Axciom - A leader in technology and marketing services, Acxiom has amassed the world's largest commercial database on consumers.
Al Haramain v. Bush - This case alleges targeting of the leaders of an Islamic charity and their lawyers by the admitted, targeted warrantless wiretapping by the NSA. It is based on a document that was accidentally disclosed to the plaintiffs by the government that the plaintiffs allege demonstrates that they were subjected to warrantless wiretapping (the exact facts are held under tight seal).
Applied Video Solutions, Inc. - Provides integrated video surveillance systems for security and business management applications. CCTV camera systems designed and implemented by Applied Video Solutions promote safety, protect valuable assets and improve business operations by providing vital information about real events.
Camcom - Specializes in the design, supply, installation and suport of security/surveillance systems.
Cellibrite - Cellebrite's UFED (Universal Forensic Extraction Device), a high-end mobile forensics solution, extracts, decodes and analyses actionable data from legacy and smartphones, tablets and portable GPS devices for use in law enforcement. Cellebrite also supports the extraction and analysis of Chinese manufactured phones.
Citizen Lab - An interdisciplinary laboratory based at the Munk School of Global Affairs at the University of Toronto, Canada focusing on advanced research and development at the intersection of digital media, global security, and human rights. Undertakes advanced research and engages in development that monitors, analyses, and impacts the exercise of political power in cyberspace.
Closed Circuit Television (CCTV) - The use of video cameras to transmit signal to a specific, limited set of monitors. It differs from broadcast television in that the signal is not openly transmitted, though it may employ point to point wireless links. CCTV is often used for surveillance in areas which need monitoring, such as banks, casinos, airports, military installations and convenience stores.
Communications Assistance for Law Enforcement Act of 1994 (CALEA) - In October 1994, Congress took action to protect public safety and national security by enacting CALEA. The law further defines the existing statutory obligation of telecommunications carriers to assist Law Enforcement in executing electronic surveillance pursuant to court order or other lawful authorization.
Covert Surveillance Code of Practice - This UK code applies to every authorisation of covert surveillance or of entry on or interference with property or with wireless telegraphy carried out under section 5 of the Intelligence Services Act 1994, Part III of the Police Act 1997 or Part II of the Regulation of Investigatory Powers Act 2000.
Deep Packet Inspection (DPI) - Deep packet inspection (DPI) is the act of any packet network equipment which is not an endpoint of a communication using non-header content (typically the actual payload) for some purpose. This is performed as the packet passes an inspection point, searching for protocol non-compliance, viruses, spam, intrusions or predefined criteria to decide what actions to take on the packet, including collecting statistical information. There are multiple headers for IP packets, network equipment only needs to use the first of these (the IP header) for normal operation, but use of the second header (TCP, UDP etc) is normally considered to be shallow packet inspection (usually called Stateful Packet Inspection) despite this definition. Deep Packet Inspection (and filtering) enables advanced network management, user service, and security functions as well as internet data mining, eavesdropping, and censorship. Although DPI technology has been used for Internet management for many years, some advocates of net neutrality fear that the technology can be used anticompetitively or to reduce the openness of the Internet. Also see:
DigitalGlobe - Imagery and information company: satellite imagery, geospatial data, remotedly sensed images, GIS, space imagery.
Also see DigitalGlobe's FirstLook Coverage, web-based access to high-resolution pre- and post-event satellite imagery.
FinFisher - Governmental IT intrusion and remote monitoring solutions. FinFisher is security software that has stirred controversy because Gamma Group marketed it to government security officials who were told it could be covertly installed on suspects' computers through exploiting security lapses in the update procedures of non-suspect software. See Wikipedia article.
FlexiSPY - The industry leader in the design and development of professional grade cell phone monitoring software; and is the only company offering cross-platform solutions for Android, BlackBerry, iPhone, Windows Mobile, and Nokia-Symbian to consumer, corporate and government markets.
Gamma Group - Provides advanced technical surveillance, monitoring solutions, and advanced government training, as well as international consultancy to national and state intelligence departments and law enforcement agencies.
Glimmerglass - Serves a global customer base in cyber security, defense, and telecommunications. Defense agencies worldwide employ Glimmerglass solutions for enhanced monitoring. Sells optical fiber technology, offers government agencies software product CyberSweep to intercept signals on undersea cables. Their technology can analyze Gmail and Yahoo! Mail as well as social media like Facebook and Twitter to discover 'actionable intelligence.'
Global Surveillance Disclosure - Wikipedia entry: Ongoing news reports in the international media have revealed operational details about the U.S. National Security Agency (NSA) and its international partners' global surveillance of foreign nationals and U.S. citizens. The vast majority of reports emanated from a cache of top secret documents leaked by ex-NSA contractor Edward Snowden.
Government Electronic Surveillance Agencies - Here are some organizations that take information security and/or communications security very seriously, some of which also expend effort in breaking the security of others.
Maltego - An open source intelligence and forensics application. Provides you with timous mining and gathering of information as well as the representation of this information in a easy to understand format.
Murray Associates - An independent consulting firm specializing in eavesdropping detection and counterespionage services for business and government.
Netsweeper - Canadian net-filtering company that is also providing surveillance and censorship technology.
NSA ANT Catalog - 48-page classified document listing technology available to the United States National Security Agency (NSA) Tailored Access Operations (TAO) by the ANT division to aid in cyber surveillance. Also see 29 Dec 2013 Der Spiegel article by Jacob Appelbaum, Judith Horchert and Christian Stocker.
OpenNet Initiative - A joint project whose goal is to monitor and report on internet filtering and surveillance practices by nations. The project employs a number of technical means, as well as an international network of investigators, to determine the extent and nature of government-run internet filtering programs.
Printers: Is Your Printer Spying On You? - In a purported effort to identify counterfeiters the U.S. government has persuaded some color laser printer manufacturers to encode each page with identifying information. That means that without your knowledge or consent an act you assume is private could become public. A communication tool you're using in everyday life could become a tool for government surveillance. And there are no laws to prevent abuse. From EFF. Also see EFF's DocuColor Tracking Dot Decoding Guide.
PrivacySOS - The ACLU of Massachusetts shines sunlight on surveillance and highlights actions you can take to protect your privacy.
Realtime-Spy - High-tech surveillance and remote spy software that allows you to remotely install the monitoring system on any computer you own and access the activity logs from anywhere at any time via your own personal Realtime-Spy Webspace.
Radio-frequency Identification (RFID) - Wikipedia entry: RFID he wireless non-contact use of radio-frequency electromagnetic fields to transfer data, for the purposes of automatically identifying and tracking tags attached to objects. The tags contain electronically stored information. Some tags are powered by and read at short ranges (a few meters) via magnetic fields (electromagnetic induction), and then act as a passive transponder to emit microwaves or UHF radio waves (i.e., electromagnetic radiation at high frequencies). Others use a local power source such as a battery, and may operate at hundreds of meters. Unlike a bar code, the tag does not necessarily need to be within line of sight of the reader, and may be embedded in the tracked object.
Search EFF's FOIA Documents - EFF's Freedom of Information Act project has gathered thousands of pages of material. These shed light on controversial government surveillance programs, lobbying practices, and intellectual property initiatives. You can use the EFF FOIA Search Engine below to search and examine the documents' contents.
Spy Chest - Spy equipment, GPS tracking systems, telephone recorders spy software spy cameras and tracking systems security camera telephone recorder surveillance equipment and hidden cameras, long range parabolic microphones.
Spy Company - Surveillance equipment, pinhole video cameras, privacy theft personal protection, bug detectors, lock picks, counter espionage measures.
Spy Files - WikiLeaks publishes The Spy Files, thousands of pages and other materials exposing the global mass surveillance industry.
Spybase - Surveillance cameras and spy equipment, video recorders, home security devices, night vision, wireless devices, telephone recorders, digital audio recorders, pinhole cameras, hidden cameras, security cameras and more.
Spytech - Computer monitoring, employee monitoring, spy software, and parental control software for home users and businesses.
Street Level Surveillance - Resources from EFF: In the last 20 years, crime rates in the United States have steadily and significantly declined. Despite this, government spending on surveillance technologies for domestic law enforcement -- technologies like GPS tracking devices, stingrays, biometrics, drones, and cameras of all kinds -- has increased exponentially. These technologies are becoming more and more sophisticated every year, and the data collected using them is aggregated, stored, and shared across government agencies..
Stingray Phone Tracker (Wikipedia) - A stingray is a controversial electronic surveillance device for remotely capturing data from mobile telephones. It is designed to mimic a cell tower so all the mobile phones in the area communicate with it and provide information, including location data. This can be done even when the phone is not being used to make a call. Also see Global Research article by Clarence Walker.
Surveillance Self-Defense Project - This Electronic Frontier Foundation (EFF) project exists to answer two main questions: What can the government legally do to spy on your computer data and communications? And what can you legally do to protect yourself against such spying?
Thing (Listening Device) - Wikipedia entry: Also known as the Great Seal bug, this was one of the first covert listening devices (or "bugs") to use passive techniques to transmit an audio signal. Because it was passive, being energized and activated by electromagnetic energy from an outside source, it is considered a predecessor of current RFID technology.
Trapwire - Designs, builds and deploys counterterrorism technologies and services. The TrapWire system encapsulates the expertise of professionals in the areas of counterterrorism, surveillance, surveillance detection, and intelligence operations and analysis.
Urban Eye - A comparative research project analysing the employment of CCTV in public accessible space in Europe which shall assess its social effects and political impacts in order to finally outline strategies for its regulation.
What Location Tracking Looks Like - Your cell phone company knows everywhere you go, twenty-four hours a day, every day. How concrete is this fact for you? It's very concrete for Malte Spitz, a German politician and privacy advocate. He used German privacy law - which, like the law of many European countries, gives individuals a right to see what private companies know about them - to force his cell phone carrier to reveal what it knew about him. The result? 35,831 different facts about his cell phone use over the course of six months.
Whole Body Imaging Technology - The Transportation Security Administration is expanding the use of "backscatter X-ray systems for passenger screening. The $100,000 refrigerator-size machines use "backscatter" technology, which bounces low-radiation X-rays off of a passenger to produce photo-quality images of travelers as if they were undressed. Computer processing partially obscures the image that is available to operators. TSA states that the agency will delete the raw images, but there is no law or regulation that prevents the agency from saving the original, detailed images. Until there is such a prohibition, EPIC believes funding for the program should be suspended.
XKeyscore - A formerly secret computer system used by the United States National Security Agency for searching and analysing internet data about foreign nationals across the world.
KWSnet is an Internet subject directory providing special attention to U.S. national and international news, the arts, computing, culture, environment, law, literature, media, politics, science and technology. Based in San Francisco, California, KWSnet contains over 125,000 annotated links to resources worldwide. Use Search KWSnet, located at the top of each page, to search within this site. Use Ctrl-F (Windows) or ⌘-F (Mac) to search within individual pages.
KWSnet's Zotero Library provides news articles as well as primary and secondary sources and bibliographic information for your research. More information on Zotero, a powerful, easy-to-use research tool, can be found at its site. Also, and highly recommended, subscribe to RSS content for latest updates.
KWSnet is completely non-commercial. It has no commercial objective or emphasis. Instead, it is intended for educational purposes, research, and personal use. It is updated regularly.
KWSnet is IPv6 enabled, HTTPS deployed, and fully HTML5 compliant.
KWSnet may be contacted via email with any comments, suggestions or link submissions. KWSnet is designed and maintained, in its entirety, by Kirk W. Smith.