Portal:Intelligence
Template:/box header Intelligence is the gathering of information via covert means - eavesdropping, monitoring, spying, intimidation, bribery, etc. There are many forms of intelligence gathering which are referred to as disciplines. Some are:
- Signals Intelligence (SIGINT) — which is the gathering of intelligence through communications and transmissions. Some associated terms of SIGINT are cryptology which is the decoding of encrypted communication. Agencies that carry out these SIGINT operations are the National Security Agency in the United States and the Communications Security Establishment in Canada. A series of disclosures from the United States, particularly those by Edward Snowden in 2013, have focused public attention on the extent of mass surveillance programs such as Boundless Informant, PRISM, President's Surveillance Program. However, mass surveillance occurs on a much broader international basis among the "Five Eyes" (now involving more than fourteen countries).
- Human Intelligence (HUMINT) — This source of information is what you would most likely see in a James Bond film. HUMINT is the gathering of information through persons or intelligence officers or spies on the ground. Human Intelligence is usually carried out by government institutions such as the United States (US) Central Intelligence Agency (CIA) or the Canadian Security Intelligence Service (CSIS) or the North Korean State Security Department (SSD). The difference between these three agencies is that the CIA carries out foreign intelligence operations at the request of the president whiles CSIS carries out domestic Intelligence operations at the request of the prime minister or the public safety minister. Another type of intelligence is in the case of the State Security Department which is dubbed a secret police organization as most of its activities are secret. These types of organizations carry out brutal, unlawful and inhumane acts for the sake of control of the regime in power.
Template:/box header The Citizens' Commission to Investigate the FBI was a leftist activist group operational in the US during the early 1970s. Their only known action was breaking into a two-man Media, Pennsylvania Federal Bureau of Investigation (FBI) office, and stealing over 1000 classified documents. They then mailed these documents anonymously to several US newspapers. Some news outlets refused to publish the information, as it related to ongoing operations and they contended disclosure may have threatened the lives of agents or informants. "The complete collection of political documents ripped-off from the F.B.I. office in Media, Pa., March 8, 1971" was published for the first time as the March, 1972 issue of WIN Magazine ("Peace and freedom thru nonviolent action"), a journal associated with the War Resisters League. The documents revealed the COINTELPRO operation,[1] and led to the Church Committee and the cessation of this operation by the FBI.
- "According to its analysis of the documents in this FBI office, 1 percent were devoted to organized crime, mostly gambling; 30 percent were "manuals, routine forms, and similar procedural matter"; 40 percent were devoted to political surveillance and the like, including two cases involving right-wing groups, ten concerning immigrants, and over 200 on left or liberal groups. Another 14 percent of the documents concerned draft resistance and "leaving the military without government permission." The remainder concerned bank robberies, murder, rape, and interstate theft."[2] - Noam Chomsky
Did you know... |
From new and recently improved content by Wikipedia's WikiProject Mass surveillance in recognition of The Day We Fight Back:
|
The "Collateral Murder" videos represent 39 minutes of footage showing an attack by the crew of an AH-64 Apache helicopter on a group of men, some armed, in the Iraqi city of Baghdad. The video was made available on SIPRNet where it was downloaded by Bradley Manning and transmitted to Wikileaks, which put out a public appeal for supercomputer time to assist in its decryption. Wikileaks called the video "Collateral Murder" because the helicopter continued to fire on Reuters journalist Saeed Chmagh after he appeared to be injured on the ground.
Barrett Brown (born August 14, 1981) is an American journalist, essayist and satirist. He is often referred to as an unofficial spokesperson for the hacktivist collective Anonymous, a label he disputes.[3] He founded Project PM, an online distributed think tank, to facilitate analysis of the vast troves of hacked emails and other leaked information that may shed light on the sometimes questionable inner workings of the cyber-military-industrial complex.
He has spent over a year in a Texas jail and faces over a hundred more in federal prison as he awaits trial on an assortment of 17 charges filed in three indictments that include 15 years for sharing a http link to information publicly released during the 2012 Stratfor email leak on the ProjectPM Wiki, and five years for each of several counts of conspiring to publicize restricted information about an FBI agent and his family.[4][5][6] He is held under a gag order prohibiting him from discussing his case with the media.[7]
The official logo of NROL-39, an American reconnaissance satellite operated by the National Reconnaissance Office and launched in 2013. This logo drew criticism following the ongoing surveillance disclosures; satirist Jon Stewart described it as the government "owning the fact that they are getting nefarious" with "a giant octopus sucking the face off North America". According to the NRO, the logo's "octopus [is] a versatile, adaptable, and highly intelligent creature" from which America's enemies cannot hide. Template:/box-footer
![]() |
![]() |
![]() |
Cryptography | Mass surveillance | War |
Template:/box header Links to related subjects
<templatestyles src="Div col/styles.css"/>- Intelligence
- WP:Intelligence
- WP:Mass surveillance (Portal)
- Mass surveillance
- Edward Snowden
- Julian Assange
- Bradley Manning
- PATRIOT Act
- CALEA
- GCHQ (UK)
- SIS (UK)
- NSA (US)
- CSIS (CA)
- CSEC (CA)
- ASD (AU)
- GCSB (NZ)
- FIS (RU)
- MSS (CN)
ECHELON, originally a code-name, is now used in global media and in popular culture to describe a signals intelligence (SIGINT) collection and analysis network operated on behalf of the five signatory states to the UKUSA Security Agreement[8] (Australia, Canada, New Zealand, the United Kingdom, and the United States, referred to by a number of abbreviations, including AUSCANNZUKUS[8] and Five Eyes).[9][10][11] It has also been described as the only software system which controls the download and dissemination of the intercept of commercial satellite trunk communications.[12] It was created in the early 1960s to monitor the military and diplomatic communications of the Soviet Union and its Eastern Bloc allies during the Cold War, and was formally established in the year of 1971.[13][14]
By the end of the 20th century, the system referred to as "ECHELON" had evolved beyond its military/diplomatic origins, to also become "... a global system for the interception of private and commercial communications."[15]
The system has been reported in a number of public sources. One of the earliest reports to describe the program, code-named "ECHELON", was Duncan Campbell's 1988 article, "Somebody's listening", published in the New Statesman.[16] The program's capabilities and political implications were investigated by a committee of the European Parliament during 2000 and 2001 with a report published in 2001,[15] and by author James Bamford in his books on the National Security Agency of the United States.[12] The European Parliament stated in its report that the term ECHELON is used in a number of contexts, but that the evidence presented indicates that it was the name for a signals intelligence collection system. The report concludes that, on the basis of information presented, ECHELON was capable of interception and content inspection of telephone calls, fax, e-mail and other data traffic globally through the interception of communication bearers including satellite transmission, public switched telephone networks (which once carried most Internet traffic) and microwave links.[15]
Bamford describes the system as the software controlling the collection and distribution of civilian telecommunications traffic conveyed using communication satellites, with the collection being undertaken by ground stations located in the footprint of the downlink leg.
References
<templatestyles src="Reflist/styles.css" />Cite error: Invalid <references>
tag; parameter "group" is allowed only.
<references />
, or <references group="..." />
The bibliography of George Orwell includes journalism, essays, books, and fiction written by the British writer Eric Arthur Blair (pictured), pen name George Orwell. Orwell first achieved widespread acclaim with his fictional novella Animal Farm and cemented his place in history as a novelist with the publication of Nineteen Eighty-Four shortly before his death. While fiction accounts for a small fraction of his total output, these two novels are his best-selling works, having sold almost fifty million copies in sixty-two languages by 2007—more than any other pair of books by a twentieth-century author. In addition, Orwell wrote book-length investigations of poverty in Britain in the form of Down and Out in Paris and London and The Road to Wigan Pier and one of the first retrospectives on the Spanish Civil War in Homage to Catalonia. The impact of Orwell's large corpus is manifested in additions to the Western canon and the adoption of "Orwellian" as a description of totalitarian societies. (Full list...)
Template:/box-footer Purge server cache
- What are portals?
- List of portals
- Featured portals
- ↑ Tim Phillips, "Activists Confess to Breaking Into Federal Bureau of Investigation Office More Than Forty Years Ago", Activist Defense, January 7, 2014.
- ↑ Noam Chomsky. New Political Science, Volume 21, Number 3 (September, 1999), pp. 303-324
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ 8.0 8.1 Given the 5 dialects that use the terms, UKUSA can be pronounced from "You-Q-SA" to "Oo-Coo-SA", AUSCANNZUKUS can be pronounced from "Oz-Can-Zuke-Us" to "Orse-Can-Zoo-Cuss".
- From Talk:UKUSA Agreement: Per documents officially released by both the Government Communications Headquarters and the National Security Agency, this agreement is referred to as the UKUSA Agreement. This name is subsequently used by media sources reporting on the story, as written in new references used for the article. The NSA press release provides a pronunciation guide, indicating that "UKUSA" should not be read as two separate entities. (The National Archives) (National Security Agency)
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Google books – Echelon by John O'Neill
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ 12.0 12.1 Bamford, James; Body of Secrets, Anchor, ISBN 0-385-49908-6; 2002
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ 15.0 15.1 15.2 Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.