ViewfromtheBridge

Lobster Issue

[…] Party, (2) the institutional agenda of the intelligence and security agencies, and (3) the narrative power and moral fervor of the media with (4) the tech companies’ surveillance architecture. The claim that Russia hacked the 2016 vote allowed federal agencies to implement the new public-private censorship machinery under the pretext of ensuring “election integrity”. […]

Lob86 View from Bridge

Lobster Issue

[…] Party, (2) the institutional agenda of the intelligence and security agencies, and (3) the narrative power and moral fervor of the media with (4) the tech companies’ surveillance architecture. The claim that Russia hacked the 2016 vote allowed federal agencies to implement the new public-private censorship machinery under the pretext of ensuring “election integrity”. […]

View from Bridge 89

Lobster Issue

[…] American politicians? A couple of of interesting essays about the CIA recently. Covert Action has editor Jeremy Kuzmarov’s account of the joint CIA and New Zealand SIS surveillance operations in the 1980s against the New Zealanders who opposed the expansion of US bases in their country.43 The Intercept describes how the CIA used the […]

Lob86ViewfromBridgepdf

Lobster Issue

[…] Party, (2) the institutional agenda of the intelligence and security agencies, and (3) the narrative power and moral fervor of the media with (4) the tech companies’ surveillance architecture. The claim that Russia hacked the 2016 vote allowed federal agencies to Clint Watts and Andrew Weisburd, ‘How Russia Dominates Your Twitter Feed to Promote […]

Historical notes on the use of troops during the 1984-85 miners’ strike

Lobster Issue 89 (2024) FREE
To access this content, you must subscribe to Lobster (click for details).

[PDF file]: […] of how far the Secret State had become involved in the dispute. It ran covert operations against NUM members and on occasion committed murder.18 It used electronic surveillance by GCHQ and employed a network of spies and informers, some in the heart of the mining communities.19 These informers (whose identities would be at risk […]

David Shayler, ‘Tunworth’ and the LIFG

Lobster Issue 78 (Winter 2019) FREE

[PDF file]: […] of the Communist Party of Britain and Class War’ (hence the emphasis) and that he would seem to have been careful not to use the term ‘ surveillance’. What is also immediately obvious is that any decision to have ‘closed down the study of the Communist Party of Britain and Class War’ would not […]

Historical Notes on troops and the miners’s strike

Lobster Issue

[…] of how far the Secret State had become involved in the dispute. It ran covert operations against NUM members and on occasion committed murder.18 It used electronic surveillance by GCHQ and employed a network of spies and informers, some in the heart of the mining communities.19 These informers (whose identities would be at risk […]

Peer group pressure

Lobster Issue 78 (Winter 2019) FREE

[PDF file]: […] Secretary of the senior civil servants’ trade union, the First Division Association. She lists being a former member, ‘Advisory Board of PGI Protection Group International (executive protection, surveillance and risk consulting) (interest ceased 7 August 2018)’. PGI’s website has a section on Cyber security. As ever, its people come largely from government intelligence and […]

lob86View from Bridge

Lobster Issue

[…] Party, (2) the institutional agenda of the intelligence and security agencies, and (3) the narrative power and moral fervor of the media with (4) the tech companies’ surveillance architecture. The claim that Russia hacked the 2016 vote allowed federal agencies to implement the new public-private censorship machinery under the pretext Clint Watts and Andrew […]

View ffrom Bridge 89

Lobster Issue

[…] American politicians? A couple of of interesting essays about the CIA recently. Covert Action has editor Jeremy Kuzmarov’s account of the joint CIA and New Zealand SIS surveillance operations in the 1980s against the New Zealanders who opposed the expansion of US bases in their country.28 The Intercept describes how the CIA used the […]

Accessibility Toolbar