Mass surveillance

From Wikispooks
Revision as of 13:35, 24 February 2015 by Urban (talk | contribs) (preparatory act)
Jump to navigation Jump to search

Concept.png Mass surveillance Rdf-entity.pngRdf-icon.png 3
Mass surveillance.jpg
Interest of• AMD
• Apple
• Jacob Applebaum
• Below Gotham Labs
• Big Brother Watch
• Carole Cadwalladr
• Dark Politricks
• Michael Drury
• ID2020
• International Festival of Whistleblowing Dissent and Accountability
• Philip Matthews
• Microsoft
• William Odom
• Privacy International
• Security Without Borders
• The Juice Media
• The Paypal Mafia
Subpage(s)Mass surveillance/Technology
Wholesale surveillance of the citizenry is the new normal, introduced under the smokescreen of the "war on terror". It is both a precondition and a preparatory act for more invasive measures like the suspension of habeas corpus as i.e. introduced in the patriot act.

Rhetoric about the "war on terror" and repeated false flag terror attacks have been used in conjunction the commercially-controlled media to instill fear in populations. This fear has been used to quell dissent and justify the introduction of mass surveillance techniques. This has been particularly useful in countries such as the USA and the UK which had laws and traditions about privacy which, if enforced, could have prevented such surveillance. A widespread culture of impunity for those who control the structures of Western nation states mean that few (if any?) serious commentators regard such objections to mass surveillance as effective in practice - the only remaining limitations on data collection are purely technical in nature.

Internet Surveillance

Full article: Internet/Surveillance

While the Internet was designed to be decentralised, and so non-trivial to censor/monitor, the NSA has been consistently trying for decades to stifle an effective roll out of cryptography for decades. Several whistleblowers have revealed that the NSA has fiber optic splitters which allow for monitoring of huge amounts of data. The connection with internet censorship is clear; when everyone's posting is watched, unwanted content is easily removed, moreover, self-censorship may become endemic due to fear of reprisals - Webster Tarpley and others have suggested that this perspective may help understand the Edward Snowden Affair, and would tally with a large number of disclosures of mass surveillance of other natures made recently.

Watch lists

Full article: Watch lists

The official narrative of watch lists is that they help assist law enforcement in prevention of terrorist activity. In practice, however, they are better understood as a means of mass surveillance (because everyone has to give their details, to prove that they are not on a watch list). Since the management of these lists is completely opaque, they can also be understood as a precursor to the enforcement of a heavy-handed police state - one in which individual rights are conditional and can be revoked at a moment's notice without the need for such matters as evidence of wrong doing.

Postal surveillance

Full article: Mail Isolation Control and Tracking

After the 2001 anthrax attacks, which were initially blamed on "Islamic terrorists", although the anthrax was later proved to have come from a US military laboratory, the US government secretly instituted a program to photograph all the mail sent in the US. This went undisclosed to the general public for over a decade.

Cellphone location data

In 2013, in response to a subpoena for cellphone data, the NSA claimed that "The government does not possess the records the defendant seeks", i.e. specifically denied that they had collected cellphone data, although the Foreign Intelligence Surveillance Act court order stated that they could have collected this data.[1]

New Technologies

RANGE-R.png

The US military has developed new surveillance technologies which - with or without trialling in war zones overseas - are being rolled out across the country. Legal barriers are no effective impediment in what many have termed a police state.

Aerial Surveillance

In December 2014 it was announced that Italian Reaper UAVs are to be used to monitor soccer games and demonstrations in Italy’s cities, following a deal struck between the Italian Air Force and the country’s police forces.[2]

Hand Held Radar

In January 2015, it was first reported that since 2012 the United States Marshals Service has been using hand held radars which can "see through walls". Originally developed for use in Iraq and Afghanistan, they are sensitive enough to detect human breathing within 50 feet.[3]

Cellphone Surveillance Tools

Termed by the Electronic Frontier Foundation "an unconstitutional, all-you-can-eat data buffet"[4] Stingray phone trackers are IMSI-catchers (International Mobile Subscriber Identity), a cellular phone surveillance device, manufactured by the Harris Corporation. Used since at least 2006, their use became public knowledge around 2012. They allow collection of data stored on phones, listening in on calls, blocking calls and man-in-the-middle attacks to capture all data.

X-Ray Vans

The Z Backscatter Van can scan while driving alongside a line of vehicles or while parked as they pass by. (American Science and Engineering Inc.)

In 2015 a US judge required that more details be published about the unmarked vans with which NYPD uses X-Rays to carry out surveillance on citizens.[5]

Licence Plate Readers

In January 2015, it was first reported that the Drug Enforcement Administration had initiated a massive nation wide scheme to coordinate automated collection of car license plates, coordinating DEA-owned automatic license plate readers with readers controlled by the Customs and Border Patrol and other agencies of the US government. Documents released under FOIA note that the aims are "to identify travel patterns" but the primary aim is "asset forfeiture." A slideshow released under FOIA suggested that the database had over 343 million records.[6] In 2014 the LAPD argued in a US court that all license plate data was required to aid in ongoing investigations.

"Taken to an extreme, the agencies’ arguments would allow law enforcement to conduct around-the-clock surveillance on every aspect of our lives and store those records indefinitely on the off-chance they may aid in solving a crime at some previously undetermined date in the future. If the court accepts their arguments, the agencies would then be able to hide all this data from the public." - EFF, 2014[7]

Facial Recognition

In Febriary 2015, it was revealed that the UK Police uploaded up to 18 million "mugshots" to a facial recognition database linked to facial recognition software, which they claimed complied with the UK Data Protection Act. Such technology is already used by MI5, MI6 and Border Force.[8] The TSA has reportedly been developing systems to analyse moods and emotions based on facial microgestures, while in the UK 'walk signatures' are computer analysed.[9]


 

Examples

Page nameDateDescription
"Digital identity"information used by computer systems to represent a person or group.
"Smart city"A prison-city with an algorithm as warden
"Strike Hard Campaign"A research project into repressive social control carried out against Chinese Muslims.
1-3-30 PlanA Rockefeller Foundation sponsored large vaccine passport planning simulation. Held April 2020
Australia/Universal surveillance
CONTEST
ECHELON
FacebookThe world's most popular social network, with over 1,000,000,000 users in 2014.
GoogleGlobal Internet/Skynet conglomerate
InfraGardProgram to turn private-sector corporations - having access to enormous amounts of information on citizens - into surrogate eyes and ears for the FBI.
InslawComplex financial/political fraud the full dimensions of which were never uncovered, but some of which were forced onto the official record.
Internet/SurveillanceWholesale surveillance of the citizenry is the new normal, introduced under the smokescreen of the "war on terror".
LifeLogA DARPA project to create a system of collecting data about users in a single place. It was cancelled when Facebook started, in February 2004.
Mail Isolation Control and TrackingA US mail program to photograph of the exterior of every piece of mail that is processed in the United States.
Maximator-AllianceIntelligence Alliance, similar to Five Eyes.
NSA/Boundless Informant
NSA/PRISM
NewsGuardA tech company which is teaming up with Microsoft as regards "fake news"
Project SHAMROCKNSA surveillance program
Romas/COINUS SIGINT program of mass surveillance and data mining operated against the Arab world through 2009-2011
Satellite
Sentient World Simulation
ShadowNet
Surveillance and censorship programThe UK government's 'Surveillance and censorship' (SAC) program is alleged by Kevin Galalae to be a part of the their CONTEST 'war on terror' strategy. He describes it as a project to 'brainwash the young and the impressionable to hold skewed and hypocritical views in line with the British Government’s foreign and domestic policy objectives'.
United States Postal Inspection ServiceThe "law enforcement arm of the United States Postal Service."

 

A Mass surveillance victim on Wikispooks

TitleDateDescription
Denis RancourtFormerly a former tenured professor of physics, Rancourt was dismissed after covert surveillance and legal maneuverings by the University of Ottawa in Canada.

 

Related Quotations

PageQuoteAuthorDate
"Vaccine passport"“Eventually we will need some digital certificates to show who has recovered or been tested (for COVID-19) recently, or when we have a vaccine, who has received it.”Bill Gates18 March 2020
"Vaccine passport"““We have no plans to introduce them” said the prime minister (Boris Johnson) when talking about so-called vaccine passports. “I certainly am not planning to issue any vaccine passports and I don't know anyone else in government who would”, said Michael Gove and “no one has been given or will be required to have a vaccine passport” said the man himself, the vaccine's minister Nadhim Zahawi. Now in a slope slipperier than the ones Eddie the Eagle used to chuck himself off, it seems the government have changed their mind. First it was talk of nightclubs or sports events, and now the government is I quote “not ruling out making students be fully vaccinated to attend lectures”.... I guarantee you this is not where it ends.”Michelle Dewberry26 July 2021
Australia/1975 coup d'état“There were a number of points of tension between Whitlam's government and the United States intelligence apparatus. Whitlam had close ties with the United States, in 1964 receiving a "Leader" travel grant from the U.S. Department of State to spend three months studying under U.S. government and military officials.

After coming to power, Whitlam quickly removed the last Australian troops from Vietnam. Whitlam government ministers criticised the US bombing of North Vietnam at the end of 1972. The US complained diplomatically about the criticism. In March 1973, US secretary of State William Rogers told Richard Nixon that "the leftists [within the Labor Party would] try to throw overboard all military alliances and eject our highly classified US defence space installations from Australia". In 1973, Whitlam ordered the Australian security organisation ASIS to close its operation in Chile, where it was working as a proxy for the CIA in opposition to Chile's president Salvador Allende. Whitlam's Attorney-General Lionel Murphy used the Australian Federal Police to conduct a raid on the headquarters of the Australian Security Intelligence Organisation (ASIO) in March 1973. CIA Chief of Counter-Intelligence, James Angleton, later said Murphy had "barged in and tried to destroy the delicate mechanism of internal security".

Australian journalist Brian Toohey said that Angleton considered then Australian Prime Minister Gough Whitlam a "serious threat" to the US and was concerned after the 1973 raid on ASIO headquarters. In 1974, Angleton sought to instigate the removal of Whitlam from office by having CIA station chief in Canberra, John Walker, ask the director general of ASIO, Peter Barbour, to make a false declaration that Whitlam had lied about the raid in Parliament. Barbour refused to make the statement. In 1974, Whitlam ordered the head of ASIO, Peter Barbour, to sever all ties with the CIA. Barbour ignored Whitlam's order and contact between Australian and US security agencies was driven underground. Whitlam later established a royal commission into intelligence and security. Jim Cairns became Deputy Prime Minister after the 1974 election. He was viewed by US secretary of state Henry Kissinger and defence secretary James Schlesinger as "a radical with strong anti-American and pro-Chinese sympathies". The US administration was concerned that he would have access to classified United States intelligence.

Whitlam instantly dismissed ASIS chief WT Robinson in 1975 after discovering ASIS had assisted the Timorese Democratic Union in an attempted coup against the Portuguese administration in Timor, without informing Whitlam's government.

Whitlam threatened to reveal the identities of CIA agents working in Australia. He also threatened not to renew the lease of the US spy base at Pine Gap, which was due to expire on 10 December 1975. The US was also concerned about Whitlam's intentions towards its spy base at Nurrungar.”
Wikipedia2022
Backdoor“Every year, we learn about some issue in WhatsApp that puts everything on their users' devices at risk. Which means it's almost certain that a new security flaw already exists there. Such issues are hardly incidental – they are planted backdoors. If one backdoor is discovered and has to be removed, another one is added”Pavel Durov5 October 2022
CONTEST/Prevent“I hear criticism but I absolutely don't accept it. Prevent is not about spying on communities. It's about safeguarding.”2017
China“The US believes a suspected Chinese surveillance balloon that was shot down over its territory is part of a wider fleet that has spanned five continents.

"The United States was not the only target of this broader programme," Secretary of State Antony Blinken said. He added that the US had shared information gathered from the balloon debris with dozens of other countries. China has denied the balloon was being used for spying purposes, and says it was a weather device blown astray. US officials have described the balloon as being about 200 ft (60m) tall, with the payload portion comparable in size to regional airliners and weighing hundreds - or potentially thousands - of pounds. Its presence in US airspace set off a diplomatic crisis and prompted Secretary Blinken to immediately call off a trip to China - the first such high level US-China meeting there in years. It was later shot down by a US fighter jet off the eastern coast.

Citing unnamed officials, the Washington Post reported that the US believes the suspected surveillance balloon project was being operated from China's coastal Hainan province and targeted countries including Japan, India, Vietnam, Taiwan and the Philippines.”
BBC2023
FBI“According to its analysis of the documents in this FBI office, 1 percent were devoted to organized crime, mostly gambling; 30 percent were "manuals, routine forms, and similar procedural matter"; 40 percent were devoted to political surveillance and the like, including two cases involving right-wing groups, ten concerning immigrants, and over 200 on left or liberal groups. Another 14 percent of the documents concerned draft resistance and "leaving the military without government permission." The remainder concerned bank robberies, murder, rape, and interstate theft.”Noam Chomsky
Citizens' Commission to Investigate the FBI
Bill Gates“Eventually what we’ll have to have is certificates of who’s a recovered person, who’s a vaccinated person […] Because you don’t want people moving around the world where you’ll have some countries that won’t have it under control, sadly. You don’t want to completely block off the ability for people to go there and come back and move around. So eventually there will be this digital immunity proof that will help facilitate the global reopening up.Bill Gates24 March 2020
ID2020“Beyond the enormous economic interests that motivate the promoters of the Great Reset, the imposition of the vaccination will be accompanied by the requirement of a health passport and a digital ID, with the consequent contact tracing of the population of the entire world. Those who do not accept these measures will be confined in detention camps or placed under house arrest, and all their assets will be confiscated.”Carlo Maria Viganò25 October 2020
Logic Industries
Covert UAE-Israel Security relationship

In 2008 Abu Dhabi authorities agreed to pay an Israeli owned company $816mn to install security systems protecting oil and gas installations in the emirate.

Through working with two partner companies former Intelligence agent Mati Kochavi has also won contracts to implement the entire emirate-wide Falcon Eye surveillance project that monitors the movements of all those living in Abu Dhabi.”
Mobile phone“A mobile phone is a tracking device that also makes calls”Julian Assange
Holger Münch“The still high incidence of punishable hate posting shows a need for police action. Our free society must not allow a climate of fear, threat, criminal violence and violence either on the street or on the internet.”Holger Münch21 June 2017
National Security Agency“Your Data: If You Have Nothing to Hide, You Have Nothing to Fear”National Security Agency
Platformization“Platform businesses, such as Amazon, Google and Facebook, have come to dominate their respective markets. They have generated massive network effects by facilitating exchanges with technology. As these platforms get more popular, their user value increases, leading to a virtuous cycle where the entire market coalesces around them. Their success has benefited consumers, with both low prices and access to more data-driven services. But this has also resulted in winner-take-all dynamics, making them powerful monopolies and preventing new entrants from coming in and attracting the market away from the dominant platforms. While users have come to coalesce around these platforms because their needs are being well-served, their powerful network effects risk guaranteeing their winner-take-all position. In their initial days, these platforms rapidly gained user acceptance by providing value to them. Their benevolence is increasingly looking like dominance. While they have enabled interactions and opened up markets, increasing efficiency for customers and vendors alike, they are attracting scrutiny. Data has become currency and they have a monopoly on it.”Sangeet Paul Choudary8 May 2017
Dick Schoof“Here you come to the metaphor of the frog in the pan. If you slowly make the water in the pan hotter, the frog would stay put. But if you throw the frog into a hot pan, it jumps right out.”Dick Schoof2023
TSAEl Reg: "Sonic Screwdriver is cleared aimed at molesting seized machines, or during black bag operations, not at interfering with factory-fresh products in transit."

Do it at airports during a customs inspection. Take the computer out of the owner's sight and install whatever you want.

Or better still, come up with some sort of bogus excuse to force everyone to put their laptops in checked baggage, and then do it in the baggage handling process. That way the subject wouldn't know they had been targeted. Not that anyone would ever dream of doing something as disruptive as arbitrarily forcing people to check their laptops of course...”
23 March 2017
Peter Thiel“I believe that it is always important to exchange views with people, no matter what their perspectives are. I think we have a lot of problems in our society and we need to be finding ways to talk to people. We need to find ways to talk to people where not everything is completely transparent. Libertarianism is not synonymous with radical transparency. That's often an argument that Stasi would make in East Germany, when everything had to be monitored by society. And I think you have the best conversations in smaller groups where not everything is being monitored. That's how you can have very honest conversations and you can think better about the future.”Peter Thiel2016
Russ Tice“Why would anyone believe a bloody word of what NSA says about their mass domestic surveillance programs? They have lied repeatedly in the past and they are likely lying now. They have been collecting meta data and content, word-for-word, both voice and text, for some time now.”Russ Tice2019
UK“The UK's communications watchdog Ofcom has overturned its ban on the use of GSM gateways (COMUGs) for overseas phone calls – leaving one of the longest prosecutions in modern English legal history hanging in the balance. The decision comes after a controversial public consultation exercise held earlier this year, in which The Register caught the Home Office's secret spy powers unit trying to anonymously lobby the regulator and keep the ban.”Gareth Corfield10 July 2017
UK/Deep state“The UK's communications watchdog Ofcom has overturned its ban on the use of GSM gateways (COMUGs) for overseas phone calls – leaving one of the longest prosecutions in modern English legal history hanging in the balance. The decision comes after a controversial public consultation exercise held earlier this year, in which The Register caught the Home Office's secret spy powers unit trying to anonymously lobby the regulator and keep the ban.”Gareth Corfield10 July 2017
Naomi Wolf“I am not overstating this, I can't say it forcefully enough, this is literally the end of human liberty in the West if this plan [of vaccine passports] unfolds...”Naomi Wolf29 March 2021

 

Related Documents

TitleTypePublication dateAuthor(s)Description
Document:10 Ways We Are Being Tracked Traced and Databasedblog post10 July 2010'Activist'A summary overview of technological developments in the main branches of surveillance technology with examples of their current and developing application.
Document:Google and the NSAarticle24 August 2013Julian Assange
Document:Hacker Generationsarticle23 August 2011Richard ThiemeOn the origins and real meaning of "Hacker"; a term which, in company with "conspiracy-theory", "Holocaust-denial" and many others has been co-opted/invented by Establishments to marginalise research deemed most threatening to the Official Narratives that define "Consensus trance" reality.
Document:Hacking on a Scale you can Barely Imaginearticle6 December 2012John PilgerOn the glaring omissions and hypocrisies of the Leveson Inquiry into Press standards, noting especially the vast covert programs of interception and permanent storage of every item of electronic communication on the planet for later data-mining wherever the state might deem it expedient to re-construct the life and movements of targetted individuals.
Document:Julian Assange at Moment of TruthVideo transcript15 September 2014Julian AssangeSpeech by Julian Assange to the Moment of Truth event in New Zealand on 15 September 2014
Document:NSA GCHQ and the Death of Gareth Williamsarticle14 November 2011Trowbridge FordA speculative article connecting the NSA with the death of Gareth Williams
Document:The Essential Rules of Tyrannywebpage29 July 2011Brandon Smith
Document:The demise of global communications securityWikispooks Page21 September 2005Wayne Madsen
Document:Unthinking extremism - Radicalising narratives that legitimise surveillancepaper26 October 2015Ben Harbisher
File:Dissent or Terror FINAL 0.pdfreport20 May 2013Beau HodaDissent or Terror a report that details how the counter-terrorism apparatus was used to monitor the Occupy Movement nationwide
File:Full-Disclosure.pdfreport4 December 2013The AdversariesIf your UK internet service and equipment provider is BT (and probably any other of the large UK ISP's), then it is a trivial matter for GCHQ and its agencies to route a duplicate of all your traffic to a spook server, access your home computer network, install malware and retrieve any passwords and encryption keys stored on it. You have been warned.
File:Operation-shady-rat.pdfreport2 August 2011Dmitri Alperovitch


Rating

3star.png 8 November 2017 Robin  A good overview of this important topic
Although rather wordy and in need of better structure, this page gathers a lot of relevant information in one place and presents insight into this important topic.
Many thanks to our Patrons who cover ~2/3 of our hosting bill. Please join them if you can.



References


57px-Notepad icon.png This is a page stub. Please add to it.