| Mass surveillance |
(social control, Civil_unrest/Preparation)
Surveillance center for Venice, Italy.
|Interest of||• Jacob Applebaum|
• Below Gotham Labs
• Big Brother Watch
• Carole Cadwalladr
• Dark Politricks
• Michael Drury
• International Festival of Whistleblowing Dissent and Accountability
• Philip Matthews
• William Odom
• Privacy International
• Security Without Borders
• The Juice Media
• The Paypal Mafia
|Wholesale surveillance of the citizenry is the new normal, introduced under the smokescreen of the "war on terror". In the "art of warfare" surveillance is taught as a preparatory act for more invasive measures such as the suspension of habeas corpus (i.e. the Patriot Act) or other covert operations.|
“Extreme forms of monitoring, whether by the KGB in the Soviet Union, the Stasi in East Germany, or Big Brother in 1984, are essential elements of all tyrannies, and technology is making both monitoring and the consolidation of surveillance data easier than ever.”
Robert Epstein (18 February 2016) 
Mass surveillance is increasingly carried out by governments the world over. The most common purported justification is the "war on terror". The extent is not publicly disclosed, but rapid development in mass surveillance technologies and large budgets which remain classified behind veils of "national security" suggest that its extent and sophistication may be more than is generally realised. In military or intelligence terms surveillance is often a preparation for an attack.
- 1 Official narrative
- 2 "Corrupt power grab?"
- 3 Origins
- 4 Emerging surveillance Technologies
- 5 Modern Methods
- 6 Response
- 7 Examples
- 8 A Mass surveillance victim on Wikispooks
- 9 Related Quotations
- 10 Related Documents
- 11 Rating
- 12 References
Mass surveillance is usually presented by the commercially-controlled media as being a necessary evil to fight the "war on terror". The official opposition narrative - the other end of the spectrum of opinion presented by corporate media - does not question that civil rights must be trade off for protection against "terrorism", so if differs only about only how much mass surveillance is an acceptable compromise between safety and liberty. Both the official narrative and its opposition neglect to mention that, since Edward Snowden's revelations have demonstrated that illegal mass surveillance was being carried out widely and systematically, and since no one has been charged - or even accused - as a result, it is reasonable to assume that the major limitations to mass surveillance are technical rather than legal.
No evidence has been presented that mass surveillance was intended to stopping "terrorism". Several NSA whistleblowers such as William Binney, Russell Tice and Thomas Drake have directly challenged this claim, arguing that by contrast, it makes the US public less safe rather than more. The "Surveillance State Repeal Act" was introduced into US Congress in March 2015, to end the US PATRIOT Act and reform the NSA.
"Corrupt power grab?"
A simpler explanation suggests that it is "a corrupt power grab... not an effort aimed at stopping terrorism". In 2017, the United Nations' Special Rapporteur on the right to privacy echoed this sentiment in more diplomat terms. Criticising recent mass surveillance laws in France, Germany, the UK and the USA, he stated that they are "predicated on the... disproportionate though understandable fear that electorates may have in the face of the threat of terrorism" but are informed by "little or no evidence" of their "efficacy or... proportionality".
|William Binney on mass surveillance|
"War on Terror"
- Full article: “War on Terror”
- Full article: “War on Terror”
The "War on Terror" has repeatedly used false flag terror attacks, in conjunction with a compliant commercially-controlled media to try to instill fear in people. Deliberate vagueness about laws and increasing use of guilt by association are intended to chill dissent in an effort to introduce new mass surveillance technologies. This has been particularly useful in countries such as the USA and the UK which had laws and traditions about privacy which, if enforced, would have prevented such surveillance. A widespread culture of impunity for those who control the structures of Western nation states mean that few (if any?) serious commentators regard such objections to mass surveillance as effective in practice - the only remaining limitations on data collection are purely technical in nature. UN Special Rapporteur on Privacy, Joseph Cannataci referred UK's oversight of surveillance as “worse than a bad joke.”
Harry S. Truman was concerned about the power accrued by both the CIA and the FBI. In 1947 he wrote about the FBI: "Edgar Hoover's orgnization would make a good start toward a citizen spy system. Not for me."
Emerging surveillance Technologies
- Full article: Mass surveillance/Technology
- Full article: Mass surveillance/Technology
The US military has developed new surveillance technologies which - with or without trialing in war zones overseas - are being rolled out across the country. Legal barriers are no effective impediment in what many have termed a police state. These include surveillance by Reaper Drones, Hand Held Radar, Cellphone Surveillance Tools, X-Ray vans and automatic recognitino of faces, car license plates and other data from CCTV by computers.
The rise of electronic communication methods have lead to a burgeoning of the mass surveillance in the 21st century. The blatant - and unpunished - disregard for the law by both NSA and GCHQ should leave little doubt that legal restrictions are mostly left for show.
- Full article: Television
- Full article: Television
"Fake off mode".
- Full article: Internet/Surveillance
- Full article: Internet/Surveillance
While the Internet was designed to be decentralised, and so non-trivial to censor/monitor, the NSA has been consistently trying for decades to stifle an effective roll out of cryptography for decades. Several whistleblowers have revealed that the NSA has fiber optic splitters which allow for monitoring of huge amounts of data. The connection with internet censorship is clear; when everyone's posting is watched, unwanted content is easily removed, moreover, self-censorship may become endemic due to fear of reprisals - Webster Tarpley and others have suggested that this perspective may help understand the Edward Snowden Affair, and would tally with a large number of disclosures of mass surveillance of other natures made recently.
Common operating systems on the market like Microsofts Windows, Apples IOS and Googles Android are mostly used with an online connection. The devices that run these operating systems, by design will become the first functioning part of the data collection process over the Internet which the user has no real overview of.
- Full article: Watch lists
- Full article: Watch lists
The official narrative of watch lists is that they help assist law enforcement in prevention of terrorist activity. In practice, however, they are better understood as a means of mass surveillance (because everyone has to give their details, to prove that they are not on a watch list). Since the management of these lists is completely opaque, they can also be understood as a precursor to the enforcement of a heavy-handed police state - one in which individual rights are conditional and can be revoked at a moment's notice without the need for such matters as evidence of wrong doing.
- Full article: Mail Isolation Control and Tracking
- Full article: Mail Isolation Control and Tracking
After the 2001 anthrax attacks, which were initially blamed on "Islamic terrorists", although the anthrax was later proved to have come from a US military laboratory, the US government secretly instituted a program to photograph all the mail sent in the US. This went undisclosed to the general public for over a decade. In 2015, it was revealed that the US Postal Inspection Service had installed a utility box "positioned to capture and record the license plates and facial features of customers leaving a Golden Post Office." 
Cellphone location data
In 2013, in response to a subpoena for cellphone data, the NSA claimed that "The government does not possess the records the defendant seeks", i.e. specifically denied that they had collected cellphone data, although the Foreign Intelligence Surveillance Act court order stated that they could have collected this data. At the same time all of this type surveillance data is available for the cellphone network providers, whose data the NSA may access with ease, irregardless of any legal regulation. Apple does have a history of collecting location data secretly.
“Always keen to get the latest smartphone? Soon it won’t matter, said Mike Bechtel, Chief Futurist at Deloitte. “Over the next 10 years its going to be about moving beyond the device,” he said. “We can’t realistically have 15 smart speakers everywhere we go....We are going to be moving to ambient experiences, which is shorthand for a sort of digital Downton Abbey where we don’t ask Echo or Google ‘What’s the weather?’, we just say ‘What’s the weather?’ and the right agent jumps up at the right time to give the right answer.”
Mike Bechtel (16 Apr 2021) 
The commercially-controlled media has not dwelt on the illegality of mass surveillance carried out continuously by intelligence agencies. Instead, the political establishment has moved to legalise such actions, under the pretext of the threat of "terrorism". Only token discussion has ever been made in corporate media about whether mass surveillance is helpful in this regard.
“Perhaps the most curious thing about the response to revelations concerning the extent of modern mass surveillance is that most people in the West have not seemed to mind; we have not perceptibly altered our online behavior or demanded a response from our governments. We seem not able or willing to grasp the implications, and we have shown a weary cynicism that evidently masks a deeper indifference. Many have shown an eager complicity, free of defensiveness. If you are innocent, you have nothing to fear, we insist, forgetting the innocence of millions interned and murdered by Western governments within living memory. Surveillance will keep us safe from our enemies, we say, obediently accepting the pronouncements of our governments on the identities of our enemies and the proper sources of our terror.”
Amanda Power (February 2016) Under Watchful Eyes 
|"Digital identity"||information used by computer systems to represent a person or group.|
|"Smart city"||A prison-city with an algorithm as warden|
|"Strike Hard Campaign"||A research project into repressive social control carried out against Chinese Muslims.|
|1-3-30 Plan||A Rockefeller Foundation sponsored large scale surveillance proposal and simulation. Held April 2020|
|The world's most popular social network, with over 1,000,000,000 users in 2014.|
|Global Internet/Skynet conglomerate|
|InfraGard||Program to turn private-sector corporations, having access to huge amount of personal information, into surrogate eyes and ears for the FBI.|
|Inslaw||Complex financial/political fraud the full dimensions of which were never uncovered, but some of which were forced onto the official record.|
|Internet/Surveillance||Wholesale surveillance of the citizenry is the new normal, introduced under the smokescreen of the "war on terror".|
|LifeLog||A DARPA project to create a system of collecting data about users in a single place. It was cancelled when Facebook started, in February 2004.|
|Mail Isolation Control and Tracking||A US mail program to photograph of the exterior of every piece of mail that is processed in the United States.|
|Maximator-Alliance||Intelligence Alliance, similar to Five Eyes.|
|NewsGuard||A tech company which is teaming up with Microsoft as regards "fake news"|
|Project SHAMROCK||NSA surveillance program|
|Sentient World Simulation|
|Surveillance and censorship program||The UK government's 'Surveillance and censorship' (SAC) program is alleged by Kevin Galalae to be a part of the their CONTEST 'war on terror' strategy. He describes it as a project to 'brainwash the young and the impressionable to hold skewed and hypocritical views in line with the British Government’s foreign and domestic policy objectives'.|
|United States Postal Inspection Service||The "law enforcement arm of the United States Postal Service."|
A Mass surveillance victim on Wikispooks
|Denis Rancourt||Formerly a former tenured professor of physics, Rancourt was dismissed after covert surveillance and legal maneuverings by the University of Ottawa in Canada.|
|"Vaccine passport"||“Eventually we will need some digital certificates to show who has recovered or been tested (for COVID-19) recently, or when we have a vaccine, who has received it.”||Bill Gates||18 March 2020|
|"Vaccine passport"||““We have no plans to introduce them” said the prime minister (Boris Johnson) when talking about so-called vaccine passports. “I certainly am not planning to issue any vaccine passports and I don't know anyone else in government who would”, said Michael Gove and “no one has been given or will be required to have a vaccine passport” said the man himself, the vaccine's minister Nadhim Zahawi. Now in a slope slipperier than the ones Eddie the Eagle used to chuck himself off, it seems the government have changed their mind. First it was talk of nightclubs or sports events, and now the government is I quote “not ruling out making students be fully vaccinated to attend lectures”.... I guarantee you this is not where it ends.”||Michelle Dewberry||26 July 2021|
|Backdoor||“Every year, we learn about some issue in WhatsApp that puts everything on their users' devices at risk. Which means it's almost certain that a new security flaw already exists there. Such issues are hardly incidental – they are planted backdoors. If one backdoor is discovered and has to be removed, another one is added”||Pavel Durov||5 October 2022|
|CONTEST/Prevent||“I hear criticism but I absolutely don't accept it. Prevent is not about spying on communities. It's about safeguarding.”||2017|
|FBI||“According to its analysis of the documents in this FBI office, 1 percent were devoted to organized crime, mostly gambling; 30 percent were "manuals, routine forms, and similar procedural matter"; 40 percent were devoted to political surveillance and the like, including two cases involving right-wing groups, ten concerning immigrants, and over 200 on left or liberal groups. Another 14 percent of the documents concerned draft resistance and "leaving the military without government permission." The remainder concerned bank robberies, murder, rape, and interstate theft.”||Noam Chomsky|
Citizens' Commission to Investigate the FBI
|Bill Gates||“Eventually what we’ll have to have is certificates of who’s a recovered person, who’s a vaccinated person […] Because you don’t want people moving around the world where you’ll have some countries that won’t have it under control, sadly. You don’t want to completely block off the ability for people to go there and come back and move around. So eventually there will be this digital immunity proof that will help facilitate the global reopening up.”||Bill Gates||24 March 2020|
|ID2020||“Beyond the enormous economic interests that motivate the promoters of the Great Reset, the imposition of the vaccination will be accompanied by the requirement of a health passport and a digital ID, with the consequent contact tracing of the population of the entire world. Those who do not accept these measures will be confined in detention camps or placed under house arrest, and all their assets will be confiscated.”||Carlo Maria Viganò||25 October 2020|
|Mobile phone||“A mobile phone is a tracking device that also makes calls”||Julian Assange|
|Holger Münch||“The still high incidence of punishable hate posting shows a need for police action. Our free society must not allow a climate of fear, threat, criminal violence and violence either on the street or on the internet.”||Holger Münch||21 June 2017|
|National Security Agency||“Your Data: If You Have Nothing to Hide, You Have Nothing to Fear”||National Security Agency|
|Platformization||“Platform businesses, such as Amazon, Google and Facebook, have come to dominate their respective markets. They have generated massive network effects by facilitating exchanges with technology. As these platforms get more popular, their user value increases, leading to a virtuous cycle where the entire market coalesces around them. Their success has benefited consumers, with both low prices and access to more data-driven services. But this has also resulted in winner-take-all dynamics, making them powerful monopolies and preventing new entrants from coming in and attracting the market away from the dominant platforms. While users have come to coalesce around these platforms because their needs are being well-served, their powerful network effects risk guaranteeing their winner-take-all position. In their initial days, these platforms rapidly gained user acceptance by providing value to them. Their benevolence is increasingly looking like dominance. While they have enabled interactions and opened up markets, increasing efficiency for customers and vendors alike, they are attracting scrutiny. Data has become currency and they have a monopoly on it.”||Sangeet Paul Choudary||8 May 2017|
|TSA||“El Reg: "Sonic Screwdriver is cleared aimed at molesting seized machines, or during black bag operations, not at interfering with factory-fresh products in transit."
Do it at airports during a customs inspection. Take the computer out of the owner's sight and install whatever you want.Or better still, come up with some sort of bogus excuse to force everyone to put their laptops in checked baggage, and then do it in the baggage handling process. That way the subject wouldn't know they had been targeted. Not that anyone would ever dream of doing something as disruptive as arbitrarily forcing people to check their laptops of course...”
|23 March 2017|
|Peter Thiel||“I believe that it is always important to exchange views with people, no matter what their perspectives are. I think we have a lot of problems in our society and we need to be finding ways to talk to people. We need to find ways to talk to people where not everything is completely transparent. Libertarianism is not synonymous with radical transparency. That’s often an argument that Stasi would make in East Germany, when everything had to be monitored by society. And I think you have the best conversations in smaller groups where not everything is being monitored. That’s how you can have very honest conversations and you can think better about the future.”||Peter Thiel||2016|
|Russ Tice||“Why would anyone believe a bloody word of what NSA says about their mass domestic surveillance programs? They have lied repeatedly in the past and they are likely lying now. They have been collecting meta data and content, word-for-word, both voice and text, for some time now.”||Russ Tice||2019|
|UK||“The UK's communications watchdog Ofcom has overturned its ban on the use of GSM gateways (COMUGs) for overseas phone calls – leaving one of the longest prosecutions in modern English legal history hanging in the balance. The decision comes after a controversial public consultation exercise held earlier this year, in which The Register caught the Home Office's secret spy powers unit trying to anonymously lobby the regulator and keep the ban.”||Gareth Corfield||10 July 2017|
|UK/Deep state||“The UK's communications watchdog Ofcom has overturned its ban on the use of GSM gateways (COMUGs) for overseas phone calls – leaving one of the longest prosecutions in modern English legal history hanging in the balance. The decision comes after a controversial public consultation exercise held earlier this year, in which The Register caught the Home Office's secret spy powers unit trying to anonymously lobby the regulator and keep the ban.”||Gareth Corfield||10 July 2017|
|Naomi Wolf||“I am not overstating this, I can't say it forcefully enough, this is literally the end of human liberty in the West if this plan [of vaccine passports] unfolds...”||Naomi Wolf||29 March 2021|
|Document:10 Ways We Are Being Tracked Traced and Databased||blog post||10 July 2010||'Activist'||A summary overview of technological developments in the main branches of surveillance technology with examples of their current and developing application.|
|Document:Google and the NSA||article||24 August 2013||Julian Assange|
|Document:Hacker Generations||article||23 August 2011||Richard Thieme||On the origins and real meaning of "Hacker"; a term which, in company with "conspiracy-theory", "Holocaust-denial" and many others has been co-opted/invented by Establishments to marginalise research deemed most threatening to the Official Narratives that define "Consensus trance" reality.|
|Document:Hacking on a Scale you can Barely Imagine||article||6 December 2012||John Pilger||On the glaring omissions and hypocrisies of the Leveson Inquiry into Press standards, noting especially the vast covert programs of interception and permanent storage of every item of electronic communication on the planet for later data-mining wherever the state might deem it expedient to re-construct the life and movements of targetted individuals.|
|Document:Julian Assange at Moment of Truth||Video transcript||15 September 2014||Julian Assange||Speech by Julian Assange to the Moment of Truth event in New Zealand on 15 September 2014|
|Document:NSA GCHQ and the Death of Gareth Williams||article||14 November 2011||Trowbridge Ford||A speculative article connecting the NSA with the death of Gareth Williams|
|Document:The Essential Rules of Tyranny||webpage||29 July 2011||Brandon Smith|
|Document:Unthinking extremism - Radicalising narratives that legitimise surveillance||paper||26 October 2015||Ben Harbisher|
|File:Dissent or Terror FINAL 0.pdf||report||20 May 2013||Beau Hoda||Dissent or Terror a report that details how the counter-terrorism apparatus was used to monitor the Occupy Movement nationwide|
|File:Full-Disclosure.pdf||report||4 December 2013||The Adversaries||If your UK internet service and equipment provider is BT (and probably any other of the large UK ISP's), then it is a trivial matter for GCHQ and its agencies to route a duplicate of all your traffic to a spook server, access your home computer network, install malware and retrieve any passwords and encryption keys stored on it. You have been warned.|
|File:Operation-shady-rat.pdf||report||2 August 2011||Dmitri Alperovitch|
- https://www.globalresearch.ca/the-new-mind-control-subliminal-stimulation-controlling-people-without-their-knowledge/5511628 Global Research
- Robert H. Ferrell (ed.) Dear Bess: The Letters from Harry to Bess Truman, 1910-1959 (New York: W. W. Norton, 1983), 550.
- https://www.laphamsquarterly.org/spies/under-watchful-eyes Lapham's Quarterly