Выбрать главу

Another place the government used the all-seeing eye of providence was as part of the design for the Total Information Awareness program. The Latin means “knowledge is power”

https://en.wikipedia.org/wiki/Scientia_potentia_est#/media/File: IAO-logo.png

The brilliant cartoonist Tom Tomorrow summed up Total Information Awareness perfectly… all the way back in 2002

https://twitter.com/tomtomorrow/status/613187965737660416/photo/1

Inventing ever scarier-sounding terrorist groups to justify more bombings. Heard of the Khorasan group lately?

https://firstlook.org/theintercept/2014/09/28/u-s-officials-invented-terror-group-justify-bombing-syria/

https://firstlook.org/theintercept/2015/05/28/called-khorasan-group-doesnt-exist/

CHAPTER 6

United Nations Special Rapporteur on Torture finds Chelsea Manning’s treatment cruel and inhuman

http://www.theguardian.com/world/2012/mar/12/bradley-manning-cruel-inhuman-treatment-un

Yemenis seek justice in wedding drone strike

http://www.aljazeera.com/indepth/features/2014/01/yemenis-seek-justice-wedding-drone-strike-201418135352298935.html

The best coverage of America’s drone wars ever is courtesy of comedian John Oliver

http://www.motherjones.com/mixed-media/2014/09/john-oliver-drones-obama-harvey-keitel

Detaining someone assisting in journalism under the pretext of antiterrorism

http://barryeisler.blogspot.com/2013/08/david-miranda-and-preclusion-of-privacy.html

Hacking a car and turning it into a drone

http://www.youtube.com/watch?v=3D6jxBDy8k8&feature=youtu.be

http://www.nytimes.com/2011/03/10/business/10hack.html?_r=1&

http://www.huffingtonpost.com/2013/06/24/michael-hastings-car-hacked_n_3492339.html

http://www.forbes.com/sites/andygreenberg/2013/07/24/hackers-reveal-nasty-new-car-attacks-with-me-behind-the-wheel-video/

http://www.economist.com/news/science-and-technology/21654954-computer-networks-cars-are-now-targets-hackers-deus-ex-vehiculum

https://www.techdirt.com/articles/20150721/08391831712/newsflash-car-network-security-is-still-horrible-very-dangerous-joke.shtml

Airplanes are vulnerable to cyberhacking, too

http://www.foxnews.com/us/2015/04/17/security-expert-pulled-off-flight-by-fbi-after-exposing-airline-tech/

Everything in a high-end car is microprocessor-controlled — even the steering

http://auto.howstuffworks.com/car-driving-safety/safety-regulatory-devices/self-parking-car1.htm

Hertz puts cameras inside some of its rental cars

http://arstechnica.com/cars/2015/03/hertz-puts-cameras-in-some-of-its-rental-cars-but-it-never-meant-to-be-creepy/

CHAPTER 7

It’s possible Manus has seen this video on concealing a handgun inside a vehicle

https://www.youtube.com/watch?v=odT-CfS7lQs

CHAPTER 8

How Western media is manipulated by ISIS into spreading jihadist propaganda

http://www.juancole.com/2014/09/media-politicians-should-stop-letting-isil-manipulated-them.html

The real starship Enterprise-like “Information Dominance Center,” used by former NSA chief Keith Alexander, is at Fort Belvoir, not Fort Meade. But I couldn’t resist moving it

http://www.theguardian.com/commentisfree/2013/sep/15/nsa-mind-keith-alexander-star-trek

See how excited Brian Williams gets when the government permits him a peek inside the (gasp) Situation Room!

http://rockcenter.nbcnews.com/_news/2012/05/04/11539949-inside-the-situation-room-a-guided-tour

CHAPTER 9

If you think Brian’s interview of the director was deferential to the point of parody, you probably haven’t seen Wolf Blitzer’s version, with FBI director James Comey

https://twitter.com/ggreenwald/status/624612963064807428/photo/1

https://www.youtube.com/watch?t=204&v=7RyVXLKO0DM

Pakistani government forces cell phone users to turn over fingerprints or lose their service

http://www.washingtonpost.com/world/asia_pacific/pakistanis-face-a-deadline-surrender-fingerprints-or-give-up-cellphone/2015/02/23/de995a88-b932-11e4-bc30-a4e75503948a_story.html

CHAPTER 10

ACLU rendition of just how powerful a tool location data can be

https://www.aclu.org/meet-jack-or-what-government-could-do-all-location-data

Leaving your cell phone at home when you go out? Using encryption? The NSA might think you’re a terrorist

http://www.theguardian.com/world/2014/nov/09/berlins-digital-exiles-tech-activists-escape-nsa

NSA spied on US senators

http://foreignpolicy.com/2013/09/25/secret-cold-war-documents-reveal-nsa-spied-on-senators/

“We Kill People Based on Metadata”

http://www.nybooks.com/blogs/nyrblog/2014/may/10/we-kill-people-based-metadata/

CHAPTER 11

ISIS waterboarded journalist James Foley

http://www.ibtimes.com/james-foley-waterboarding-us-journalist-was-tortured-isis-using-same-techniques-cia-used-1673268

CHAPTER 12

Obama prosecutes whistleblowers under the 1917 Espionage Act more than twice as many times as all administrations in history combined

http://theweek.com/article/index/246029/is-obama-abusing-the-espionage-act

Here’s what the Constitutional law professor and Nobel Peace laureate did to whistleblower Jeffrey Sterling

https://firstlook.org/theintercept/2015/01/27/torture-must-circumstances-call-new-york-times/

https://firstlook.org/theintercept/2015/06/18/jeffrey-sterling-took-on-the-cia-and-lost-everything/

Secret FISA “court” is nothing but an administrative rubber stamp

http://www.thedailybeast.com/articles/2013/07/24/the-secret-fisa-court-must-go.html

FISA “court” approves 99.97 percent of government surveillance requests

http://www.motherjones.com/mojo/2013/06/fisa-court-nsa-spying-opinion-reject-request

CHAPTER 13

Journalists relying on face-to-face meetings and human couriers

http://barryeisler.blogspot.com/2013/08/david-miranda-and-preclusion-of-privacy.html

NSA spends billions to weaken international standards, install backdoors, and otherwise subvert encryption

http://www.nytimes.com/2013/09/07/us/politics/legislation-seeks-to-bar-nsa-tactic-in-encryption.html?smid=tw-share&_r=0

NSA intercepts shipments of Internet-ordered computers; infects them with malware

http://www.spiegel.de/international/world/the-nsa-uses-powerful-toolbox-in-effort-to-spy-on-global-networks-a-940969.html

“Secret Documents Reveal NSA Campaign Against Encryption”

http://www.nytimes.com/interactive/2013/09/05/us/documents-reveal-nsa-campaign-against-encryption.html?_r=0

“A Few Thoughts on Cryptographic Engineering”

http://blog.cryptographyengineering.com/2013/09/on-nsa.html

The menace of “insider threats”

http://www.mcclatchydc.com/2013/06/20/194513/obamas-crackdown-views-leaks-as.html

Over 700,000,000 people changing their online behavior to evade NSA surveillance

https://www.schneier.com/blog/archives/2014/12/over_700_millio.html

US Postal Service logs all mail for law enforcement

http://www.nytimes.com/2013/07/04/us/monitoring-of-snail-mail.html?_r=0

CHAPTER 14

Over 1.5 million people with top-secret clearances (more than the population of Norway)