Topic: Mass surveillance (Page 2)

You are looking at all articles with the topic "Mass surveillance". We found 30 matches.

Hint: To view all topics, click here. Too see the most popular topics, click here instead.

πŸ”— Mass Surveillance in the United States

πŸ”— United States/U.S. Government πŸ”— United States πŸ”— Human rights πŸ”— Mass surveillance πŸ”— Military history πŸ”— Military history/North American military history πŸ”— Military history/United States military history πŸ”— Freedom of speech πŸ”— Military history/Intelligence πŸ”— Law Enforcement

The practice of mass surveillance in the United States dates back to World War I wartime monitoring and censorship of international communications from, to, or which passed through the United States. After the First World War and the Second World War, the surveillance continued, via programs such as the Black Chamber and Project SHAMROCK. The formation and growth of federal law-enforcement and intelligence agencies such as the FBI, CIA, and NSA institutionalized surveillance used to also silence political dissent, as evidenced by COINTELPRO projects which targeted various organizations and individuals. During the Civil Rights Movement era, many individuals put under surveillance orders were first labelled as integrationists then deemed subversive. Other targeted individuals and groups included Native American activists, African American and Chicano liberation movement activists, and anti-war protesters.

The formation of the international UKUSA surveillance agreement of 1946 evolved into the ECHELON collaboration by 1955 of five English-speaking nations, also known as the Five Eyes, and focused on interception of electronic communications, with substantial increases in domestic surveillance capabilities.

Following the September 11th attacks of 2001, domestic and international mass surveillance capabilities grew immensely. Contemporary mass surveillance relies upon annual presidential executive orders declaring a continued State of National Emergency, first signed by George W. Bush on September 14, 2001 and then continued on an annual basis by President Barack Obama, and upon several subsequent national security Acts including the USA PATRIOT Act and FISA Amendment Act's PRISM surveillance program. Critics and political dissenters currently describe the effects of these acts, orders, and resulting database network of Fusion centers as forming a veritable American police state that simply institutionalized the illegal COINTELPRO tactics used to assassinate dissenters and leaders from the 1950s onwards.

Additional surveillance agencies, such as the DHS and the position of Director of National Intelligence have exponentially escalated mass surveillance since 2001. A series of media reports in 2013 revealed more recent programs and techniques employed by the US intelligence community. Advances in computer and information technology allow the creation of huge national databases that facilitate mass surveillance in the United States by DHS managed Fusion centers, the CIA's Terrorist Threat Integration Center (TTIC) program, and the FBI's TSDB.

Mass surveillance databases are also cited as responsible for profiling Latino Americans and contributing to "self-deportation" techniques, or physical deportations by way of the DHS's ICEGang national database.

After World War I, the US Army and State Department established the Black Chamber, also known as the Cipher Bureau, which began operations in 1919. The Black Chamber was headed by Herbert O. Yardley, who had been a leader in the Army's Military Intelligence program. Regarded as a precursor to the National Security Agency, it conducted peacetime decryption of material including diplomatic communications until 1929.

In the advent of World War II, the Office of Censorship was established. The wartime agency monitored "communications by mail, cable, radio, or other means of transmission passing between the United States and any foreign country". This included the 350,000 overseas cables and telegrams and 25,000 international telephone calls made each week. "Every letter that crossed international or U.S. territorial borders from December 1941 to August 1945 was subject to being opened and scoured for details."

With the end of World War II, Project SHAMROCK was established in 1945. The organization was created to accumulate telegraphic data entering and exiting from the United States. Major communication companies such as Western Union, RCA Global and ITT World Communications actively aided the project, allowing American intelligence officials to gain access to international message traffic. Under the project, and many subsequent programs, no precedent had been established for judicial authorisation, and no warrants were issued for surveillance activities. The project was terminated in 1975.

In 1952, President Harry S. Truman established the National Security Agency (NSA) in 1952 for the purposes of collecting, processing, and monitoring intelligence data. The existence of NSA was not known to people as the memorandum by President Truman was classified.

When the Citizens' Commission to Investigate the FBI published stolen FBI documents revealing abuse of intelligence programs in 1971, Senator Frank Church began an investigation into the programs that become known as the Church Committee. The committee sought to investigate intelligence abuses throughout the 1970s. Following a report provided by the committee outlining egregious abuse, in 1976 Congress established the Senate Select Committee on Intelligence. It would later be joined by the Foreign Intelligence Surveillance Court in 1978. The institutions worked to limit the power of the agencies, ensuring that surveillance activities remained within the rule of law.

Following the attacks of September 11, 2001, Congress passed The Patriot Act to strengthen security and intelligence efforts. The act granted the President broad powers on the war against terror, including the power to bypass the FISA Court for surveillance orders in cases of national security. Additionally, mass surveillance activities were conducted alongside various other surveillance programs under the head of President's Surveillance Program. Under pressure from the public, the warrantless wiretapping program was allegedly ended in January 2007.

Many details about the surveillance activities conducted in the United States were revealed in the disclosure by Edward Snowden in June 2013. Regarded as one of the biggest media leaks in the United States, it presented extensive details about the surveillance programs of the NSA, that involved interception of internet data and telephonic calls from over a billion users, across various countries.

Discussed on

πŸ”— Operation Ivy Bells

πŸ”— Mass surveillance πŸ”— Espionage πŸ”— Military history πŸ”— Military history/North American military history πŸ”— Military history/United States military history πŸ”— Military history/Maritime warfare πŸ”— Cold War

Operation Ivy Bells was a joint United States Navy, Central Intelligence Agency (CIA), and National Security Agency (NSA) mission whose objective was to place wire taps on Soviet underwater communication lines during the Cold War.

Discussed on

πŸ”— Crypto-Anarchism

πŸ”— Mass surveillance πŸ”— Computing πŸ”— Internet culture πŸ”— Philosophy πŸ”— Cryptography πŸ”— Cryptography/Computer science πŸ”— Numismatics πŸ”— Sociology πŸ”— Numismatics/Cryptocurrency πŸ”— Computing/Computer Security πŸ”— Philosophy/Anarchism πŸ”— Anarchism

Crypto-anarchism (or crypto-anarchy) is a political ideology focusing on protection of privacy, political freedom and economic freedom, the adherents of which use cryptographic software for confidentiality and security while sending and receiving information over computer networks.

By using cryptographic software, the association between the identity of a certain user or organization and the pseudonym they use is made difficult to find, unless the user reveals the association. It is difficult to say which country's laws will be ignored, as even the location of a certain participant is unknown. However, participants may in theory voluntarily create new laws using smart contracts or, if the user is pseudonymous, depend on online reputation.

Discussed on

πŸ”— Hawthorne Effect

πŸ”— Mass surveillance πŸ”— Business πŸ”— Psychology πŸ”— Sociology

The Hawthorne effect is a type of human behavior reactivity in which individuals modify an aspect of their behavior in response to their awareness of being observed. The effect was discovered in the context of research conducted at the Hawthorne Western Electric plant; however, some scholars feel the descriptions are apocryphal.

The original research involved workers who made electrical relays at the Hawthorne Works, a Western Electric plant in Cicero, Illinois. Between 1924 and 1927, the lighting study was conducted. Workers experienced a series of lighting changes in which productivity was said to increase with almost any change in the lighting. This turned out not to be true. In the study that was associated with Elton Mayo, which ran from 1928 to 1932, a series of changes in work structure were implemented (e.g., changes in rest periods) in a group of five women. However, this was a methodologically poor, uncontrolled study that did not permit any firm conclusions to be drawn.

One of the later interpretations by Landsberger suggested that the novelty of being research subjects and the increased attention from such could lead to temporary increases in workers' productivity. This interpretation was dubbed "the Hawthorne effect".

Discussed on

πŸ”— Kwangmyong, the North-Korea-Wide-Web

πŸ”— Mass surveillance πŸ”— Computing πŸ”— Korea πŸ”— Korea/North Korea

Kwangmyong (literally β€œBright Light”) is a North Korean "walled garden" national intranet service opened in 2000.

The network uses domain names under the .kp top level domain that are not accessible from the global Internet. As of 2016 the network uses IPv4 addresses reserved for private networks in the 10.0.0.0/8 range. North Koreans often find it more convenient to access sites by their IP address rather than by URL using Latin characters. Like the global Internet, the network hosts content accessible with web browsers, and provides an internal web search engine. It also provides email services and news groups.

Only foreigners and a small number of government officials/scholars/elites are allowed to use the global Internet in North Korea, making Kwangmyong the only computer network available to most North Korean citizens. It is a free service for public use.

Discussed on

πŸ”— Echelon (signals intelligence)

πŸ”— United States/U.S. Government πŸ”— United States πŸ”— Mass surveillance πŸ”— Espionage πŸ”— Military history πŸ”— Military history/North American military history πŸ”— Military history/United States military history πŸ”— United States/Military history - U.S. military history πŸ”— Military history/Military science, technology, and theory πŸ”— Military history/Intelligence πŸ”— United Kingdom πŸ”— Military history/Australia, New Zealand and South Pacific military history πŸ”— Military history/Canadian military history πŸ”— Military history/European military history πŸ”— Military history/British military history

ECHELON, originally a secret government code name, is a surveillance program (signals intelligence/SIGINT collection and analysis network) operated by the United States with the aid of four other signatory states to the UKUSA Security Agreement: Australia, Canada, New Zealand, and the United Kingdom, also known as the Five Eyes.

Created in the late 1960s to monitor the military and diplomatic communications of the Soviet Union and its Eastern Bloc allies during the Cold War, the ECHELON project became formally established in 1971.

By the end of the 20th century, the system referred to as "ECHELON" had evolved beyond its military and diplomatic origins into "a global system for the interception of private and commercial communications" (mass surveillance and industrial espionage).

Discussed on

πŸ”— Small-World Experiment

πŸ”— Mass surveillance πŸ”— Sociology

The small-world experiment comprised several experiments conducted by Stanley Milgram and other researchers examining the average path length for social networks of people in the United States. The research was groundbreaking in that it suggested that human society is a small-world-type network characterized by short path-lengths. The experiments are often associated with the phrase "six degrees of separation", although Milgram did not use this term himself.

Discussed on

πŸ”— CALEA requires telecoms to install surveillance equipment in their datacenters

πŸ”— United States/U.S. Government πŸ”— United States πŸ”— Mass surveillance πŸ”— Telecommunications

The Communications Assistance for Law Enforcement Act (CALEA), also known as the "Digital Telephony Act," is a United States wiretapping law passed in 1994, during the presidency of Bill Clinton (Pub. L. No. 103-414, 108 Stat. 4279, codified at 47 USC 1001-1010).

CALEA's purpose is to enhance the ability of law enforcement agencies to conduct lawful interception of communication by requiring that telecommunications carriers and manufacturers of telecommunications equipment modify and design their equipment, facilities, and services to ensure that they have built-in capabilities for targeted surveillance, allowing federal agencies to selectively wiretap any telephone traffic; it has since been extended to cover broadband Internet and VoIP traffic. Some government agencies argue that it covers mass surveillance of communications rather than just tapping specific lines and that not all CALEA-based access requires a warrant.

The original reason for adopting CALEA was the Federal Bureau of Investigation's worry that increasing use of digital telephone exchange switches would make tapping phones at the phone company's central office harder and slower to execute, or in some cases impossible. Since the original requirement to add CALEA-compliant interfaces required phone companies to modify or replace hardware and software in their systems, U.S. Congress included funding for a limited time period to cover such network upgrades. CALEA was passed into law on October 25, 1994 and came into force on January 1, 1995.

In the years since CALEA was passed it has been greatly expanded to include all VoIP and broadband Internet traffic. From 2004 to 2007 there was a 62 percent growth in the number of wiretaps performed under CALEA – and more than 3,000 percent growth in interception of Internet data such as email.

By 2007, the FBI had spent $39 million on its Digital Collection System Network (DCSNet) system, which collects, stores, indexes, and analyzes communications data.

πŸ”— The Lives of Others (2006 film)

πŸ”— Mass surveillance πŸ”— Film πŸ”— Germany πŸ”— Film/American cinema πŸ”— Film/German cinema

The Lives of Others (German: Das Leben der Anderen, pronounced [das ˈleːbmΜ© deːɐ̯ ΛˆΚ”andəʁən] ) is a 2006 German drama film written and directed by Florian Henckel von Donnersmarck marking his feature film directorial debut. The plot is about the monitoring of East Berlin residents by agents of the Stasi, East Germany's secret police. It stars Ulrich MΓΌhe as Stasi Captain Gerd Wiesler, Ulrich Tukur as his superior Anton Grubitz, Sebastian Koch as the playwright Georg Dreyman, and Martina Gedeck as Dreyman's lover, a prominent actress named Christa-Maria Sieland.

The film was released by Buena Vista International in Germany on 23 March 2006. At the same time, the screenplay was published by Suhrkamp Verlag. The Lives of Others won the Academy Award for Best International Feature Film. The film had earlier won seven Deutscher Filmpreis awardsβ€”including those for best film, best director, best screenplay, best actor, and best supporting actorβ€”after setting a new record with 11 nominations. It also won the BAFTA Award for Best Film Not in the English Language and European Film Award for Best Film, while it was nominated for the Golden Globe Award for Best Foreign Language Film. The Lives of Others cost US$2 million and grossed more than US$77 million worldwide.

Released 17 years after the fall of the Berlin Wall, marking the end of the German Democratic Republic, it was the first notable drama film about the subject after a series of comedies such as Good Bye, Lenin! and Sonnenallee. This approach was widely applauded in Germany, and the film was complimented for its accurate tone despite some criticism that Wiesler's character was depicted unrealistically and with undue sympathy. The film's authenticity was considered praiseworthy given that the director grew up outside of East Germany and was 16 when the Berlin Wall fell.

Discussed on