Statue of Liberty Spies on Visitors

29 04 2013

From Slate

Lady Liberty’s Watching You

I wanted to write about face-recognition software considered for use at the statue. Here’s what happened.

By Ryan Gallagher

The Statue of Liberty is getting a facelift, though the changes aren’t only cosmetic. An upgraded “state of the art” security system will help keep Lady Liberty safe when it reopens soon. But what does the system entail, and could it involve a controversial new face-recognition technology that can detect visitors’ ethnicity from a distance? I tried to find out—and a New York surveillance company tried to stop me. . . .  (more)

and in the U.K. – everything’s O.K. –


Texas: Austin police provocateurs infiltrated, entrapped Houston Occupy protesters

10 09 2012

By Charles Abelard

An ersatz protester who attended planning meetings for the Austin, Texas Occupy group has now been identified as Austin Police Detective Shannon Dowell. Two other Austin police officers also infiltrated the Austin Occupy group. The three police provocateurs used classic methods designed to entrap protesters into breaking the law, thus setting them up for arrest, criminal prosecution and possible imprisonment.

The operation may now be unraveling due to carelessness on the part of the provocateurs themselves, as a state district judge reviews the case. Court documents make clear that police officials up to Chief Art Acevedo approved the infiltration operation.

While attending Occupy planning meetings, Dowell apparently didn’t say much openly before the group, but preferred to operate behind the scenes by buttonholing individual Occupy members privately and urging them to adopt more aggressive tactics. . . . (more)

The Police Spy Files on Occupy Wall Street

16 08 2012

Now available for download [PDF] –  DHS  Occupy Wall Street Documents

– thanks to a FOIA request by

Police Spy Files:

DHS Response to Truthout FOIA Request: Cover Letter (Occupy Wall Street)

DHS Reponse to Truthout FOIA Request: Cover Letter (US Day of Rage)

DHS Response to Truthout FOIA Request: Documents, Part 1

DHS Response to Truthout FOIA Request: Documents, Part 2

DHS Reponse to Truthout FOIA Request: Documents, Part 3

DHS Response to Truthout FOIA Request: Documents, Part 4

DHS Response to Truthout FOIA Request: Documents, Part 5


The American Bankers Association memo on OWS, Nov. 24, 2011

More OWS files –


  shortlink to this page is

Cryptome Tracks The NYPD Ring Of Steel

10 08 2012



Alexander Higgins has the Fed’s Spy Docs on Occupy Wall St. Online

17 05 2012

In his post Docs Show White House, DHS Coverup Of Massive Natiowide Occupy Spy Network you can view the police spy documents. Another FOIA catch.



A hearty GOOD LUCK to all Occupiers going to Chicago this weekend!

– F.C.

WikiLeaks: How Mass Surveillance Contractors Share Your Data with the State

27 12 2011

This article shows why activists need to avoid electronic communucation. All of it.

[snip]  . . . .   Surveillance companies like SS8 in the U.S., Hacking Team in Italy and Vupen in France manufacture viruses (Trojans) that hijack individual computers and phones (including iPhones, Blackberries and Androids), take over the device, record its every use, movement, and even the sights and sounds of the room it is in. Other companies like Phoenexia in the Czech Republic collaborate with the military to create speech analysis tools. They identify individuals by gender, age and stress levels and track them based on ‘voiceprints’. Blue Coat in the U.S. and Ipoque in Germany sell tools to governments in countries like China and Iran to prevent dissidents from organizing online.

Trovicor, previously a subsidiary of Nokia Siemens Networks, supplied the Bahraini government with interception technologies that tracked human rights activist Abdul Ghani Al Khanjar. He was shown details of personal mobile phone conversations from before he was interrogated and beaten in the winter of 2010-2011. . . .

 . . . .  In January 2011, the National Security Agency broke ground on a $1.5 billion facility in the Utah desert that is designed to store terabytes of domestic and foreign intelligence data forever and process it for years to come.

Telecommunication companies are forthcoming when it comes to disclosing client information to the authorities – no matter the country. Headlines during August’s unrest in the UK exposed how Research in Motion (RIM), makers of the Blackberry, offered to help the government identify their clients. RIM has been in similar negotiations to share BlackBerry Messenger data with the governments of India, Lebanon, Saudi Arabia, and the United Arab Emirates. . . . “

How to Identify an Agent Provocateur

10 10 2011

From Take the

. . . .  As the paranoia common to governments grows, the question arises: will your group or church or political action committee be targeted with agent provocateurs at some point? Why not? The targets have been quite various, with government certainly not always focused on so-called radicals. At the same time, governments’ definitions of what groups are risky can change quickly and silently. It certainly wouldn’t be advertized. Many groups haven’t discovered their agent provocateurs until years after their activity.

Would you be able to spot an agent provocateur? They try to blend in and make friends. They appear to share your interests. . . (more)