Difference between revisions of "Timeline masters of the internet"

From Gender and Tech Resources

m
m
Line 1: Line 1:
 
This page contains links gathered and shared by anonymii over four years (crowdsourced as it were) on "things", told and leaked stories and whistle spit, for further investigation into and analysis of "things" to find (counter) moves healthy for self, life, and others, '''moves aiding survival of the greatest scope of life to a greater degree than any associated destruction'''.
 
This page contains links gathered and shared by anonymii over four years (crowdsourced as it were) on "things", told and leaked stories and whistle spit, for further investigation into and analysis of "things" to find (counter) moves healthy for self, life, and others, '''moves aiding survival of the greatest scope of life to a greater degree than any associated destruction'''.
 +
 +
== Interception capabilities 2000 ==
 +
 +
Interception Capabilities 2000: eport to the Director General for Research of the European Parliament (Scientific and Technical Options Assessment programme office) on the development of surveillance technology and risk of abuse of economic information.  This study considers the state of the art in Communications intelligence (Comint) of automated processing for intelligence purposes of intercepted broadband multi-language leased or common carrier systems, and its applicability to Comint targeting and selection, including speech recognition. <ref>Interception Capabilities 2000 http://fas.org/irp/eprint/ic2000/ic2000.htm</ref>
  
 
== Glimpses of planned information operations ==
 
== Glimpses of planned information operations ==
Line 20: Line 24:
 
More alarming seems to be the article from the Register on wargame simulations: Sentient world: war games on the grandest scale informing us that the US DOD is developing a parallel to Planet Earth, with billions of individual "nodes" to reflect every man, woman, and child this side of the dividing line between reality and artificial reality to see how long you can go without food or water, or how you will respond to televised propaganda <ref>Sentient world: war games on the grandest scale http://www.theregister.co.uk/2007/06/23/sentient_worlds/
 
More alarming seems to be the article from the Register on wargame simulations: Sentient world: war games on the grandest scale informing us that the US DOD is developing a parallel to Planet Earth, with billions of individual "nodes" to reflect every man, woman, and child this side of the dividing line between reality and artificial reality to see how long you can go without food or water, or how you will respond to televised propaganda <ref>Sentient world: war games on the grandest scale http://www.theregister.co.uk/2007/06/23/sentient_worlds/
 
</ref>.
 
</ref>.
 +
 +
== The secret EU surveillance plan that wasn't ==
 +
CLEAN IT: the secret EU surveillance plan that wasn't: There are elements in Europe who would dearly like to see the CLEAN IT wish list put into practice, but we must distinguish between transnational talking shops, EU working groups and draft EU policy. <ref>Transnational CLEAN IT: the secret EU surveillance plan that wasn't, October 2012 http://www.tni.org/article/clean-it-secret-eu-surveillance-plan-wasnt</ref>
  
 
== Surveillance is about control, not security ==
 
== Surveillance is about control, not security ==

Revision as of 16:56, 3 June 2015

This page contains links gathered and shared by anonymii over four years (crowdsourced as it were) on "things", told and leaked stories and whistle spit, for further investigation into and analysis of "things" to find (counter) moves healthy for self, life, and others, moves aiding survival of the greatest scope of life to a greater degree than any associated destruction.

Interception capabilities 2000

Interception Capabilities 2000: eport to the Director General for Research of the European Parliament (Scientific and Technical Options Assessment programme office) on the development of surveillance technology and risk of abuse of economic information. This study considers the state of the art in Communications intelligence (Comint) of automated processing for intelligence purposes of intercepted broadband multi-language leased or common carrier systems, and its applicability to Comint targeting and selection, including speech recognition. [1]

Glimpses of planned information operations

Propaganda for the middle east

In 2005 the BBC reports that the US military is planning to win the hearts of young people in the Middle East by publishing a new comic in order to "achieve long-term peace and stability in the Middle East" [2] .

Fight the net

In 2006 the BBC reveals US plans to 'fight the net': A newly declassified document gives a fascinating glimpse into the US military's plans for "information operations" - from psychological operations, to attacks on hostile computer networks [3].

Bloggers on guard

The Raw Story reports in 2007 that CENTCOM sent emails to "bloggers who are posting inaccurate or untrue information, as well as bloggers who are posting incomplete information" [4].

In 2009 the US Air Force releases ‘Counter-Blog’ marching orders to its airmen as part of an Air Force push to "counter the people out there in the blogosphere who have negative opinions about the U.S. government and the Air Force" [5]

Wargame simulations

More alarming seems to be the article from the Register on wargame simulations: Sentient world: war games on the grandest scale informing us that the US DOD is developing a parallel to Planet Earth, with billions of individual "nodes" to reflect every man, woman, and child this side of the dividing line between reality and artificial reality to see how long you can go without food or water, or how you will respond to televised propaganda [6].

The secret EU surveillance plan that wasn't

CLEAN IT: the secret EU surveillance plan that wasn't: There are elements in Europe who would dearly like to see the CLEAN IT wish list put into practice, but we must distinguish between transnational talking shops, EU working groups and draft EU policy. [7]

Surveillance is about control, not security

2013, Surveillance Blowback: The Making of the U.S. Surveillance State, 1898-2020: The American surveillance state is now an omnipresent reality, but its deep history is little known and its future little grasped. Edward Snowden’s leaked documents reveal that, in a post-9/11 state of war, the National Security Agency (NSA) was able to create a surveillance system that could secretly monitor the private communications of almost every American in the name of fighting foreign terrorists. The technology used is state of the art; the impulse, it turns out, is nothing new. For well over a century, what might be called “surveillance blowback” from America’s wars has ensured the creation of an ever more massive and omnipresent internal security and surveillance apparatus. Its future (though not ours) looks bright indeed. [8]

2014, NSA Surveillance is about Control & Leverage, not Security: For more than six months, Edward Snowden’s revelations about the National Security Agency (NSA) have been pouring out from the Washington Post, the New York Times, the Guardian, Germany’s Der Spiegel, and Brazil’s O Globo, among other places. Yet no one has pointed out the combination of factors that made the NSA’s expanding programs to monitor the world seem like such a slam-dunk development in Washington. The answer is remarkably simple. For an imperial power losing its economic grip on the planet and heading into more austere times, the NSA’s latest technological breakthroughs look like a bargain basement deal when it comes to projecting power and keeping subordinate allies in line — like, in fact, the steal of the century. Even when disaster turned out to be attached to them, the NSA’s surveillance programs have come with such a discounted price tag that no Washington elite was going to reject them.

For well over a century, from the pacification of the Philippines in 1898 to trade negotiations with the European Union today, surveillance and its kissing cousins, scandal and scurrilous information, have been key weapons in Washington’s search for global dominion. Not surprisingly, in a post-9/11 bipartisan exercise of executive power, George W. Bush and Barack Obama have presided over building the NSA step by secret step into a digital panopticon designed to monitor the communications of every American and foreign leaders worldwide. [9]

Related

References

  1. Interception Capabilities 2000 http://fas.org/irp/eprint/ic2000/ic2000.htm
  2. US army to produce Mid-East comic http://news.bbc.co.uk/2/hi/middle_east/4396351.stm
  3. US plans to 'fight the net' revealed http://news.bbc.co.uk/2/hi/americas/4655196.stm
  4. Raw obtains CENTCOM email to bloggers http://www.rawstory.com/news/2006/Raw_obtains_CENTCOM_email_to_bloggers_1016.html
  5. Air Force Releases ‘Counter-Blog’ Marching Orders http://www.wired.com/2009/01/usaf-blog-respo/
  6. Sentient world: war games on the grandest scale http://www.theregister.co.uk/2007/06/23/sentient_worlds/
  7. Transnational CLEAN IT: the secret EU surveillance plan that wasn't, October 2012 http://www.tni.org/article/clean-it-secret-eu-surveillance-plan-wasnt
  8. Surveillance Blowback: The Making of the U.S. Surveillance State, 1898-2020 http://www.tomdispatch.com/blog/175724/alfred_mccoy_surveillance_blowback
  9. NSA Surveillance is about Control & Leverage, not Security http://www.juancole.com/2014/01/surveillance-leverage-security.html