A lot of the most freaky and invasive surveillance engineering that the U.S. government uses to give chase its citizen are not secret . In fact , you’re able to happen out about a lot of these project as they ’re being developed , just by knowing what to search for on U.S. government website .
Over at Electronic Frontier Foundation , Dave Maass explains it all to you :
Over the last twelvemonth , chiliad of pages of sore document outlining the government ’s intelligence agency practice have landed on our desktops .

One solidification of documentsdescribes the Director of National Intelligence ’s finish of funding “ dramatic improvements in unconstrained fount acknowledgement . ”A presentationfrom the Navy utilize examples from Star Trek to explain its electronic warfare program . Other records show the FBI was purchasingmobile phone origin devices , malwareandfiber internet - tapping systems . Asign - in listshows the name and contact details of one C of cybersecurity contractile organ who turn up a Department of Homeland Security “ Industry Day . ” Yetanother document , a heavy redacted contract , provides contingent of U.S. assistance with dawdler surveillance programs in Burundi , Kenya and Uganda .
But these are n’t top - secret record carefully leaked to diarist . They are n’t classified dossier paste randomly on the Internet by hacktivists . They were n’t even set free through the Freedom of Information Act . No , these public document are available to anyone who looks at the U.S. government ’s contracting internet site , FBO.gov .
For step - by - step statement on how to seek for these undertaking on FBO and a few other sites , record the rest of Maass ’ mail onEFF ’s Deeplinks web log .

GovernmentPoliticsSurveillanceTechnology
Daily Newsletter
Get the best tech , scientific discipline , and culture tidings in your inbox daily .
intelligence from the hereafter , delivered to your present .
You May Also Like












![]()
