Topic: Mass surveillance (Page 2)
You are looking at all articles with the topic "Mass surveillance". We found 29 matches.
Hint:
To view all topics, click here. Too see the most popular topics, click here instead.
π Operation Ivy Bells
Operation Ivy Bells was a joint United States Navy, Central Intelligence Agency (CIA), and National Security Agency (NSA) mission whose objective was to place wire taps on Soviet underwater communication lines during the Cold War.
Discussed on
- "Operation Ivy Bells" | 2018-05-07 | 98 Upvotes 31 Comments
π Crypto-Anarchism
Crypto-anarchism (or crypto-anarchy) is a political ideology focusing on protection of privacy, political freedom and economic freedom, the adherents of which use cryptographic software for confidentiality and security while sending and receiving information over computer networks.
By using cryptographic software, the association between the identity of a certain user or organization and the pseudonym they use is made difficult to find, unless the user reveals the association. It is difficult to say which country's laws will be ignored, as even the location of a certain participant is unknown. However, participants may in theory voluntarily create new laws using smart contracts or, if the user is pseudonymous, depend on online reputation.
Discussed on
- "Crypto-Anarchism" | 2021-02-27 | 74 Upvotes 46 Comments
π Hawthorne Effect
The Hawthorne effect is a type of human behavior reactivity in which individuals modify an aspect of their behavior in response to their awareness of being observed. The effect was discovered in the context of research conducted at the Hawthorne Western Electric plant; however, some scholars feel the descriptions are apocryphal.
The original research involved workers who made electrical relays at the Hawthorne Works, a Western Electric plant in Cicero, Illinois. Between 1924 and 1927, the lighting study was conducted. Workers experienced a series of lighting changes in which productivity was said to increase with almost any change in the lighting. This turned out not to be true. In the study that was associated with Elton Mayo, which ran from 1928 to 1932, a series of changes in work structure were implemented (e.g., changes in rest periods) in a group of five women. However, this was a methodologically poor, uncontrolled study that did not permit any firm conclusions to be drawn.
One of the later interpretations by Landsberger suggested that the novelty of being research subjects and the increased attention from such could lead to temporary increases in workers' productivity. This interpretation was dubbed "the Hawthorne effect".
Discussed on
- "Hawthorne Effect" | 2023-04-24 | 68 Upvotes 47 Comments
π Kwangmyong, the North-Korea-Wide-Web
Kwangmyong (literally βBright Lightβ) is a North Korean "walled garden" national intranet service opened in 2000.
The network uses domain names under the .kp top level domain that are not accessible from the global Internet. As of 2016 the network uses IPv4 addresses reserved for private networks in the 10.0.0.0/8 range. North Koreans often find it more convenient to access sites by their IP address rather than by URL using Latin characters. Like the global Internet, the network hosts content accessible with web browsers, and provides an internal web search engine. It also provides email services and news groups.
Only foreigners and a small number of government officials/scholars/elites are allowed to use the global Internet in North Korea, making Kwangmyong the only computer network available to most North Korean citizens. It is a free service for public use.
Discussed on
- "Kwangmyong, the North-Korea-Wide-Web" | 2010-06-13 | 45 Upvotes 14 Comments
π Echelon (signals intelligence)
ECHELON, originally a secret government code name, is a surveillance program (signals intelligence/SIGINT collection and analysis network) operated by the United States with the aid of four other signatory states to the UKUSA Security Agreement: Australia, Canada, New Zealand, and the United Kingdom, also known as the Five Eyes.
Created in the late 1960s to monitor the military and diplomatic communications of the Soviet Union and its Eastern Bloc allies during the Cold War, the ECHELON project became formally established in 1971.
By the end of the 20th century, the system referred to as "ECHELON" had evolved beyond its military and diplomatic origins into "a global system for the interception of private and commercial communications" (mass surveillance and industrial espionage).
Discussed on
- "Echelon (signals intelligence)" | 2011-03-15 | 35 Upvotes 20 Comments
π Small-World Experiment
The small-world experiment comprised several experiments conducted by Stanley Milgram and other researchers examining the average path length for social networks of people in the United States. The research was groundbreaking in that it suggested that human society is a small-world-type network characterized by short path-lengths. The experiments are often associated with the phrase "six degrees of separation", although Milgram did not use this term himself.
Discussed on
- "Small-World Experiment" | 2020-03-15 | 50 Upvotes 3 Comments
π List of government surveillance projects
This is a list of government surveillance projects and related databases throughout the world.
Discussed on
- "List of government surveillance projects" | 2013-06-13 | 49 Upvotes 1 Comments
π CALEA requires telecoms to install surveillance equipment in their datacenters
The Communications Assistance for Law Enforcement Act (CALEA), also known as the "Digital Telephony Act," is a United States wiretapping law passed in 1994, during the presidency of Bill Clinton (Pub. L. No. 103-414, 108 Stat. 4279, codified at 47 USC 1001-1010).
CALEA's purpose is to enhance the ability of law enforcement agencies to conduct lawful interception of communication by requiring that telecommunications carriers and manufacturers of telecommunications equipment modify and design their equipment, facilities, and services to ensure that they have built-in capabilities for targeted surveillance, allowing federal agencies to selectively wiretap any telephone traffic; it has since been extended to cover broadband Internet and VoIP traffic. Some government agencies argue that it covers mass surveillance of communications rather than just tapping specific lines and that not all CALEA-based access requires a warrant.
The original reason for adopting CALEA was the Federal Bureau of Investigation's worry that increasing use of digital telephone exchange switches would make tapping phones at the phone company's central office harder and slower to execute, or in some cases impossible. Since the original requirement to add CALEA-compliant interfaces required phone companies to modify or replace hardware and software in their systems, U.S. Congress included funding for a limited time period to cover such network upgrades. CALEA was passed into law on October 25, 1994 and came into force on January 1, 1995.
In the years since CALEA was passed it has been greatly expanded to include all VoIP and broadband Internet traffic. From 2004 to 2007 there was a 62 percent growth in the number of wiretaps performed under CALEAΒ β and more than 3,000 percent growth in interception of Internet data such as email.
By 2007, the FBI had spent $39 million on its Digital Collection System Network (DCSNet) system, which collects, stores, indexes, and analyzes communications data.
Discussed on
- "CALEA requires telecoms to install surveillance equipment in their datacenters" | 2013-06-11 | 39 Upvotes 7 Comments
π The Lives of Others (2006 film)
The Lives of Others (German: Das Leben der Anderen, pronounced [das ΛleΛbmΜ© deΛΙΜ― ΛΚandΙΚΙn] ) is a 2006 German drama film written and directed by Florian Henckel von Donnersmarck marking his feature film directorial debut. The plot is about the monitoring of East Berlin residents by agents of the Stasi, East Germany's secret police. It stars Ulrich MΓΌhe as Stasi Captain Gerd Wiesler, Ulrich Tukur as his superior Anton Grubitz, Sebastian Koch as the playwright Georg Dreyman, and Martina Gedeck as Dreyman's lover, a prominent actress named Christa-Maria Sieland.
The film was released by Buena Vista International in Germany on 23 March 2006. At the same time, the screenplay was published by Suhrkamp Verlag. The Lives of Others won the Academy Award for Best International Feature Film. The film had earlier won seven Deutscher Filmpreis awardsβincluding those for best film, best director, best screenplay, best actor, and best supporting actorβafter setting a new record with 11 nominations. It also won the BAFTA Award for Best Film Not in the English Language and European Film Award for Best Film, while it was nominated for the Golden Globe Award for Best Foreign Language Film. The Lives of Others cost US$2 million and grossed more than US$77 million worldwide.
Released 17 years after the fall of the Berlin Wall, marking the end of the German Democratic Republic, it was the first notable drama film about the subject after a series of comedies such as Good Bye, Lenin! and Sonnenallee. This approach was widely applauded in Germany, and the film was complimented for its accurate tone despite some criticism that Wiesler's character was depicted unrealistically and with undue sympathy. The film's authenticity was considered praiseworthy given that the director grew up outside of East Germany and was 16 when the Berlin Wall fell.
Discussed on
- "The Lives of Others (2006 film)" | 2024-06-30 | 30 Upvotes 14 Comments
π Five Eyes
The Five Eyes (FVEY) is an anglophone intelligence alliance comprising Australia, Canada, New Zealand, the United Kingdom and the United States. These countries are parties to the multilateral UKUSA Agreement, a treaty for joint cooperation in signals intelligence.
The origins of the FVEY can be traced back to the postβWorld War II period, when the Atlantic Charter was issued by the Allies to lay out their goals for a post-war world. During the course of the Cold War, the ECHELON surveillance system was initially developed by the FVEY to monitor the communications of the former Soviet Union and the Eastern Bloc, although it is now used to monitor billions of private communications worldwide.
In the late 1990s, the existence of ECHELON was disclosed to the public, triggering a major debate in the European Parliament and, to a lesser extent, the United States Congress. As part of efforts in the ongoing War on Terror since 2001, the FVEY further expanded their surveillance capabilities, with much emphasis placed on monitoring the World Wide Web. The former NSA contractor Edward Snowden described the Five Eyes as a "supra-national intelligence organisation that does not answer to the known laws of its own countries". Documents leaked by Snowden in 2013 revealed that the FVEY has been spying on one another's citizens and sharing the collected information with each other in order to circumvent restrictive domestic regulations on surveillance of citizens.
In spite of continued controversy over its methods, the Five Eyes relationship remains one of the most comprehensive known espionage alliances in history.
Since processed intelligence is gathered from multiple sources, the intelligence shared is not restricted to signals intelligence (SIGINT) and often involves defence intelligence as well as human intelligence (HUMINT) and geospatial intelligence (GEOINT). The following table provides an overview of most of the FVEY agencies involved in such forms of data sharing.