{"id":151136,"date":"2020-01-06T12:00:54","date_gmt":"2020-01-06T12:00:54","guid":{"rendered":"https:\/\/www.transcend.org\/tms\/?p=151136"},"modified":"2020-01-04T09:08:42","modified_gmt":"2020-01-04T09:08:42","slug":"everybodys-watching-you-the-intercepts-2019-big-brother-surveillance-technology-coverage","status":"publish","type":"post","link":"https:\/\/www.transcend.org\/tms\/2020\/01\/everybodys-watching-you-the-intercepts-2019-big-brother-surveillance-technology-coverage\/","title":{"rendered":"Everybody\u2019s Watching You: The Intercept\u2019s 2019 Big Brother\/Surveillance Technology Coverage"},"content":{"rendered":"<div id=\"attachment_151137\" style=\"width: 510px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2020\/01\/big-brother-surveillance-spy.jpg\" ><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-151137\" class=\"wp-image-151137\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2020\/01\/big-brother-surveillance-spy-1024x512.jpg\" alt=\"\" width=\"500\" height=\"250\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2020\/01\/big-brother-surveillance-spy-1024x512.jpg 1024w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2020\/01\/big-brother-surveillance-spy-300x150.jpg 300w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2020\/01\/big-brother-surveillance-spy-768x384.jpg 768w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2020\/01\/big-brother-surveillance-spy.jpg 1440w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/a><p id=\"caption-attachment-151137\" class=\"wp-caption-text\">The Intercept<\/p><\/div>\n<blockquote><p><em>27 Dec 2019 &#8211; <\/em>A look back\u00a0at <em>The Intercept<\/em>\u2019s must-read technology stories from 2019.<\/p><\/blockquote>\n<p><strong><a target=\"_blank\" href=\"https:\/\/theintercept.com\/2019\/02\/14\/amazon-ring-police-surveillance\/\" >Amazon\u2019s Home Surveillance Chief Declared War on \u201cDirtbag Criminals\u201d as Company Got Closer to Police<\/a><\/strong><\/p>\n<p style=\"padding-left: 40px;\">Video and internal emails show how Amazon\u2019s Ring has blurred the line between private innovation and public law enforcement.<br \/>\n<em>By\u00a0Sam Biddle<\/em><\/p>\n<p><strong><a target=\"_blank\" href=\"https:\/\/theintercept.com\/2019\/03\/20\/rodrigo-duterte-ibm-surveillance\/\" >Inside the Video Surveillance Program IBM Built for Philippine Strongman Rodrigo Duterte<\/a><\/strong><\/p>\n<p style=\"padding-left: 40px;\">Law enforcement in Davao City familiar with the IBM program said the technology had assisted them in carrying out Duterte\u2019s controversial anti-crime agenda.<br \/>\n<em>By\u00a0George Joseph<\/em><\/p>\n<p><strong><a target=\"_blank\" href=\"https:\/\/theintercept.com\/2019\/01\/24\/computer-supply-chain-attacks\/\" >Everybody Does It: The Messy Truth About Infiltrating Computer Supply Chains<\/a><\/strong><\/p>\n<p style=\"padding-left: 40px;\">The danger of China compromising hardware supply chains is very real, judging from classified intelligence documents, even if a Bloomberg story on the matter is highly disputed.<br \/>\n<em>By Micah Lee, Henrik Moltke<\/em><\/p>\n<p><strong><a target=\"_blank\" href=\"https:\/\/theintercept.com\/2019\/08\/04\/whistleblowers-surveillance-fbi-trump\/\" >The Trump Administration Is Using the Full Power of the U.S. Surveillance State Against Whistleblowers<\/a><\/strong><\/p>\n<p style=\"padding-left: 40px;\">An examination of court filings in all seven leak cases filed under Trump yields a detailed picture of how the government tries to unmask confidential sources.<br \/>\n<em>By\u00a0Micah Lee<\/em><\/p>\n<p><strong><a target=\"_blank\" href=\"https:\/\/theintercept.com\/2019\/05\/29\/nsa-data-afghanistan-iraq-mexico-border\/\" >Mission Creep: How the NSA\u2019s Game-Changing Targeting System Built for Iraq and Afghanistan Ended Up on the Mexico Border<\/a><\/strong><\/p>\n<p style=\"padding-left: 40px;\">The revolutionary NSA system merged different sources of electronic surveillance to rapidly map enemy fighters. The ramifications are still being felt.<br \/>\n<em>By Henrik Moltke<\/em><\/p>\n<p><strong><a target=\"_blank\" href=\"https:\/\/theintercept.com\/2019\/06\/12\/darkmatter-uae-hack-intercept\/\" >Team of American Hackers and Emirati Spies Discussed Attacking The Intercept<\/a><\/strong><\/p>\n<p style=\"padding-left: 40px;\">Spies working for the United Arab Emirates discussed the attack with operatives at controversial firm DarkMatter.<br \/>\n<em>By\u00a0Sam Biddle, Matthew Cole<\/em><\/p>\n<p><strong><a target=\"_blank\" href=\"https:\/\/theintercept.com\/2019\/05\/02\/peter-thiels-palantir-was-used-to-bust-hundreds-of-relatives-of-migrant-children-new-documents-show\/\" >Peter Thiel\u2019s Palantir Was Used to Bust Relatives of Migrant Children, New Documents Show<\/a><\/strong><\/p>\n<p style=\"padding-left: 40px;\">Palantir previously claimed its software was strictly involved in criminal investigations as opposed to deportations. This was false.<br \/>\n<em>By Sam Biddle, Ryan Devereaux<\/em><\/p>\n<p><strong><a target=\"_blank\" href=\"https:\/\/theintercept.com\/2019\/07\/11\/china-surveillance-google-ibm-semptian\/\" >How U.S. Tech Giants Are Helping to Build China\u2019s Surveillance State<\/a><\/strong><\/p>\n<p style=\"padding-left: 40px;\">A nonprofit led by Google and IBM executives is working with Semptian, whose technology is monitoring the internet activity of 200 million people in China.<br \/>\n<em>By\u00a0Ryan Gallagher<\/em><\/p>\n<p><strong><a target=\"_blank\" href=\"https:\/\/theintercept.com\/2019\/07\/15\/hacked-surveillance-perceptics-congress-lobby-privacy\/\" >Before Being Hacked, Border Surveillance Firm Lobbied to Downplay Security and Privacy Concerns about Its Technology<\/a><\/strong><\/p>\n<p style=\"padding-left: 40px;\">The CEO of Perceptics, which makes license plate readers, claimed that \u201cCBP has none of the privacy concerns at the border that all agencies have inland.\u201d<br \/>\n<em>By\u00a0Cora Currier<\/em><\/p>\n<p><strong><a target=\"_blank\" href=\"https:\/\/theintercept.com\/2019\/11\/30\/david-duke-and-his-twitter-nazis-got-mad-at-me-twitter-took-their-side\/\" >David Duke and His Twitter Nazis Got Mad at Me. Twitter Took Their Side.<\/a><\/strong><\/p>\n<p style=\"padding-left: 40px;\">Twitter doesn\u2019t care when its users are abused by Nazi accounts. But what happens when the feelings of the Nazis get hurt? Then Twitter springs into action.<br \/>\n<em>By\u00a0Jon Schwarz<\/em><\/p>\n<p><em>_______________________________________________<\/em><\/p>\n<p style=\"padding-left: 40px;\"><em><a target=\"_blank\" href=\"https:\/\/theintercept.com\/theintercept\/\" >The Intercept<\/a> &#8211; <a href=\"mailto:ti-media@firstlook.org\">ti-media@\u200bfirstlook.org<\/a><\/em><\/p>\n<p><a target=\"_blank\" href=\"https:\/\/theintercept.com\/2019\/12\/27\/the-intercept-2019-technology\/\" >Go to Original \u2013 theintercept.com<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>27 Dec 2019 &#8211; A look back at The Intercept\u2019s must-read technology stories from 2019.<\/p>\n","protected":false},"author":4,"featured_media":151137,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[60],"tags":[910,1009,1007,1760,1282,234,1724,109,287,1109,911,461,75],"class_list":["post-151136","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-whistleblowing-surveillance","tag-big-brother","tag-big-tech","tag-facebook","tag-hacking","tag-internet","tag-media","tag-nsa","tag-politics","tag-power","tag-spying","tag-surveillance","tag-technology","tag-world"],"_links":{"self":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/151136","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/comments?post=151136"}],"version-history":[{"count":0,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/151136\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/media\/151137"}],"wp:attachment":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/media?parent=151136"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/categories?post=151136"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/tags?post=151136"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}