Difference between revisions of "Surveillance"

From Gender and Tech Resources

(Created page with "== Alphabet soup == === Signals Intelligence (SIGINT) === Intelligence-gathering by interception of signals, between people (COMINT) or from electronic signals not directly u...")
 
m
Line 31: Line 31:
 
== Countermoves ==
 
== Countermoves ==
  
I don’t think any alternative will be possible until certain realities are faced, not just by fringe figures like ourselves but by much broader swathes of society, and that seems unlikely <ref>The Californian Reality http://nettime.org/Lists-Archives/nettime-l-1401/msg00064.html </ref>.
+
I don’t think any alternative will be possible until certain realities are faced, not just by fringe figures like ourselves but by much broader swathes of society, and that seems unlikely <ref>The Californian Reality http://nettime.org/Lists-Archives/nettime-l-1401/msg00064.html</ref>. Well, I'm not ready to give up on that yet.
  
 
== News and watchdogs ==
 
== News and watchdogs ==
Line 39: Line 39:
  
 
== Documentaries ==
 
== Documentaries ==
 +
 +
== Related ==
 +
 +
* [[Covert operations]]
 +
* [[Psychological warfare]]
 +
* [[Game of drones]]
 +
* [[Biometrics]]
 +
* [[Censorship]]
  
 
== References ==
 
== References ==

Revision as of 13:30, 3 June 2015

Alphabet soup

Signals Intelligence (SIGINT)

Intelligence-gathering by interception of signals, between people (COMINT) or from electronic signals not directly used in communication (ELINT). The NSA SIGINT Strategy 2012-2016 covers all the comsec and crypto initiatives to covertly exploit people, cryptographers, anonymisers, informants, planted spies, security firms, networks, governments, nations [1].

Communications Intelligence (COMINT)

Covers all electronic communications in the US and the world "to ensure national security". The NSA at Ft Meade, Maryland has had the most advanced computers in the world since the 60s. Technology is developed and implemented in secret.

Electronic Intelligence (ELINT)

ELINT is divided into Technical ELINT (TechELINT) and Operational ELINT (OpELINT):

  • Technical ELINT obtains signal structure, emission characteristics, modes of operation, emitter functions, and weapons systems associations of such emitters as radars, beacons, jammers, and navigational signals for determining its capabilities and role in a larger system as part of electronic warfare.
  • Operational ELINT focuses on locating specific ELINT targets and determining operational patterns of the systems named Electronic Order of Battle (EOB) for supporting military operational planners and tactical military commanders on the battlefield.

And it's "counter" programs, existing and under development (afaik):

  • Electronic counter-countermeasures (ECCM) in the US and electronic protective measures (EPM) in Europe
  • Wild Weasel (alias Iron Hand or SEAD)
  • Smart Dust
  • Wolfpack

Foreign Instrumentation Signals Intelligence (FISINT)

TELINT (Telemetry Intelligence), later named FISINT (Foreign Instrumentation Signals Intelligence) used for intercepting, processing, and analysis of foreign telemetry is closely related to TechELINT and conducted by DoD.

Human intelligence (HUMINT)

Any information that can be gathered from any human sources. The National Clandestine Service (NCS) is the branch of the CIA responsible for the collection of HUMINT.

Domestic Intelligence (DOMINT)

The NSA has a permanent national security anti-terrorist surveillance network in place. This surveillance network seems hidden from the public, save for the leaks.

Communications Privacy Folly

In reply to a request for comments on Mexico law revisions – Warrantless Real-time Cell phone Geolocation Data Surveillance, Cryptome comments - This is the short version of why there can be no solution to preventing communication systems abuse [2].

Countermoves

I don’t think any alternative will be possible until certain realities are faced, not just by fringe figures like ourselves but by much broader swathes of society, and that seems unlikely [3]. Well, I'm not ready to give up on that yet.

News and watchdogs

Books

Documentaries

Related

References

  1. NSA Global SIGINT Power to Generate Profits and Pay http://cryptome.org/2013/11/nsa-power-profit-pay.htm
  2. Communications Privacy Folly http://cryptome.org/2012/06/comms-folly.htm
  3. The Californian Reality http://nettime.org/Lists-Archives/nettime-l-1401/msg00064.html