summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorjules <jules@carbonpictures.com>2017-06-03 18:46:19 +0000
committerjules <jules@carbonpictures.com>2017-06-03 18:46:19 +0000
commit8bcf5f1b4d25146ff963a9944712b3f34a3cf9bd (patch)
treec763a0e8a136888aced45592743aa1a5454345a6
parent46337a6a262b53fbe4e6cad15aa5630ee079a2b4 (diff)
db
-rw-r--r--db.json22
1 files changed, 11 insertions, 11 deletions
diff --git a/db.json b/db.json
index 37add8f..e522471 100644
--- a/db.json
+++ b/db.json
@@ -553,7 +553,7 @@
"title": "Moonbounce",
"medium": "Program",
"category": "Surveillance",
- "keywords": "#Moon #Surveillance #Interception #Signal #Covered Operations #Cold-War #Conspiracy #Espionage #Governments #Information #Radar #Antenna #Technology\r\n",
+ "keywords": "#Moon #Surveillance #Interception #Signal #Covert Operations #Cold-War #Conspiracy #Espionage #Governments #Information #Radar #Antenna #Technology\r\n",
"description": "Moonbounce describes the phenomenon that man-made signals emanating from Earth would bounced back from the moon and detected from other locations. The radar-reflective characteristics of the lunar surface were already successfully tested since 1946. One time in surveillance history this came to use was in the US-Air Force led project named FLOWER GARDEN in the early 1960s to monitor and intercept radar signals from the Soviet Union. Several antennas around the US were used for moonbounce – also operated by the CIA and the NSA.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/b0a50210-365a-11e7-a37a-4579121b15f0.jpg",
@@ -759,7 +759,7 @@
"title": "Teufelsberg (“Devil’s Mountain”), Berlin",
"medium": "Item",
"category": "Surveillance",
- "keywords": "#NSA #Surveillance #Covered Operations #Cold-War #Espionage #Fascism #Germany #Governments #Interception #Intelligence #Signal #Information #War #Geography #Architecture #Radome #Radar #Antenna #Technology\r\n",
+ "keywords": "#NSA #Surveillance #Covert Operations #Cold-War #Espionage #Fascism #Germany #Governments #Interception #Intelligence #Signal #Information #War #Geography #Architecture #Radome #Radar #Antenna #Technology\r\n",
"description": "Teufelsberg (translated as “devil’s hill”) is a man-made hill in Berlin. Built on top of a unfinished Nazi military-technical college, it was created in the 20 years following World War II by moving debris from the destroyed city of Berlin. In 1963 the NSA built a permanent listening station atop the mountain to spy on the eastern Allies. The Field Station had four radomes containing large satellite antennas. With the most sophisticated spying equipment for that time, they enabled the US and British intelligence to intercept satellite signals, radio waves, microwave links and other transmissions. This unique history makes Teufelsberg a tourist attraction.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/617c4070-3661-11e7-a37a-4579121b15f0.jpg",
@@ -1377,7 +1377,7 @@
"title": "WikiLeaks",
"medium": "Item",
"category": "Surveillance",
- "keywords": "#WikiLeaks #Whistleblower #Classified Information #Covered Operations #Transparency #Evidence #Governments #Secrets #Human Rights #Intelligence #Information #Politics #Scandals #Digital Rights #Disclosure #Freedom \r\n",
+ "keywords": "#WikiLeaks #Whistleblower #Classified Information #Covert Operations #Transparency #Evidence #Governments #Secrets #Human Rights #Intelligence #Information #Politics #Scandals #Digital Rights #Disclosure #Freedom \r\n",
"description": "WikiLeaks is an international, non-profit media organisation that publishes classified information and news-leaks from anonymous sources. It was founded in Iceland in 2006 and uses the slogan “We open governments.” Julian Assange is described to be the director and spokesperson of the organisation devoted to bringing transparency to governments, accessibility to information, and protecting whistleblowers. Over the past years WikiLeaks draw a lot of global attention to itself by publishing leaked classified information, for instance on the US-Military and the war in Afghanistan and Iraq (2010), the US State Department diplomatic cables (2010) and the Podesta Emails during the US presidential election campaign in 2016. \r\n\r\nEcuador granted Assange political asylum in 2012, since then he has been a resident in the Ecuadorian Embassy in London, afraid to leave as he fears an extradition to the US by Sweden, where he is accused of sexual assaults. In the US he could face several penalties, including the death sentence, for his work with WikiLeaks. ",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/fec0c370-36f6-11e7-a37a-4579121b15f0.jpg",
@@ -1759,7 +1759,7 @@
"title": "PRISM",
"medium": "Program",
"category": "Surveillance",
- "keywords": "#NSA #Five Eyes #Snowden #Internet #Social Media #PRISM #Surveillance #Privacy #Encryption #Big Brother #Interception #Covered Operations #Computing #Data #Network #Wiretapping \r\n",
+ "keywords": "#NSA #Five Eyes #Snowden #Internet #Social Media #PRISM #Surveillance #Privacy #Encryption #Big Brother #Interception #Covert Operations #Computing #Data #Network #Wiretapping \r\n",
"description": "PRISM is a highly-classified program intended to grant direct access to internet servers for the NSA to wiretap. Since 2007, it would collect material including individual search history, the contents of emails, file transfers and live chats from internet giants like Google, Apple or Facebook. Being part of the Snowden archive, it was the first leak to be published, simultaneously by the Guardian and the Washington Post on June the 7th, 2013 which marked the begin of the Snowden-affair.\r\nThe leaked 41 pages power-point document intended for internal use only, demonstrates information on the extensive surveillance program. Among others it includes the facts that most of the world’s electronic communication passes through the US, which makes monitoring from intelligence analysts possible. The logo chosen represents the mission’s purpose: the prism refracting invisible noise into visible information.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/0de8eac0-3702-11e7-a37a-4579121b15f0.jpg",
@@ -1784,7 +1784,7 @@
"title": "Undersea Network Surveillance",
"medium": "Program",
"category": "Surveillance",
- "keywords": "#GCHQ #NSA #Five Eyes #Snowden #Internet #Social Media #Surveillance #Privacy #Encryption #Big Brother #Interception #Covered Operations #Computing #Data #Network #Wiretapping \r\n",
+ "keywords": "#GCHQ #NSA #Five Eyes #Snowden #Internet #Social Media #Surveillance #Privacy #Encryption #Big Brother #Interception #Covert Operations #Computing #Data #Network #Wiretapping \r\n",
"description": "The Snowden revelation also contained evidence of the US and the UK spy agencies tapping into submarine network structures. These fibre optic cables are part of the physical backbone of the internet and essential to worldwide data flows. All communication flows through them, in favour of „Mastering the Internet“ – a project by GCHQ. The subsidiary of that project codenamed TEMPORA stores huge volumes of data drawn from fibre-optic cables for up to 30 days. The data then can be sifted through and analysed.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/4b9d7790-3703-11e7-a37a-4579121b15f0.jpg",
@@ -2175,7 +2175,7 @@
"title": "Ancient Surveillance: Egypt",
"medium": "Case",
"category": "Surveillance",
- "keywords": "#Espionage #Governments #Intelligence #Information #Spy #Secret Service #Warfare #Ancient #Military #Reconnaissance #Secret Service #Evidence #Covered Operations\r\n",
+ "keywords": "#Espionage #Governments #Intelligence #Information #Spy #Secret Service #Warfare #Ancient #Military #Reconnaissance #Secret Service #Evidence #Covert Operations\r\n",
"description": "As a military empire the Pharaohs of ancient Egypt deployed spies to surveil the enemy and gather intelligence to spread their hegemony. Some of the earliest extant intelligence documents date back to 1844 B.C. For the spies, seen as a new breed of the public servant, the Ancient Egyptians even coined a new word. The called them “the eyes of the Pharaoh”. A significant historic example of intelligence-gathering was the well-documented Battle of Kadesh, that nearly ended as a disaster for the Egyptians, when Shasu spies led the Pharaoh, Ramses II, into a trap. The concept of employing spies is the first known documentation of an intelligence network in history.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/9db6dfd0-476b-11e7-bfa2-633db9d19e2a.png",
@@ -2195,9 +2195,9 @@
"dateCreated": "Fri, 02 Jun 2017 08:17:42 GMT"
},
{
- "id": "sun-zsu-the-art-of-war",
+ "id": "sun-tsu-the-art-of-war",
"date": "5th century BC",
- "title": "Sun Zsu: The Art of War",
+ "title": "Sun Tsu: The Art of War",
"medium": "Book",
"category": "Surveillance",
"keywords": "#Espionage #Surveillance #Spy #Literature #Military #Ancient #Warfare #Intelligence #Information\r\n",
@@ -2254,7 +2254,7 @@
"title": "Ancient Surveillance: Roman Empire",
"medium": "Surveillance Concept",
"category": "Surveillance",
- "keywords": "#Spy #Governments #Surveillance #Dissent #Espionage #Geography #Information #Geography #Literature #Reconnaissance #Intelligence #Police #Covered Operations #Control #Military #Politics #Secrets #Ancient #Secret Service #Warfare\r\n",
+ "keywords": "#Spy #Governments #Surveillance #Dissent #Espionage #Geography #Information #Geography #Literature #Reconnaissance #Intelligence #Police #Covert Operations #Control #Military #Politics #Secrets #Ancient #Secret Service #Warfare\r\n",
"description": "Throughout the history of the Roman Empire, espionage and surveillance were significant elements of the political apparatus. Spies engaged in both foreign and domestic political operations, assessing the disposition of their enemy but also the loyalty of their own population. Several accounts indicate the presence of a secret police, one of which were the infamous frumentarii around the first century AD. They were supply sergeant who originally purchased and distributed grain to become intelligence agents adding manpower to the vast intelligence network of Ancient Rome. Working closely with the urban police, their duties included investigating, arresting and even political assassination. By the 3rd century the secret police was more and more seen as authoritative force or as an occupational army.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/db6d7300-476d-11e7-bfa2-633db9d19e2a.jpg",
@@ -2333,7 +2333,7 @@
"title": "All the President’s Men",
"medium": "Film",
"category": "Surveillance",
- "keywords": "#Scandal #Surveillance #Wiretapping #Governments #Film #Covered Operations #Disclosure #Information #USA #US-Election\r\n",
+ "keywords": "#Scandal #Surveillance #Wiretapping #Governments #Film #Covert Operations #Disclosure #Information #USA #US-Election\r\n",
"description": "In the run-up to the 1972 elections, Washington Post reporter Bob Woodward covers what seems to be a minor break-in at the Democratic Party National headquarters. He is surprised to find top lawyers already on the defense case, and the discovery of names and addresses of Republican fund organizers on the accused further arouses his suspicions. The editor of the Post is prepared to run with the story and assigns Woodward and Carl Bernstein to it. They find the trail leading higher and higher in the Republican Party, and eventually into the White House itself.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/76bfd750-4771-11e7-bfa2-633db9d19e2a.jpg",
@@ -2407,7 +2407,7 @@
"title": "Code Names",
"medium": "Artwork",
"category": "Surveillance",
- "keywords": "#Arts #Classified Information #Covered Operations #Pentagon #BlackWorld #Control #Espionage #Surveillance #Governments #Intelligence #NSA #CIA #Top-Secret #USA #War on Terror\r\n",
+ "keywords": "#Arts #Classified Information #Covert Operations #Pentagon #BlackWorld #Control #Espionage #Surveillance #Governments #Intelligence #NSA #CIA #Top-Secret #USA #War on Terror\r\n",
"description": "Code Names is a list of words, phrases, and terms that designate active military programs whose existence or purpose is classified. These include classified exercises and units, intelligence programs, information compartments, and Pentagon “Special Access Programs.”\r\nThe code names are deliberately nonsensical, often droll and sardonic words or short phrases without discernable connection to the programs they designate. For example, “Bacon Ridge” is an NSA installation in Texas, “Fox Acid” an NSA-controlled Internet server designed to inject malware into unsuspecting web browsers, and “Mystic” a program to collect every phone call from the Bahamas.\r\n",
"image": {
"uri": "https://marsupial.s3.amazonaws.com/armory/677fd9e0-4774-11e7-bfa2-633db9d19e2a.jpg",