Tag Archives: NSA

The NSA’s wizard: “time machine” capable of storing every single phonecall

The NSA has constructed a surveillance system that can record 100 percent of a foreign country’s telephone calls, according to documents leaked to the Washington Post. The agency is able to “rewind” conversations for up to a month. The NSA’s … Continue reading

Posted in NSA, Secrecy and Surveillance | Tagged , , , | Leave a comment

Highlights from Special Operations meeting

Micah Zenko has posted highlights from the “U.S. Special Operations Command in Review of the Defense Authorization Request for FY2015 and the Future Years Defense Program,” Senate Armed Services Committee, Subcommittee on Emerging Threats and Capabilities, on March 11, 2014. … Continue reading

Posted in Secrecy and Surveillance, Special Forces | Tagged , , , , , | Leave a comment

Optic Nerve: GCHQ has intercepted millions of webcam images

The UK’s premier spy agency, GCHQ, with the support of the NSA, has intercepted and stored the webcam images of millions of innocent internet users, according to leaked documents. A surveillance program codenamed “Optic Nerve” collected still images from Yahoo … Continue reading

Posted in Secrecy and Surveillance | Tagged , , | Leave a comment

What does a surveillance state look like?

Trevor Paglen has released these birds-eye photos of the NSA (National Security Agency, the “signals” intelligence organization, $10.8 billion dollar budget), the NRO (National Reconnaissance Office – in control of U.S. satellites, $10.3 billion dollar budget), and the NGA (National … Continue reading

Posted in Art, Secrecy and Surveillance | Tagged , , , , , , | Leave a comment

NSA “hopping” surveillance (or why you’re connected to millions)

I missed this important story from last year over at the Guardian. It illustrates how the NSA’s “hopping” technique for mass-surveillance works. The agency is allowed to travel three “hops” or connections, when collecting data on a suspect. The average … Continue reading

Posted in NSA, Secrecy and Surveillance | Tagged , | Leave a comment

10 NSA myths debunked

Peter van Buren, over at TomDispatch, lists ten “myths” associated with the NSA. Here number 8: Terrorists are everywhere and dangerous. “From 1776 to 2001 the United States did not experience a terror attack anywhere close to the scale of … Continue reading

Posted in NSA, Secrecy and Surveillance | Tagged | Leave a comment

NSA and GCHQ inside World of Warcraft and Google Cookies

Two interrelated stories about our surveillance planet. The first comes from The Washington Post, which details how the agency is using “cookies” and location data to pinpoint targets for government hacking and to bolster surveillance.The second story comes from The … Continue reading

Posted in NSA, Secrecy and Surveillance | Tagged , , , | Leave a comment

A Leviathan: The NSA collects 5 billion cellphone records a day, mapping the planet’s population

The NSA is vacuuming 5 billion cellphone records a day, enabling the spy organization to track the location of individuals, and their relationship with other individuals, around the clock. The vast data represents an unimaginable power to “geo-locate” millions of … Continue reading

Posted in Empire, NSA, Secrecy and Surveillance | Tagged , , , , | Leave a comment

Minority Report war-policing: the rush to secure time

The Hollywood film Minority Report, staring Tom Cruise, explores a world in which the  police are able to accurately predict, and stop, a crime before it is committed. The conceit throws up all kinds of interesting philosophical questions of course, … Continue reading

Posted in Drone Technology, Policing, Secrecy and Surveillance | Tagged , , , , , , , , , , , | 1 Comment

NSA and GCHQ infiltrates links to data centers worldwide

Another story from the Washington Post on the sheer scale of joint NSA-GCHQ data mining across the planet, under the MUSCULAR program. The image below, I believe, is genuine. Note the smiley face 🙂 The National Security Agency has secretly … Continue reading

Posted in Secrecy and Surveillance | Tagged , | Leave a comment