]], Chief Futurist at [[Deloitte]]. “Over the next 10 years its going to be about moving beyond the device,” he said. “We can’t realistically have 15 smart speakers everywhere we go....We are going to be moving to ambient experiences, which is shorthand for a sort of digital [[Downton Abbey]] where we don’t ask [[Amazon|Echo]] or [[Google]] ‘What’s the weather?’, we just say ‘What’s the weather?’ and the right agent jumps up at the right time to give the right answer.
 +
|authors= Mike Bechtel
 +
|source_URL=https://www.weforum.org/agenda/2021/04/global-technology-governance-summit-gtgs-future/
 +
|date=16 Apr 2021
 +
}}
 +
 
 +
==Response==
 +
[[image:Mass surveillance cartoon.jpg|left|400px|thumb]]
 +
The {{ccm}} has not dwelt on the illegality of mass surveillance carried out continuously by [[intelligence agencies]]. Instead, the political establishment has moved to legalise such actions, under the pretext of the threat of "[[terrorism]]". Only token discussion has ever been made in [[corporate media]] about whether mass surveillance is helpful in this regard.
 +
{{SMWQ
 +
|text=Perhaps the most curious thing about the response to revelations concerning the extent of modern mass surveillance is that most people in the West have not seemed to mind; we have not perceptibly altered our online behavior or demanded a response from our governments. We seem not able or willing to grasp the implications, and we have shown a weary cynicism that evidently masks a deeper indifference. Many have shown an eager complicity, free of defensiveness. If you are innocent, you have nothing to fear, we insist, forgetting the innocence of millions interned and murdered by Western governments within living memory. Surveillance will keep us safe from our enemies, we say, obediently accepting the pronouncements of our governments on the identities of our enemies and the proper sources of our terror.
 +
|subjects=Mass surveillance
 +
|authors=Amanda Power
 +
|date=February 2016
 +
|source_URL=https://www.laphamsquarterly.org/spies/under-watchful-eyes
 +
|source_title=Under Watchful Eyes
 +
|source_name=Lapham's Quarterly
 +
}}
 +
 
 
{{SMWDocs}}
 
{{SMWDocs}}
 
==References==
 
==References==
 
{{Reflist}}
 
{{Reflist}}
{{Stub}}
 

Latest revision as of 16:18, 1 November 2024

Concept.png Mass surveillance 
(social control,  Civil_unrest/Preparation)Rdf-entity.pngRdf-icon.png 3
Mass surveillance2.jpg
Surveillance center for Venice, Italy.
Interest of• AMD
• Apple
• Jacob Applebaum
• Below Gotham Labs
• Big Brother Watch
• Carole Cadwalladr
• Dark Politricks
• Michael Drury
• ID2020
• International Festival of Whistleblowing Dissent and Accountability
• Philip Matthews
• Microsoft
• William Odom
• Privacy International
• Security Without Borders
• The Juice Media
• The Paypal Mafia
Subpage(s)Mass surveillance/Technology
Wholesale surveillance of the citizenry is the new normal, introduced under the smokescreen of the "war on terror". In the "art of warfare" surveillance is taught as a preparatory act for more invasive measures such as the suspension of habeas corpus (i.e. the Patriot Act) or other covert operations.

Mass surveillance is increasingly carried out by governments the world over. The most common purported justification is the "war on terror". The extent is not publicly disclosed, but rapid development in mass surveillance technologies and large budgets which remain classified behind veils of "national security" suggest that its extent and sophistication may be more than is generally realised. In military or intelligence terms surveillance is often a preparation for an attack.

“Extreme forms of monitoring, whether by the KGB in the Soviet Union, the Stasi in East Germany, or Big Brother in 1984, are essential elements of all tyrannies, and technology is making both monitoring and the consolidation of surveillance data easier than ever.”
Robert Epstein (18 February 2016)  [1]

Official narrative

10 Surprising Ways the Government is Spying on You - The InfoGraphics Show

Mass surveillance is usually presented by the commercially-controlled media as being a necessary evil to fight the "war on terror". The official opposition narrative - the other end of the spectrum of opinion presented by corporate media - does not question that civil rights must be trade off for protection against "terrorism", so if differs only about only how much mass surveillance is an acceptable compromise between safety and liberty. Both the official narrative and its opposition neglect to mention that, since Edward Snowden's revelations have demonstrated that illegal mass surveillance was being carried out widely and systematically, and since no one has been charged - or even accused - as a result, it is reasonable to assume that the major limitations to mass surveillance are technical rather than legal.

Problems

No evidence has been presented that mass surveillance was intended to stopping "terrorism". Several NSA whistleblowers such as William Binney, Russell Tice and Thomas Drake have directly challenged this claim, arguing that by contrast, it makes the US public less safe rather than more.[2] The "Surveillance State Repeal Act" was introduced into US Congress in March 2015, to end the US PATRIOT Act and reform the NSA.

"Corrupt power grab?"

A simpler explanation suggests that it is "a corrupt power grab... not an effort aimed at stopping terrorism".[3] In 2017, the United Nations' Special Rapporteur on the right to privacy echoed this sentiment in more diplomat terms. Criticising recent mass surveillance laws in France, Germany, the UK and the USA, he stated that they are "predicated on the... disproportionate though understandable fear that electorates may have in the face of the threat of terrorism" but are informed by "little or no evidence" of their "efficacy or... proportionality".[4]

William Binney on mass surveillance

"War on Terror"

Full article: Rated 4/5 “War on Terror”

The "War on Terror" has repeatedly used false flag terror attacks, in conjunction with a compliant commercially-controlled media to try to instill fear in people. Deliberate vagueness about laws and increasing use of guilt by association are intended to chill dissent in an effort to introduce new mass surveillance technologies. This has been particularly useful in countries such as the USA and the UK which had laws and traditions about privacy which, if enforced, would have prevented such surveillance. A widespread culture of impunity for those who control the structures of Western nation states mean that few (if any?) serious commentators regard such objections to mass surveillance as effective in practice - the only remaining limitations on data collection are purely technical in nature. UN Special Rapporteur on Privacy, Joseph Cannataci referred UK's oversight of surveillance as “worse than a bad joke.”[5]

Origins

Harry S. Truman was concerned about the power accrued by both the CIA and the FBI. In 1947 he wrote about the FBI: "Edgar Hoover's orgnization would make a good start toward a citizen spy system. Not for me."[6]

Emerging surveillance Technologies

A screenshot from the 2014 video game Watch Dogs.[7][8] The game depicts a future in witch a city is completely monitored 24/7, including the living quarters of all citizens. Research by MIT professor Dina Katabi[9] in 2020 is in such an advanced stage, that a signal emitting device can monitor the breathing of a person.[10] Papers have been published which show, that from regular Wi-Fi signals alone, the movement of a person can be calculated.[11][12]
Full article: Mass surveillance/Technology

The US military has developed new surveillance technologies which - with or without trialing in war zones overseas - are being rolled out across the country. Legal barriers are no effective impediment in what many have termed a police state. These include surveillance by Reaper Drones[13], Hand Held Radar[14], Cellphone Surveillance Tools[15], X-Ray vans[16] and automatic recognitino of faces, car license plates and other data from CCTV by computers.[17][18]

Modern Methods

The rise of electronic communication methods have lead to a burgeoning of the mass surveillance in the 21st century. The blatant - and unpunished - disregard for the law by both NSA and GCHQ should leave little doubt that legal restrictions are mostly left for show.

Audio Surveillance

Various electronic devices have made audio recordings and for internet behavior.[19][20]

Voiceprint

Voiceprint.png

The NSA can, from audio recordings, create a voiceprint that makes it possible to track a person globally when he/she makes a call via regular connection, cell or landline.[21] The technology was developed from the mid-2000s onwards,[22][23] while “machine transcribed speech” was discovered in patents back in 1999.[24]

The Range-R system is one of a number of such devices that have been developed in recent years.[25] These are battlefield technology that is becoming available for police forces.[26]

Televisions

Television sets have been hacked to bring them into a "fake off mode".[27]

XBoxes

In August 2019, Motherboard wrote that Microsoft contractors have admitted to listening to users of XBoxes they "said that recordings were sometimes triggered and recorded by mistake".[28]

Internet Surveillance

Full article: Internet/Surveillance

While the Internet was designed to be decentralised, and so non-trivial to censor/monitor, the NSA has been consistently trying for decades to stifle an effective roll out of cryptography for decades. Several whistleblowers have revealed that the NSA has fiber optic splitters which allow for monitoring of huge amounts of data. The connection with internet censorship is clear; when everyone's posting is watched, unwanted content is easily removed, moreover, self-censorship may become endemic due to fear of reprisals - Webster Tarpley and others have suggested that this perspective may help understand the Edward Snowden Affair, and would tally with a large number of disclosures of mass surveillance of other natures made recently.

Operating System

Common operating systems on the market like Microsofts Windows, Apples IOS and Googles Android are mostly used with an online connection. The devices that run these operating systems, by design will become the first functioning part of the data collection process over the Internet which the user has no real overview of.

Watch lists

Full article: Watch lists

The official narrative of watch lists is that they help assist law enforcement in prevention of terrorist activity. In practice, however, they are better understood as a means of mass surveillance (because everyone has to give their details, to prove that they are not on a watch list). Since the management of these lists is completely opaque, they can also be understood as a precursor to the enforcement of a heavy-handed police state - one in which individual rights are conditional and can be revoked at a moment's notice without the need for such matters as evidence of wrong doing.

Postal surveillance

Full article: Mail Isolation Control and Tracking

After the 2001 anthrax attacks, which were initially blamed on "Islamic terrorists", although the anthrax was later proved to have come from a US military laboratory, the US government secretly instituted a program to photograph all the mail sent in the US. This went undisclosed to the general public for over a decade. In 2015, it was revealed that the US Postal Inspection Service had installed a utility box "positioned to capture and record the license plates and facial features of customers leaving a Golden Post Office." [29]

Cellphone location data

In 2013, in response to a subpoena for cellphone data, the NSA claimed that "The government does not possess the records the defendant seeks", i.e. specifically denied that they had collected cellphone data, although the Foreign Intelligence Surveillance Act court order stated that they could have collected this data.[30] At the same time all of this type surveillance data is available for the cellphone network providers, whose data the NSA may access with ease, irregardless of any legal regulation. Apple and others do have a history of collecting location data secretly.[31][32]

Covid-19 pandemic

Many governments of the world admitted to using cellphone data during the Covid-19 pandemic, prompting questions about whether it would ever be rolled back.[33][34][35]

“Always keen to get the latest smartphone? Soon it won’t matter, said Mike Bechtel, Chief Futurist at Deloitte. “Over the next 10 years its going to be about moving beyond the device,” he said. “We can’t realistically have 15 smart speakers everywhere we go....We are going to be moving to ambient experiences, which is shorthand for a sort of digital Downton Abbey where we don’t ask Echo or Google ‘What’s the weather?’, we just say ‘What’s the weather?’ and the right agent jumps up at the right time to give the right answer.”
Mike Bechtel (16 Apr 2021)  [36]

Response

Mass surveillance cartoon.jpg

The commercially-controlled media has not dwelt on the illegality of mass surveillance carried out continuously by intelligence agencies. Instead, the political establishment has moved to legalise such actions, under the pretext of the threat of "terrorism". Only token discussion has ever been made in corporate media about whether mass surveillance is helpful in this regard.

“Perhaps the most curious thing about the response to revelations concerning the extent of modern mass surveillance is that most people in the West have not seemed to mind; we have not perceptibly altered our online behavior or demanded a response from our governments. We seem not able or willing to grasp the implications, and we have shown a weary cynicism that evidently masks a deeper indifference. Many have shown an eager complicity, free of defensiveness. If you are innocent, you have nothing to fear, we insist, forgetting the innocence of millions interned and murdered by Western governments within living memory. Surveillance will keep us safe from our enemies, we say, obediently accepting the pronouncements of our governments on the identities of our enemies and the proper sources of our terror.”
Amanda Power (February 2016)  Under Watchful Eyes [37]


 

Examples

Page nameDateDescription
"Digital identity"information used by computer systems to represent a person or group.
"Smart city"A prison-city with an algorithm as warden
"Strike Hard Campaign"A research project into repressive social control carried out against Chinese Muslims.
1-3-30 PlanA Rockefeller Foundation sponsored large scale surveillance proposal and simulation. Held April 2020
Australia/Universal surveillance
CONTEST
ECHELON
FacebookThe world's most popular social network, with over 1,000,000,000 users in 2014.
GoogleGlobal Internet/Skynet conglomerate
InfraGardProgram to turn private-sector corporations - having access to enormous amounts of information on citizens - into surrogate eyes and ears for the FBI.
InslawComplex financial/political fraud the full dimensions of which were never uncovered, but some of which were forced onto the official record.
Internet/SurveillanceWholesale surveillance of the citizenry is the new normal, introduced under the smokescreen of the "war on terror".
LifeLogA DARPA project to create a system of collecting data about users in a single place. It was cancelled when Facebook started, in February 2004.
Mail Isolation Control and TrackingA US mail program to photograph of the exterior of every piece of mail that is processed in the United States.
Maximator-AllianceIntelligence Alliance, similar to Five Eyes.
NSA/Boundless Informant
NSA/PRISM
NewsGuardA tech company which is teaming up with Microsoft as regards "fake news"
Project SHAMROCKNSA surveillance program
Romas/COINUS SIGINT program of mass surveillance and data mining operated against the Arab world through 2009-2011
Satellite
Sentient World Simulation
ShadowNet
Surveillance and censorship programThe UK government's 'Surveillance and censorship' (SAC) program is alleged by Kevin Galalae to be a part of the their CONTEST 'war on terror' strategy. He describes it as a project to 'brainwash the young and the impressionable to hold skewed and hypocritical views in line with the British Government’s foreign and domestic policy objectives'.
United States Postal Inspection ServiceThe "law enforcement arm of the United States Postal Service."

 

A Mass surveillance victim on Wikispooks

TitleDateDescription
Denis RancourtFormerly a former tenured professor of physics, Rancourt was dismissed after covert surveillance and legal maneuverings by the University of Ottawa in Canada.

 

Related Quotations

PageQuoteAuthorDate
"Vaccine passport"“Eventually we will need some digital certificates to show who has recovered or been tested (for COVID-19) recently, or when we have a vaccine, who has received it.”Bill Gates18 March 2020
"Vaccine passport"““We have no plans to introduce them” said the prime minister (Boris Johnson) when talking about so-called vaccine passports. “I certainly am not planning to issue any vaccine passports and I don't know anyone else in government who would”, said Michael Gove and “no one has been given or will be required to have a vaccine passport” said the man himself, the vaccine's minister Nadhim Zahawi. Now in a slope slipperier than the ones Eddie the Eagle used to chuck himself off, it seems the government have changed their mind. First it was talk of nightclubs or sports events, and now the government is I quote “not ruling out making students be fully vaccinated to attend lectures”.... I guarantee you this is not where it ends.”Michelle Dewberry26 July 2021
Australia/1975 coup d'état“There were a number of points of tension between Whitlam's government and the United States intelligence apparatus. Whitlam had close ties with the United States, in 1964 receiving a "Leader" travel grant from the U.S. Department of State to spend three months studying under U.S. government and military officials.

After coming to power, Whitlam quickly removed the last Australian troops from Vietnam. Whitlam government ministers criticised the US bombing of North Vietnam at the end of 1972. The US complained diplomatically about the criticism. In March 1973, US secretary of State William Rogers told Richard Nixon that "the leftists [within the Labor Party would] try to throw overboard all military alliances and eject our highly classified US defence space installations from Australia". In 1973, Whitlam ordered the Australian security organisation ASIS to close its operation in Chile, where it was working as a proxy for the CIA in opposition to Chile's president Salvador Allende. Whitlam's Attorney-General Lionel Murphy used the Australian Federal Police to conduct a raid on the headquarters of the Australian Security Intelligence Organisation (ASIO) in March 1973. CIA Chief of Counter-Intelligence, James Angleton, later said Murphy had "barged in and tried to destroy the delicate mechanism of internal security".

Australian journalist Brian Toohey said that Angleton considered then Australian Prime Minister Gough Whitlam a "serious threat" to the US and was concerned after the 1973 raid on ASIO headquarters. In 1974, Angleton sought to instigate the removal of Whitlam from office by having CIA station chief in Canberra, John Walker, ask the director general of ASIO, Peter Barbour, to make a false declaration that Whitlam had lied about the raid in Parliament. Barbour refused to make the statement. In 1974, Whitlam ordered the head of ASIO, Peter Barbour, to sever all ties with the CIA. Barbour ignored Whitlam's order and contact between Australian and US security agencies was driven underground. Whitlam later established a royal commission into intelligence and security. Jim Cairns became Deputy Prime Minister after the 1974 election. He was viewed by US secretary of state Henry Kissinger and defence secretary James Schlesinger as "a radical with strong anti-American and pro-Chinese sympathies". The US administration was concerned that he would have access to classified United States intelligence.

Whitlam instantly dismissed ASIS chief WT Robinson in 1975 after discovering ASIS had assisted the Timorese Democratic Union in an attempted coup against the Portuguese administration in Timor, without informing Whitlam's government.

Whitlam threatened to reveal the identities of CIA agents working in Australia. He also threatened not to renew the lease of the US spy base at Pine Gap, which was due to expire on 10 December 1975. The US was also concerned about Whitlam's intentions towards its spy base at Nurrungar.”
Wikipedia2022
Backdoor“Every year, we learn about some issue in WhatsApp that puts everything on their users' devices at risk. Which means it's almost certain that a new security flaw already exists there. Such issues are hardly incidental – they are planted backdoors. If one backdoor is discovered and has to be removed, another one is added”Pavel Durov5 October 2022
CONTEST/Prevent“I hear criticism but I absolutely don't accept it. Prevent is not about spying on communities. It's about safeguarding.”2017
China“The US believes a suspected Chinese surveillance balloon that was shot down over its territory is part of a wider fleet that has spanned five continents.

"The United States was not the only target of this broader programme," Secretary of State Antony Blinken said. He added that the US had shared information gathered from the balloon debris with dozens of other countries. China has denied the balloon was being used for spying purposes, and says it was a weather device blown astray. US officials have described the balloon as being about 200 ft (60m) tall, with the payload portion comparable in size to regional airliners and weighing hundreds - or potentially thousands - of pounds. Its presence in US airspace set off a diplomatic crisis and prompted Secretary Blinken to immediately call off a trip to China - the first such high level US-China meeting there in years. It was later shot down by a US fighter jet off the eastern coast.

Citing unnamed officials, the Washington Post reported that the US believes the suspected surveillance balloon project was being operated from China's coastal Hainan province and targeted countries including Japan, India, Vietnam, Taiwan and the Philippines.”
BBC2023
FBI“According to its analysis of the documents in this FBI office, 1 percent were devoted to organized crime, mostly gambling; 30 percent were "manuals, routine forms, and similar procedural matter"; 40 percent were devoted to political surveillance and the like, including two cases involving right-wing groups, ten concerning immigrants, and over 200 on left or liberal groups. Another 14 percent of the documents concerned draft resistance and "leaving the military without government permission." The remainder concerned bank robberies, murder, rape, and interstate theft.”Noam Chomsky
Citizens' Commission to Investigate the FBI
Bill Gates“Eventually what we’ll have to have is certificates of who’s a recovered person, who’s a vaccinated person […] Because you don’t want people moving around the world where you’ll have some countries that won’t have it under control, sadly. You don’t want to completely block off the ability for people to go there and come back and move around. So eventually there will be this digital immunity proof that will help facilitate the global reopening up.Bill Gates24 March 2020
ID2020“Beyond the enormous economic interests that motivate the promoters of the Great Reset, the imposition of the vaccination will be accompanied by the requirement of a health passport and a digital ID, with the consequent contact tracing of the population of the entire world. Those who do not accept these measures will be confined in detention camps or placed under house arrest, and all their assets will be confiscated.”Carlo Maria Viganò25 October 2020
Logic Industries
Covert UAE-Israel Security relationship

In 2008 Abu Dhabi authorities agreed to pay an Israeli owned company $816mn to install security systems protecting oil and gas installations in the emirate.

Through working with two partner companies former Intelligence agent Mati Kochavi has also won contracts to implement the entire emirate-wide Falcon Eye surveillance project that monitors the movements of all those living in Abu Dhabi.”
Mobile phone“A mobile phone is a tracking device that also makes calls”Julian Assange
Holger Münch“The still high incidence of punishable hate posting shows a need for police action. Our free society must not allow a climate of fear, threat, criminal violence and violence either on the street or on the internet.”Holger Münch21 June 2017
National Security Agency“Your Data: If You Have Nothing to Hide, You Have Nothing to Fear”National Security Agency
Platformization“Platform businesses, such as Amazon, Google and Facebook, have come to dominate their respective markets. They have generated massive network effects by facilitating exchanges with technology. As these platforms get more popular, their user value increases, leading to a virtuous cycle where the entire market coalesces around them. Their success has benefited consumers, with both low prices and access to more data-driven services. But this has also resulted in winner-take-all dynamics, making them powerful monopolies and preventing new entrants from coming in and attracting the market away from the dominant platforms. While users have come to coalesce around these platforms because their needs are being well-served, their powerful network effects risk guaranteeing their winner-take-all position. In their initial days, these platforms rapidly gained user acceptance by providing value to them. Their benevolence is increasingly looking like dominance. While they have enabled interactions and opened up markets, increasing efficiency for customers and vendors alike, they are attracting scrutiny. Data has become currency and they have a monopoly on it.”Sangeet Paul Choudary8 May 2017
Dick Schoof“Here you come to the metaphor of the frog in the pan. If you slowly make the water in the pan hotter, the frog would stay put. But if you throw the frog into a hot pan, it jumps right out.”Dick Schoof2023
TSAEl Reg: "Sonic Screwdriver is cleared aimed at molesting seized machines, or during black bag operations, not at interfering with factory-fresh products in transit."

Do it at airports during a customs inspection. Take the computer out of the owner's sight and install whatever you want.

Or better still, come up with some sort of bogus excuse to force everyone to put their laptops in checked baggage, and then do it in the baggage handling process. That way the subject wouldn't know they had been targeted. Not that anyone would ever dream of doing something as disruptive as arbitrarily forcing people to check their laptops of course...”
23 March 2017
Peter Thiel“I believe that it is always important to exchange views with people, no matter what their perspectives are. I think we have a lot of problems in our society and we need to be finding ways to talk to people. We need to find ways to talk to people where not everything is completely transparent. Libertarianism is not synonymous with radical transparency. That’s often an argument that Stasi would make in East Germany, when everything had to be monitored by society. And I think you have the best conversations in smaller groups where not everything is being monitored. That’s how you can have very honest conversations and you can think better about the future.”Peter Thiel2016
Russ Tice“Why would anyone believe a bloody word of what NSA says about their mass domestic surveillance programs? They have lied repeatedly in the past and they are likely lying now. They have been collecting meta data and content, word-for-word, both voice and text, for some time now.”Russ Tice2019
UK“The UK's communications watchdog Ofcom has overturned its ban on the use of GSM gateways (COMUGs) for overseas phone calls – leaving one of the longest prosecutions in modern English legal history hanging in the balance. The decision comes after a controversial public consultation exercise held earlier this year, in which The Register caught the Home Office's secret spy powers unit trying to anonymously lobby the regulator and keep the ban.”Gareth Corfield10 July 2017
UK/Deep state“The UK's communications watchdog Ofcom has overturned its ban on the use of GSM gateways (COMUGs) for overseas phone calls – leaving one of the longest prosecutions in modern English legal history hanging in the balance. The decision comes after a controversial public consultation exercise held earlier this year, in which The Register caught the Home Office's secret spy powers unit trying to anonymously lobby the regulator and keep the ban.”Gareth Corfield10 July 2017
Naomi Wolf“I am not overstating this, I can't say it forcefully enough, this is literally the end of human liberty in the West if this plan [of vaccine passports] unfolds...”Naomi Wolf29 March 2021

 

Related Documents

TitleTypePublication dateAuthor(s)Description
Document:10 Ways We Are Being Tracked Traced and Databasedblog post10 July 2010'Activist'A summary overview of technological developments in the main branches of surveillance technology with examples of their current and developing application.
Document:Google and the NSAarticle24 August 2013Julian Assange
Document:Hacker Generationsarticle23 August 2011Richard ThiemeOn the origins and real meaning of "Hacker"; a term which, in company with "conspiracy-theory", "Holocaust-denial" and many others has been co-opted/invented by Establishments to marginalise research deemed most threatening to the Official Narratives that define "Consensus trance" reality.
Document:Hacking on a Scale you can Barely Imaginearticle6 December 2012John PilgerOn the glaring omissions and hypocrisies of the Leveson Inquiry into Press standards, noting especially the vast covert programs of interception and permanent storage of every item of electronic communication on the planet for later data-mining wherever the state might deem it expedient to re-construct the life and movements of targetted individuals.
Document:Julian Assange at Moment of TruthVideo transcript15 September 2014Julian AssangeSpeech by Julian Assange to the Moment of Truth event in New Zealand on 15 September 2014
Document:NSA GCHQ and the Death of Gareth Williamsarticle14 November 2011Trowbridge FordA speculative article connecting the NSA with the death of Gareth Williams
Document:The Essential Rules of Tyrannywebpage29 July 2011Brandon Smith
Document:The demise of global communications securityWikispooks Page21 September 2005Wayne Madsen
Document:Unthinking extremism - Radicalising narratives that legitimise surveillancepaper26 October 2015Ben Harbisher
File:Dissent or Terror FINAL 0.pdfreport20 May 2013Beau HodaDissent or Terror a report that details how the counter-terrorism apparatus was used to monitor the Occupy Movement nationwide
File:Full-Disclosure.pdfreport4 December 2013The AdversariesIf your UK internet service and equipment provider is BT (and probably any other of the large UK ISP's), then it is a trivial matter for GCHQ and its agencies to route a duplicate of all your traffic to a spook server, access your home computer network, install malware and retrieve any passwords and encryption keys stored on it. You have been warned.
File:Operation-shady-rat.pdfreport2 August 2011Dmitri Alperovitch


Rating

3star.png 8 November 2017 Robin  A good overview of this important topic
Although rather wordy and in need of better structure, this page gathers a lot of relevant information in one place and presents insight into this important topic.
Many thanks to our Patrons who cover ~2/3 of our hosting bill. Please join them if you can.


References

  1. https://www.globalresearch.ca/the-new-mind-control-subliminal-stimulation-controlling-people-without-their-knowledge/5511628 Global Research
  2. http://www.911truth.org/trump-bush-had-advanced-notice-of-911/
  3. http://www.911truth.org/trump-bush-had-advanced-notice-of-911/
  4. http://www.theregister.co.uk/2017/03/10/united_nations_special_rapporteur_on_privacy_report/
  5. http://www.rt.com/uk/314157-britain-surveillance-dangerous-un/
  6. Robert H. Ferrell (ed.) Dear Bess: The Letters from Harry to Bess Truman, 1910-1959 (New York: W. W. Norton, 1983), 550.
  7. https://en.wikipedia.org/wiki/Watch_Dogs
  8. https://me-en.kaspersky.com/about/press-releases/2014_ubisoft-consulted-with-kaspersky-lab-to-authenticate-watch-dogs-script
  9. http://people.csail.mit.edu/fadel/papers/wivi-paper.pdf
  10. https://www.technologyreview.com/2018/09/12/140293/dina-katabi-emerald-walls/
  11. https://medium.com/syncedreview/seeing-through-walls-with-adversarial-wifi-sensing-attack-and-defence-strategies-7ee2559a7f8
  12. https://arxiv.org/pdf/1810.10109.pdf
  13. http://www.defensenews.com/story/defense/international/europe/2014/12/17/italian-reaper-drones-to-be-used-for-crowd-monitoring/20528495/
  14. http://www.usatoday.com/story/news/2015/01/19/police-radar-see-through-walls/22007615/
  15. https://www.eff.org/deeplinks/2013/02/secretive-stingray-surveillance-tool-becomes-more-pervasive-questions-over-its
  16. http://www.propublica.org/article/judge-orders-nypd-to-release-records-on-x-ray-vans
  17. http://21stcenturywire.com/2015/01/29/revealed-the-tsas-new-computerized-facial-and-emotional-recognition-system/
  18. http://motherboard.vice.com/read/us-customs-quietly-launches-facial-recognition-experiment-at-dc-airport
  19. https://techcrunch.com/2019/07/26/siri-recordings-regularly-sent-to-apple-contractors-for-analysis-claims-whistleblower/
  20. https://www.naturalnews.com/2019-01-10-google-caught-secretly-recording-conversations-mobile-device.html
  21. https://www.cnbc.com/2018/01/20/the-nsa-can-recognize-you-by-just-your-voice-predating-apple-amazon.html
  22. https://www.biometricupdate.com/201801/nsa-voice-recognition-capabilities-appear-to-be-more-advanced-than-previously-thought
  23. http://archive.today/2024.11.01-161853/http://www.nbmachinetool.com/content-about-the-power-of-the-3145.html
  24. https://theintercept.com/2015/05/11/speech-recognition-nsa-best-kept-secret/
  25. https://web.archive.org/web/20200911200826/https://assets.documentcloud.org/documents/1505138/00-wallsensorreport-508.pdf
  26. https://reason.com/2015/01/20/police-use-radar-device-to-see-inside-yo/
  27. https://www.consumerreports.org/electronics-computers/privacy/a-closer-look-at-the-tvs-from-the-cia-vault-7-hack-a1864416431/
  28. https://www.vice.com/en_us/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana
  29. http://gizmodo.com/u-s-post-offices-have-installed-hidden-spy-cameras-to-1691112318
  30. http://www.motherjones.com/kevin-drum/2013/06/nsa-claims-it-doesnt-track-movements-cell-phone-users
  31. http://web.archive.org/web/20150417071618/http://radar.oreilly.com/2011/04/apple-location-tracking.html
  32. http://archive.today/2020.12.04-174303/https://www.wsj.com/articles/SB10001424052748703983704576277101723453610
  33. https://www.theregister.co.uk/2020/04/14/contact_tracing_exit_strategy/
  34. https://medium.com/@caityjohnstone/they-are-rolling-out-the-architecture-of-oppression-now-because-they-fear-the-people-d0d374509d
  35. https://www.vice.com/en_us/article/bvge5q/snowden-warns-governments-are-using-coronavirus-to-build-the-architecture-of-oppression
  36. https://www.weforum.org/agenda/2021/04/global-technology-governance-summit-gtgs-future/
  37. https://www.laphamsquarterly.org/spies/under-watchful-eyes Lapham's Quarterly