Topic: Mass surveillance (Page 2)

You are looking at all articles with the topic "Mass surveillance". We found 28 matches.

Hint: To view all topics, click here. Too see the most popular topics, click here instead.

πŸ”— Operation Ivy Bells

πŸ”— Mass surveillance πŸ”— Espionage πŸ”— Military history πŸ”— Military history/North American military history πŸ”— Military history/United States military history πŸ”— Military history/Maritime warfare πŸ”— Cold War

Operation Ivy Bells was a joint United States Navy, Central Intelligence Agency (CIA), and National Security Agency (NSA) mission whose objective was to place wire taps on Soviet underwater communication lines during the Cold War.

Discussed on

πŸ”— Crypto-Anarchism

πŸ”— Mass surveillance πŸ”— Computing πŸ”— Internet culture πŸ”— Philosophy πŸ”— Cryptography πŸ”— Cryptography/Computer science πŸ”— Numismatics πŸ”— Sociology πŸ”— Numismatics/Cryptocurrency πŸ”— Computing/Computer Security πŸ”— Philosophy/Anarchism πŸ”— Anarchism

Crypto-anarchism (or crypto-anarchy) is a political ideology focusing on protection of privacy, political freedom and economic freedom, the adherents of which use cryptographic software for confidentiality and security while sending and receiving information over computer networks.

By using cryptographic software, the association between the identity of a certain user or organization and the pseudonym they use is made difficult to find, unless the user reveals the association. It is difficult to say which country's laws will be ignored, as even the location of a certain participant is unknown. However, participants may in theory voluntarily create new laws using smart contracts or, if the user is pseudonymous, depend on online reputation.

Discussed on

πŸ”— Hawthorne Effect

πŸ”— Mass surveillance πŸ”— Business πŸ”— Psychology πŸ”— Sociology

The Hawthorne effect is a type of human behavior reactivity in which individuals modify an aspect of their behavior in response to their awareness of being observed. The effect was discovered in the context of research conducted at the Hawthorne Western Electric plant; however, some scholars feel the descriptions are apocryphal.

The original research involved workers who made electrical relays at the Hawthorne Works, a Western Electric plant in Cicero, Illinois. Between 1924 and 1927, the lighting study was conducted. Workers experienced a series of lighting changes in which productivity was said to increase with almost any change in the lighting. This turned out not to be true. In the study that was associated with Elton Mayo, which ran from 1928 to 1932, a series of changes in work structure were implemented (e.g., changes in rest periods) in a group of five women. However, this was a methodologically poor, uncontrolled study that did not permit any firm conclusions to be drawn.

One of the later interpretations by Landsberger suggested that the novelty of being research subjects and the increased attention from such could lead to temporary increases in workers' productivity. This interpretation was dubbed "the Hawthorne effect".

Discussed on

πŸ”— Kwangmyong, the North-Korea-Wide-Web

πŸ”— Mass surveillance πŸ”— Computing πŸ”— Korea πŸ”— Korea/North Korea

Kwangmyong (literally β€œBright Light”) is a North Korean "walled garden" national intranet service opened in 2000.

The network uses domain names under the .kp top level domain that are not accessible from the global Internet. As of 2016 the network uses IPv4 addresses reserved for private networks in the 10.0.0.0/8 range. North Koreans often find it more convenient to access sites by their IP address rather than by URL using Latin characters. Like the global Internet, the network hosts content accessible with web browsers, and provides an internal web search engine. It also provides email services and news groups.

Only foreigners and a small number of government officials/scholars/elites are allowed to use the global Internet in North Korea, making Kwangmyong the only computer network available to most North Korean citizens. It is a free service for public use.

Discussed on

πŸ”— Echelon (signals intelligence)

πŸ”— United States/U.S. Government πŸ”— United States πŸ”— Mass surveillance πŸ”— Espionage πŸ”— Military history πŸ”— Military history/North American military history πŸ”— Military history/United States military history πŸ”— United States/Military history - U.S. military history πŸ”— Military history/Military science, technology, and theory πŸ”— Military history/Intelligence πŸ”— United Kingdom πŸ”— Military history/Australia, New Zealand and South Pacific military history πŸ”— Military history/Canadian military history πŸ”— Military history/European military history πŸ”— Military history/British military history

ECHELON, originally a secret government code name, is a surveillance program (signals intelligence/SIGINT collection and analysis network) operated by the United States with the aid of four other signatory states to the UKUSA Security Agreement: Australia, Canada, New Zealand, and the United Kingdom, also known as the Five Eyes.

Created in the late 1960s to monitor the military and diplomatic communications of the Soviet Union and its Eastern Bloc allies during the Cold War, the ECHELON project became formally established in 1971.

By the end of the 20th century, the system referred to as "ECHELON" had evolved beyond its military and diplomatic origins into "a global system for the interception of private and commercial communications" (mass surveillance and industrial espionage).

Discussed on

πŸ”— Small-World Experiment

πŸ”— Mass surveillance πŸ”— Sociology

The small-world experiment comprised several experiments conducted by Stanley Milgram and other researchers examining the average path length for social networks of people in the United States. The research was groundbreaking in that it suggested that human society is a small-world-type network characterized by short path-lengths. The experiments are often associated with the phrase "six degrees of separation", although Milgram did not use this term himself.

Discussed on

πŸ”— CALEA requires telecoms to install surveillance equipment in their datacenters

πŸ”— United States/U.S. Government πŸ”— United States πŸ”— Mass surveillance πŸ”— Telecommunications

The Communications Assistance for Law Enforcement Act (CALEA), also known as the "Digital Telephony Act," is a United States wiretapping law passed in 1994, during the presidency of Bill Clinton (Pub. L. No. 103-414, 108 Stat. 4279, codified at 47 USC 1001-1010).

CALEA's purpose is to enhance the ability of law enforcement agencies to conduct lawful interception of communication by requiring that telecommunications carriers and manufacturers of telecommunications equipment modify and design their equipment, facilities, and services to ensure that they have built-in capabilities for targeted surveillance, allowing federal agencies to selectively wiretap any telephone traffic; it has since been extended to cover broadband Internet and VoIP traffic. Some government agencies argue that it covers mass surveillance of communications rather than just tapping specific lines and that not all CALEA-based access requires a warrant.

The original reason for adopting CALEA was the Federal Bureau of Investigation's worry that increasing use of digital telephone exchange switches would make tapping phones at the phone company's central office harder and slower to execute, or in some cases impossible. Since the original requirement to add CALEA-compliant interfaces required phone companies to modify or replace hardware and software in their systems, U.S. Congress included funding for a limited time period to cover such network upgrades. CALEA was passed into law on October 25, 1994 and came into force on January 1, 1995.

In the years since CALEA was passed it has been greatly expanded to include all VoIP and broadband Internet traffic. From 2004 to 2007 there was a 62 percent growth in the number of wiretaps performed under CALEA – and more than 3,000 percent growth in interception of Internet data such as email.

By 2007, the FBI had spent $39 million on its Digital Collection System Network (DCSNet) system, which collects, stores, indexes, and analyzes communications data.

πŸ”— Five Eyes

πŸ”— Mass surveillance πŸ”— Military history/North American military history πŸ”— Military history/United States military history πŸ”— Military history/Military science, technology, and theory πŸ”— Military history/Intelligence πŸ”— Military history/Cold War πŸ”— Military history/Australia, New Zealand and South Pacific military history πŸ”— Military history/Canadian military history πŸ”— Military history/European military history πŸ”— Military history/British military history

The Five Eyes (FVEY) is an anglophone intelligence alliance comprising Australia, Canada, New Zealand, the United Kingdom and the United States. These countries are parties to the multilateral UKUSA Agreement, a treaty for joint cooperation in signals intelligence.

The origins of the FVEY can be traced back to the post–World War II period, when the Atlantic Charter was issued by the Allies to lay out their goals for a post-war world. During the course of the Cold War, the ECHELON surveillance system was initially developed by the FVEY to monitor the communications of the former Soviet Union and the Eastern Bloc, although it is now used to monitor billions of private communications worldwide.

In the late 1990s, the existence of ECHELON was disclosed to the public, triggering a major debate in the European Parliament and, to a lesser extent, the United States Congress. As part of efforts in the ongoing War on Terror since 2001, the FVEY further expanded their surveillance capabilities, with much emphasis placed on monitoring the World Wide Web. The former NSA contractor Edward Snowden described the Five Eyes as a "supra-national intelligence organisation that does not answer to the known laws of its own countries". Documents leaked by Snowden in 2013 revealed that the FVEY has been spying on one another's citizens and sharing the collected information with each other in order to circumvent restrictive domestic regulations on surveillance of citizens.

In spite of continued controversy over its methods, the Five Eyes relationship remains one of the most comprehensive known espionage alliances in history.

Since processed intelligence is gathered from multiple sources, the intelligence shared is not restricted to signals intelligence (SIGINT) and often involves defence intelligence as well as human intelligence (HUMINT) and geospatial intelligence (GEOINT). The following table provides an overview of most of the FVEY agencies involved in such forms of data sharing.

πŸ”— Corona reconnaissance satellites

πŸ”— Mass surveillance πŸ”— Spaceflight πŸ”— Military history πŸ”— Military history/North American military history πŸ”— Military history/United States military history πŸ”— Military history/Military science, technology, and theory πŸ”— Military history/Intelligence πŸ”— Cold War

The Corona program was a series of American strategic reconnaissance satellites produced and operated by the Central Intelligence Agency Directorate of Science & Technology with substantial assistance from the U.S. Air Force. The Corona satellites were used for photographic surveillance of the Soviet Union (USSR), the People's Republic of China, and other areas beginning in June 1959 and ending in May 1972.

Discussed on