Join 3,512 readers in helping fund MetaFilter (Hide)

119 posts tagged with spying. (View popular tags)
Displaying 1 through 50 of 119. Subscribe:

Related tags:
+ (42)
+ (36)
+ (17)
+ (14)
+ (14)
+ (13)
+ (13)
+ (11)
+ (11)
+ (11)
+ (10)
+ (9)
+ (9)
+ (9)
+ (9)
+ (7)
+ (7)
+ (7)
+ (7)
+ (7)
+ (6)
+ (6)
+ (6)
+ (6)
+ (6)
+ (6)
+ (6)
+ (6)
+ (6)
+ (6)
+ (5)
+ (5)
+ (5)
+ (5)
+ (4)
+ (4)
+ (4)
+ (4)
+ (4)
+ (4)
+ (4)
+ (4)
+ (4)
+ (4)
+ (4)
+ (4)


Users that often use this tag:
anemone of the state (10)
digaman (7)
amberglow (6)
Postroad (3)
dunkadunc (3)
Pope Guilty (2)
KokuRyu (2)
Kattullus (2)
caddis (2)
Ty Webb (2)

The Visual Microphone: Passive Recovery of Sound from Video

Researchers at the MIT Computer Science and Artificial Intelligence Laboratory, Microsoft Research, and Adobe Research have presented a technique for reconstructing an audio signal by analyzing minute vibrations of objects depicted in video. For example, the method can be used to extract intelligible speech from video of a bag of potato chips filmed from 15 feet away through soundproof glass. [more inside]
posted by jedicus on Aug 4, 2014 - 78 comments

"He alone was real."

Philby's boss was Sir Stewart Menzies, who, we are told, "rode to hounds, mixed with royalty, never missed a day at Ascot, drank a great deal, and kept his secrets buttoned up behind a small, fierce mustache. He preferred women to men and horses to both." Menzies was an amateur at a time when his adversaries were professionals. Philby's fellow Soviet spy Donald Maclean was a mess. But since he was a mess with the right accent and background he easily found a home in the British spy service. At one point, Macintyre says, Maclean "got drunk, smashed up the Cairo flat of two secretaries at the U.S. embassy, ripped up their underwear, and hurled a large mirror off the wall, breaking a large bath in two. He was sent home, placed under the care of a Harley Street psychiatrist, and then, amazingly, after a short period of treatment, promoted to head the American desk at the Foreign Office."
Kim Philby, the Soviet spy who infiltrated MI6, is the subject of a Malcolm Gladwell article in The New Yorker. Gladwell argues that Philby's story is not about spying but "the hazards of mistrust." He is interviewed on a New Yorker podcast about his article. Gladwell's article is also a review of Ben Macintyre's book on Philby, A Spy Among Friends. Gladwell reviewed Macintyre's previous book, Operation Mincemeat and argued that spy agencies might be more trouble than they're worth.
posted by Kattullus on Jul 28, 2014 - 25 comments

The *first* revelation this week, at least

This week's Glenn Greenwald revelation is that Britain's GCHQ JTRIG intelligence organization offers its agents and planners tools with abilities to increase the search ranking of chosen web sites, “change outcome of online polls”, “masquerade Facebook Wall Posts for individuals or entire countries”, and accomplish “amplification of a given message, normally video, on popular multimedia websites (Youtube).” [more inside]
posted by XMLicious on Jul 16, 2014 - 54 comments

NSA spies on mainstream muslim US citizens

In one of the most damning Snowden leaks yet revealed, Glenn Greenwald and Murtaza Hussain show that the NSA targets prominent Muslim-Americans under the FISA secret court program. The Office of the Director of National Intelligence has in response issued a denial that any Americans were targeted for exercising their constitutional rights via its tumblr.
posted by p3on on Jul 9, 2014 - 93 comments

NSA gathers more data from non-targeted people than we thought.

In Snowden’s view, the PRISM and Upstream programs have “crossed the line of proportionality.” [SLWAPO] [more inside]
posted by feckless fecal fear mongering on Jul 6, 2014 - 58 comments

``Wherever you are, you are equally within of the power of conqueror´´.

At the end of 2013 Eben Moglen (Metafilter Previously) gave a lecture in four parts ``Snowden and the Future´´ presented here in Audio, Video and Text:
Part I: Westward the Course of Empire.
Part II: Oh, Freedom.
Part III: The Union, May it Be Preserved.
Part IV: Freedom's Future.
From Al-Jazeera - A Timeline of the leaks.
From The Tow Centre - Journalism after Snowden. (scroll down for further links ).
From Foreign Affairs - How to Spy after Snowden.
posted by adamvasco on May 28, 2014 - 37 comments

“The link between surveillance and fear"

A Suicide Bomber’s Guide to Online Privacy is the title of a keynote talk that Peter Watts (previously) gave to the International Association Of Privacy Professionals' Canada Symposium.
My immediate reaction was that this had to be some kind of cruel hoax. But they hooked me anyway, with what basically came down to a double-dare: “You’ve got a chance to talk to the regulators who enforce privacy law and the executives as big companies who make decisions about what to do with your data – what do you want to say to them?” Well. Since you ask.
[more inside]
posted by the man of twists and turns on May 20, 2014 - 32 comments

Spy satellite images reveal Middle Eastern archaelogical sites

The Corona Atlas of the Middle East uses spy satellite imagery to reveal as many as 10,000 previously unknown archaeological sites.
posted by MoonOrb on May 3, 2014 - 8 comments

Surveillance state reverse

Reuters: EU court rules against requirement to keep data of telecom users [different news sources: BBC, The Register] Considerably more detail is available in the ECJ press release (pdf) and the full judgement but the Court has invalidated Data Retention Directive 2006/24/EC and struck a very clear blow against metadata storage in national law as the authority of the directive will soon cease to exist. This has a particular impact for UK MeFites, as UK law was based on the Directive and crucially passed through Parliament via the European Communities Act and thus skipped some review steps but is founded on the validity of the directive being implemented. Remaining national law would of course also be open to challenge on the same grounds. [more inside]
posted by jaduncan on Apr 8, 2014 - 5 comments

"A Defining Moment"

United States Senator Dianne Feinstein Publicly Accuses C.I.A. of Spying on Congress. 'The chairwoman of the Senate intelligence committee on Tuesday accused the Central Intelligence Agency of improperly removing documents from computers that committee staff members had been using to complete a report on the agency’s detention program, saying the move was part of an effort to intimidate the committee.' 'Senator Dianne Feinstein, Democrat of California and the chairwoman of the committee, suggested on the Senate floor that the agency had violated federal law and said the C.I.A. had undermined Congress’s constitutional right to oversee the actions of the executive branch.' [more inside]
posted by VikingSword on Mar 11, 2014 - 164 comments

Codename: ANTICRISIS GIRL

Top-secret documents published by The Intercept reveal how GCHQ and the National Security Agency have targeted Wikileaks and "the human network that supports Wikileaks", with tactics ranging from covert surveillance to prosecution, targeting The Pirate Bay and Anonymous, urging countries to file criminal charges against Julian Assange, and secretly logging visitors to the Wikileaks website. [more inside]
posted by anemone of the state on Feb 18, 2014 - 178 comments

30c3

While Jacob Appelbaum grabbed headlines with his NSA revelations at this year's Chaos Communication Congress, other presentations provided equally fascinating insight into how the world works. Learn how data mining is bringing perpetrators of genocide to justice (alt), how an artist uses different concepts of secrecy landscapes (alt) to keep tabs on clandestine activities, and how India's surveillance state continues to grow (alt). previously [more inside]
posted by antonymous on Jan 4, 2014 - 23 comments

Digital Black-Bag Ops:

Der Spiegel reports on the NSA's "plumbers" at the Office of Tailored Access Operations, who collect and deploy exploits to infiltrate computers and even redirect shipments so they can install malware and hardware backdoors on electronics ordered by those they are targeting. Jacob Appelbaum [AKA ioerror] reports on the NSA's 'catalog', which ranges from $30 monitor cables that send back screenshots, to exploits for network security hardware from Cisco and Huawei, to backdoored BIOS code and firmware for all major hard drive manucfacturers. While some of the NSA's malware requires physical access or proximity, much of it is remotely installable over the Internet.

At the 30c3 conference in Hamburg, Appelbaum gives an in-depth talk about the NSA's Tailored Access Operations hacking activities and its 'interdiction' process, whereby computers are tampered with during shipping or as part of a 'black-bag' operation. Appelbaum, a Wikileaks affiliate who has reported on documents leaked by Edward Snowden, has been personally targeted by such operations, as have his family members.
posted by anemone of the state on Dec 30, 2013 - 201 comments

Historic ruling: NSA Mass Phone Surveillance Likely Unconstitutional

A federal judge in Washington, DC ruled today that the mass phone records surveillance revealed by whistleblower Edward Snowden is likely unconstitutional. [previously on Metafilter] Judge Leon wrote: “The question before me is not the same question that the Supreme Court confronted in Smith” and is “a far cry from the issue in this case.” [annotated by Spencer Ackerman, original PDF here.]
Journalist Glenn Greenwald, who broke the story, responds on MSNBC.
posted by anemone of the state on Dec 16, 2013 - 87 comments

Tech rivals unite against surveillance

Facebook, Google, Yahoo, Microsoft, Apple, LinkedIn and Aol have all teamed up to oppose widespread government surveillance. In an open letter to the US president and members of congress, the companies urge the government to reform its digital spy apparatus. Live reactions at the Guardian.
posted by brina on Dec 9, 2013 - 126 comments

“We will not lie, steal or cheat, nor tolerate among us anyone who does"

Honor and deception: A secretive Air Force program recruits academy students to inform on fellow cadets and disavows them afterward.
posted by no regrets, coyote on Dec 2, 2013 - 33 comments

NSA SEXINT

NSA SEXINT is the Abuse You’ve All Been Waiting For. According to documents revealed by whistleblower Edward Snowden, the NSA has been gathering records of online sexual activity and logging visits to pornographic websites as part of a proposed plan to blackmail and silence those advocating "radical" beliefs.
posted by anemone of the state on Nov 29, 2013 - 156 comments

‘PRISM: The SIGAD Used *Most* in NSA Reports!’

How would you, as a junior analyst in S2C41, the branch of the Signals Intelligence Directorate, navigate the millions of records logged daily, in order to find the nugget to get you noticed? “EVILOLIVE, MADCAPOCELOT, ORANGECRUSH, COBALTFALCON, DARKTHUNDER: the names are beguiling. But they don’t always tell us much, which is their reason for existing: covernames aren’t classified, and many of them – including the names of the NSA’s main databases for intercepted communications data, MAINWAY, MARINA, PINWALE and NUCLEON – have been seen in public before, in job ads and resumés posted online.” Daniel Soar sorts through the possibilities in the London Review of Books, 24 Oct 2013. (See also William Arkin's blog on codenames) [more inside]
posted by zbsachs on Nov 4, 2013 - 33 comments

Social Network Analysis Collaboration Knowledge Service (or, SNACKS)

No Morsel Too Minuscule for All-Consuming N.S.A.
posted by crossoverman on Nov 3, 2013 - 38 comments

France in the NSA's crosshairs

Using documents leaked by US whistleblower Edward Snowden, Le Monde reports that the NSA has been intercepting French telephone communications on a massive scale. Under a programme called 'US-985D', the NSA is collecting not only metadata but recordings of telephone calls: From 10 December 2012 to 8 January 2013, 70.3 million French telephone calls were recorded.
These revelations came just as US Secretary of State John Kerry arrived in Paris on a pre-scheduled visit. Francois Hollande is not pleased.
posted by anemone of the state on Oct 21, 2013 - 166 comments

We have a very extensive knowledge of what is happening in Syria.

The Spies Inside Damascus: The Mossad's secret war on the Syrian WMD machine.
On Aug. 20, 2012, U.S. President Barack Obama declared that if Syrian President Bashar al-Assad began shifting around or using his chemical weapons, Obama would consider that "a red line." The implication was that such a move would lead to American intervention in Syria. Some officials from the Israeli Foreign Ministry believed that Obama drew the line because he believed it would never be crossed. If that was his assumption, he made it based, in part, on assessments received from the Israeli intelligence services, which have waged a multidecade clandestine campaign to strip Assad of his deadliest weapons -- and which also have emerged as the United States' primary partners in collecting information on Middle Eastern regimes.
posted by andoatnp on Sep 21, 2013 - 22 comments

The declassified fashions of East German spies

Top Secret: Images from the Stasi Archives A collection of images from the book, including more disguises, images of house searches, hand-to-hand combat techniques, hidden cameras, and even fake beards, is available free of charge at Simon Menner’s website. [more inside]
posted by KokuRyu on Sep 18, 2013 - 27 comments

NSA Shares US Citizens' Communications with Israel

A new story in The Guardian shows how the NSA routinely shares raw intelligence data with Israel without first filtering it to remove information about US citizens. The memorandum of understanding (published here in full) shows that the US government handed over intercepted communications likely to contain the phone calls and emails of US citizens. This goes against earlier Obama administration claims that there were strong safeguards in place to protect Amercans' communications.
posted by anemone of the state on Sep 11, 2013 - 115 comments

We'd be happy to help you out with that spec....

The NSA has been spending $250 million a year on its "Sigint Enabling Project". The purpose of this project is to "actively engage[s] the U.S. and foreign IT industries to covertly influence and/or overtly leverage their commercial products’ designs' to make them 'exploitable."

Classified N.S.A. memos appear to confirm that the fatal weakness, discovered by two Microsoft cryptographers in 2007, was engineered by the agency. The N.S.A. wrote the standard and aggressively pushed it on the international group, privately calling the effort “a challenge in finesse.” “Eventually, N.S.A. became the sole editor,” the memo says.

The NSA requested that these reports not be published. [more inside]
posted by lattiboy on Sep 5, 2013 - 450 comments

"He did away with the propaganda machine and did it for all of us"

(MeFi's own) Jacob Appelbaum receives Transparency International's (DE) 2013 Whistleblower Prize on behalf of Edward Snowden (statement from Snowden starts here) joined remotely by Glenn Greenwald.
posted by anemone of the state on Aug 31, 2013 - 24 comments

"the boomers and their institutions look like parasitic aliens"

"Generation Z will arrive brutalized and atomized by three generations of diminished expectations and dog-eat-dog economic liberalism. Most of them will be so deracinated that they identify with their peers and the global Internet culture more than their great-grandparents' post-Westphalian nation-state. The machineries of the security state may well find them unemployable, their values too alien to assimilate into a model still rooted in the early 20th century. But if you turn the Internet into a panopticon prison and put everyone inside it, where else are you going to be able to recruit the jailers? And how do you ensure their loyalty?" Charlie Stross on the future demographic peril faced by spy agencies.
posted by Pope Guilty on Aug 29, 2013 - 86 comments

Bad Relationship

A Softer World - a Metafilter favorite better known for stories of love, loss, and dysfunctional relationships - takes on government spying: Happy beginnings. Signs of trouble. Denial.... [more inside]
posted by eviemath on Aug 27, 2013 - 9 comments

Invasion of privacy or parental right?

Matthew Ingram used the tools available to him to watch the online behaviours of his three daughters. Here is his (and his daughter's) story: Part 1, Part 2, Part 3, and his daughter's response.
posted by Amity on Aug 13, 2013 - 200 comments

"MI5 trained a specially bred group of gerbils to detect spies"

It doesn't matter whether you hate the spies and believe they are corroding democracy, or if you think they are the noble guardians of the state. In both cases the assumption is that the secret agents know more than we do. But the strange fact is that often when you look into the history of spies what you discover is something very different. It is not the story of men and women who have a better and deeper understanding of the world than we do. In fact in many cases it is the story of weirdos who have created a completely mad version of the world that they then impose on the rest of us.
Bugger: Maybe the Real State Secret Is that Spies Aren't Very Good at Their Jobs and Don't Know Very Much About the World by Adam Curtis. It's about the checkered history of the MI5.
posted by Kattullus on Aug 9, 2013 - 63 comments

Domestic spying now (secretly) used by law enforcement

The NSA is handing the Justice Department information, derived from its secret electronic eavesdropping programs, about suspected criminal activity unrelated to terrorism; meanwhile the DEA is using information from NSA programs to launch criminal investigations, and then 'recreating' the trail of investigation in order to hide where the information originated.
posted by anemone of the state on Aug 5, 2013 - 168 comments

Mail Covers for everybody.

Concerned about privacy and government surveillance? Not even snail-mail is safe: With Mail Isolation Control and Tracking, the US Postal Service is now photographing the exterior of every piece of paper mail in the United States, and storing the data indefinitely.
posted by anemone of the state on Jul 3, 2013 - 100 comments

Codename: DROPMIRE

According to The Guardian and Der Spiegel, the NSA has bugged EU government offices in Washington and New York, installed spyware on EU embassy communications equipment, and used the NATO headquarters in Brussels as a base to infiltrate the phone and computer networks of the EU's Justus Lipsius building. In addition, the NSA is targeting German civilian communications, monitoring ca. 500 million phone calls, emails and text messages per day.
European leaders are not amused- these revelations could endanger a trade pact worth hundreds of billions of dollars.
posted by anemone of the state on Jun 30, 2013 - 363 comments

How Can Any Company Ever Trust Microsoft Again?

How Can Any Company Ever Trust Microsoft Again?A thoughtful essay about why companies and individuals shouldn't trust Microsoft in light of the recent leaks.
posted by stoneweaver on Jun 28, 2013 - 44 comments

The ZXX typeface: Zalgo meets Captcha to prevent OCR

During my service in the Korean military, I worked for two years as special intelligence personnel for the NSA, learning first-hand how to extract information from defense targets. Now, as a designer, I am influenced by these experiences and I have become dedicated to researching ways to “articulate our unfreedom” and to continue the evolution of my own thinking about censorship, surveillance, and a free society.
ZXX is a disruptive typeface designed by an ex-Korean intelligence officer to prevent automated text processing. ZXX Type Specimen Video. Project site offers a free download (.zip, 77 KB).
posted by Foci for Analysis on Jun 22, 2013 - 43 comments

Codefellas, starring John Hodgman.

"I may be a high functioning zinfandel addict with three estranged wives who's seen Kissinger naked, but I am NOT an over sharer." (SLNYT)
posted by MeanwhileBackAtTheRanch on Jun 21, 2013 - 18 comments

I do not expect to see home again.

I will be satisfied if the federation of secret law, unequal pardon and irresistible executive powers that rule the world that I love are revealed even for an instant."
posted by bitmage on Jun 9, 2013 - 1038 comments

Ana Montes: Civil Servant, Cuban Spy

In the days following 9/11, knowing they would soon have time for little other than anti-terrorism activities, FBI agents arrested Ana Montes, a Defense Intelligence Agency (DIA) analyst later convicted of espionage for spying on behalf of the Cuban government. Over the course of her "meteoric career" she became the agency's lead analyst for Cuban military affairs, despite having been recruited as an agent before even applying for the DIA post. [more inside]
posted by Kadin2048 on Jun 4, 2013 - 14 comments

IRS Claims Authority to Read Your E-Mail Without A Warrant

The ACLU reports that the IRS claims in an internal document that it has the authority to access citizens' online communications without a warrant. The IRS claimed in a 2009 document that "the Fourth Amendment does not protect communications held in electronic storage, such as email messages stored on a server, because internet users do not have a reasonable expectation of privacy in such communications." It still retains that position even after the 2010 case of US v Warshak which determined that citizens have a reasonable expectation of privacy in such communications. [more inside]
posted by Sleeper on Apr 11, 2013 - 50 comments

"We need to get this SNAFU under control rapidly".

My fellow Oceanians, you know we've always been at war with Eurasia
(Or is it Eastasia?) Either way it's war and we need division to wage it
But now the proles are connecting online bypassing these illusory divisions
Of race, religion and nationality (Sounds grand to me?!) It's a catastrophe!

Rap News (previously) analyzes the ongoing struggle of civil liberties in the Internet Age.
Will it remain the one open frequency where humanity can bypass filters and barriers, or become the greatest spying machine ever imagined?

posted by dunkadunc on Sep 10, 2012 - 30 comments

Challenging the Surveillance State

"If the government is able to learn what we speak about, and know who we're talking to, and know what it is that we're planning, it makes any kind of activism extremely difficult, because secrecy and privacy are prerequisites to effective activism. "
Glenn Greenwald on challenging the surveillance state: (1 - 2 - 3 - 4).
posted by dunkadunc on Jul 1, 2012 - 48 comments

Kuang Grade Mark Eleven

He leaves his cellphone and laptop at home and instead brings "loaner" devices, which he erases before he leaves the US and wipes clean the minute he returns . In China, he disables Bluetooth and Wi-Fi , never lets his phone out of his sight and, in meetings, not only turns off his phone but also removes the battery , for fear his microphone could be turned on remotely. He connects to the Internet only through an encrypted, password-protected channel, and copies and pastes his password from a USB thumb drive. He never types in a password directly, because, he said, "Chinese are very good at installing key-logging software on your laptop." - Travel precautions in the age of digital espionage.
posted by Artw on Feb 13, 2012 - 125 comments

X-37B spaceplane spying on Chinese space station?

In March last year, the unmanned X-37B US military spaceplane launched from Cape Canaveral on mission USA-226, to "demonstrate various experiments", sensors and technology. Its original 270 day mission was extended in November "as circumstances allow" for "additional experimentation opportunities", but a dedicated group of optical tracking specialists in the US and Europe believe that the X-37B is in fact spying on the Chinese space station Tiangong-1. [more inside]
posted by adrianhon on Jan 5, 2012 - 59 comments

Hacker Rattles Security Circles

“My country should have control over Google, Skype, Yahoo, etc.,” he said by e-mail. “I’m breaking all encryption algorithms and giving power to my country to control all of them.” Is an independent Iranian hacker trying to help his government spy on its people?
posted by beisny on Sep 12, 2011 - 24 comments

Of spies, special forces and drone strikes

Warfare: An advancing front - "The US is engaged in increasingly sophisticated warfare, fusing intelligence services and military specialists" [more inside]
posted by kliuless on May 21, 2011 - 19 comments

Giving "The Devil" His Due

Emmanuel "Toto" Constant led a paramilitary organization called FRAPH that terrorized Haiti after the overthrow of Jean-Bertrand Aristide. When FRAPH's fortunes declined, Toto mysteriously appeared in New York City, where he was scorned by the Haitian community. Justice eventually caught up to Toto, who is now imprisoned in New York state. [more inside]
posted by reenum on Apr 27, 2011 - 6 comments

Still temporary. Still PATRIOTic.

USA PATRIOT is up for renewal again. Tim Nichols of the Independent Examiner reports that "nobody notices" as Mike Rogers (R-MI) floats the renewal. As we noted last year during another quiet renewal, this is not the first time the Obama administration has been confronted with the idea. While groups as disparate as the Cato Institute and the Randolph Bourne Institute's antiwar.com speak out against the possibility, mainstream media sources seem uninterested.
posted by anarch on Jan 14, 2011 - 31 comments

Domestic spying

... the United States is assembling a vast domestic intelligence apparatus to collect information about Americans, using the FBI, local police, state homeland security offices and military criminal investigators. The system, by far the largest and most technologically sophisticated in the nation's history, collects, stores and analyzes information about thousands of U.S. citizens and residents, many of whom have not been accused of any wrongdoing. (previously)
posted by Joe Beese on Dec 20, 2010 - 79 comments

Codename Oracle

A worshiper at a California mosque called frequently for violent jihad against the West. This freaked out his fellow attendees so much that they took out a restraining order on him... and learned he was an informant planted by the FBI.
posted by Faint of Butt on Dec 5, 2010 - 73 comments

Daryl Gates' real legacy

You may have heard about Romeo Agents, the male employees of the East German Ministry for State Security (also known as MfS or Stasi). They were unleashed on female federal employees in West Germany, with whom they began long-term relations and then began using as sources. That tactic has apparently been used in the United States as well; David Cay Johnston writes about the real legacy of Daryl Gates, the former chief of the LAPD. Gates died Friday. [more inside]
posted by krautland on Apr 17, 2010 - 38 comments

It was hot, the night we burned Chrome

Canadian researchers have uncovered a vast “Shadow Network” of online espionage based in China that used seemingly harmless means such as e-mail and Twitter to extract highly sensitive data. Stolen documents recovered in a year-long investigation show the hackers have breached the servers of dozens of countries and organizations, taking everything from top-secret files on missile systems in India to confidential visa applications, including those of Canadians travelling abroad. [more inside]
posted by KokuRyu on Apr 5, 2010 - 35 comments

Page: 1 2 3