¿Fe)NBC NEWS INVESTIGATIONS Inve Stigati Ons. Nb Cnews. Com ¿¡JÈ)NBC NEWS INVESTIGATIONS Investigations.Nbcnews.Com

Total Page:16

File Type:pdf, Size:1020Kb

¿Fe)NBC NEWS INVESTIGATIONS Inve Stigati Ons. Nb Cnews. Com ¿¡JÈ)NBC NEWS INVESTIGATIONS Investigations.Nbcnews.Com ¿fe)NBC NEWS INVESTIGATIONSinv e stigati ons. nb cnews. com GCHQ, the British signals intelligence agency, prepared the following PowerPoint slideshow presentation for a top-secret intelligence conference in 2012, revealing a pilot program called Squeaky Dolphin. Documents taken from the National Security Agency by Edward Snowden and obtained by NBC News detail how British cyber spies demonstrated to their U.S. partners in 2012 the ability to monitor YouTube and Blogger in real time and collect addresses from the billions of videos watched daily, as well as some user information, for analysis. At the time the documents were printed, GCHQ was also able to spy on Facebook and Twitter. Called "Psychology A New Kind of SIGDEV," (Signals Development), the presentation includes a section that spells out "Broad real-time monitoring of online activity" of YouTube videos, URLs "liked" on Facebook, and Blogspot/Blogger visits. The monitoring program is called "Squeaky Dolphin." NBC News is publishing the documents with minimal redactions to protect individuals. NBC News has also withheld two slides for further review. The last five pages shown here are from an earlier GCHQ document in 2010. NBC News has added annotations on two slides in yellow boxes. Read the article online at investigations.nbcnews.com. •a NBC NEWS INVESTIGATIONS investigations.nbcnews.com TOP SECRET//SV/REL TO USA, FVEV ^GC Psychology A New Kind of SIGDEV Establishing the Human Science Operations Cell TOP SECRET//SI//REL TO USA, FVEY a NBC NEWS INVESTIGATIONS investigations.nbcnews.com ¿¡JÈ)NBC NEWS INVESTIGATIONS investigations.nbcnews.com TOP SECRET//SI//REL TO USA, FVEV 9000000 - soooooo - 7000000 - 6000000 J 5000000 J 4000000 - 3000000 - 2000000 1000000 J D •••••••••J • 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 Time TOP SECRET//SI//REL TO USA, FVEY ¿¡JÈ)NBC NEWS INVESTIGATIONSinvestigations.nbcnews.co m TOP SECRET//SI//REL TO USA, FVEV lOObn TOP SECRET//SI//REL TO USA, FVEY ¿fe)NBC NEWS INVESTIGATIONSinv e stigati ons. nb cnews. com TOP SECRET//S1//REL TO USA, FVEY SIGINT • À A Covert Internet CNE TOP SECRET//SI//REL TO USA, FVEY ¿¡JÈ)NBC NEWS INVESTIGATIONinvestigations.nbcnews.coS m TOP SECRET//SI//REL TO USA, FVEV Online Strategie HUMINT Influence JTRIG Disruption and CNA TOP SECRET//SI//REL TO USA, FVEY ¿fe)NBC NEWS INVESTIGATIONS inve stigati ons. nb cnews. com ¿¡JÈ)NBC NEWS INVESTIGATIONS investigations.nbcnews.com TOP SECRET//SI//REL TO USA, FVEV Human Science? TOP SECRET//SI//REL TO USA, FVEY ¿¡JÈ)NBC NEWS INVESTIGATIONS investigations.nbcnews.com TOP SECRET//SI//REL TO USA, FVEV ANTHROPOLOGY PSYCHOLOGY SOCIOLOGY <5> t I ** ECONOMICS HISTORY BIOLOGY POLITICAL SCIENCE TOP SECRET//SI//REL TO USA, FVEY ¿fe)NBC NEWS INVESTIGATIONSinv e stigati ons. nb cnews. com TOP SECRET//SI//REL TO USA, FVEÏ Culture Deception Ethnography Influence ANTHROPOLOGY Ethnography Magic SOCIOLOGY Compliance <*>-- -, Obedience Social Networks Belief HISTORY Religion BIOLOGY POLITICAL SCIENCE Key Leader Engagement Neuroscience Global Trends Evolutionary Biology TOP SECRET//5I//REL TO USA, FVEY ¿¡JÈ)NBC NEWS INVESTIGATIONS investigations.nbcnews.com TOP SECRET//SI//REL TO USA, FVEÏ S4 SCIENCE SIGINT SKILLS SYSTEMS TOP SECRET//SI//REL TO USA, FVEY ¿fe)NBC NEWS INVESTIGATIONS inve stigati ons. nb cnews. com TOPSECRET//SWREL TO USA, FVE/ ¿¡JÈ)NBC NEWS INVESTIGATIONinvestigations.nbcnews.coS m TOP SECRET//SI//REL TO USA, FVEV TOP SECRET//SI//REL TO USA, FVEY ¿¡JÈ)NBC NEWS INVESTIGATIONinvestigations.nbcnews.coS m TOP SECRET//SI//REL TO USA, FVEV TOP SECRET//SI//REL TO USA, FVEY ¿¡JÈ)NBC NEWS INVESTIGATIONS investigations.nbcnews.com TOP SECRET//SI//REL TO USA, FVEV TOP SECRET//SI//REL TO USA, FVEY ¿fe)NBC NEWS INVESTIGATIONS inve stigati ons. nb cnews. com ¿fe)NBC NEWS INVESTIGATIONS inve stigati ons. nb cnews. com «a NBC NEWS INVESTIGATIONS investigations.nbcnews.com TOP SECRET//SI//REL TO USA, FVEV Lhj -a IVj vs TOP SECRET//SI//REL TO USA, FVEY ¿¡JÈ)NBC NEWS INVESTIGATIONinvestigations.nbcnews.coS m TOP SECRET//SI//REL TO USA, FVEÏ • Extroversion • Conscientiousness • Neurotic is m DI Agreeabieness • Openness to experience Chrome Internet Explorer Firefox Safari TOP SECRET//SI//REL TO USA, FVEY investigations.nbcnews.com What can we tell? ¿¡JÈ)NBC NEWS INVESTIGATIONSinvestigations.nbcnews.co m TOP SECRET//SI//REL TO USA, FVEV Liking Certainty \ Disclosure TOP SECRET//SI//REL TO USA, FVEY ¿fe)NBC NEWS INVESTIGATIONS inve stigati ons. nb cnews. com TOP SECRET//S1//REL TO USA, FVEY Facilitated through: Mirroring Mimicry Accommodation Orientation Phase Time TOP SECRET//SI//REL TO USA, FVEY ¿¡JÈ)NBC NEWS INVESTIGATIONSinvestigations.nbcnews.co m TOP SECRET//SI//REL TO USA, FVEV TOP SECRET//SI//REL TO USA, FVEY ¿fe)NBC NEWS INVESTIGATIONSinv e stigati ons. nb cnews. com TOP SECRET//COMINT//REL BIT ' - - ¿¡JÈ)NBC NEWS INVESTIGATIONS investigations.nbcnews.com TOP SECRET//SI//REL TO USA, FVEV TOP SECRET//SI//REL TO USA, FVEY ¿fe)NBC NEWS INVESTIGATIONS inve stigati ons. nb cnews. com SQUEAKY DOLPHIN GTE=Global Telecoms Exploitation, a GCHQ unit that collects data from fiberoptic cables rstand and shape the Human Terrain. Signals Development ¿¡JÈ)NBC NEWS INVESTIGATIONS investigations.nbcnews.com TOP SECRET//SI//REL TO USA, FVEÏ SQUEAKY DOLPHIN Broad real-time monitoring of online activity of: • YouTube Video Views • URLs 'Liked' on Facebook • Blogspot/Blogger Visits TOP SECRET//SI//REL TO USA, FVEY ¿¡JÈ)NBC NEWS INVESTIGATIONS investigations.nbcnews.com TOP SECRET//SI//REL TO USA, FVEV Job Vacancies in Lagos, Nigeria SQUEAKY DOLPHW Ctty Actrnly - SeiedsCtfr LAOOS y SQUEAKY DOLPHIN 6atr/e Damage Assessment Demonstrator - City Activity ro.iIiilm Moil„11.15I ?II|(M.SI ulnw tod«, »1 ItlMr 1-QtJOo. go comi is»«.!«»» •*J7<S<t» 3>_cKBM1 rt®jy- I «»VJGPJMM W BStWJjvrtiY tvpltw cnM»«g _ _*CtWV",'B ^^H ONVRfCViiYl ««ftuM*. ™ QSt^B 0W»«rfWc ^•rjT^^ »htissnur- «W«®5«i0 ^^^ gtogwIYfrCt FI*>af3fC"JFl nbkKWTucfiE unaemH isu-sieouw sbvzsms» . jjuardngr VlflwrS^ TOP SECRET//SI//REL TO USA, FVEY ¿¡JÈ)NBC NEWS INVESTIGATIONinvestigations.nbcnews.coS m TOP SECRET//SI//REL TO USA, FVEÏ Embed+Cricket+Channel Cricket Related "ISO+ODI+Test+Channels Activities in ESPN Criclnfo India Vs England London, England Page 'Liked' * toctSÌÌt+Wfeg 'Facebook' Likes for URLs containing 'liam fox' TOP SECRET//SI//REL TO USA, FVEY ¿¡JÈ)NBC NEWS INVESTIGATIONSinvestigations.nbcnews.co m TOP SECRET//SI//REL TO USA, FVEÏ So Passive gives us... Scalability. But, we don't have context! Targeted enrichment is the solution. TOP SECRET//SI//REL TO USA, FVEY ¿¡JÈ)NBC NEWS INVESTIGATIONinvestigations.nbcnews.coS m TOP SECRET//SI//REL TO USA, FVEV YouTube Across the world on 13th February 2012: the 14th Feb & Syrian Rally it (r= » YouTube Tags 14FEB — BAHRAI Air N M MARCH RALLY TOP SECRET//SI//REL TO USA, FVEY ¿¡JÈ)NBC NEWS INVESTIGATIONinvestigations.nbcnews.coS m TOP SECRET//SI//REL TO USA, FVEV YouTube Game Trailer in London, England Mail IBCMU 21 mew**-* sauxAi -Z^z A 1 \1 = 11 ^iii n 1 ^^^^^^ (RS41JW«« \ 4m TOP SECRET//SI//REL TO USA, FVEY ii NBC NEWS INVESTIGATIONS investigations. nbcne ws .com HOLLOW POINT ¿¡JÈ)NBC NEWS INVESTIGATIONS investigations.nbcnews.com TOP SECRET//SI//REE TO USA, FVEV Optimising Influence TOP SECRET//SI//REL TO USA, FVEY ¿¡JÈ)NBC NEWS INVESTIGATIONinvestigations.nbcnews.coS m TOP SECRET//SI//REL TO USA, FVEV NEWTONS CAT TOP SECRET//SI//REL TO USA, FVEY ¿¡JÈ)NBC NEWS INVESTIGATIONS investigations.nbcnews.com TOP SECRET//SI//REE TO USA, FVEV TOP SECRET//SI//REL TO USA, FVEY ¿¡JÈ)NBC NEWS INVESTIGATIONS investigations.nbcnews.com TOP SECRET//SI//REL TO USA, FVEV TOP SECRET//SI//REL TO USA, FVEY ¿fe)NBC NEWS INVESTIGATIONS inve stigati ons. nb cnews. com TOP SECRET//SI//REE TO USA, FVEV • Right on bro ^^^H & hcurs ags RT •'---ill so true! vou mean I should be suspicious of you? or that should be challenged? 10 hours ago you might want to be suspcious > what do you say H lauto-alert: am monitoring for spam: H 11 hours ago @ • •you might want to be suspcious about 12 hours ago lauto-alert: am monitoring for spam:l ¿¡JÈ)NBC NEWS INVESTIGATIONSinvestigations.nbcnews.co m TOP SECRET//SI//REL TO USA, FVEV Influence @ Scale TOP SECRET//SI//REL TO USA, FVEY ¿¡JÈ)NBC NEWS INVESTIGATIONinvestigations.nbcnews.coS m TOP SECRET//SI//REL TO USA, FVEÏ ^ J I J Fire Ant y^mmj^j Open Source Vistialisalbn HOME REPORTS SUBMIT A REPORT GET ALERTS CONTACTUS BBCM TAGS •••IRAQ • CIVILIANS • DEATHS a PAKISTAN • PROPERTY LOSS REPORT SOURCE I RIOTS HOW TO REPORT 1. g^gno an smai'ro 2. B|(i!Htialhi5tùriTi TOP SECRET//SI//REL TO USA, FVEY jHbNBC NEWS INVESTIGATIONS investigations.nbcnews.com TOP SECRET//SI//REL TO USA, FVEV TOP SECRET//SI//REL TO USA, FVEY ¿fe)NBC NEWS INVESTIGATIONSinv e stigati ons. nb cnews. com Joint Threat Research Intelligence Group, a GCHQ unit focused on cyber forensics, investigations and covert operations These last five pages are from an earlier GCHQ document, from 2010. ¿feNBC NEWS INVESTIGATIONS investigations.nbcnews.com UK TOP SECRET STRAP1 Information Operations: The Social Web YouiTHifì —li il facebook flickr Deliver messages and multimedia content across Web 2.0 Crafting messaging campaigns to go 'viral' This information is exempt under the Freedom a/ 'Information Act 2000 f FOIA J and may be exempt under other UK information legislation. Refer any FOIA queries to GCHQ ¿fc NBC NEWS INVESTIGATIONS investigations.nbcnews.com UK TOP SECRET STRAP1 CNIO Twitter TDI Development Need SIGINT coverage across protocols, Not necessarily consistent with target SIGDEV priorities twitter_sess=BAh7DjoTcGFze3dvernRfdG9rZW4iLWFhMGI3 ZDkOOTIINTJkOWQzMzMyYTc2%250AOTkyNjMOY2ZmM2Y 5NDNjYmQ6DGNzcmZfaWQIJTZmYjRhNTk5ZDVkMjlkMmF h%250AN2U4ZDczOWM2ZWFmNDc5lidzaG93X2Rpc2Nvd mVyYWJpbGI0eV9mb3Jfc29s%250Ab19vbmx5MDoVaW5fb mV3X3VzZXJfZinxvdzA6EXRyYW5zX3Byb21wdDA6CXVz% 250AZXJpBAPZMAEiCmZsYXNoSUM6J0FjdGlvbkNvbnRyb 2xsZXI60kZsYXNoCi]pG%250AbGFzaEhhc2h7AAY6CkB1c2 VkewA6B2lkliVhZDRIOGM2NmM0ZjRkM2U2NGI5%250AZG ZmMGJmOGVjZDgOMjoPY3JIYXRIZF9hdGwrCGWCJS4nA Q%253D%253D— a3894361aa489c2cd51ff326358c92f2e4d39cd8; This information is exempt under the Freedom of Information Act 2000 <FO!A) and may be exempt under other UK information legislation.
Recommended publications
  • 1 Collect It All: Everyday Lives Turned Into Passive Signals Intelligence
    GCHQ and UK Mass Surveillance Chapter 1 1 Collect it all: everyday lives turned into passive signals intelligence 1.1 Introduction The NSA and GCHQ have stated their desire to “collect all the signals, all the time”.i To fulfil this aim, they want the ability to collect all data generated by our daily use of the Internet, phones and other technology. Through the wiretapping of international fibre optic cables, the communications of billions of people are intercepted every day. These include our personal phone calls, emails, text messages and web searches. The information provided by these communications can be broadly split into the actual content of the communication and the communications data, also called metadata, the information on when, where and to whom it was communicated. GCHQ collects both the content of communications, what is being said, and the metadata of communications. Traditionally metadata collection was perceived as less intrusive than the interception of content – reading the envelope was not as bad as opening and reading the letter. But nowadays it is widely acknowledged that metadata can provide an intimate picture of an individual’s life. We can map social relationships and traveling patterns just from metadata, without anyone looking at the contents of messages. At present, content and communications data are treated differently under the law but they can both be used to gain intrusive insights into our life. As well as collecting our personal communications data, GCHQ and the NSA have programmes that can collect data from apps, web cams and social media. The data we 1 of 16 GCHQ and UK Mass Surveillance generate will proliferate as more and more household products, from cars to fridges, use digital technology.
    [Show full text]
  • By Gil Carlson
    No longer is there a separation between Earthly technology, other worldly technology, science fiction stories of our past, hopes and aspirations of the future, our dimension and dimensions that were once inaccessible, dreams and nightmares… for it is now all the same! By Gil Carlson (C) Copyright 2016 Gil Carlson Wicked Wolf Press Email: [email protected] To discover the rest of the books in this Blue Planet Project Series: www.blue-planet-project.com/ -1- Air Hopper Robot Grasshopper…7 Aqua Sciences Water from Atmospheric Moisture…8 Avatar Program…9 Biometrics-At-A-Distance…9 Chembot Squishy SquishBot Robots…10 Cormorant Submarine/Sea Launched MPUAV…11 Cortical Modem…12 Cyborg Insect Comm System Planned by DARPA…13 Cyborg Insects with Nuclear-Powered Transponders…14 EATR - Energetically Autonomous Tactical Robot…15 EXACTO Smart Bullet from DARPA…16 Excalibur Program…17 Force Application and Launch (FALCON)…17 Fast Lightweight Autonomy Drones…18 Fast Lightweight Autonomous (FLA) indoor drone…19 Gandalf Project…20 Gremlin Swarm Bots…21 Handheld Fusion Reactors…22 Harnessing Infrastructure for Building Reconnaissance (HIBR) project…24 HELLADS: Lightweight Laser Cannon…25 ICARUS Project…26 InfoChemistry and Self-Folding Origami…27 Iron Curtain Active Protection System…28 ISIS Integrated Is Structure…29 Katana Mono-Wing Rotorcraft Nano Air Vehicle…30 LANdroid WiFi Robots…31 Lava Missiles…32 Legged Squad Support System Monster BigDog Robot…32 LS3 Robot Pack Animal…34 Luke’s Binoculars - A Cognitive Technology Threat Warning…34 Materials
    [Show full text]
  • The Politics of Surveillance Policy: UK Regulatory Dynamics After Snowden
    INTERNET POLICY REVIEW Journal on internet regulation Volume 5 | Issue 3 The politics of surveillance policy: UK regulatory dynamics after Snowden Arne Hintz Cardiff School of Journalism, Media and Cultural Studies, Cardiff University, United Kingdom, [email protected] Lina Dencik Cardiff School of Journalism, Media and Cultural Studies, Cardiff University, United Kingdom, [email protected] Published on 26 Sep 2016 | DOI: 10.14763/2016.3.424 Abstract: The revelations by NSA whistleblower Edward Snowden have illustrated the scale and extent of digital surveillance carried out by different security and intelligence agencies. The publications have led to a variety of concerns, public debate, and some diplomatic fallout regarding the legality of the surveillance, the extent of state interference in civic life, and the protection of civil rights in the context of security. Debates about the policy environment of surveillance emerged quickly after the leaks began, but actual policy change is only starting. In the UK, a draft law (Investigatory Powers Bill) has been proposed and is currently discussed. In this paper, we will trace the forces and dynamics that have shaped this particular policy response. Addressing surveillance policy as a site of struggle between different social forces and drawing on different fields across communication policy research, we suggest eight dynamics that, often in conflicting ways, have shaped the regulatory framework of surveillance policy in the UK since the Snowden leaks. These include the governmental context; national and international norms; court rulings; civil society advocacy; technical standards; private sector interventions; media coverage; and public opinion. We investigate how state surveillance has been met with criticism by parts of the technology industry and civil society, and that policy change was required as a result of legal challenges, review commissions and normative interventions.
    [Show full text]
  • Sources of Law and of Rights
    YALE LAW SCHOOL GLOBAL CONSTITUTIONALISM 2014 A Part of the Gruber Program for Global Justice and Women’s Rights Sources of Law and of Rights Surveillance and National Security Religion as a Source of Law Judicial Enforcement of International Human Rights Equality in Democracy: Legislatures, Courts, and Quotas Constitutional Constraints on the Power to Punish Editor Judith Resnik Gruber Program for Global Justice and Women’s Rights The Gruber Program for Global Justice and Women’s Rights has supported the Yale Global Constitutionalism Seminar since The Gruber Foundation was established at Yale University in 2011. The Seminar originated at Yale Law School in 1996 and is now an integral part of the Gruber Program. The Gruber Program supports programs in international justice and human rights. Core components include the Global Constitutionalism Seminar, the Gruber Distinguished Lectures in Global Justice and Women’s Rights, and the Gruber Fellowships in Global Justice and Women’s Rights. The commitment of philanthropists Peter and Patricia Gruber to bringing about a fundamentally just world is furthered by the Gruber Program for Global Justice and Women’s Rights at Yale Law School, which draws upon the missions of the former Gruber Justice and Women’s Rights Prizes. www.gruber.yale.edu Sources of Law and of Rights: Yale Global Constitutionalism 2014 Editor Judith Resnik Executive and Managing Editor Travis Pantin Senior Managing Editor Andrea Scoseria Katz Senior Editor Julie Veroff Editors Joshua Braver Sarafina Midzik Rebecca Forrestal
    [Show full text]
  • The Politics of Surveillance Policy: UK Regulatory Dynamics After Snowden
    INTERNET POLICY REVIEW Journal on internet regulation Volume 5 | Issue 3 The politics of surveillance policy: UK regulatory dynamics after Snowden Arne Hintz Cardiff School of Journalism, Media and Cultural Studies, Cardiff University, United Kingdom, [email protected] Lina Dencik Cardiff School of Journalism, Media and Cultural Studies, Cardiff University, United Kingdom, [email protected] Published on 26 Sep 2016 | DOI: 10.14763/2016.3.424 Abstract: The revelations by NSA whistleblower Edward Snowden have illustrated the scale and extent of digital surveillance carried out by different security and intelligence agencies. The publications have led to a variety of concerns, public debate, and some diplomatic fallout regarding the legality of the surveillance, the extent of state interference in civic life, and the protection of civil rights in the context of security. Debates about the policy environment of surveillance emerged quickly after the leaks began, but actual policy change is only starting. In the UK, a draft law (Investigatory Powers Bill) has been proposed and is currently discussed. In this paper, we will trace the forces and dynamics that have shaped this particular policy response. Addressing surveillance policy as a site of struggle between different social forces and drawing on different fields across communication policy research, we suggest eight dynamics that, often in conflicting ways, have shaped the regulatory framework of surveillance policy in the UK since the Snowden leaks. These include the governmental context; national and international norms; court rulings; civil society advocacy; technical standards; private sector interventions; media coverage; and public opinion. We investigate how state surveillance has been met with criticism by parts of the technology industry and civil society, and that policy change was required as a result of legal challenges, review commissions and normative interventions.
    [Show full text]
  • US Looks at Ways to Prevent Spying on Its Spying (Update) 27 January 2014, by Stephen Braun
    US looks at ways to prevent spying on its spying (Update) 27 January 2014, by Stephen Braun America to develop a system for high-volume, encrypted searches of electronic records kept outside the government's possession. The project is among several ideas that would allow the government to discontinue storing Americans' phone records, but still search them as needed. Under the research, U.S. data mining would be shielded by secret coding that could conceal identifying details from outsiders and even the owners of the targeted databases, according to public documents obtained by The Associated Press and AP interviews with researchers, corporate executives and government officials. In this Jan. 23, 2014 file photo, President Barack Obama In other developments Monday: speaks in the East Room of the White House in Washington. The U.S. government is looking at ways to —The Justice Department and leading Internet prevent anyone from spying on its own surveillance of Americans' phone records. As the Obama administration companies agreed to a compromise with the considers shifting the collection of Americans' phone government that would allow the firms to reveal records from the National Security Agency to requiring how often they are ordered to turn over information that they be stored at phone companies or elsewhere, about their customers in national security it's quietly funding research that would allow it to search investigations. The deal with Google Inc., Microsoft the information using encryption so that phone company Corp., Yahoo Inc., Facebook Inc. and LinkedIn employees or eavesdroppers couldn't see who the U.S. Corp.
    [Show full text]
  • News, Agenda Building, and Intelligence Agencies: a Systematic
    HIJXXX10.1177/1940161214566693The International Journal of Press/PoliticsBakir 566693research-article2015 Introduction The International Journal of Press/Politics 2015, Vol. 20(2) 131 –144 News, Agenda Building, © The Author(s) 2015 Reprints and permissions: and Intelligence Agencies: sagepub.com/journalsPermissions.nav DOI: 10.1177/1940161214566693 A Systematic Review of the ijpp.sagepub.com Field from the Discipline of Journalism, Media, and Communications Vian Bakir1 Abstract Reflecting on Edward Snowden’s whistle-blowing revelations regarding indiscriminate online and telephone surveillance and social media manipulation by signals intelligence agencies, especially in the United States and the United Kingdom, this article highlights the hitherto limited nature of public knowledge of, and internationally uneven concern regarding, intelligence agencies’ contemporary techniques of communications surveillance and manipulative agenda building. While noting that the interdisciplinary field of intelligence studies has started to theorize intelligence agencies’ agenda-building activities, also observable is a remarkable lacuna from the discipline of Journalism, Media, and Communications. A systematic review of all research articles (up until December 2014) from the archives of sixteen journals in the discipline of Journalism, Media, and Communications confirms this lack of attention. Only 0.1 percent of the discipline’s articles are centrally on the field of the press, intelligence agencies, and agenda-building processes, even when these are broadly defined. Patterns within this tiny field are delineated, comprising intelligence agencies’ techniques of, and success in, manipulating different agenda-building nodes involving the press, journalists’ practices and challenges in dealing with intelligence, the public’s role in press-related agenda building on intelligence issues, and methodological patterns and issues in examining this field.
    [Show full text]
  • DEFINING REALITY AFTER SNOWDEN: a Mixed Methods Study to Global Surveillance Discourses Across Societal Sectors
    Master Thesis DEFINING REALITY AFTER SNOWDEN: A mixed methods study to global surveillance discourses across societal sectors Leon Jansen Erasmus University Rotterdam 27-06-2014 DEFINING REALITY AFTER SNOWDEN: A mixed methods study to global surveillance discourses across societal sectors by Leon Jansen Student number: 321106 Supervisor: Lela Mosemghvdlishvili, MSc. Second Reader: Marc Verboord, PhD Master Media Studies Media & Business Erasmus School of History, Culture & Communication Erasmus University Rotterdam Master Thesis June 2014 ii Abstract Design: This study features a comprehensive design, both conceptually as well as methodological, in order to uncover surveillance discourses in different sectors throughout society after the groundbreaking disclosures on global mass surveillance. These disclosures were fundamentally aided by the whistleblowing activities of Edward Snowden. Through a triangular conceptual design, this study investigated the discourses used by the corporate sector, government, and citizen groups. Methodology: This study featured a very comprehensive methodological design using digital research methods (DRM), quantitative and qualitative content analysis, and in-depth discourse analysis. Accordingly, while moving forward through the research process, the data captured with the different methodologies allowed for an increasingly rich understanding of how surveillance is understood in different societal sectors. The network analysis (DRM) capitalized on the linking structure of the internet and collected big data
    [Show full text]
  • Global Surveillance Disclosures (2013–Present) - Wikipedia, the
    Global surveillance disclosures (2013–present) - Wikipedia, the ... http://en.wikipedia.org/wiki/Global_surveillance_disclosures_(... Global surveillance disclosures (2013–present) From Wikipedia, the free encyclopedia Ongoing news reports in the international media have revealed operational details about the U.S. National Security Agency (NSA) and its international partners' global surveillance[1] of foreign nationals and U.S. citizens. The reports emanate from a cache of top secret documents leaked by ex-NSA contractor Edward Snowden. In June 2013, the first of Snowden's documents were published simultaneously by The Washington Post and The Guardian, attracting considerable public attention.[2] The disclosure continued throughout the entire year of 2013, and a significant portion of the full cache of the estimated 1.7 million documents[3] was later obtained and published by many other media outlets worldwide, most notably The New York Times (USA), Der Spiegel (Germany), Australian Broadcasting Corporation (Australia), O Globo (Brazil), the Canadian Broadcasting Corporation (Canada), Le Monde (France), L'espresso (Italy), NRC Handelsblad (the Netherlands), Dagbladet (Norway), El País (Spain), and Sveriges Television (Sweden).[4] In summary, these media reports have shed light on the implications of several secret treaties signed by members of the UKUSA Agreement in their efforts to implement global surveillance. For example, Der Spiegel revealed how the German Bundesnachrichtendienst (BND) transfers "massive amounts of intercepted data
    [Show full text]
  • Taxonomy of the Snowden Disclosures Margaret Hu Washington and Lee University School of Law, [email protected]
    Washington and Lee Law Review Volume 72 | Issue 4 Article 4 Fall 9-1-2015 Taxonomy of the Snowden Disclosures Margaret Hu Washington and Lee University School of Law, [email protected] Follow this and additional works at: https://scholarlycommons.law.wlu.edu/wlulr Part of the Fourth Amendment Commons, and the Privacy Law Commons Recommended Citation Margaret Hu, Taxonomy of the Snowden Disclosures, 72 Wash. & Lee L. Rev. 1679 (2015), https://scholarlycommons.law.wlu.edu/wlulr/vol72/iss4/4 This Article is brought to you for free and open access by the Washington and Lee Law Review at Washington & Lee University School of Law Scholarly Commons. It has been accepted for inclusion in Washington and Lee Law Review by an authorized editor of Washington & Lee University School of Law Scholarly Commons. For more information, please contact [email protected]. Taxonomy of the Snowden Disclosures Margaret Hu∗ Abstract This brief Essay offers a proposed taxonomy of the Snowden Disclosures. An informed discussion on the legality and constitutionality of the emerging cybersurveillance and mass dataveillance programs revealed by former NSA contractor Edward Snowden necessitates the furtherance of cybersurveillance aptitude. This Essay contends, therefore, that a detailed examination of the Snowden disclosures requires not just a careful inquiry into the legal and constitutional framework that guides the oversight of these programs. A close interrogation also requires a careful inquiry into ∗ Assistant Professor of Law, Washington and Lee School of Law. I would like to extend my deep gratitude to those who graciously offered comments on this draft, or who offered perspectives and expertise on this research on big data cybersurveillance through our thoughtful discussions: Jack Balkin, Kate Bartlett, danah boyd, Guy Charles, Bobby Chesney, Andrew Christensen, Danielle Citron, Geoff Corn, Jennifer Daskal, Nora Demleitner, Charlie Dunlap, Josh Fairfield, Mark Graber, David Gray, Woody Hartzog, Trina Jones, Brett Max Kaufman, Orin Kerr, J.J.
    [Show full text]