Timeline masters of the internet
From Gender and Tech Resources
This page contains links gathered and shared by anonymii over four years (crowdsourced as it were) on "things", told and leaked stories and whistle spit, for further investigation into and analysis of "things" to find (counter) moves healthy for self, life, and others, moves aiding survival of the greatest scope of life to a greater degree than any associated destruction.
Contents
- 1 Masters of the internet
- 2 The making of the US surveillance state, 1898-2020
- 3 Interception capabilities 2000
- 4 Glimpses of planned information operations
- 5 The secret eu surveillance plan that wasn't
- 6 Snowden leaks
- 7 The death of irony
- 8 Snowden leaks
- 9 Multistakeholder global (internet) governance?
- 10 Surveillance is about control, not security
- 11 Related
- 12 References
Masters of the internet
Even during the 1970s, the rhetoric of “free flow of information” had long functioned as a central tenet of US foreign policy. During the era of decolonisation and cold war the doctrine purported to be a shining beacon, lighting the world’s way to emancipation from imperialism and state repression. Today it continues to paint deep-seated economic and strategic interests in an appealing language of universal human rights. “Internet freedom”, “freedom to connect”, “net freedom” — terms circulated by Secretary of State Hillary Clinton and Google executives together in the run-up to the WCIT — are today’s version of the longstanding “free flow” precept. But just as before, “Internet freedom” is a red herring (see Logical fallacies in Propaganda). Calculatingly manipulative, it tells us to entrust a fundamental human right to a pair of powerfully self-interested social actors: corporations and states. [1]
The making of the US surveillance state, 1898-2020
The Making of the U.S. Surveillance State, 1898-2020: The American surveillance state is now an omnipresent reality, but its deep history is little known and its future little grasped. Edward Snowden’s leaked documents reveal that, in a post-9/11 state of war, the National Security Agency (NSA) was able to create a surveillance system that could secretly monitor the private communications of almost every American in the name of fighting foreign terrorists. The technology used is state of the art; the impulse, it turns out, is nothing new. For well over a century, what might be called “surveillance blowback” from America’s wars has ensured the creation of an ever more massive and omnipresent internal security and surveillance apparatus. Its future (though not ours) looks bright indeed. [2]
Interception capabilities 2000
Interception Capabilities 2000: eport to the Director General for Research of the European Parliament (Scientific and Technical Options Assessment programme office) on the development of surveillance technology and risk of abuse of economic information. This study considers the state of the art in Communications intelligence (Comint) of automated processing for intelligence purposes of intercepted broadband multi-language leased or common carrier systems, and its applicability to Comint targeting and selection, including speech recognition. [3]
Glimpses of planned information operations
Propaganda for the middle east
In 2005 the BBC reports that the US military is planning to win the hearts of young people in the Middle East by publishing a new comic in order to "achieve long-term peace and stability in the Middle East" [4] .
Fight the net
In 2006 the BBC reveals US plans to 'fight the net': A newly declassified document gives a fascinating glimpse into the US military's plans for "information operations" - from psychological operations, to attacks on hostile computer networks [5].
Bloggers on guard
The Raw Story reports in 2007 that CENTCOM sent emails to "bloggers who are posting inaccurate or untrue information, as well as bloggers who are posting incomplete information" [6].
In 2009 the US Air Force releases ‘Counter-Blog’ marching orders to its airmen as part of an Air Force push to "counter the people out there in the blogosphere who have negative opinions about the U.S. government and the Air Force" [7]
Wargame simulations
More alarming seems to be the article from the Register on wargame simulations: Sentient world: war games on the grandest scale informing us that the US DOD is developing a parallel to Planet Earth, with billions of individual "nodes" to reflect every man, woman, and child this side of the dividing line between reality and artificial reality to see how long you can go without food or water, or how you will respond to televised propaganda [8].
The secret eu surveillance plan that wasn't
CLEAN IT: the secret EU surveillance plan that wasn't: There are elements in Europe who would dearly like to see the CLEAN IT wish list put into practice, but we must distinguish between transnational talking shops, EU working groups and draft EU policy. [9]
Snowden leaks
PRISM
June 6, 2013: First Snowden leak containing the PRISM slides. All known slides are shown in an article by Top Level Communications on what is known about NSA's PRISM program. If new slides of this PRISM presentation become available, they will be added. [10]. PRISM is not for mass surveillance but for collecting communications of specifically identified targets. NSA also has no "direct access" to the servers of companies like Microsoft, Facebook and Google. A unit of the FBI picks up the data and the NSA does the analysis.
Overseas target list
June 7, 2013: Second Snowden leak on Obama ordering his senior national security and intelligence officials to draw up an overseas target list for cyber-attacks. The 18-page Presidential Policy Directive 20, issued in October last year but never published, states that what it calls Offensive Cyber Effects Operations (OCEO) "can offer unique and unconventional capabilities to advance US national objectives around the world with little or no warning to the adversary or target and with potential effects ranging from subtle to severely damaging".
It says the government will "identify potential targets of national importance where OCEO can offer a favorable balance of effectiveness and risk as compared with other instruments of national power".
The directive also contemplates the possible use of cyber actions inside the US, though it specifies that no such domestic operations can be conducted without the prior order of the president, except in cases of emergency. [11]
Boundless Informant
June 8, 2013: Apparently the NSA has a tool that records and analyzes all the flow of data that the spy agency collects around the world. Think of it as a global data-mining software that details exactly how much intelligence, and of what type, has been collected from every country in the world. That is "Boundless Informant." The tool allows users to select a country on a map and view the metadata volume and select details about the collections against that country, according to an NSA factsheet on the program. [12]
US spies on Hong Kong and Chinese citizens
June 14, 2013: Edward Snowden: US government has been hacking Hong Kong and China for years. [13]
US and Britain monitor foreign diplomats
June 16, 2013: GCHQ intercepted foreign politicians' communications at G20 summits: Foreign politicians and officials who took part in two G20 summit meetings in London in 2009 had their computers monitored and their phone calls intercepted on the instructions of their British government hosts, according to documents seen by the Guardian. Some delegates were tricked into using internet cafes which had been set up by British intelligence agencies to read their email traffic. [14]
June 17, 2013: G20 summit: NSA targeted Russian president Medvedev in London: American spies based in the UK intercepted the top-secret communications of the then Russian president, Dmitry Medvedev, during his visit to Britain for the G20 summit in London, leaked documents reveal. [15]
June 16, 2013: Read extracts from the leaked documents describing the agency's 'recent successes'. [16]
Top secret rules
June 20, 2013: The top secret rules that allow NSA to use US data without a warrant: Top secret documents submitted to the court that oversees surveillance by US intelligence agencies show the judges have signed off on broad orders which allow the NSA to make use of information "inadvertently" collected from domestic US communications without a warrant. The documents show that even under authorities governing the collection of foreign intelligence from foreign targets, US communications can still be collected, retained and used. [17]
GCHQ taps fibre-optic cables
June 21, 2013: GCHQ taps fibre-optic cables for secret access to world's communications: Britain's spy agency GCHQ has secretly gained access to the network of cables which carry the world's phone calls and internet traffic and has started to process vast streams of sensitive personal information which it is sharing with its American partner, the National Security Agency (NSA).
The sheer scale of the agency's ambition is reflected in the titles of its two principal components: Mastering the Internet and Global Telecoms Exploitation, aimed at scooping up as much online and telephone traffic as possible. This is all being carried out without any form of public acknowledgement or debate. One key innovation has been GCHQ's ability to tap into and store huge volumes of data drawn from fibre-optic cables for up to 30 days so that it can be sifted and analysed. That operation, codenamed Tempora, has been running for some 18 months. [18]
The death of irony
University of Penn’s Secret Meetings on Secret Surveillance Law: [...] She soon passes me off to another attendee: the ACLU’s Alex Abdo.
"There’s a non-attribution agreement that applies, a 'Chatham House Rule' [19] that people here are talking about," Alex Abdo tells me. Finally, we’re getting somewhere.
Abdo is an ACLU staff attorney and participant in that organization’s National Security Project. He arrived here this morning after doing battle with the National Security Agency in U.S. District Court in Lower Manhattan the day before. Abdo is also a conference participant. At moments during our conversation, he seems embarrassed when I press him on the absurdly-ironic secrecy cloaking a conference whose very theme ostensibly seeks to take a critical look at Intelligence Community obfuscation. Hell, even several participants (including Dr. Hans Blix) during a 2006 UK conference on freedom of information and the Iraq War scoffed at invoking the Chatham House rule. [20]
Snowden leaks
Meet the spies doing the NSA’s dirty work
November 2013: This obscure FBI unit does the domestic surveillance that no other intelligence agency can touch. With every fresh leak, the world learns more about the U.S. National Security Agency’s massive and controversial surveillance apparatus. Lost in the commotion has been the story of the NSA’s indispensable partner in its global spying operations: an obscure, clandestine unit of the Federal Bureau of Investigation that, even for a surveillance agency, keeps a low profile. [21] [...] But the FBI is no mere errand boy for the United States’ biggest intelligence agency. It carries out its own signals intelligence operations and is trying to collect huge amounts of email and Internet data from U.S. companies — an operation that the NSA once conducted, was reprimanded for, and says it abandoned. [22] The heart of the FBI’s signals intelligence activities is an obscure organization called the Data Intercept Technology Unit, or DITU (pronounced DEE-too). The handful of news articles that mentioned it prior to revelations of NSA surveillance this summer did so mostly in passing. It has barely been discussed in congressional testimony. An NSA PowerPoint presentation given to journalists by former NSA contractor Edward Snowden hints at DITU’s pivotal role in the NSA’s Prism system — it appears as a nondescript box on a flowchart showing how the NSA "task[s]" information to be collected, which is then gathered and delivered by the DITU.
NSA tracking cellphone locations worldwide
The National Security Agency is gathering nearly 5 billion records a day on the whereabouts of cellphones around the world, according to top-secret documents and interviews with U.S. intelligence officials, enabling the agency to track the movements of individuals — and map their relationships — in ways that would have been previously unimaginable. [23]
The ACLU created Meet Jack. Or, What The Government Could Do With All That Location Data. [24]
Multistakeholder global (internet) governance?
The multistakeholder model, neo-liberalism and global (internet) governance
Gurstein writes in March 2014: What is new and somewhat startling is the full court press by the US government (USG) and its allies and acolytes among the corporate, technical and civil society participants in Internet Governance discussions to extend the use of the highly locally adapted versions of the MS model. The intent is to move the use of the MS model from the quite narrow and technical areas where it has achieved a considerable degree of success towards becoming the fundamental and effectively, only, basis on which such Internet Governance discussions are to be allowed to go forward (as per the USG’s statement concerning the transfer of the DNS management function). Notably as well "multistakeholderism" seems to have replaced "Internet Freedom" as the mobilizing Internet meme of choice ("Internet Freedom" having been somewhat discredited by post-Snowden associations of the "Internet Freedom" meme with the freedom of the USG –to "surveille", "sabotage", and "subvert" at will via the Internet). [25]
Domain name expansion signals political shift of the internet
More than 1,000 new generic top-level domain names – the part of an internet address that comes after the “dot” – are being rolled out by the International Corporation for Assigned Names and Numbers. It’s a move that will change how the internet as we know it looks and feels and has significant political implications to boot. [26]
Surveillance is about control, not security
2014, NSA Surveillance is about Control & Leverage, not Security: For more than six months, Edward Snowden’s revelations about the National Security Agency (NSA) have been pouring out from the Washington Post, the New York Times, the Guardian, Germany’s Der Spiegel, and Brazil’s O Globo, among other places. Yet no one has pointed out the combination of factors that made the NSA’s expanding programs to monitor the world seem like such a slam-dunk development in Washington. The answer is remarkably simple. For an imperial power losing its economic grip on the planet and heading into more austere times, the NSA’s latest technological breakthroughs look like a bargain basement deal when it comes to projecting power and keeping subordinate allies in line — like, in fact, the steal of the century. Even when disaster turned out to be attached to them, the NSA’s surveillance programs have come with such a discounted price tag that no Washington elite was going to reject them.
For well over a century, from the pacification of the Philippines in 1898 to trade negotiations with the European Union today, surveillance and its kissing cousins, scandal and scurrilous information, have been key weapons in Washington’s search for global dominion. Not surprisingly, in a post-9/11 bipartisan exercise of executive power, George W. Bush and Barack Obama have presided over building the NSA step by secret step into a digital panopticon designed to monitor the communications of every American and foreign leaders worldwide. [27]
Related
- Timeline merchants of death
- Petty tyrants
- Covert operations
- Psychological warfare
- Propaganda
- Surveillance
- Biometrics
- Censorship
References
- ↑ Monde Diplo: Masters of the Internet http://mondediplo.com/2013/02/15internet
- ↑ Surveillance Blowback: The Making of the U.S. Surveillance State, 1898-2020 http://www.tomdispatch.com/blog/175724/alfred_mccoy_surveillance_blowback
- ↑ Interception Capabilities 2000 http://fas.org/irp/eprint/ic2000/ic2000.htm
- ↑ US army to produce Mid-East comic http://news.bbc.co.uk/2/hi/middle_east/4396351.stm
- ↑ US plans to 'fight the net' revealed http://news.bbc.co.uk/2/hi/americas/4655196.stm
- ↑ Raw obtains CENTCOM email to bloggers http://www.rawstory.com/news/2006/Raw_obtains_CENTCOM_email_to_bloggers_1016.html
- ↑ Air Force Releases ‘Counter-Blog’ Marching Orders http://www.wired.com/2009/01/usaf-blog-respo/
- ↑ Sentient world: war games on the grandest scale http://www.theregister.co.uk/2007/06/23/sentient_worlds/
- ↑ Transnational CLEAN IT: the secret EU surveillance plan that wasn't, October 2012 http://www.tni.org/article/clean-it-secret-eu-surveillance-plan-wasnt
- ↑ What is known about NSA's PRISM program http://electrospaces.blogspot.nl/2014/04/what-is-known-about-nsas-prism-program.html
- ↑ Guardian: Obama orders US to draw up overseas target list for cyber-attacks http://www.theguardian.com/world/2013/jun/07/obama-china-targets-cyber-overseas
- ↑ Boundless Informant: NSA explainer – full document text http://www.theguardian.com/world/interactive/2013/jun/08/boundless-informant-nsa-full-text
- ↑ South China Morning Post: Edward Snowden: US government has been hacking Hong Kong and China for years http://www.scmp.com/news/hong-kong/article/1259508/edward-snowden-us-government-has-been-hacking-hong-kong-and-china
- ↑ Guardian: GCHQ intercepted foreign politicians' communications at G20 summits http://www.theguardian.com/uk/2013/jun/16/gchq-intercepted-communications-g20-summits
- ↑ G20 summit: NSA targeted Russian president Medvedev in London http://www.theguardian.com/world/2013/jun/16/nsa-dmitry-medvedev-g20-summit
- ↑ GCHQ surveillance – the documents http://www.theguardian.com/uk/interactive/2013/jun/16/gchq-surveillance-the-documents
- ↑ The top secret rules that allow NSA to use US data without a warrant http://www.theguardian.com/world/2013/jun/20/fisa-court-nsa-without-warrant
- ↑ GCHQ taps fibre-optic cables for secret access to world's communications http://www.theguardian.com/uk/2013/jun/21/gchq-cables-secret-world-communications-nsa
- ↑ Chatham House Rule http://www.chathamhouse.org/about/chatham-house-rule
- ↑ The Death of Irony: University of Penn’s Secret Meetings on Secret Surveillance Law http://mediaroots.org/the-death-of-irony-or-university-of-penns-secret-meetings-on-secret-surveillance-law/
- ↑ Meet the Spies Doing the NSA’s Dirty Work http://foreignpolicy.com/2013/11/21/meet-the-spies-doing-the-nsas-dirty-work/
- ↑ Spy Copters, Lasers, and Break-In Teams How the FBI keeps watch on foreign diplomats http://foreignpolicy.com/2013/11/19/spy-copters-lasers-and-break-in-teams/
- ↑ NSA tracking cellphone locations worldwide, Snowden documents show http://www.washingtonpost.com/world/national-security/nsa-tracking-cellphone-locations-worldwide-snowden-documents-show/2013/12/04/5492873a-5cf2-11e3-bc56-c6ca94801fac_story.html
- ↑ Meet Jack. Or, What The Government Could Do With All That Location Data https://www.aclu.org/feature/meet-jack?redirect=meet-jack-or-what-government-could-do-all-location-data
- ↑ The Multistakeholder Model, Neo-liberalism and Global (Internet) Governance https://gurstein.wordpress.com/2014/03/26/the-multistakeholder-model-neo-liberalism-and-global-internet-governance/
- ↑ Domain name expansion signals political shift of the internet https://theconversation.com/domain-name-expansion-signals-political-shift-of-the-internet-22865
- ↑ NSA Surveillance is about Control & Leverage, not Security http://www.juancole.com/2014/01/surveillance-leverage-security.html