{"id":1238,"date":"2011-12-22T06:23:29","date_gmt":"2011-12-22T06:23:29","guid":{"rendered":"https:\/\/melangedmaculateme.wordpress.com\/2011\/12\/22\/next-step-identifying-customers-of-surveillance\/"},"modified":"2023-07-28T16:29:25","modified_gmt":"2023-07-28T20:29:25","slug":"next-step-identifying-customers-of-surveillance","status":"publish","type":"post","link":"https:\/\/melange.dmaculate.me\/home\/2011\/12\/22\/next-step-identifying-customers-of-surveillance\/","title":{"rendered":"Next Step: Identifying Customers of Surveillance Technology Companies and Turning Up the Heat | Electronic Frontier Foundation"},"content":{"rendered":"<p>Via <a style=\"font-weight:bold;font-size:16px\" href=\"http:\/\/www.scoop.it\/t\/rights-liberties\/p\/859379739\/next-step-identifying-customers-of-surveillance-technology-companies-and-turning-up-the-heat-electronic-frontier-foundation\" target=\"_blank\" rel=\"noopener\">Scoop.it<\/a> &#8211; <a href=\"http:\/\/www.scoop.it\/t\/rights-liberties\" target=\"_blank\" rel=\"noopener\">Rights &amp; Liberties<\/a><br \/><a href=\"http:\/\/www.scoop.it\/t\/rights-liberties\/p\/859379739\/next-step-identifying-customers-of-surveillance-technology-companies-and-turning-up-the-heat-electronic-frontier-foundation\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"http:\/\/img.scoop.it\/DEsoWpAzg46CFcOthkkv5jl72eJkfbmt4t8yenImKBXEejxNn4ZJNZ2ss5Ku7Cxt\" \/><\/a><br \/>In the past month\u2014thanks to reporting from the Wall Street Journal and Bloomberg, as well as WikiLeaks and its media partners\u2014a little sunlight has finally exposed a large but shadowy industry: Western technology companies selling mass spying software to governments. The amazing and dangerous capabilities of these tools are described in hundreds of marketing documents that were recently leaked to the media organizations.<br \/><a href=\"https:\/\/www.eff.org\/deeplinks\/2011\/12\/next-step-identifying-customers-surveillance-technology-companies-and-turning-heat\" target=\"_blank\" rel=\"noopener\">Via eff.org<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Via Scoop.it &#8211; Rights &amp; LibertiesIn the past month\u2014thanks to reporting from the Wall Street Journal and Bloomberg, as well as WikiLeaks and its media partners\u2014a little sunlight has finally exposed a large but shadowy industry: Western technology companies selling &hellip; <a href=\"https:\/\/melange.dmaculate.me\/home\/2011\/12\/22\/next-step-identifying-customers-of-surveillance\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[1],"tags":[],"class_list":["post-1238","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack-related-posts":[{"id":1200,"url":"https:\/\/melange.dmaculate.me\/home\/2011\/12\/30\/tyrants-and-technology-how-western-mercantilism\/","url_meta":{"origin":1238,"position":0},"title":"Tyrants and Technology: How Western Mercantilism Leads to Censorship and Disappearances &#8211; Forbes","author":"aslam","date":"December 30, 2011","format":false,"excerpt":"Via Scoop.it - Rights & LibertiesIn the last two decades, leading information, communications, and technology (ICT) companies\u00a0have sold goods and services to repressive governments, enabling them\u00a0to dramatically improve their surveillance and intelligence capabilities as well as control the flow of information from the outside world.Via forbes.com","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1490,"url":"https:\/\/melange.dmaculate.me\/home\/2011\/08\/19\/cisco-sued-by-chinese-political-prisoners-over\/","url_meta":{"origin":1238,"position":1},"title":"Cisco Sued By Chinese Political Prisoners Over &#8216;Golden Shield&#8217;","author":"aslam","date":"August 19, 2011","format":false,"excerpt":"Via Scoop.it - Rights & LibertiesCisco, one of the world\u2019s largest technology companies, is being sued by Chinese political prisoners for allegedly providing the technology and expertise used by the Chinese Communist Party to monitor, censor and suppress the Chinese people.Show original","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":284,"url":"https:\/\/melange.dmaculate.me\/home\/2015\/02\/16\/how-a-private-anime-torrent-tracker-became-an\/","url_meta":{"origin":1238,"position":2},"title":"How a Private &#8216;Anime&#8217; Torrent Tracker Became an Essential Tool For Facebook | TorrentFreak","author":"aslam","date":"February 16, 2015","format":"link","excerpt":"\u2026 an open source private tracker, originally programmed to serve anime torrents, is now powering one of the largest technology companies in the world. How a Private 'Anime' Torrent Tracker Became an Essential Tool For Facebook | TorrentFreak","rel":"","context":"In \"BitTorrent\"","block_context":{"text":"BitTorrent","link":"https:\/\/melange.dmaculate.me\/home\/tag\/bittorrent\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1303,"url":"https:\/\/melange.dmaculate.me\/home\/2011\/12\/10\/trade-fair-for-trojans-f-secure-weblog-news\/","url_meta":{"origin":1238,"position":3},"title":"Trade Fair&#8230; For Trojans &#8211; F-Secure Weblog : News from the Lab","author":"aslam","date":"December 10, 2011","format":false,"excerpt":"Via Scoop.it - Rights & Liberties Trojans, backdoors, keyloggers and eavesdropping is used by online criminals. The same techniques are also used by governments. Some government do this to spy on their own people or to find dissidents. Other governments do this while investigating criminal suspects. \u00a0 Most of the\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":905,"url":"https:\/\/melange.dmaculate.me\/home\/2012\/08\/10\/the-united-nations-and-the-internet-its\/","url_meta":{"origin":1238,"position":4},"title":"The United Nations and the Internet: It&#8217;s Complicated &#8211; By Rebecca MacKinnon","author":"aslam","date":"August 10, 2012","format":false,"excerpt":"See on Scoop.it - Rights & LibertiesWhen it comes to the Internet, however, Congress, the White House, technology companies, and civil liberties groups are all on the same page: All agree that the United Nations \u2013 a body representing the interests of governments \u2013 should not be given control over\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1804,"url":"https:\/\/melange.dmaculate.me\/home\/2018\/09\/03\/the-overlapping-tensions-in-indias-online-business-policy-and-data-protection\/","url_meta":{"origin":1238,"position":5},"title":"India Pushes Back Against Tech \u2018Colonization\u2019 by Internet Giants &#8211; The New York Times","author":"aslam","date":"September 3, 2018","format":false,"excerpt":"https:\/\/www.nytimes.com\/2018\/08\/31\/technology\/india-technology-american-giants.html The overlapping tensions in India's online business, policy and data protection India wants to curb the dominance of foreign (mainly US) tech giants in India's online consumer marketplace to facilitate the growth of homegrown counterparts. For this, it is looking at China's success in establishing its own tech heavyweights\u2026","rel":"","context":"In \"China\"","block_context":{"text":"China","link":"https:\/\/melange.dmaculate.me\/home\/tag\/china\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_likes_enabled":true,"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/posts\/1238","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/comments?post=1238"}],"version-history":[{"count":1,"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/posts\/1238\/revisions"}],"predecessor-version":[{"id":3019,"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/posts\/1238\/revisions\/3019"}],"wp:attachment":[{"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/media?parent=1238"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/categories?post=1238"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/tags?post=1238"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}