An economy based on surveillance and interception or jamming of communications, intelligence and monitoring, was born in the United States through the development of mass personal information technologies. As the regulations concerning protection of civilian life are dwindling, this mass surveillance treats every citizen as a suspect and seriously questions the presumption of innocence (chapter 6, no. 17).
• Analysis of data from a network or database :
- Data & text mining, cross-search, etc. ;
- mobile network (metadata) ;
- applications (shopping lists, etc.) ;
- online games ;
- credit card ;
- emails ;
- traceability of RFID tags (RFID) ;
- profiling of persons ;
- phone signals, tablets or laptops in a given space (an airport, for example). Etc.
• Fixed or board cameras (drones and robots):
- Satellite visual identification ;
- observation of risk areas ;
- analysis of physical travel by dynamic mapping ;
- facial recognition ;
- biometric monitoring ;
- infrared Camera (Night Vision) ;
- terrestrial robot (cleaning, recognition, etc.). (See spy robots below).
This is how the National News analyzes the situation in the United States :
In the USA
In the United States, intelligence reports from 17 institutions that make up the intelligence community :
This intelligence is funded by different sources. In 2013 the funding totaled $ 52 billion divided between different activities. The following diagram was publicized from information recently revealed by E. Snowden :
The NSA-PRISM scandal
The main English-speaking countries (US, GB, UK, Canada, Australia and New Zealand) have created a consortium of information by sharing their infrastructure and their main tools (see the Convention of the five eyes, called ECHELON, established in 1946 as the precursor to the current Prism).
PRISM operates in the following manner :
Today, all information is fed to the NSA (30,000 employees). The NSA claims to save only 1.6% of global Internet traffic and scan only .04% of that trafic. However, this still represents 2 billion emails / day extracted from a total of 1.3 trillion / day. In fact, the main criticism is that specialists, by wanting to capture everything, make it too hard to find anything meaningful.
Here is the operating model of the Information Awareness Office, which has the task of analyzing the records of American citizens as well as other people around the globe :
Note that the Web giants (Facebook, Yahoo, Google and Microsoft) were forced to collaborate with the NSA because they are subject to US laws.
Watch lists maintained by the US government
Tuesday, August 5, 2014, the website The Intercept Watch revealed the lists of people monitored by the various US intelligence agencies. The Terrorist Identities Strategies Accomplishments in 2013 revealed that in the first list, 40% of people have no known affiliation with major terrorist groups :
The second list of 47,000 names is the No-Fly List. The third list includes the biometrics of 130,000 people (facial recognition, fingerprinting and scanning of the iris of the eye).
This illegal listening program was launched in secret by the Bush administration in the wake of the Patriot Act (2001) and was only revealed to the public in 2005, but we have only really understood the extent that since the revelations of Edward Snowden (2013).
A child born today will not know the concept of privacy. There will be no privacy for him or her, no moments that will not be recorded and analyzed.
Edward Snowden, Chanel 4 TV G.-B. 2013 (Moscow).
Do the Russians and Chinese also have big ears ?
A cybernetic September 11? (Cybergeddon?)
At the last meeting in Davos (2010-2013), there was a significant increase in cyber attacks against banks and government departments (15,000 per day?). 95% of the networks would be affected in one way or another by industrial spies, criminal networks, hackers or saboteurs). Now Pentagon strategists speak of the possibility of a computer Pearl Harbour, while Chinese hackers (see 61398 Unit APT1 Group in Shanghai) can blithely enter all industrial countries (including in departments in Ottawa) (see Mandiant Report).
The first cyber war has already taken place, in Estonia in 2007. A cyber war is a war in which we use computer networks to disrupt some of the key information structures of an enemy (eg, the Iranian nuclear centres in 2010). The first computer viruses for this type of digital intoxication are known : Stuxnet, Flame, Duqu, and Shamoon. This is a « total » activity; it happens on land, sea, air, space and cyberspace. In response, a first cyber-law book has been sketched out : the Taillin Report (2013).
Below, a War Room used to manage cyberwar :