Timeline masters of the internet
From Gender and Tech Resources
This page contains links gathered and shared by anonymii over four years (crowdsourced as it were) on "things", told and leaked stories and whistle spit, for further investigation into and analysis of "things" to find (counter) moves healthy for self, life, and others, moves aiding survival of the greatest scope of life to a greater degree than any associated destruction.
Contents
- 1 Masters of the internet
- 2 The making of the US surveillance state, 1898-2020
- 3 Interception capabilities 2000
- 4 Glimpses of planned information operations
- 5 The secret eu surveillance plan that wasn't
- 6 Snowden leaks
- 7 Snowden leaks
- 8 Multistakeholder global (internet) governance?
- 9 Surveillance is about control, not security
- 10 Snowden leaks
- 11 It's politics!
- 12 Snowden leaks
- 13 Related
- 14 References
Masters of the internet
Even during the 1970s, the rhetoric of “free flow of information” had long functioned as a central tenet of US foreign policy. During the era of decolonisation and cold war the doctrine purported to be a shining beacon, lighting the world’s way to emancipation from imperialism and state repression. Today it continues to paint deep-seated economic and strategic interests in an appealing language of universal human rights. “Internet freedom”, “freedom to connect”, “net freedom” — terms circulated by Secretary of State Hillary Clinton and Google executives together in the run-up to the WCIT — are today’s version of the longstanding “free flow” precept. But just as before, “Internet freedom” is a red herring (see Logical fallacies in Propaganda). Calculatingly manipulative, it tells us to entrust a fundamental human right to a pair of powerfully self-interested social actors: corporations and states. [1]
The making of the US surveillance state, 1898-2020
The Making of the U.S. Surveillance State, 1898-2020: The American surveillance state is now an omnipresent reality, but its deep history is little known and its future little grasped. Edward Snowden’s leaked documents reveal that, in a post-9/11 state of war, the National Security Agency (NSA) was able to create a surveillance system that could secretly monitor the private communications of almost every American in the name of fighting foreign terrorists. The technology used is state of the art; the impulse, it turns out, is nothing new. For well over a century, what might be called “surveillance blowback” from America’s wars has ensured the creation of an ever more massive and omnipresent internal security and surveillance apparatus. Its future (though not ours) looks bright indeed. [2]
Interception capabilities 2000
Interception Capabilities 2000: eport to the Director General for Research of the European Parliament (Scientific and Technical Options Assessment programme office) on the development of surveillance technology and risk of abuse of economic information. This study considers the state of the art in Communications intelligence (Comint) of automated processing for intelligence purposes of intercepted broadband multi-language leased or common carrier systems, and its applicability to Comint targeting and selection, including speech recognition. [3]
Glimpses of planned information operations
Propaganda for the middle east
In 2005 the BBC reports that the US military is planning to win the hearts of young people in the Middle East by publishing a new comic in order to "achieve long-term peace and stability in the Middle East" [4] .
Fight the net
In 2006 the BBC reveals US plans to 'fight the net': A newly declassified document gives a fascinating glimpse into the US military's plans for "information operations" - from psychological operations, to attacks on hostile computer networks [5].
Bloggers on guard
The Raw Story reports in 2007 that CENTCOM sent emails to "bloggers who are posting inaccurate or untrue information, as well as bloggers who are posting incomplete information" [6].
In 2009 the US Air Force releases ‘Counter-Blog’ marching orders to its airmen as part of an Air Force push to "counter the people out there in the blogosphere who have negative opinions about the U.S. government and the Air Force" [7]
Wargame simulations
More alarming seems to be the article from the Register on wargame simulations: Sentient world: war games on the grandest scale informing us that the US DOD is developing a parallel to Planet Earth, with billions of individual "nodes" to reflect every man, woman, and child this side of the dividing line between reality and artificial reality to see how long you can go without food or water, or how you will respond to televised propaganda [8].
The secret eu surveillance plan that wasn't
CLEAN IT: the secret EU surveillance plan that wasn't: There are elements in Europe who would dearly like to see the CLEAN IT wish list put into practice, but we must distinguish between transnational talking shops, EU working groups and draft EU policy. [9]
Snowden leaks
PRISM
June 6, 2013: First Snowden leak containing the PRISM slides. All known slides are shown in an article by Top Level Communications on what is known about NSA's PRISM program. If new slides of this PRISM presentation become available, they will be added. [10]. PRISM is not for mass surveillance but for collecting communications of specifically identified targets. NSA also has no "direct access" to the servers of companies like Microsoft, Facebook and Google. A unit of the FBI picks up the data and the NSA does the analysis.
Overseas target list
June 7, 2013: Second Snowden leak on Obama ordering his senior national security and intelligence officials to draw up an overseas target list for cyber-attacks. The 18-page Presidential Policy Directive 20, issued in October last year but never published, states that what it calls Offensive Cyber Effects Operations (OCEO) "can offer unique and unconventional capabilities to advance US national objectives around the world with little or no warning to the adversary or target and with potential effects ranging from subtle to severely damaging".
It says the government will "identify potential targets of national importance where OCEO can offer a favorable balance of effectiveness and risk as compared with other instruments of national power".
The directive also contemplates the possible use of cyber actions inside the US, though it specifies that no such domestic operations can be conducted without the prior order of the president, except in cases of emergency. [11]
Boundless Informant
June 8, 2013: Apparently the NSA has a tool that records and analyzes all the flow of data that the spy agency collects around the world. Think of it as a global data-mining software that details exactly how much intelligence, and of what type, has been collected from every country in the world. That is "Boundless Informant." The tool allows users to select a country on a map and view the metadata volume and select details about the collections against that country, according to an NSA factsheet on the program. [12]
US spies on Hong Kong and Chinese citizens
June 14, 2013: Edward Snowden: US government has been hacking Hong Kong and China for years. [13]
US and Britain monitor foreign diplomats
June 16, 2013: GCHQ intercepted foreign politicians' communications at G20 summits: Foreign politicians and officials who took part in two G20 summit meetings in London in 2009 had their computers monitored and their phone calls intercepted on the instructions of their British government hosts, according to documents seen by the Guardian. Some delegates were tricked into using internet cafes which had been set up by British intelligence agencies to read their email traffic. [14]
June 17, 2013: G20 summit: NSA targeted Russian president Medvedev in London: American spies based in the UK intercepted the top-secret communications of the then Russian president, Dmitry Medvedev, during his visit to Britain for the G20 summit in London, leaked documents reveal. [15]
June 16, 2013: Read extracts from the leaked documents describing the agency's 'recent successes'. [16]
Top secret rules
June 20, 2013: The top secret rules that allow NSA to use US data without a warrant: Top secret documents submitted to the court that oversees surveillance by US intelligence agencies show the judges have signed off on broad orders which allow the NSA to make use of information "inadvertently" collected from domestic US communications without a warrant. The documents show that even under authorities governing the collection of foreign intelligence from foreign targets, US communications can still be collected, retained and used. [17]
GCHQ taps fibre-optic cables
June 21, 2013: GCHQ taps fibre-optic cables for secret access to world's communications: Britain's spy agency GCHQ has secretly gained access to the network of cables which carry the world's phone calls and internet traffic and has started to process vast streams of sensitive personal information which it is sharing with its American partner, the National Security Agency (NSA).
The sheer scale of the agency's ambition is reflected in the titles of its two principal components: Mastering the Internet and Global Telecoms Exploitation, aimed at scooping up as much online and telephone traffic as possible. This is all being carried out without any form of public acknowledgement or debate. One key innovation has been GCHQ's ability to tap into and store huge volumes of data drawn from fibre-optic cables for up to 30 days so that it can be sifted and analysed. That operation, codenamed Tempora, has been running for some 18 months. [18]
Stellar wind
June 27, 2013 Guardian: NSA inspector general report on email and internet data collection under Stellar Wind: Top-secret draft report from 2009 by the NSA's inspector general shows development of 'collection of bulk internet metadata' under program launched under Bush. [19]
Spying on europeans
June 29, 2013 Der Spiegel: Information shows that America's National Security Agency (NSA) not only conducted online surveillance of European citizens, but also appears to have specifically targeted buildings housing European Union institutions. A "top secret" 2010 document describes how the secret service attacked the EU's diplomatic representation in Washington.
The document suggests that in addition to installing bugs in the building in downtown Washington, DC, the European Union representation's computer network was also infiltrated. In this way, the Americans were able to access discussions in EU rooms as well as emails and internal documents on computers. [20]
June 30, 2013 Der Spiegel: Internal NSA statistics indicate that the agency stores data from around half a billion communications connections in Germany each month. This data includes telephone calls, emails, mobile-phone text messages and chat transcripts. The metadata -- or information about which call or data connections were made and when -- is then stored at the NSA's headquarters in Fort Meade, near Washington, DC. [21]
July 4, 2013: Le Monde: Si les révélations sur le programme d'espionnage américain Prism ont provoqué un concert d'indignation en Europe, la France, elle, n'a que faiblement protesté. Pour deux excellentes raisons : Paris était déjà au courant. Et fait la même chose.
Le Monde est en mesure de révéler que la Direction générale de la sécurité extérieure (DGSE, les services spéciaux) collecte systématiquement les signaux électromagnétiques émis par les ordinateurs ou les téléphones en France, tout comme les flux entre les Français et l'étranger : la totalité de nos communications sont espionnées. L'ensemble des mails, des SMS, des relevés d'appels téléphoniques, des accès à Facebook, Twitter, sont ensuite stockés pendant des années. [22]
University of Penn’s Secret Meetings on Secret Surveillance Law: [...] She soon passes me off to another attendee: the ACLU’s Alex Abdo.
"There’s a non-attribution agreement that applies, a 'Chatham House Rule' [23] that people here are talking about," Alex Abdo tells me. Finally, we’re getting somewhere.
Abdo is an ACLU staff attorney and participant in that organization’s National Security Project. He arrived here this morning after doing battle with the National Security Agency in U.S. District Court in Lower Manhattan the day before. Abdo is also a conference participant. At moments during our conversation, he seems embarrassed when I press him on the absurdly-ironic secrecy cloaking a conference whose very theme ostensibly seeks to take a critical look at Intelligence Community obfuscation. Hell, even several participants (including Dr. Hans Blix) during a 2006 UK conference on freedom of information and the Iraq War scoffed at invoking the Chatham House rule. [24]
Snowden leaks
Cover up program used to investigate americans
August 2013: A secretive U.S. Drug Enforcement Administration (DEA) unit is funneling information from intelligence intercepts, wiretaps, informants and a massive database of telephone records to authorities across the nation to help them launch criminal investigations of Americans.
Although these cases rarely involve national security issues, documents reviewed by Reuters show that law enforcement agents have been directed to conceal how such investigations truly begin - not only from defense lawyers but also sometimes from prosecutors and judges.
The undated documents show that federal agents are trained to "recreate" the investigative trail to effectively cover up where the information originated, a practice that some experts say violates a defendant's Constitutional right to a fair trial. If defendants don't know how an investigation began, they cannot know to ask to review potential sources of exculpatory evidence - information that could reveal entrapment, mistakes or biased witnesses. [25]
Meet the spies doing the NSA’s dirty work
November 2013: With every fresh leak, the world learns more about the U.S. National Security Agency’s massive and controversial surveillance apparatus. Lost in the commotion has been the story of the NSA’s indispensable partner in its global spying operations: an obscure, clandestine unit of the Federal Bureau of Investigation that, even for a surveillance agency, keeps a low profile. [26] [...] But the FBI is no mere errand boy for the United States’ biggest intelligence agency. It carries out its own signals intelligence operations and is trying to collect huge amounts of email and Internet data from U.S. companies — an operation that the NSA once conducted, was reprimanded for, and says it abandoned. [27] The heart of the FBI’s signals intelligence activities is an obscure organization called the Data Intercept Technology Unit, or DITU (pronounced DEE-too). The handful of news articles that mentioned it prior to revelations of NSA surveillance this summer did so mostly in passing. It has barely been discussed in congressional testimony. An NSA PowerPoint presentation given to journalists by former NSA contractor Edward Snowden hints at DITU’s pivotal role in the NSA’s Prism system — it appears as a nondescript box on a flowchart showing how the NSA "task[s]" information to be collected, which is then gathered and delivered by the DITU.
NSA tracking cellphone locations worldwide
The National Security Agency is gathering nearly 5 billion records a day on the whereabouts of cellphones around the world, according to top-secret documents and interviews with U.S. intelligence officials, enabling the agency to track the movements of individuals — and map their relationships — in ways that would have been previously unimaginable. [28]
The ACLU created Meet Jack. Or, What The Government Could Do With All That Location Data. [29]
Multistakeholder global (internet) governance?
The multistakeholder model, neo-liberalism and global (internet) governance
Gurstein writes in March 2014: What is new and somewhat startling is the full court press by the US government (USG) and its allies and acolytes among the corporate, technical and civil society participants in Internet Governance discussions to extend the use of the highly locally adapted versions of the MS model. The intent is to move the use of the MS model from the quite narrow and technical areas where it has achieved a considerable degree of success towards becoming the fundamental and effectively, only, basis on which such Internet Governance discussions are to be allowed to go forward (as per the USG’s statement concerning the transfer of the DNS management function). Notably as well "multistakeholderism" seems to have replaced "Internet Freedom" as the mobilizing Internet meme of choice ("Internet Freedom" having been somewhat discredited by post-Snowden associations of the "Internet Freedom" meme with the freedom of the USG –to "surveille", "sabotage", and "subvert" at will via the Internet). [30]
Domain name expansion signals political shift of the internet
More than 1,000 new generic top-level domain names – the part of an internet address that comes after the “dot” – are being rolled out by the International Corporation for Assigned Names and Numbers. It’s a move that will change how the internet as we know it looks and feels and has significant political implications to boot. [31]
Surveillance is about control, not security
2014, NSA Surveillance is about Control & Leverage, not Security: For more than six months, Edward Snowden’s revelations about the National Security Agency (NSA) have been pouring out from the Washington Post, the New York Times, the Guardian, Germany’s Der Spiegel, and Brazil’s O Globo, among other places. Yet no one has pointed out the combination of factors that made the NSA’s expanding programs to monitor the world seem like such a slam-dunk development in Washington. The answer is remarkably simple. For an imperial power losing its economic grip on the planet and heading into more austere times, the NSA’s latest technological breakthroughs look like a bargain basement deal when it comes to projecting power and keeping subordinate allies in line — like, in fact, the steal of the century. Even when disaster turned out to be attached to them, the NSA’s surveillance programs have come with such a discounted price tag that no Washington elite was going to reject them.
For well over a century, from the pacification of the Philippines in 1898 to trade negotiations with the European Union today, surveillance and its kissing cousins, scandal and scurrilous information, have been key weapons in Washington’s search for global dominion. Not surprisingly, in a post-9/11 bipartisan exercise of executive power, George W. Bush and Barack Obama have presided over building the NSA step by secret step into a digital panopticon designed to monitor the communications of every American and foreign leaders worldwide. [32]
Snowden leaks
DEA operations exposed
April 8, 2015: Rights group sues DEA over bulk collection of phone records: Opening another front in the legal challenges to U.S. government surveillance, a human rights group has sued the Drug Enforcement Administration for collecting bulk records of Americans' telephone calls to some foreign countries.
Lawyers for Human Rights Watch filed the lawsuit on Tuesday in U.S. District Court in Los Angeles. The lawsuit asks a judge to declare unlawful the DEA program, which ended in September 2013 after about 15 years, and to bar the DEA from collecting call records in bulk again. [33]
April 9, 2015: DEA Global Surveillance Dragnet Exposed; Access to Data Likely Continues: The vast program reported on by USA Today shares some of the same hallmarks of Project Crisscross: it began in the early 1990s, was ostensibly aimed at gathering intelligence about drug trafficking, and targeted countries worldwide, with focus on Central and South America.
It is also reminiscent of the so-called Hemisphere Project, a DEA operation revealed in September 2013 by The New York Times, which dated as far back as 1987, and used subpoenas to collect vast amounts of international call records every day. [34]
It's politics!
June 4, 2015: A bipartisan group of Washington lawmakers solicited details from Pentagon officials that they could use to "damage" former NSA contractor Edward Snowden's "credibility in the press and the court of public opinion."
That's according to declassified government documents obtained by VICE News in response to a long-running Freedom of Information Act (FOIA) lawsuit. The lawmakers' requests for information were made in December 2013 and again in February 2014, following classified briefings top officials at the Defense Intelligence Agency (DIA) held for oversight committees in the House and Senate about a DIA assessment of the alleged damage to national security caused by Snowden's leak of top-secret documents to journalists Glenn Greenwald, Barton Gellman, and Laura Poitras. [35]
Snowden leaks
Documents Reveal Secret Memos Expanding Spying
June 4, 2015: Without public notice or debate, the Obama administration has expanded the National Security Agency’s warrantless surveillance of Americans’ international Internet traffic to search for evidence of malicious computer hacking, according to classified NSA documents.
In mid-2012, Justice Department lawyers wrote two secret memos permitting the spy agency to begin hunting on Internet cables, without a warrant and on American soil, for data linked to computer intrusions originating abroad — including traffic that flows to suspicious Internet addresses or contains malware, the documents show.
The Justice Department allowed the agency to monitor only addresses and “cybersignatures” — patterns associated with computer intrusions — that it could tie to foreign governments. But the documents also note that the NSA sought permission to target hackers even when it could not establish any links to foreign powers. [36]
Related
- Timeline merchants of death
- Petty tyrants
- Covert operations
- Psychological warfare
- Propaganda
- Surveillance
- Biometrics
- Censorship
References
- ↑ Monde Diplo: Masters of the Internet http://mondediplo.com/2013/02/15internet
- ↑ Surveillance Blowback: The Making of the U.S. Surveillance State, 1898-2020 http://www.tomdispatch.com/blog/175724/alfred_mccoy_surveillance_blowback
- ↑ Interception Capabilities 2000 http://fas.org/irp/eprint/ic2000/ic2000.htm
- ↑ US army to produce Mid-East comic http://news.bbc.co.uk/2/hi/middle_east/4396351.stm
- ↑ US plans to 'fight the net' revealed http://news.bbc.co.uk/2/hi/americas/4655196.stm
- ↑ Raw obtains CENTCOM email to bloggers http://www.rawstory.com/news/2006/Raw_obtains_CENTCOM_email_to_bloggers_1016.html
- ↑ Air Force Releases ‘Counter-Blog’ Marching Orders http://www.wired.com/2009/01/usaf-blog-respo/
- ↑ Sentient world: war games on the grandest scale http://www.theregister.co.uk/2007/06/23/sentient_worlds/
- ↑ Transnational CLEAN IT: the secret EU surveillance plan that wasn't, October 2012 http://www.tni.org/article/clean-it-secret-eu-surveillance-plan-wasnt
- ↑ What is known about NSA's PRISM program http://electrospaces.blogspot.nl/2014/04/what-is-known-about-nsas-prism-program.html
- ↑ Guardian: Obama orders US to draw up overseas target list for cyber-attacks http://www.theguardian.com/world/2013/jun/07/obama-china-targets-cyber-overseas
- ↑ Boundless Informant: NSA explainer – full document text http://www.theguardian.com/world/interactive/2013/jun/08/boundless-informant-nsa-full-text
- ↑ South China Morning Post: Edward Snowden: US government has been hacking Hong Kong and China for years http://www.scmp.com/news/hong-kong/article/1259508/edward-snowden-us-government-has-been-hacking-hong-kong-and-china
- ↑ Guardian: GCHQ intercepted foreign politicians' communications at G20 summits http://www.theguardian.com/uk/2013/jun/16/gchq-intercepted-communications-g20-summits
- ↑ G20 summit: NSA targeted Russian president Medvedev in London http://www.theguardian.com/world/2013/jun/16/nsa-dmitry-medvedev-g20-summit
- ↑ GCHQ surveillance – the documents http://www.theguardian.com/uk/interactive/2013/jun/16/gchq-surveillance-the-documents
- ↑ The top secret rules that allow NSA to use US data without a warrant http://www.theguardian.com/world/2013/jun/20/fisa-court-nsa-without-warrant
- ↑ GCHQ taps fibre-optic cables for secret access to world's communications http://www.theguardian.com/uk/2013/jun/21/gchq-cables-secret-world-communications-nsa
- ↑ NSA inspector general report on email and internet data collection under Stellar Wind – full document http://www.theguardian.com/world/interactive/2013/jun/27/nsa-inspector-general-report-document-data-collection
- ↑ Der Spiegel: Attacks from America: NSA Spied on European Union Offices http://www.spiegel.de/international/europe/nsa-spied-on-european-union-offices-a-908590.html
- ↑ Der Spiegel: NSA Snoops on 500 Million German Data Connections http://www.spiegel.de/international/germany/nsa-spies-on-500-million-german-data-connections-a-908648.html
- ↑ Le Monde: Révélations sur le Big Brother français http://www.lemonde.fr/societe/article/2013/07/04/revelations-sur-le-big-brother-francais_3441973_3224.html
- ↑ Chatham House Rule http://www.chathamhouse.org/about/chatham-house-rule
- ↑ The Death of Irony: University of Penn’s Secret Meetings on Secret Surveillance Law http://mediaroots.org/the-death-of-irony-or-university-of-penns-secret-meetings-on-secret-surveillance-law/
- ↑ U.S. directs agents to cover up program used to investigate Americans http://www.reuters.com/article/2013/08/05/us-dea-sod-idUSBRE97409R20130805
- ↑ Meet the Spies Doing the NSA’s Dirty Work http://foreignpolicy.com/2013/11/21/meet-the-spies-doing-the-nsas-dirty-work/
- ↑ Spy Copters, Lasers, and Break-In Teams How the FBI keeps watch on foreign diplomats http://foreignpolicy.com/2013/11/19/spy-copters-lasers-and-break-in-teams/
- ↑ NSA tracking cellphone locations worldwide, Snowden documents show http://www.washingtonpost.com/world/national-security/nsa-tracking-cellphone-locations-worldwide-snowden-documents-show/2013/12/04/5492873a-5cf2-11e3-bc56-c6ca94801fac_story.html
- ↑ Meet Jack. Or, What The Government Could Do With All That Location Data https://www.aclu.org/feature/meet-jack?redirect=meet-jack-or-what-government-could-do-all-location-data
- ↑ The Multistakeholder Model, Neo-liberalism and Global (Internet) Governance https://gurstein.wordpress.com/2014/03/26/the-multistakeholder-model-neo-liberalism-and-global-internet-governance/
- ↑ Domain name expansion signals political shift of the internet https://theconversation.com/domain-name-expansion-signals-political-shift-of-the-internet-22865
- ↑ NSA Surveillance is about Control & Leverage, not Security http://www.juancole.com/2014/01/surveillance-leverage-security.html
- ↑ Reuters: Rights group sues DEA over bulk collection of phone records http://www.reuters.com/article/2015/04/08/us-usa-dea-lawsuit-idUSKBN0MZ1F720150408
- ↑ DEA Global Surveillance Dragnet Exposed; Access to Data Likely Continues https://firstlook.org/theintercept/2015/04/08/dea-surveillance-phone-records-crisscross-nsa/
- ↑ Inside Washington's Quest to Bring Down Edward Snowden https://news.vice.com/article/exclusive-inside-washingtons-quest-to-bring-down-edward-snowden
- ↑ ProPublica: New Snowden Documents Reveal Secret Memos Expanding Spying https://www.propublica.org/article/new-snowden-documents-reveal-secret-memos-expanding-spying