U.S. Mass Surveillance System

From GM-RKB
(Redirected from U.S. Mass Surveillance)
Jump to navigation Jump to search

An U.S. Mass Surveillance System is a mass surveillance system for a U.S. population.



References

2021

  • (Wikipedia, 2021) ⇒ https://en.wikipedia.org/wiki/Mass_surveillance#United_States Retrieved:2021-1-6.
    • Historically, mass surveillance was used as part of wartime censorship to control communications that could damage the war effort and aid the enemy. For example, during the world wars, every international telegram from or to the United States sent through companies such as Western Union was reviewed by the US military. After the wars were over, surveillance continued in programs such as the Black Chamber following World War I and project Shamrock following World War II. [1] COINTELPRO projects conducted by the U.S. Federal Bureau of Investigation (FBI) between 1956 and 1971 targeted various "subversive" organizations, including peaceful anti-war and racial equality activists such as Albert Einstein and Martin Luther King Jr. Billions of dollars per year are spent, by agencies such as the National Security Agency (NSA) and the Federal Bureau of Investigation (FBI), to develop, purchase, implement, and operate systems such as Carnivore, ECHELON, and NarusInsight to intercept and analyze the immense amount of data that traverses the Internet and telephone system every day. Since the September 11 attacks, a vast domestic (and to some extent, global) intelligence apparatus has been built to collect information using the NSA, FBI, local police, state homeland security offices and military criminal investigators. The intelligence apparatus collects, analyzes and stores information about millions of (if not all) American (and sometimes foreign) citizens, many of whom have not been accused of any wrongdoing. Under the Mail Isolation Control and Tracking program, the U.S. Postal Service photographs the exterior of every piece of paper mail that is processed in the United States – about 160 billion pieces in 2012. The U.S. Postmaster General stated that the system is primarily used for mail sorting, but the images are available for possible use by law enforcement agencies.[2] Created in 2001 following the anthrax attacks that killed five people, it is a sweeping expansion of a 100-year-old program called “mail cover” which targets people suspected of crimes.[3] The FBI developed the computer programs “Magic Lantern” and CIPAV, which they can remotely install on a computer system, in order to monitor a person's computer activity. The NSA has been gathering information on financial records, Internet surfing habits, and monitoring e-mails. They have also performed extensive analysis of social networks such as Myspace. [4] The PRISM special source operation system legally immunized private companies that cooperate voluntarily with U.S. intelligence collection. According to The Register, the FISA Amendments Act of 2008 "specifically authorizes intelligence agencies to monitor the phone, email, and other communications of U.S. citizens for up to a week without obtaining a warrant" when one of the parties is outside the U.S. PRISM was first publicly revealed on 6 June 2013, after classified documents about the program were leaked to The Washington Post and The Guardian by American Edward Snowden. The Communications Assistance for Law Enforcement Act (CALEA) requires that all U.S. telecommunications and Internet service providers modify their networks to allow easy wiretapping of telephone, VoIP, and broad and Internet traffic. In early 2006, USA Today reported that several major telephone companies were providing the telephone call records of U.S. citizens to the National Security Agency (NSA), which is storing them in a large database known as the NSA call database. This report came on the heels of allegations that the U.S. government had been conducting electronic surveillance of domestic telephone calls without warrants. In 2013, the existence of the Hemisphere Project, through which AT&T provides telephone call data to federal agencies, became publicly known. Traffic cameras, which were meant to help enforce traffic laws at intersections, may be used by law enforcement agencies for purposes unrelated to traffic violations. Some cameras allow for the identification of individuals inside a vehicle and license plate data to be collected and time stamped for cross reference with other data used by police. [5] The Department of Homeland Security is funding networks of surveillance cameras in cities and towns as part of its efforts to combat terrorism. The New York City Police Department infiltrated and compiled dossiers on protest groups before the 2004 Republican National Convention, leading to over 1,800 arrests. Modern surveillance in the United States was thought of more of a wartime effort before Snowden disclosed in depth information about the National Security Agency in June 2013.[6] The constant development and improvements of the Internet and technology has made it easier for mass surveillance to take hold. Such revelations allow critical commentators to raise questions and scrutinize the implementation, use, and abuse of networking technologies, devices, and software systems that partake in a "global surveillant assemblage" (Bogard 2006; Collier and Ong 2004; Haggerty and Ericson 2000; Murakami Wood 2013). The NSA collected millions of Verizon user's telephone records in between 2013 and 2014. The NSA also collected data through Google and Facebook with a program called 'Prism'. Journalists through Snowden published nearly 7,000 top-secret documents since then, yet the information disclosed seems to be less than 1% of the entire information. Having access to every individual's private records seems to directly contradict the fourth amendment.
  1. James Bamford (2008), The Shadow Factory, Doubleday, , Chapter 'Shamrock', especially pg. 163.
  2. "AP Interview: USPS takes photos of all mail", Associated Press (AP), 2 August 2013.
  3. "U.S. Postal Service Logging All Mail for Law Enforcement", Ron Nixon, New York Times, 3 July 2013. Retrieved 25 September 2013.
  4. "Is the NSA reading your MySpace profile?", Dawn Kawamoto, CNET News, 9 June 2006. Retrieved 19 September 2013.
  5. "Law Enforcement Operations", Persistent Surveillance Systems. Retrieved 9 September 2013.
  6. van der Vlist, Fernando N. 2017. Counter-Mapping Surveillance: A Critical Cartography of Mass Surveillance Technology After Snowden. Surveillance & Society 15(1): 137-157.