Everybody’s Watching You: The Intercept’s 2019 Big Brother/Surveillance Technology Coverage
WHISTLEBLOWING - SURVEILLANCE, 6 Jan 2020
27 Dec 2019 – A look back at The Intercept’s must-read technology stories from 2019.
Video and internal emails show how Amazon’s Ring has blurred the line between private innovation and public law enforcement.
By Sam Biddle
Law enforcement in Davao City familiar with the IBM program said the technology had assisted them in carrying out Duterte’s controversial anti-crime agenda.
By George Joseph
The danger of China compromising hardware supply chains is very real, judging from classified intelligence documents, even if a Bloomberg story on the matter is highly disputed.
By Micah Lee, Henrik Moltke
An examination of court filings in all seven leak cases filed under Trump yields a detailed picture of how the government tries to unmask confidential sources.
By Micah Lee
The revolutionary NSA system merged different sources of electronic surveillance to rapidly map enemy fighters. The ramifications are still being felt.
By Henrik Moltke
Spies working for the United Arab Emirates discussed the attack with operatives at controversial firm DarkMatter.
By Sam Biddle, Matthew Cole
Palantir previously claimed its software was strictly involved in criminal investigations as opposed to deportations. This was false.
By Sam Biddle, Ryan Devereaux
A nonprofit led by Google and IBM executives is working with Semptian, whose technology is monitoring the internet activity of 200 million people in China.
By Ryan Gallagher
The CEO of Perceptics, which makes license plate readers, claimed that “CBP has none of the privacy concerns at the border that all agencies have inland.”
By Cora Currier
Twitter doesn’t care when its users are abused by Nazi accounts. But what happens when the feelings of the Nazis get hurt? Then Twitter springs into action.
By Jon Schwarz
Tags: Big Brother, Big tech, Facebook, Hacking, Internet, Media, NSA, Politics, Power, Spying, Surveillance, Technology, World
DISCLAIMER: The statements, views and opinions expressed in pieces republished here are solely those of the authors and do not necessarily represent those of TMS. In accordance with title 17 U.S.C. section 107, this material is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. TMS has no affiliation whatsoever with the originator of this article nor is TMS endorsed or sponsored by the originator. “GO TO ORIGINAL” links are provided as a convenience to our readers and allow for verification of authenticity. However, as originating pages are often updated by their originating host sites, the versions posted may not match the versions our readers view when clicking the “GO TO ORIGINAL” links. This site contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available in our efforts to advance understanding of environmental, political, human rights, economic, democracy, scientific, and social justice issues, etc. We believe this constitutes a ‘fair use’ of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml. If you wish to use copyrighted material from this site for purposes of your own that go beyond ‘fair use’, you must obtain permission from the copyright owner.
Click here to go to the current weekly digest or pick another article:
WHISTLEBLOWING - SURVEILLANCE: