mass surveillance

 

  • [18] China[edit] Main article: Mass surveillance in China China is one of the five countries on Reporters Without Borders’ March 2013 list of “State Enemies of the Internet”,
    countries whose governments are involved in active, intrusive surveillance of news providers, resulting in grave violations of freedom of information and basic human rights.

  • [15] Bahrain[edit] Bahrain is one of the five countries on Reporters Without Borders’ March 2013 list of “State Enemies of the Internet”, countries whose governments are involved
    in active, intrusive surveillance of news providers, resulting in grave violations of freedom of information and human rights.

  • It requires that telecommunication operators retain metadata for telephone, Internet, and other telecommunication services for periods of not less than six months and not
    more than two years from the date of the communication as determined by each EU member state and, upon request, to make the data available to various governmental bodies.

  • [89] Syria[edit] Syria is one of the five countries on Reporters Without Borders’ March 2013 list of “State Enemies of the Internet”, countries whose governments are involved
    in active, intrusive surveillance of news providers, resulting in grave violations of freedom of information and human rights.

  • The vote is part of efforts in Europe to shield citizens from online surveillance in the wake of revelations about a far-reaching spying program by the U.S. National Security
    Agency.

  • [56] Iran[edit] Main article: Mass surveillance in Iran Iran is one of the five countries on Reporters Without Borders’ March 2013 list of “State Enemies of the Internet”,
    countries whose governments are involved in naturally active efforts to news providers .

  • Bahrain was among the many countries listed as the Israeli firm’s clients accused of hacking and conducting unauthorized mass surveillance using phone malware despite a poor
    human rights record.

  • [71] As part of Singapore’s Smart Nation initiative to build a network of sensors to collect and connect data from city life (including the citizen’s movement), the Singapore
    government rolled out 1000 sensors ranging from computer chips to surveillance cameras,[72] to track almost everything in Singapore from air quality to public safety in 2014.

  • [16] Malaysia[edit] In July 2018, the Malaysian police announced the creation of the Malaysian Intercept Crimes Against Children Unit (icacu) that is equipped with real-time
    mass internet surveillance software developed in the United States and is tasked with the monitoring of all Malaysian internet users, with a focus on pornography and child pornography.

  • [106][107][108] However, the Tribunal stated in February 2015 that one particular aspect, the data sharing arrangement that allowed UK Intelligence services to request data
    from the US

  • [25] The Chinese government also plans to network and interlink up to 20 million surveillance cameras equipped with facial recognition as part of the ‘Skynet’ project in order
    to track down wanted fugitives and suspects within minutes.

  • Singapore’s largest telecompany, Singtel, has close relations to the government and Singapore’s laws are broadly phrased to allow the government to obtain sensitive data such
    as text-messages, email, call logs, and web surfing history from its people without the need for court permission.

  • [76] Spain[edit] According to a 2017 report by Privacy International, Spain may be part of a group of 21 European countries that is withholding information, also known as
    data retention.

  • [50] India[edit] Main article: Mass surveillance in India The Indian parliament passed the Information Technology Act of 2008 with no debate, giving the government fiat power
    to tap all communications without a court order or a warrant.

  • [13][14] For example, in September 2007 the American Civil Liberties Union (ACLU) stated that we are “in danger of tipping into a genuine surveillance society completely alien
    to American values” with “the potential for a dark future where our every move, our every transaction, our every communication is recorded, compiled, and stored away, ready to be examined and used against us by the authorities whenever they
    want”.

  • Mandiant, the company engaged by the NYT to secure its network, identified the source of the attacks as a group of hackers it called Advanced Persistent Threat 1, a unit of
    the People’s Liberation Army operating from a 12-story building in the suburbs of Shanghai that had hundreds, possibly thousands, of staff and the direct support of the Chinese government.

  • India is setting up a national intelligence grid called NATGRID,[51] which would be fully set up by May 2011 where each individual’s data ranging from land records, Internet
    logs, air and rail PNR, phone records, gun records, driving license, property records, insurance, and income tax records would be available in real time and with no oversight.

  • Section 69 of the act states “Section 69 empowers the Central Government/State Government/ its authorized agency to intercept, monitor or decrypt any information generated,
    transmitted, received or stored in any computer resource if it is necessary or expedient so to do in the interest of the sovereignty or integrity of India, defence of India, security of the State, friendly relations with foreign States or
    public order or for preventing incitement to the commission of any cognizable offence or for investigation of any offence.”

  • [2] Another criticism is that increasing mass surveillance could lead to the development of a surveillance state or an electronic police state where civil liberties are infringed
    or political dissent is undermined by COINTELPRO-like programs.

  • These companies sold SMS interception and user location products to Mobile Communication Company of Iran and Irancell, Iran’s two biggest mobile phone companies, in 2009 and
    they were used to identify Iranian citizens during the post-election uprising in 2009.

  • In a statement, the Emirati government acknowledged that cameras are used to counter the threat of terrorism and have helped the country rank as one of the safest countries
    in the world.

  • [24] Individuals can also be subject to travel restrictions such as bans on purchases of flights and high speed train tickets based on whether they have violated social norms,
    certain laws or engage in political activism against the government, subjecting violators to a form of virtual house arrest by confining them to a specific geographic area such as a particular town or city.

  • [81] The FRA has been contested since the change in its legislation, mainly because of the public perception the change would enable mass surveillance.

  • Singapore’s surveillance structure spreads widely from closed-circuit television (CCTV) in public areas even around the neighbourhood, internet monitoring/traffic monitoring
    and to the use of surveillance metadata for government initiatives.

  • [3] In 2013, the practice of mass surveillance by world[4] governments was called into question after Edward Snowden’s 2013 global surveillance disclosure on the practices
    by the National Security Agency (NSA) of the United States.

  • [31] European Union justice and rights commissioner Viviane Reding said “The question has arisen whether the large-scale collection and processing of personal information
    under US surveillance programmes is necessary and proportionate to meet the interests of national security.”

  • [74] With rising security concerns, the number of CCTV cameras in public areas such as monitoring of the public transport system and commercial/ government buildings in Singapore
    is set to increase.

  • And since March 2012, new legislation requires all new users of micro-blogging sites to register using their own name and telephone number.

  • [52] With a UID from the Unique Identification Authority of India being given to every Indian from February 2011, the government would be able track people in real time.

  • [6][7][8][9] The Aerospace Corporation of the United States describes a near-future event they call the “GEOINT Singularity” in which everything on the surface of the earth
    will be monitored at all times, analyzed by artificial intelligence systems, and then redistributed and made available to the general public globally in realtime.

  • Private companies are directly responsible to the Chinese authorities for surveillance of their networks to ensure banned messages are not circulated.

  • [70] In 2018, the Singapore government would be rolling out new and more advanced surveillance systems.

  • However, soon the project began being used as a surveillance program to spy on rival leaders, critical dissidents and journalists.

  • In particular, access to the content of private messages (that is, interception of a communication) must be authorized by a warrant signed by a Secretary of State.

  • [1] The surveillance is often carried out by local and federal governments or governmental organizations, such as organizations like the NSA, but it may also be carried out
    by corporations (either on behalf of governments or at their own initiative).

  • European Union[edit] The right to privacy is a highly developed area of law in Europe.

  • On 20 October 2013, a committee at the European Parliament backed the measure, which, if it is enacted, could require American companies to seek clearance from European officials
    before complying with United States warrants seeking private data.

  • By the time the state collapsed in 1989, the Stasi had built up an estimated civilian network of 189,000 informants, who monitored even minute hints of political dissent among
    other citizens.

  • Several states within India have already installed CCTV surveillance systems with face matching capabilities using biometrics in Aadhaar.

  • [77] In 2014, many defense lawyers tried to overturn multiple cases that used mass storage as their evidence to convict, according to the European Agency for Fundamental Rights.

  • [27] Internet surveillance is pervasive within China, under the Cybersecurity Law of the People’s Republic of China, all SIM cards purchases require real name registration,[20]
    all WiFi hotspots throughout the country require SMS verification through a phone number which is incidentally linked to a user’s resident ID card and all instant messaging and internet service providers including but not limited to ISP’s,
    internet cafes and gaming service providers are required to verify the real identity of users through either a foreign passport or national ID card prior to the provision of a service.

  • [26] According to UK-based technology research organization, Comparitech, a city in China called Chongqing is the most surveilled city in the entire world, with 2.5m cameras
    watching over almost 15.35 million people.

  • The government enforces restrictions around the types of appliances North Koreans may own in their home, in case radio or TV sets pick up signals from nearby South Korea,
    China and Russia.

  • After moving to the UK and getting his asylum request accepted, Al-Jamri legally filed charges against Bahrain along with the notorious spyware firm, NSO Group for infecting
    his phone with a malware, built with military-grade technology in August 2019.

  • [69] The installation of mass surveillance cameras in Singapore is an effort to act as a deterrence not only for terror attacks[70] but also for public security such as loan
    sharks, illegal parking, and more.

  • North Korea[edit] Main article: Mass surveillance in North Korea Having attained the nickname ‘surveillance state’, North Korea’s government has complete control over all
    forms of telecommunications and Internet.

  • [99] The use of these capabilities is controlled by laws made in the UK Parliament.

  • [80] Communications service providers are legally required, under confidentiality, to transfer cable communications crossing Swedish borders to specific “interaction points”,
    where data may be accessed after a court order.

  • The Court said it violates two basic rights – respect for private life and protection of personal data.

  • [30] Since early 2012, the European Union has been working on a General Data Protection Regulation to replace the Data Protection Directive and harmonise data protection and
    privacy law.

  • [91] In December 2019, Google Play Store and Apple App Store removed an Emirati messaging application called ToTok following allegations that it was a state surveillance application,
    according to The New York Times report.

  • Singapore’s government have the rights to access communication data.

  • [98] After the growth of the Internet and development of the World Wide Web, a series of media reports in 2013 revealed more recent programs and techniques involving GCHQ,
    such as Tempora.

  • [10][11] By country Privacy International’s 2007 survey, covering 47 countries, indicated that there had been an increase in surveillance and a decline in the performance
    of privacy safeguards, compared to the previous year.

  • The network traffic management and surveillance device NetEnforcer was provided by Israel to Denmark and then resold to Iran.

  • [16] Media reports published in July 2021 exposed the use of NSO Group’s phone malware software, Pegasus, for spying on rights activists, lawyers, and journalists, globally,
    by authoritarian governments.

  • [49] Germany[edit] In 2002 German citizens were tipped off about wiretapping when a software error led to a phone number allocated to the German Secret Service being listed
    on mobile telephone bills.

  • “[90] In January 2019, Reuters released a detailed account of a 2014 state-surveillance operation – dubbed as Project Raven – led by the United Arab Emirates with the help
    of former NSA officials like Lori Stroud, an ex-NSA cyberspy.

  • [60] The relevance of these political beliefs may make it easier for mass surveillance to spread within the country.

  • [79] In December 2009, new legislation went into effect, allowing the FRA to monitor cable bound signals passing the Swedish border.

  • [32] When the EU / US arrangement to implement International Safe Harbor Privacy Principles were struck down by the European Court of Justice, a new framework for transatlantic
    data flows, called the “EU-US Privacy Shield”, was adopted in July 2016.

  • The EU is also asking the US for changes to US legislation to match the legal redress offered in Europe; American citizens in Europe can go to the courts if they feel their
    rights are infringed but Europeans without right of residence in America cannot.

  • Besides the usual routing regulations that allow access to an IP address or a particular domain name to be blocked, the Great Firewall makes large-scale use of Deep Packet
    Inspection (DPI) technology to monitor and block access based on keyword detection.

  • [92][93] The application’s privacy policy clearly stated that it may share personal data of the users with “regulatory agencies, law enforcement, and other lawful access requests”.

  • [citation needed] Obviously, in order to have digital data to draw from, the citizens must have access to phones and other things online.

  • The level of Internet filtering and surveillance in Bahrain is one of the highest in the world.

  • [16] United Arab Emirates[edit] In October 2016, The Intercept released a report detailing the experience of an Italian security researcher Simone Margaritelli, of allegedly
    being hired for mass surveillance operations run by United Arab Emirates.

  • Mass surveillance has often been cited as necessary to fight terrorism, prevent crime and social unrest, protect national security, and control the population.

 

Works Cited

[‘o “Mass Surveillance”. Privacy International. Retrieved 20 April 2017.
o ^ Watt, Eliza (2 September 2017). “‘The right to privacy and the future of mass surveillance'”. The International Journal of Human Rights. 21 (7): 773–799. doi:10.1080/13642987.2017.1298091.
ISSN 1364-2987. S2CID 148928418.
o ^ Giroux, Henry A. (2015). “Totalitarian Paranoia in the Post-Orwellian Surveillance State”. Cultural Studies. 29 (2): 108–140. doi:10.1080/09502386.2014.917118. S2CID 143580193.
o ^ TATLOW, DIDI KIRSTEN (28
June 2013), U.S. Prism, Meet China’s Golden Shield, […] a Beijing lawyer named Xie Yanyi filed a public information request with the police asking about China’s own surveillance operations. […] ‘Most people were critical about the U.S. and
supported Snowden.’ [he said…] Then the discussion started shifting to take in China’s own surveillance issues.
o ^ Mark Hosenball and John Whitesides (7 June 2013). “Reports on surveillance of Americans fuel debate over privacy, security”.
Reuters. Retrieved 17 December 2013.
o ^ Kuehn, Kathleen (9 December 2016). The Post-Snowden Era: Mass Surveillance and Privacy in New Zealand. Bridget Williams Books. ISBN 9780908321087. Retrieved 8 January 2017.
o ^ “Snowden: Mass Surveillance
Needs Global Solution”. Retrieved 8 January 2017.
o ^ Lyon, David (19 October 2015). Surveillance After Snowden. John Wiley & Sons. ISBN 9780745690889. Retrieved 8 January 2017.
o ^ “Towards a world without mass surveillance” (PDF). Retrieved
8 January 2017.
o ^ Vinci, Anthony (August 31, 2020). “The Coming Revolution in Intelligence Affairs: How Artificial Intelligence and Autonomous Systems Will Transform Espionage”. Foreign Affairs. Vol. 99, no. 5. ISSN 0015-7120.
o ^ “The Future
of Ubiquitous, Real-Time Intelligence – A GEOINT Singularity | Aerospace Center for Space Policy and Strategy”. csps.aerospace.org. Retrieved 19 April 2022.
o ^ “Surveillance Monitor 2007 – International country rankings”. Privacy International.
28 December 2007. Archived from the original on 8 January 2016. Retrieved 16 September 2013.
o ^ Tom Steinert-Threlkeld (13 August 2008). “Police Surveillance: Go Snoop, Yourself”. ZDNet. Archived from the original on 11 September 2008. Retrieved
13 August 2008.
o ^ “YouGov / Daily Telegraph Survey Results” (PDF). YouGov. 2006. Retrieved 15 September 2013.
o ^ “Why a Surveillance Society Clock?”. American Civil Liberties Union. 4 September 2007. Retrieved 15 September 2013.
o ^ Jump
up to:a b c d e f g h i j k l The Enemies of the Internet Special Edition : Surveillance Archived 31 August 2013 at the Wayback Machine, Reporters Without Borders, 12 March 2013
o ^ “Pegasus: Spyware sold to governments ‘targets activists'”. BBC
News. 19 July 2021. Retrieved 19 July 2021.
o ^ “No safe haven? The Bahraini dissident still menaced after gaining UK asylum”. The Guardian. Retrieved 6 December 2022.
o ^ Archived at Ghostarchive and the Wayback Machine: How China’s Mass Surveillance
Works, retrieved 5 October 2021
o ^ Jump up to:a b Chin, Josh; Lin, Liza (2022). Surveillance State: Inside China’s Quest to Launch a New Era of Social Control (1st ed.). New York. ISBN 978-1-250-24929-6. OCLC 1315574672.
o ^ ONI Asia Archived
23 September 2017 at the Wayback Machine, web site, OpenNet Initiative, retrieved 15 September 2013.
o ^ “Breaching Trust: An analysis of surveillance and security practices on China’s TOM-Skype platform”, Nart Villeneuve, Information Warfare Monitor
and ONI Asia, 1 October 2008.
o ^ Perlroth, Nicole (31 January 2013). “Hackers in China Attacked The Times for Last 4 Months”. The New York Times. ISSN 0362-4331. Retrieved 20 March 2021.
o ^ Vincent, Alice (15 December 2017). “Black Mirror is
coming true in China, where your ‘rating’ affects your home, transport and social circle”. The Daily Telegraph. Archived from the original on 12 January 2022.
o ^ “China Law Translate- Social Credit Resources Page”. China Law Translate. 2 May
2019. Retrieved 25 July 2021.
o ^ “”Skynet”, China’s massive video surveillance network”. South China Morning Post. 4 October 2018. Retrieved 25 July 2021.
o ^ “Big Brother is watching: Chinese city with 2.6m cameras is world’s most heavily
surveilled”. The Guardian. 2 December 2019. Retrieved 2 December 2019.
o ^ Shu, Catherine (1 June 2016). “China attempts to reinforce real-name registration for Internet users”. TechCrunch. Retrieved 25 July 2021.
o ^ Welle (www.dw.com), Deutsche.
“East German Stasi Had 189,000 Informers, Study Says | DW | 11.03.2008”. DW.COM. Retrieved 12 March 2022.
o ^ See Julia M. Fromholz, The European Union Data Privacy Directive, 15 Berkeley Tech. L.J. 471, 472 (2000); Dean William Harvey & Amy White,
The Impact of Computer Security Regulation on American Companies, 8 Tex. Wesleyan L. Rev. 505 (2002); Kamaal Zaidi, Harmonizing U.S.-EU Online Privacy Law: Toward a U.S. Comprehensive Regime For the Protection of Personal Data, 12 Mich.St. J. Int’l
L. 169 (2003).
o ^ “Rules Shielding Online Data From N.S.A. and Other Prying Eyes Advance in Europe”, James Kanter and Mike Scott, The New York Times, 21 October 2013. Retrieved 22 October 2013.
o ^ Traynor, Ian (26 November 2013). “NSA surveillance:
Europe threatens to freeze US data-sharing arrangements”. The Guardian. Retrieved 1 December 2013.
o ^ “EU Commission and United States agree on new framework for transatlantic data flows: EU-US Privacy Shield” (Press release). European Commission.
2 February 2016. Retrieved 24 February 2016; “Restoring trust in transatlantic data flows through strong safeguards: European Commission presents EU-U.S. Privacy Shield” (Press release). European Commission. 29 February 2016. Retrieved 7 March 2016;
“European Commission launches EU-U.S. Privacy Shield: stronger protection for transatlantic data flows” (Press release). European Commission. 12 July 2016. Retrieved 16 July 2016.
o ^ “U.S. and Europe in ‘Safe Harbor’ Data Deal, but Legal Fight
May Await”. The New York Times. 2 February 2016. Retrieved 24 February 2016; “Privacy Shield deal lets US tech firms transfer European customers’ data again”. The Guardian. 8 July 2016. Retrieved 8 July 2016; “Privacy Shield forced US to be ‘transparent’
about intelligence agencies”. EurActiv. 12 July 2016. Retrieved 16 July 2016.
o ^ “Top EU court rejects EU-wide data retention law”. BBC. 8 April 2014. Retrieved 7 September 2014.
o ^ “Directive 2006/24/EC of the European Parliament and of the
Council of 15 March 2006 on the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002/58/EC”, L 105/54, Official
Journal of the European Union, 13 April 2006. Retrieved 20 September 2013.
o ^ “Joint letter to Cecilia Malmström, European Commissioner for Home Affairs, from Dr. Patrick Breyer and 105 additional parties”, 22 June 2010.
o ^ “FP7 – Science in
Society” Archived 26 January 2012 at the Wayback Machine, Community Research and Development Information Service (CORDIS), European Commission, 30 December 2006.
o ^ “FP7 Security Research”, Community Research and Development Information Service
(CORDIS), European Commission, 3 September 2012. Retrieved 15 September 2013.
o ^ “The EU Security-Industrial Complex, an interview with Ben Hayes about his book NeoConOpticon “, Matthias Monroy, Telepolis (Heise Zeitschriften Verlag), 25 September
2009. Retrieved 15 September 2013.
o ^ NeoConOpticon — The EU Security-Industrial Complex, Ben Hayes, Transnational Institute (TNI) and Statewatch, 25 September 2009, 84 pages,ISSN 1756-851X. Retrieved 15 September 2013.
o ^ “Totalüberwachung
der realen und virtuellen Räume” (in German) (“Total control of the real and virtual spaces”), Florian Rötzer, Telepolis (Heise Zeitschriften Verlag), 22 September 2009. Retrieved 15 September 2013. (English translation)
o ^ Towards a more secure
society and increased industrial competitiveness: Security Research Projects under the 7th Framework Programme for Research[permanent dead link], European Commission, May 2009, 100 pages. Retrieved 15 September 2013.
o ^ INDECT project homepage
Archived 8 January 2011 at the Wayback Machine, AGH – University of Science and Technology (Poland). Retrieved 17 September 2013.
o ^ “INDECT: Intelligent information system supporting observation, searching and detection for security of citizens
in urban environment”, EU Research Projects, Community Research and Development Information Service (CORDIS), European Commission, 4 September 2013. Retrieved 17 September 2013.
o ^ “EU funding ‘Orwellian’ artificial intelligence plan to monitor
public for ‘abnormal behaviour’ “, Ian Johnston, The Telegraph (UK), 19 September 2009. Retrieved 17 September 2013.
o ^ HIDE – “HOMELAND SECURITY, BIOMETRIC IDENTIFICATION AND PERSONAL DETECTION ETHICS”, Community Research and Development Information
Service, http://cordis.europa.eu/project/rcn/88614_en.html. Retrieved 17 July 2016
o ^ Mordini E. (2008), Nothing to Hide. Biometrics, Privacy and Private Sphere, in Schouten B. et al. (eds.): BIOID 2008, Biometrics and Identity Management, LNCS
5372, Springer-Verlag Berlin Heidelberg, 247–257. https://link.springer.com/chapter/10.1007/978-3-540-89991-4_27. Retrieved July, 17; 2016.
o ^ HIDE Project Overview, http://www.cssc.eu/public/FINAL%20BROCHURE.pdf Archived 24 January 2021 at the
Wayback Machine. Retrieved 17 July 2016
o ^ Tim Richardson (4 November 2002). “German secret service taps phones, bills buggees”. The Register. Retrieved 27 January 2011.
o ^ “Centralised System to Monitor Communications”, reply by Shri Gurudas
Kamat, Minister of State for Communications and Information Technology in Rajya Sabha, Press Information Bureau, 26 November 2009. Retrieved 17 September 2013.
o ^ Mohan, Vishwa (2 October 2009). “MHA to make security data tamper-free”. The Times
of India. TNN. Retrieved 17 September 2013.
o ^ India to prepare NPR with 2011 Census Archived 5 September 2012 at the Wayback Machine, iGovernment (9.9 Mediaworx), 24 April 2008. Retrieved 17 September 2013.
o ^ “Election Commission to use Census
data, GPS to track voters”, Rediff (Delhi), 25 August 2008. Retrieved 17 September 2012.
o ^ “Picture Intelligence Unit – Aadhaar Based Surveillance By Foreign Firms”. Archived from the original on 2 February 2018.
o ^ “Right to privacy: Data
shows states using Aadhaar to build profiles of citizens”. 25 August 2017.
o ^ “Watching porn? Cops now have their eyes on you | Malay Mail”.
o ^ “[Exclusive] Police will know if you watch porn”. 9 July 2018.
o ^ “Respect privacy and no to monitoring
of internet usage or activity in Malaysia, say ASEAN NGOs”. 20 July 2018. Archived from the original on 20 September 2018. Retrieved 16 August 2018.
o ^ Arteaga, Nelson. 2017. Mexico: Internal security, surveillance, and authoritarianism. Surveillance
& Society 15(3/4): 491-495.
o ^ Arteaga, Nelson. 2017. Mexico: Internal security, surveillance, and authoritarianism. Surveillance & Society 15(3/4): 491-495.(Artega, 494)
o ^ “Italy and the Netherlands top wiretap chart”, Digital Civil Rights
in Europe, EDRI-gram Number 2.14, 15 July 2004. Retrieved 17 September 2013.
o ^ “Press release of The Dutch Banking Association, 8 July 2020”
o ^ “Website TMNL”
o ^ “North Korea, the surveillance state”.
o ^ “Chapter 2. Rights and Freedoms
of Man And Citizen”, Constitution of Russia. Retrieved 17 September 2013.
o ^ “What is “professionalitet”, how it will be useful for a student, a specialist and the labor market”. “Website about business and economics (in Russian)”. Wall Wayxar
(Moscow) (in Russian). Retrieved 17 October 2021.
o ^ “Digital-Report” – information and analytical magazin (12 August 2021). “”Saboteur developers: pests at work and how to find them””. Digital Report (in Russian). Retrieved 17 October 2021.
o ^
“Tech in Asia – Connecting Asia’s startup ecosystem”.
o ^ Jump up to:a b Sim, Royston (18 March 2016). “More surveillance cameras as deterrent”. The Straits Times.
o ^ Heng, Janice (8 March 2016). “Network of CCTV cameras proving effective”.
The Straits Times.
o ^ “Seeking Privacy in a City of Sensors”. Bloomberg.com. 21 April 2017.
o ^ Tham, Irene (10 October 2014). “1,000 sensors to be rolled out in Singapore as part of ‘smart nation’ plan”. The Straits Times.
o ^ “Installation
of 62,000 police cameras in 10,000 HDB blocks, multi-storey carparks complete”. The Straits Times. 11 July 2016.
o ^ Cheong, Danson (18 March 2016). “Bevy of cameras, high-tech sensors to secure shoreline”. The Straits Times.
o ^ Mahmud, Aqil
Haziq (31 December 2017). “New drones, command vehicles to help police fight crime better”. Channel NewsAsia. Archived from the original on 31 December 2017.
o ^ “Report on the National Data Retention Laws Since The CJEU’s Tele-2/Watson Judgment”.
Privacy International. 1 September 2017. Archived from the original on 9 July 2019. Retrieved 17 April 2018.
o ^ “Data retention across the EU”. European Union Agency for Fundamental Rights. 16 December 2015. Retrieved 29 April 2018.
o ^ “SOU
2003:30”. p. 154. Det har således i svensk rätt bedömts att det inte finns något rättsligt skydd för den enskildes integritet mot avlyssning eller inhämtning av signaltrafik som befordras trådlöst {{cite web}}: Missing or empty |url= (help)
o ^
Jump up to:a b Hernadi, Alexandra (30 November 2009). “I morgon börjar FRA-lagen gälla”. Svenska Dagbladet (in Swedish). SvD. Retrieved 10 March 2014.
o ^ “Prop. 2006/07:63” (PDF).[permanent dead link]
o ^ Bjurbo, Peter (10 July 2008). “FRA-spaning
inte så stor som framställts”. Sveriges Radio (in Swedish). Retrieved 10 March 2014.
o ^ “FRA Påståenden och klargöranden” (in Swedish). FRA. 2009. Archived from the original on 11 June 2007.
o ^ “Datainspektionens redovisning av regeringsuppdraget
Fö2009/355/SUND” (PDF). The Swedish Data Inspection Board. Archived from the original (PDF) on 3 June 2014. Retrieved 10 March 2014.
o ^ “SFS 2008:717”.
o ^ Sjögren, Per-Anders. “Alliansen enig om stora ändringar i FRA-lag” (in Swedish). Riksdag
& Departement. Archived from the original on 10 March 2014. Retrieved 10 March 2014.
o ^ Bynert, Simon (26 September 2008). “Militärt hot villkor för FRA-spaning”. Svenska Dagbladet (in Swedish). SvD. Retrieved 10 March 2014.
o ^ “Alliansen enig
om stärkt integritet, tydligare reglering och förbättrad kontroll i kompletteringar till signalspaningslagen” (in Swedish). Regeringen. Archived from the original on 10 March 2014. Retrieved 10 March 2014.
o ^ “Anarcho-primitivism | political and
ethical movement”. Encyclopedia Britannica. Retrieved 12 December 2020.
o ^ “Spies for Hire”. The Intercept. 24 October 2016. Retrieved 24 October 2016.
o ^ “Inside the UAE’s secret hacking team of American mercenaries”. Reuters. Retrieved 30
January 2019.
o ^ “Google and Apple remove alleged UAE spy app ToTok”. BBC News. 23 December 2019. Retrieved 23 December 2019.
o ^ Mazzetti, Mark; Perlroth, Nicole; Bergman, Ronen (22 December 2019). “It Seemed Like a Popular Chat App. It’s Secretly
a Spy Tool”. The New York Times. Retrieved 22 December 2019.
o ^ Gonzalez, Oscar (6 January 2020). “ToTok returns to Google Play Store after accusations of spying”. CNET. Retrieved 6 January 2020.
o ^ “Virus projects renew questions about UAE’s
mass surveillance”. Associated Press. Retrieved 9 July 2020.
o ^ Vincent, David (1 October 2013). “Surveillance, privacy and history”. History & Policy. History & Policy. Retrieved 27 July 2016.
o ^ “How the British and Americans started listening
in”. BBC. 8 February 2016. Retrieved 24 February 2016.
o ^ Adam White (29 June 2010). “How a Secret Spy Pact Helped Win the Cold War”. Time.
o ^ “US and Britain team up on mass surveillance”. The Guardian. 22 June 2013. Retrieved 13 May 2015.
o ^
“The Andrew Marr Show Interview: Theresa May, MP Home Secretary” (PDF). BBC. 23 November 2014. Retrieved 6 December 2014. Well I guess what he’s talking about is the fact that for certain aspects and certain of the more intrusive measures that our
security service and police have available to them – i.e. Intercept, intercepting people’s telephones and some other intrusive measures – the decision is taken by the Secretary of State, predominantly me. A significant part of my job is looking at
these warrants and signing these warrants. I think it’s … Some people argue that should be to judges….I think it’s very important that actually those decisions are being taken by somebody who is democratically accountable to the public. I think
that’s an important part of our system. I think it’s a strength of our system.
o ^ “The Law”. GCHQ. Archived from the original on 13 January 2020. Retrieved 17 December 2013.
o ^ “Statement on GCHQ’s Alleged Interception of Communications under
the US PRISM Programme” (PDF). Intelligence and Security Committee of Parliament. 17 July 2013. Retrieved 17 December 2013.
o ^ “Other safeguards and oversight”. The Investigatory Powers Tribunal. Archived from the original on 6 February 2015. Retrieved
6 February 2015.
o ^ “Intelligence and Security Committee open evidence session”. UK Parliament. 7 November 2013. Retrieved 18 December 2013.; “Spy chiefs public hearing: as it happened”. The Telegraph. 7 November 2013. Archived from the original
on 12 January 2022. Retrieved 18 December 2013.
o ^ “Britain’s spy chiefs will be questioned in public for the first time, under radical reforms of the way Parliament monitors the intelligence agencies”. The Telegraph. 10 November 2012. Archived
from the original on 12 January 2022. Retrieved 18 December 2013.
o ^ Jump up to:a b “GCHQ does not breach human rights, judges rule”. BBC. 5 December 2014. Retrieved 6 December 2014.
o ^ Jump up to:a b “IPT rejects assertions of mass surveillance”.
GCHQ. 5 December 2014. Archived from the original on 6 February 2015. Retrieved 7 February 2015.
o ^ Jump up to:a b “List of judgments”. Investigatory Powers Tribunal. 5 December 2014. Archived from the original on 6 February 2015. Retrieved 7 February
2015. 1. A declaration that the regime governing the soliciting, receiving, storing and transmitting by UK authorities of private communications of individuals located in the UK which have been obtained by US authorities pursuant to Prism and/or Upstream
does not contravene Articles 8 or 10 ECHR. 2. A declaration that the regime in respect of interception under ss8(4), 15 and 16 of the Regulation of investigatory Powers Act 2000 does not contravene Articles 8 or 10 ECHR and does not give rise to unlawful
discrimination contrary to Article 14, read together with Articles 8 and/or 10 of the ECHR.
o ^ “IPT Ruling on Interception”. GCHQ. 6 February 2015. Archived from the original on 6 February 2015. Retrieved 6 February 2015.
o ^ “GCHQ censured over
sharing of internet surveillance data with US”. BBC. 6 February 2015. Retrieved 6 February 2015.
o ^ “UK-US surveillance regime was unlawful ‘for seven years'”. The Guardian. 6 February 2015. Retrieved 6 February 2015.
o ^ “UK surveillance ‘lacks
transparency’, ISC report says”. BBC. 12 March 2015. Retrieved 14 March 2015.
o ^ “Privacy and Security: A modern and transparent legal framework”. Intelligence and Security Committee of Parliament. 12 March 2015. Archived from the original on
16 March 2015. Retrieved 14 March 2015.
o ^ “Intelligence and security committee report: the key findings”. The Guardian. 12 March 2015. Retrieved 14 March 2015.
o ^ “Statement by the Interception of Communications Commissioner’s Office (IOCCO)
on the publication of the Interception of Communications Commissioner’s Report 2014” (PDF). 12 March 2015. Archived from the original (PDF) on 2 April 2015. Retrieved 14 March 2015; “Report of the Interception of Communications Commissioner” (PDF).
March 2015. Archived from the original (PDF) on 21 March 2015. Retrieved 14 March 2015.
o ^ “UK surveillance laws need total overhaul, says landmark report”. The Guardian. 12 March 2015. Retrieved 14 March 2015.
o ^ “Civil liberty campaigners
attacked for saying terror attack is “price worth paying” to prevent mass snooping”. The Telegraph. 12 March 2015. Archived from the original on 12 January 2022. Retrieved 14 November 2015; Carlile, Alex (13 March 2015). “GCHQ doesn’t need any lectures
from Liberty”. The Times. Retrieved 14 March 2015.
o ^ “Regulation of Investigatory Powers Act 2000”, 2000 Chapter 23, UK Government Legislation. Retrieved 28 September 2013.
o ^ “‘Massive abuse’ of privacy feared”. BBC News. 11 June 2002. Retrieved
5 April 2010.
o ^ “Protection of Freedoms Bill”, Home Office, 11 February 2011. Retrieved 28 September 2013.
o ^ “Emergency data law clears Commons”. BBC. 16 July 2014. Retrieved 27 September 2014.
o ^ “Data Retention Bill set to become law”.
BBC. 17 July 2014. Retrieved 27 September 2014.
o ^ “Details of UK website visits ‘to be stored for year'”. BBC. 4 November 2015. Retrieved 10 November 2015.
o ^ “Investigatory powers bill: the key points”. The Guardian. 4 November 2015. Retrieved
10 November 2015.
o ^ “A question of trust: report of the investigatory powers review – GOV.UK”. www.gov.uk. Retrieved 6 July 2017.
o ^ “Investigatory Powers Bill: bulk powers review – GOV.UK”. www.gov.uk. Retrieved 6 July 2017.
o ^ David Anderson
(11 April 2017). “CJEU judgment in Watson/Tele2”. David Anderson QC Lawyer London UK. Retrieved 6 July 2017.
o ^ “10 Human Rights Organisations v. United Kingdom | Privacy International”. www.privacyinternational.org. Retrieved 6 July 2017.
o ^
“The Price of Privacy: How local authorities spent £515m on CCTV in four years” (PDF). Big Brother Watch. February 2012. Archived from the original (PDF) on 23 September 2015. Retrieved 4 February 2015.
o ^ “FactCheck: how many CCTV cameras? – Channel
4 News”. Channel4.com. Archived from the original on 11 May 2010. Retrieved 8 May 2009.
o ^ “CCTV in London” (PDF). Retrieved 22 July 2009.
o ^ “How many cameras are there?”. CCTV User Group. 18 June 2008. Archived from the original on 23 October
2008. Retrieved 8 May 2009.
o ^ James Bamford (2008), The Shadow Factory, Doubleday, ISBN 0-385-52132-4, Chapter ‘Shamrock’, especially pg. 163.
o ^ McCullagh, Declan (30 January 2007). “FBI turns to broad new wiretap method”. ZDNet News. Retrieved
13 March 2009.
o ^ “AP Interview: USPS takes photos of all mail” Archived 24 August 2013 at the Wayback Machine, Associated Press (AP), 2 August 2013.
o ^ “U.S. Postal Service Logging All Mail for Law Enforcement”, Ron Nixon, The New York Times,
3 July 2013. Retrieved 25 September 2013.
o ^ Kevin Poulsen (18 July 2007). “FBI’s Secret Spyware Tracks Down Teen Who Made Bomb Threats”. Wired Magazine. Condé Nast. Retrieved 19 September 2013.
o ^ “Is the NSA reading your MySpace profile?”,
Dawn Kawamoto, CNET News, 9 June 2006. Retrieved 19 September 2013.
o ^ Glenn Greenwald (31 July 2013). “XKeyscore: NSA tool collects ‘nearly everything a user does on the internet'”. The Guardian. Retrieved 2 August 2013.
o ^ “CALEA Archive”.
Electronic Frontier Foundation. Archived from the original on 3 May 2009. Retrieved 14 March 2009.
o ^ “CALEA: The Perils of Wiretapping the Internet”. Electronic Frontier Foundation. Retrieved 14 March 2009.
o ^ “FAQ on the CALEA Expansion by
the FCC”. Electronic Frontier Foundation. 20 September 2007. Retrieved 14 March 2009.
o ^ Cauley, Leslie (11 May 2006). “NSA has massive database of Americans’ phone calls”. USA Today. Retrieved 12 May 2010.
o ^ Erin Mahoney and Joanne Helperin
(3 July 2009). “Caught! Big Brother May Be Watching You With Traffic Cameras”. Edmunds. Retrieved 19 September 2013.
o ^ “Law Enforcement Operations” Archived 4 May 2014 at the Wayback Machine, Persistent Surveillance Systems. Retrieved 9 September
2013.
o ^ Savage, Charlie (12 August 2007). “US doles out millions for street cameras”. The Boston Globe. Retrieved 19 September 2013.
o ^ McFadden, Robert D. (7 August 2007). “City Is Rebuffed on the Release of ’04 Records”. The New York Times.
Retrieved 5 April 2010.
o ^ Jump up to:a b van der Vlist, Fernando N. 2017. Counter-Mapping Surveillance: A Critical Cartography of Mass Surveillance Technology After Snowden. Surveillance & Society 15(1): 137-157.
o ^ “Country Report: Socialist
Republic of Vietnam”, Safety on the Line, Cormac Callanan and Hein Dries-Ziekenheiner, Freedom House, July 2012. Retrieved 19 September 2013.
o ^ “Vietnam Passes Sweeping New Cybersecurity Law | Voice of America – English”. www.voanews.com. Retrieved
25 July 2021.
o ^ Arrington, Michael (15 May 2008). “He Said, She Said in Google v. Facebook”. TechCrunch. Retrieved 14 August 2009.
o ^ Archived at Ghostarchive and the Wayback Machine: Papakipos, Matthew (28 May 2009). “Google’s HTML 5 Work:
What’s Next?” (62-minute video). Google I/O 2009. YouTube. Retrieved 19 September 2013.
o ^ “Google CEO bullish on mobile Web advertising”. Reuters. 25 January 2008. Retrieved 28 February 2010.
o ^ Archived at Ghostarchive and the Wayback Machine:
Schmidt, Eric (16 February 2010). Keynote speech (video). 2010 Mobile World Congress Barcelona. YouTube. Retrieved 28 February 2010.
o ^ Archived at Ghostarchive and the Wayback Machine: Schmidt, Eric (16 February 2010). Keynote speech (video).
2010 Mobile World Congress Barcelona. YouTube. Retrieved 28 February 2010.
o ^ “Content distribution regulation by viewing use”, Microsoft Corporation, United States Patent Application 20120278904, 26 April 2011. Retrieved 19 September 2013.
o ^
Guariglia, Matthew (31 August 2022). “What is Fog Data Science? Why is the Surveillance Company so Dangerous?”. EFF. Retrieved 4 September 2022.
o ^ Manuel Castells, (August 2009), The Rise of the Network Society, 2nd edition, Wiley Blackwell, ISBN
978-1-4051-9686-4. Retrieved 23 September 2013.
o ^ Mellor, Chris (7 September 2017). “Smart cities? Tell it like it is, they’re surveillance cities”. The Register.
o ^ The first use of the term “electronic police state” was likely in a posting
by Jim Davis “Police Checkpoints on the Information Highway”. Computer Underground Digest. 6 (72). 11 August 1994. ISSN 1066-632X. The so-called ‘electronic frontier’ is quickly turning into an electronic police state.
o ^ Jump up to:a b The term
“electronic police state” became more widely known with the publication of The Electronic Police State: 2008 National Rankings Archived 7 March 2021 at the Wayback Machine, by Jonathan Logan, Cryptohippie USA.
o ^ Kingsley Ufuoma OMOYIBO, Ogaga
Ayemo OBARO (2012), “Applications of Social Control Theory: Criminality and Governmentality” Archived 31 August 2018 at the Wayback Machine, International Journal of Asian Social Science, Vol. 2, No. 7, pp.1026-1032.
Photo credit: https://www.flickr.com/photos/dvanzuijlekom/8462246855/’]