Episode 09 - Nothing Left to Hide

The relationship between government intelligence, the military-industrial complex, and big business goes deep. In technology hubs around the world, complex surveillance products are developed and sold to governments that deploy the tech on journalists, lawyers, academics, and their own citizens. How are these technologies spreading and what effects do they have on society and us as individuals?

Join us this week as we explore one of the most heavily surveilled places on earth and ask ourselves how to respond as these technologies increasingly come home to be deployed right here in America.

Full Transcript Available

Chapters

  • 01:55 A History of Spying
  • 07:09 Surveillance as Business
  • 09:03 Ethiopia
  • 12:35 Mexico
  • 15:14 Name and Shame
  • 16:02 Where Does this Money Come From?
  • 18:06 China
  • 23:19 Surveillance at Home
  • 28:25 Affecting our Right to Protest
  • 32:22 Terrorist or Enemy of the State?
  • 43:49 Predictive Policing
  • 49:24 Chicago
  • 51:37 How Data Could Be Used to Reduce Crime
  • 56:57 Nothing to Hide

Sources

@Misc{feeney_sanchez_eddington, author = {Feeney, Matthew and Sanchez, Julian and Eddington, Patrick G.}, title = {American Big Brother: A Century of Political Surveillance and Repression}, year = {2017}, journal = {Cato Institute}, url = {https://www.cato.org/american-big-brother}, }

@Misc{choudhury_2015, author = {Choudhury, Nusrat}, title = {The Government Is Watching #BlackLivesMatter, And It's Not Okay}, month = {Aug}, year = {2015}, journal = {American Civil Liberties Union}, publisher = {American Civil Liberties Union}, url = {https://www.aclu.org/blog/racial-justice/government-watching-blacklivesmatter-and-its-not-okay?redirect=blog%2Fspeak-freely%2Fgovernment-watching-blacklivesmatter-and-its-not-okay}, }

@Misc{lewis_2015, author = {Lewis, Paul}, title = {Revealed: FBI violated its own rules while spying on Keystone XL opponents}, month = {May}, year = {2015}, journal = {The Guardian}, publisher = {Guardian News and Media}, url = {https://www.theguardian.com/us-news/2015/may/12/revealed-fbi-spied-keystone-xl-opponents}, }

@Misc{cherkis_carter_2013, author = {Cherkis, Jason and Carter, Zach}, title = {FBI Surveillance Of Occupy Wall Street Detailed}, month = {Jan}, year = {2013}, journal = {The Huffington Post}, publisher = {TheHuffingtonPost.com}, url = {https://www.huffingtonpost.com/2013/01/05/fbi-occupy-wall-street_n_2410783.html}, }

@Misc{moynihan_2010, author = {Moynihan, Colin}, title = {F.B.I. Searches Antiwar Activists' Homes}, month = {Sep}, year = {2010}, journal = {The New York Times}, publisher = {The New York Times}, url = {https://mobile.nytimes.com/2010/09/25/us/politics/25search.html?_r=1&hpw&referer=}, }

@Misc{massachusetts_2012, author = {Massachusetts, ACLU of}, title = {Policing Dissent: Police Surveillance of Lawful Political Activity in Boston}, month = {Oct}, year = {2012}, journal = {ACLU Massachusetts}, url = {https://aclum.org/sites/all/files/policing_dissent.pdf}, }

@Misc{köksal_2018, author = {Köksal, Nil}, title = {'Terrifying': How a single line of computer code put thousands of innocent Turks in jail}, month = {Jan}, year = {2018}, journal = {CBCnews}, publisher = {CBC/Radio Canada}, url = {http://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-jail-1.4495021}, }

@Misc{marshall_2017, author = {Marshall, Aarian}, title = {Alphabet Is Trying to Remake the Modern City, Starting With Toronto}, month = {Oct}, year = {2017}, journal = {Wired}, publisher = {Conde Nast}, url = {https://www.wired.com/story/google-sidewalk-labs-toronto-quayside/}, }

@Misc{fujitsuglobal_2016, author = {Fujitsu}, title = {FUJITSU Technical Computing Solution GREENAGES Citywide Surveillance}, month = {Dec}, year = {2016}, journal = {Fujitsu Global}, url = {http://www.fujitsu.com/global/solutions/business-technology/tc/sol/greenages-cs/}, }

@Misc{scott-railton_marczak_razzak_crete-nishihata_deibert_2017, author = {Scott-Railton, John and Marczak, Bill and Razzak, Bahr Abdul and Crete-Nishihata, Masashi and Deibert, Ron}, title = {Reckless Exploit: Mexican Journalists, Lawyers, and a Child Targeted with NSO Spyware}, month = {Aug}, year = {2017}, journal = {The Citizen Lab}, url = {https://citizenlab.ca/2017/06/reckless-exploit-mexico-nso/}, }

@Misc{chin_2017, author = {Chin, Josh}, title = {Twelve Days in Xinjiang: How China's Surveillance State Overwhelms Daily Life}, month = {Dec}, year = {2017}, journal = {The Wall Street Journal}, url = {https://www.wsj.com/articles/twelve-days-in-xinjiang-how-chinas-surveillance-state-overwhelms-daily-life-1513700355}, }

@Misc{stroud_2016, author = {Stroud, Matt}, title = {Chicago's predictive policing tool just failed a major test}, month = {Aug}, year = {2016}, journal = {The Verge}, publisher = {The Verge}, url = {https://www.theverge.com/2016/8/19/12552384/chicago-heat-list-tool-failed-rand-test}, }

@Article{burge_chin_2017, author = {Burge, Clement and Chin, Josh}, title = {Life Inside China's Total Surveillance State}, journal = {The Wall Street Journal}, year = {2017}, month = {Dec}, url = {https://www.youtube.com/watch?v=OQ5LnY21Hgc}, }

@Misc{joseph_2017, author = {Joseph, George}, title = {"Show Me Your Papers" Becomes "Open Your Eyes" as Border Sheriffs Expand Iris Surveillance}, month = {Jul}, year = {2017}, journal = {The Intercept}, url = {https://theintercept.com/2017/07/08/border-sheriffs-iris-surveillance-biometrics/}, }

@Misc{ahmed_2015, author = {Ahmed, Nafeez}, title = {Why Google made the NSA – INSURGE intelligence – Medium}, month = {Jan}, year = {2015}, journal = {Medium}, publisher = {INSURGE intelligence}, url = {https://medium.com/insurge-intelligence/why-google-made-the-nsa-2a80584c9c1}, }

@Misc{perlroth_2017, author = {Perlroth, Nicole}, title = {Spyware's Odd Targets: Backers of Mexico's Soda Tax}, month = {Feb}, year = {2017}, journal = {The New York Times}, publisher = {The New York Times}, url = {https://www.nytimes.com/2017/02/11/technology/hack-mexico-soda-tax-advocates.html?_r=0}, }

@Misc{moxley_2017, author = {Moxley, R. Scott}, title = {FBI Used Best Buy's Geek Squad To Increase Secret Public Surveillance}, month = {Jun}, year = {2017}, journal = {OC Weekly}, url = {http://www.ocweekly.com/news/fbi-used-best-buys-geek-squad-to-increase-secret-public-surveillance-7950030}, }

@Misc{greenwald_2016, author = {Greenwald, Glenn}, title = {New Study Shows Mass Surveillance Breeds Meekness, Fear and Self-Censorship}, month = {Apr}, year = {2016}, journal = {The Intercept}, url = {https://theintercept.com/2016/04/28/new-study-shows-mass-surveillance-breeds-meekness-fear-and-self-censorship/}, }

@Misc{kofman_2017, author = {Kofman, Ava}, title = {Real-Time Face Recognition Threatens to Turn Cops' Body Cameras Into Surveillance Machines}, month = {Mar}, year = {2017}, journal = {The Intercept}, url = {https://theintercept.com/2017/03/22/real-time-face-recognition-threatens-to-turn-cops-body-cameras-into-surveillance-machines/}, }

@Misc{gallagher_hager_2016, author = {Gallagher, Ryan and Hager, Nicky}, title = {The Little-Known Company That Enables Worldwide Mass Surveillance}, month = {Oct}, year = {2016}, journal = {The Intercept}, url = {https://theintercept.com/2016/10/23/endace-mass-surveillance-gchq-governments/}, }

@Misc{timberg_2015, author = {Timberg, Craig}, title = {Surveillance planes spotted in the sky for days after West Baltimore rioting}, month = {May}, year = {2015}, journal = {The Washington Post}, publisher = {WP Company}, url = {https://www.washingtonpost.com/business/technology/surveillance-planes-spotted-in-the-sky-for-days-after-west-baltimore-rioting/2015/05/05/c57c53b6-f352-11e4-84a6-6d7c67c50db0_story.html?utm_term=.90dda8e39e5b}, }

@Misc{richtel_2015, author = {Richtel, Matt}, title = {A Police Gadget Tracks Phones? Shhh! It's Secret}, month = {Mar}, year = {2015}, journal = {The New York Times}, publisher = {The New York Times}, url = {https://www.nytimes.com/2015/03/16/business/a-police-gadget-tracks-phones-shhh-its-secret.html}, }

@Misc{zoroya_2016, author = {Zoroya, Gregg}, title = {Pentagon report justifies deployment of military spy drones over the U.S.}, month = {Mar}, year = {2016}, journal = {USA Today}, publisher = {Gannett Satellite Information Network}, url = {https://www.usatoday.com/story/news/nation/2016/03/09/pentagon-admits-has-deployed-military-spy-drones-over-us/81474702/}, }

@Misc{joseph_2017, author = {Joseph, George}, title = {Military-Grade Spy Gear Is Flooding into Local Police Departments}, month = {Feb}, year = {2017}, journal = {Defense One}, url = {http://www.defenseone.com/technology/2017/02/military-grade-spy-gear-flooding-local-police-departments/135282/}, }

@Misc{sternstein_2016, author = {Sternstein, Aliya}, title = {The Intelligence Community Will Monitor Wearables to Find the Perfect Spy}, month = {Jul}, year = {2016}, journal = {Nextgov.com}, publisher = {Nextgov}, url = {http://www.nextgov.com/emerging-tech/2016/06/intelligence-community-will-monitor-wearables-find-perfect-spy/129555/}, }

@Misc{nesbit_2017, author = {Nesbit, Jeff}, title = {Googles true origin partly lies in CIA and NSA research grants for mass surveillance}, month = {Dec}, year = {2017}, journal = {Quartz}, publisher = {Quartz}, url = {https://qz.com/1145669/googles-true-origin-partly-lies-in-cia-and-nsa-research-grants-for-mass-surveillance/}, }

@Misc{lomas_2017, author = {Lomas, Natasha}, title = {UK spies using social media data for mass surveillance}, month = {Oct}, year = {2017}, journal = {TechCrunch}, publisher = {TechCrunch}, url = {https://techcrunch.com/2017/10/17/uk-spies-using-social-media-data-for-mass-surveillance/}, }

@Misc{penney_2017, author = {Penney, Jonathon W.}, title = {Women and Young People Are More Likely to Experience the Chilling Effects of Surveillance}, month = {Jul}, year = {2017}, journal = {Slate Magazine}, url = {http://www.slate.com/articles/technology/future_tense/2017/07/women_young_people_experience_the_chilling_effects_of_surveillance_at_higher.html}, }

@Misc{dart_2016, author = {Dart, Tom}, title = {Eye in the sky: the billionaires funding a surveillance project above Baltimore}, month = {Oct}, year = {2016}, journal = {The Guardian}, publisher = {Guardian News and Media}, url = {https://www.theguardian.com/world/2016/oct/15/baltimore-surveillance-john-laura-arnold-billionaires}, }

@Misc{holpuch_2013, author = {Holpuch, Amanda}, title = {Google's Eric Schmidt says government spying is 'the nature of our society'}, month = {Sep}, year = {2013}, journal = {The Guardian}, publisher = {Guardian News and Media}, url = {https://www.theguardian.com/world/2013/sep/13/eric-schmidt-google-nsa-surveillance}, }

@Misc{froomkin_2014, author = {Froomkin, Dan}, title = {Billion Dollar Surveillance Blimp to Launch over Maryland}, month = {Dec}, year = {2014}, journal = {The Intercept}, url = {https://theintercept.com/2014/12/17/billion-dollar-surveillance-blimp-launch-maryland/}, }

@Misc{sandvik_2013, author = {Sandvik, Runa A.}, title = {These Companies Build The Technology Used To Spy On You}, month = {Nov}, year = {2013}, journal = {Forbes}, publisher = {Forbes Magazine}, url = {https://www.forbes.com/sites/runasandvik/2013/11/20/these-companies-build-the-technology-used-to-spy-on-you/#44d9dfeb38a3}, }

@Misc{tscm_2017, author = {TSCM}, title = {The Espionage Economy - U.S. firms are making billions selling spyware to dictators}, month = {Sep}, year = {2017}, journal = {Eclipse Support Services - TSCM / Debugging}, url = {https://www.eclipsetscm.com/spying/espionage-economy-u-s-firms-making-billions-selling-spyware-dictators/}, }

@Misc{sofrep_2016, author = {SOFREP}, title = {Dictators Spending Big Money on U.S. Spy Technologies}, month = {Jan}, year = {2016}, journal = {SOFREP}, url = {https://sofrep.com/46611/dictators-spending-big-money-on-u-s-spy-technologies/}, }

@Misc{wikileaks_2011, author = {Wikileaks}, title = {The Spy Files}, month = {Dec}, year = {2011}, journal = {WikiLeaks - The Spy Files}, url = {https://wikileaks.org/the-spyfiles.html}, }

@Misc{deibert_2017, author = {Deibert, Ron}, title = {Evidence That Ethiopia Is Spying on Journalists Shows Commercial Spyware Is Out of Control}, month = {Dec}, year = {2017}, journal = {Wired}, publisher = {Conde Nast}, url = {https://www.wired.com/story/evidence-that-ethiopia-is-spying-on-journalists-shows-commercial-spyware-is-out-of-control/}, }

@Misc{gallagher_2013, author = {Gallagher, Ryan}, title = {Rights groups slam Raytheon secret software that tracks social media and 'predicts' people's future behavior}, month = {Feb}, year = {2013}, journal = {Raw Story}, url = {https://www.rawstory.com/2013/02/rights-groups-slam-ratheyon-secret-software-that-tracks-social-media-and-predicts-peoples-future-behavior/}, }

@Misc{munn_2017, author = {Munn, Nathan}, title = {'Predictive Policing' Is Coming to Canada's Capital, and Privacy Advocates Are Worried}, month = {Feb}, year = {2017}, journal = {Motherboard}, url = {https://motherboard.vice.com/en_us/article/jpaew3/ottawa-police-strategic-operations-centre-canada-surveillance}, }

@Misc{mccabe_2016, author = {McCabe, David}, title = {Civil rights, tech groups sound the alarm about 'predictive policing'}, month = {Aug}, year = {2016}, journal = {TheHill}, url = {http://thehill.com/policy/technology/294020-civil-rights-tech-groups-lay-out-predictive-policing-concerns}, }

@Misc{jouvenal_hu_ferguson_grant_2017, author = {Jouvenal, Justin and Hu, Margaret and Ferguson, Andrew and Grant, John}, title = {2017 Cato Surveillance Conference - Panel – Predictive Policing: Big Data and Law Enforcement}, month = {Dec}, year = {2017}, journal = {Cato Institute}, url = {https://www.cato.org/multimedia/events/2017-cato-surveillance-conference-panel-predictive-policing-big-data-law}, }

@Misc{o'neil_2016, author = {O'Neil, Cathy}, title = {Cathy O'Neil: "Weapons of Math Destruction" | Talks at Google}, month = {Nov}, year = {2016}, journal = {Google}, url = {https://www.youtube.com/watch?v=TQHs8SA1qpk&t=1511s}, }

@Article{reddick_chatfield_jaramillo_2015, author = {Reddick, Christopher G. and Chatfield, Akemi Takeoka and Jaramillo, Patricia A.}, title = {Public opinion on National Security Agency surveillance programs: A multi-method approach}, journal = {Government Information Quarterly}, year = {2015}, volume = {32}, number = {2}, pages = {129–141}, url = {https://www.sciencedirect.com/science/article/pii/S0740624X15000246}, }

@Article{newell2014massive, author = {Newell, Bryce Clayton}, title = {The massive metadata machine: Liberty, power, and secret mass surveillance in the US and Europe}, journal = {ISJLP}, year = {2014}, volume = {10}, pages = {481}, publisher = {HeinOnline}, url = {http://heinonline.org/HOL/LandingPage?handle=hein.journals/isjlpsoc10&div=15&id=&page=}, }

@Article{bauman2014after, author = {Bauman, Zygmunt and Bigo, Didier and Esteves, Paulo and Guild, Elspeth and Jabri, Vivienne and Lyon, David and Walker, Rob BJ}, title = {After Snowden: Rethinking the impact of surveillance}, journal = {International political sociology}, year = {2014}, volume = {8}, number = {2}, pages = {121--144}, publisher = {Oxford University Press} # url, }

Credits

Daniel Forkner & David Torcivia

Published 01-02-2018 03:01