E
Picture
Picture
CONTENTS:
INTRO, 
IN DEPTH: HISTORICAL TIMELINE OF KEY PROGRAMS, IDEOLOGIES, AND TECH ADVANCEMENTS THAT FORM THE FOUNDATION OF TODAY'S COVERT TARGETING OPERATIONS (PRE-9/11) - THE ILLUSION OF OLD PROGRAMS TERMINATION: HOW SYSTEMS PERSIST - THE TARGETED INDIVIDUAL COMPARISONS TO MKULTRA, COINTELPRO, AND THE STASI - DICK CHENEY: THE POST-9/11 ARCHITECT - SIGNIFICANT SURVEILLANCE AND INTELLIGENCE DISCLOSURE EVENTS (2004–PRESENT) - THE SNOWDEN FILES IN 2013 UNVEILED, - VAULT 7 2017, - BLUELEAKS 2020, - WILLIAM BINNEY: NSA WHISTLEBLOWER & TARGETED INDIVIDUAL, - EDWARD SNOWDEN: NSA WHISTLEBLOWER, - HOW IS NEW ZEALAND INVOLVED IN THIS, NICKY HAGER'S SECRET POWER (1996), - SEPTEMBER 11 - 2001 "WAR ON TERROR", - NSAs SURVEILLANCE STRUCTURE POST 9/11, - SECTION 702, EXECUTIVE ORDER 12333 - PDF TOTAL INFORMATION AWARENESS,  - THE SURVEILLANCE INDUSTRIAL COMPLEX ACLU 2004, - WHAT ARE FUSION CENTERS, KAREN STEWART FUSIONS,  - SUZIE DAWSON NEW ZEALAND ACTIVIST, - IN DEPTH PART 1. THE LOOPHOLE ECOSYSTEM AFTER 911: HOW POLICE, EX-COPS, PRIVATE ENTITIES, VIGILANTE GROUPS, AND THE MILITARY TRANSFORMED MASS SURVEILLANCE INTO STREET-LEVEL TERROR, THE 3 PERMANENT LOOP HOLES 1. PARALLEL CONSTRUCTION 2. 3RD PARTY DOCTRINE 3. SECRET WATCHLISTS - IN DEPTH PART 2. PRIMARY ACTORS EXPLOITING THE POST-9/11 LOOPHOLES IN 2025, - TIER 5 AFFILIATED RESEARCH INSTITUTIONS AND EMERGING TECHNOLOGIES - CHINA'S SURVEILLANCE AND SOCIAL CREDIT SYSTEM IS THE POSTER CHILD FOR THE SMART CITY, - EMERGING SURVEILLANCE TECHNOLOGIES IN LAW ENFORCEMENT WORLDWIDE: PROFILING AND PREDICTIVE POLICING 2025, - REVEALED: THIS IS PALANTIR’S TOP-SECRET USER MANUAL FOR COPS 2019. FUSION CENTERS. LINK.


                                                Intro

Picture
Since ancient times, Empires and Governments driven by the thirst for power and control, have deployed informants to monitor and deceive citizens. 
I
n Ancient Egypt (circa 1500 BCE), Pharaoh Thutmose III used agents to suppress dissent among nobles, ensuring loyalty to the throne.> In Imperial Rome (circa 100 CE), the frumentarii masked espionage as grain collection to spy on citizens and officials.> In China’s Qin Dynasty (221–206 BCE), Emperor Qin Shi Huang enforced Legalist order through informant networks, rooting out disloyalty.> During the Persian Wars (480 BCE), the Delphic Oracle, served as a Greek intelligence hub, where informants, including pilgrims and scouts, gathered data on Persian King Xerxes’ movements, enabling strategic deceptions. 
These early systems weren’t just about catching rebels; they were about instilling fear, ensuring loyalty, and maintaining the delicate balance of authority in sprawling, fractious societies. This age old tactic of using spies and informants underscores a timeless truth "those in power have always sought to know what their people are thinking, saying, or plotting, often at the cost of trust and freedom."

The contemporary Targeted Individual phenomenon did not arise in isolation; it crystallized after 11 September 2001, when legislation and policy deliberately created permanent legal mechanisms
( 1. parallel construction
to conceal the true source of evidence, 2. the third-party doctrine to eliminate privacy expectations for data held by private companies, and 3. secret watchlisting systems that allow indefinite monitoring without notice or appeal ), all confirmed by congressional reports, federal court decisions, and official audits.
These Loopholes, were structural features designed to enable intelligence and law-enforcement agencies to transfer surveillance functions to private contractors, local fusion centers, and civilian networks while preserving legal deniability. What follows is the documented historical evolution of these practices, from Cold War experimentation programs to the fully integrated, globalized control architecture that exists today.


MKUltra 1953-1973 and the predecessor programs that follow > The National Security Agency (NSA) 1952-2025 the top tier for global surveillance monitoring, and data collection. > The FIVE EYES Alliance (FVEY) 1946-2025. >  COINTELPRO 1956-1971. > DARPA 1958-2025. > The STASI 1950-1990. > ECHELON (FVEY)1972-2000 Surveillance Networks > 9/11-2001 “War on Terror” The Patriot Act (FVEY Alliances) and the expansion of the Global Surveillance Networks  >>> As well as a plethora of other branches, Predecessor programs and International sharing intelligence collaborations that continue to evolve.



In Depth: Historical timeline of key programs, ideologies, and tech advancements that form the foundation of today's covert targeting operations (Pre-9/11)

This timeline traces the step-by-step growth of advanced targeting systems. Many of these breakthroughs in brain research, data science, and surveillance bring real benefits to medicine, security, and daily life. Yet they are all dual-use technologies. This list shows how the core methods from officially ended programs like MKUltra and COINTELPRO did not disappear. Instead, they quietly migrated into today's legal, funded, and expanding frameworks.
  • Eugenics Ideology Beginnings (1883): Francis Galton coins the term "eugenics" in his book Inquiries into Human Faculty and Its Development, proposing the scientific improvement of human hereditary traits through selective breeding.
  • Technocracy Ideology Beginnings (1910s-1930s): Thorstein Veblen critiques industrial society (1919); Howard Scott founds Technocracy Inc. (1933) during the Great Depression, advocating rule by technical experts and engineers using scientific methods.
  • Nazi Germany Experiments (1933-1945): The regime conducts widespread unethical human experiments in concentration camps, including hypothermia, high-altitude, and chemical tests on prisoners to advance military and racial ideology.
  • Atomic Bomb Development (1942-1945): The U.S.-led Manhattan Project develops the first nuclear weapons, culminating in tests and use in 1945, marking a massive leap in destructive military technology.
  • ENIAC Computer (1945): The first programmable, general-purpose electronic digital computer, built for U.S. Army ballistic calculations, introducing vacuum-tube computing for complex problems.
  • Project Paperclip (1945-1950s): The U.S. recruits over 1,600 German scientists and engineers, many former Nazis, to advance American programs; Wernher von Braun's team drives NASA rocket development, while others advise CIA on interrogation/mind control techniques influencing MKUltra, with FBI handling background checks.
  • Transistor Invention (1947): Bell Labs team (Bardeen, Brattain, Shockley) invents the transistor, replacing vacuum tubes and enabling smaller, more reliable electronics.
  • National Security Act & Black Budget Origins (1947): Signed July 26, 1947 by President Truman, creating the CIA, NSC, and DoD. Established the core framework for classified "black budget" funding, enabling secret appropriations for intelligence and covert ops with minimal public/congressional oversight—formalizing wartime secrecy into a permanent Cold War system. Strengthened by the CIA Act of 1949, allowing unvouchered funds.
  • Five Eyes Alliance (FVEY) (1946-2025): Formalized UKUSA signals intelligence pact expands to include Canada, Australia, and New Zealand for global communications monitoring.
  • Robert Heath's Human Electrode Implants (1950s-1960s): Tulane University researcher implants electrodes in patients' brains for deep stimulation, exploring treatment for psychiatric disorders and behavior control.
  • NSA (1952-2025): U.S. National Security Agency established for signals intelligence, inheriting wartime codebreaking and expanding bulk collection programs.
  • Hydrogen Bomb (1952): U.S. tests the first thermonuclear device, vastly more powerful than atomic bombs, escalating the nuclear arms race.
  • Project HTLINGUAL (1953-1973): CIA program intercepts and photographs international mail to/from the U.S., targeting suspected communists and dissidents.
  • Dartmouth Conference (1956): Summer workshop at Dartmouth College marks the formal birth of artificial intelligence as a field, with optimistic predictions for machine intelligence.
  • COINTELPRO (1956-1971): FBI program targets domestic political groups with infiltration, disinformation, and disruption tactics.
  • Transhumanism Ideology Beginnings (1957): Biologist Julian Huxley coins "transhumanism" in an essay, envisioning human evolution enhanced by science and technology.
  • Integrated Circuit Invention (1958): Jack Kilby (Texas Instruments) and Robert Noyce (Fairchild) independently develop the integrated circuit, packing multiple transistors on a single chip.
  • Perceptron & Early Neural Nets (1958): Frank Rosenblatt demonstrates the Perceptron, an early neural network for pattern recognition and machine learning.
  • DARPA (1958-2025): U.S. Defense Advanced Research Projects Agency founded post-Sputnik to maintain technological superiority; pre-9/11 breakthroughs include ARPANET (internet precursor), stealth aircraft, GPS, and early AI/neural interface research, driving dual-use military innovations.
  • Laser Invention (1960): Theodore Maiman builds the first working laser at Hughes Research Labs, enabling coherent light beams for communications and weapons.
  • Visual Cortex Mapping (1959–1981, Harvard/Johns Hopkins): Hubel and Wiesel map how the brain deconstructs visual input into basic features using cats and monkeys. Their Nobel-winning discovery of "feature detectors" and "critical periods" fundamentally shaped developmental neuroscience and modern AI.
  • Project Bluebird (1950–1951): Initial research into truth serums and "reprogramming" the memory of agents to prevent them from leaking secrets if captured.
  • Project Artichoke (1951–1953): Expanded the scope to include hypnosis and morphine addiction/withdrawal to force confessions during interrogations.
  • MKUltra (1950-1973): CIA's extensive mind control program includes LSD experiments, hypnosis, and Subproject 119 exploring electromagnetic remote effects on behavior.
  • José Delgado's Stimoceiver (1963-1965): Overt Mind Control research in the public eye. Yale researcher demonstrates radio-controlled brain implants stopping a charging bull and controlling animal/human movements and emotions.
  • ELIZA Chatbot (1966): Joseph Weizenbaum creates the first natural language conversation program, simulating a psychotherapist.
  • Operation CHAOS (1967-1974): The CIA violates its charter to conduct domestic espionage on anti-war and civil rights groups. Seeking "foreign influence," the program uses illegal infiltration and mail intercepts to compile a computerized index of 300,000 Americans and 7,200 personality files.
  • Project MINARET (1967-1973): The NSA’s domestic "sister program" to CHAOS. Using its signals intelligence (SIGINT) capabilities, the agency intercepts the communications of over 1,600 "watch-listed" Americans, including Dr. Martin Luther King Jr. and Muhammad Ali, illegally sharing transcripts with the CIA, FBI, and White House.
  • Transhumanism Evolution (1960s-1970s): F.M. Esfandiary (FM-2030) defines the "Transhuman" as a transitional stage toward immortality. He promotes the use of cryonics, genetic engineering, and synthetic organs to transcend biological limits, shifting the focus from controlling the mind to upgrading the species.
  • JFK's "The President and the Press" Speech (April 27, 1961): John F. Kennedy addressed the tension between transparency and the national security needs of the Cold War, urging media self-restraint while affirming the essential role of an open press in a democracy. The speech is often cited for its warnings about excessive secrecy and "secret societies" .
  • ARPANET Launch (1969): DARPA's packet-switching network connects four universities, precursor to        the modern internet.
  • ECHELON (1972-2000): Five Eyes global signals intelligence network for intercepting communications.
  • Gene Editing Conceived and Early Expansion (1972–2000): Paul Berg creates the first recombinant DNA molecules (1972), enabling the "cutting and pasting" of life's code. By 2000, this evolves into widespread commercial GM crops (Bt corn), the first human gene therapy trials, and early programmable tools like Zinc Finger Nucleases (ZFNs).
  • DARPA & Military Neurotech Continuation (1970s–1980s): MKUltra's electrode/EM experiments feed into DARPA's ongoing brain interface R&D; funding shifts to classified military projects. Examples include early cochlear implants (1970s) and visual prostheses for the blind (DARPA-backed), demonstrating remote neural stimulation capabilities.
  • Church Committee Investigations (1975-1976): Senate probe exposes intelligence abuses, leading to reforms and oversight.
  • GPS Operational (1978-1993): U.S. military satellite navigation system becomes fully functional.
  • Personal Computer Boom (1981): IBM PC standardizes desktop computing with open architecture.
  • Executive Order 12333 (1981-Present): Reagan directive governs U.S. intelligence activities, allowing overseas collection with domestic spillover.
  • Microwave Auditory Effect & Non-Lethal Weapons Research (1980s): Building on MKUltra Subproject 119, military labs (U.S. Air Force) weaponize the "Frey Effect." Using pulsed microwaves to induce thermal expansion in the inner ear, researchers demonstrate "voice-to-skull" (V2K) technology—the ability to beam audible clicks or speech directly into a subject’s head from a distance.
  • Technocracy Revival (1980s): Amid the digital revolution, the 1930s concept of "rule by experts" is reborn. This era shifts focus toward algorithmic governance, where data, automation, and technical experts—rather than traditional politics—are viewed as the most efficient means to manage a complex, globalized society.
  • Extropianism & Transhumanism (1988): Max More founds the Extropy Institute, codifying transhumanism into a formal movement. The "Extropian Principles" promote a future of radical life extension, AI integration, and space colonization, framing human enhancement as a moral imperative for "self-directed evolution."
  • World Wide Web Invention (1989): Tim Berners-Lee proposes a decentralized hypertext system at CERN. Originally designed for scientific data sharing, the Web creates a global information architecture that facilitates unprecedented psychological influence, mass data collection, and the real-time synchronization of human thought.
  • STASI (1950-1990): East German secret police uses vast informant networks and Zersetzung (gaslighting, smears, isolation). Closest overt version of TI ops today, which is covert.
  • Machine Learning Rise (1990s): Advances in support vector machines, decision trees; IBM's Deep Blue defeats chess champion Kasparov (1997).
  • Brain-Computer Interfaces (BCIs) Emerge (Late 1980s–1990s): Research moves from external stimuli to direct neural output. In 1998, Philip Kennedy performs the first human BCI implant, allowing a paralyzed patient to control a computer cursor via thought. Simultaneously, DARPA begins funding "silent talk" and wireless neural reading to interface soldiers with machines
  • Early Body Area Network Research (1995): MIT’s Thomas Zimmerman develops the Personal Area Network (PAN), using the human body’s natural electrical conductivity as a data conduit. By allowing information transfer through a handshake or touch, this tech transforms the human body into a "wetware" bus for near-field communication and remote biometric monitoring.
  • eHealth Coined & RPM Growth (Late 1990s/Early 2000s): The term "eHealth" emerges as internet technology and healthcare converge. Formalized by the WHO in 2005, this era sees the rise of Remote Patient Monitoring (RPM). Wearables and sensors for chronic care introduce the dual-use potential for continuous, real-time collection of human body data under the guise of medical necessity.
  • Transhumanism Organizations (1998): Nick Bostrom and David Pearce found the World Transhumanist Association (now Humanity+). Bostrom’s academic papers provide the philosophical framework for the "Posthuman" era, arguing that using technology to overcome aging and cognitive limits is a fundamental human right.
  • Blanchette Rockefeller Neurosciences Institute Founding (1999): Founded as a specialized center for memory and neuromodulation research. Its creation signals a major institutional pivot toward advanced brain stimulation, rebranding technologies once associated with "mind control" as therapeutic tools for treating cognitive disorders and "unlocking" human memory.
  • Post-Stasi Continuation (1990s): Following the fall of the Berlin Wall, the "Zersetzung" (psychological decomposition) tactics of the East German Stasi are identified in Western classified operations. These methods shift from physical arrest to "gaslighting" and social neutralization, using covert harassment, character assassination, and psychological disruption to dismantle dissent without making a martyr of the target.
  • Pre-9/11 Documented TIs (1990s-2001): As the internet facilitates global communication, the first "Targeted Individual" (TI) communities emerge. These groups report "Organized Stalking" and "Electronic Harassment," describing experiences that mirror Stasi-style Zersetzung and the Frey Effect (V2K). This marks the transition of covert psychological warfare from state secrets to a visible, albeit marginalized, public discourse.
  • 9/11 & Patriot Act Expansions (2001-Present): The 9/11 attacks trigger the USA PATRIOT Act, effectively legalizing and rebranding previously "clandestine" surveillance methods. This era births Fusion Centers, which integrate military, federal, and local law enforcement into a singular apparatus. This infrastructure enables the systemic "data-sharing" and domestic targeting once restricted to illegal programs like Operation CHAOS, Stasi Zersetzung, and COINTELPRO. These entities were never abolished; they were rebranded and masked within dual-use narratives and technological frameworks specifically designed to evade natural law and constitutional protections.

The illusion of old programs termination: How systems persist

Despite the public backlash of the 1970s, sparked by the revelations of the Church Committee and the supposed "abolishment" of illegal programs, the underlying ideologies, technical capabilities, and personnel did not disappear. Instead, they underwent a sophisticated process of Institutional Migration. This was not a death, but a "laundering" of clandestine power. When the exposure of MKUltra and COINTELPRO made it politically impossible to continue these operations in their raw, "black-site" forms, the state moved them into more resilient, decentralized structures. These functions were migrated across three distinct fronts: they were codified into new national security laws that redefined "harassment" as "threat assessment"; they were privatized through defense contractors to bypass Freedom of Information (FOIA) oversight; and they were medicalized into the emerging fields of neuroscience and bio-engineering.
By dissolving a centralized operation like Operation CHAOS into dozens of disparate agencies and "dual-use" commercial ventures, the system ensured that its capabilities remained active while its trackable "paper trail" was effectively erased.


Examples:
The Rebranding of CHAOS/COINTELPRO: When the public rejected domestic spying and the infiltration of civil rights groups, the state didn't stop the activity; it integrated it. The "extra-legal" harassment of the 1960s was woven into the DHS Fusion Center model. By changing the label from "Political Dissident" to "Potential Domestic Threat" or "Person of Interest," the same targeting became a legal, funded mandate.
The Stasi Digitalization of Zersetzung: 
The Stasi’s manual "decomposition" of a target’s life (social isolation, career sabotage, and psychological gaslighting) has evolved into  A.I Algorithmic Neutralization through the digital revolution. In the modern era, this persists via covert psychological operations harnessing smart IoT frameworks and wireless communications for real-time remote monitoring, advanced pervasive surveillance, shadow-banning, financial deplatforming, and digital "interference" tactics that achieve the same "social death" without physical agents, often under the guise of "Content Moderation."
The Medicalization of MKUltra: The most invasive elements of mind control (drugs, frequency manipulation, and neural interfaces) were moved from the "torture chamber" to the Laboratory and Hospital. By framing these advancements as "Neuromodulation" or "Brain-Computer Interfacing (BCI)" for health, the system gained voluntary consent for technologies that were previously rejected as human rights violations.

Why this "Evades Natural Law"
Natural Law recognizes the inherent sovereignty of the individual’s mind and body.
Institutional Migration creates a loophole where the state claims it is not "targeting" a soul, but merely "managing data," "securing the network," or "optimizing public health."

By keeping these controversial programs "immortal," the state ensures they remain free from public backlash, exposure, and legal consequences. These operations are simply disguised under various new forms and labels, enabling ongoing criminal acts like clandestine targeting, illegal surveillance, and unethical experiments on citizens to continue indefinitely. This "rebranding" creates a shield that allows the same old machinery to operate in the dark, hidden behind the face of modern security and science. Institutional Migration allows the system to operate in a Legal Fiction, where the "label" of the activity is protected by law, while the "substance" of the act remains a violation of human sovereignty.

The Targeted Individual program has significant comparisons to the methods of MKUltra, COINTELPRO and the STASI programs. . .

which are examples of extreme state control and psychological manipulation, surveillance and the disruption of global civil liberties.
Despite public outrage, court exposures, and intense scrutiny, MKUltra, COINTELPRO, and Stasi programs didn’t really finish. Their entities and directives quietly persisted in the background, evolving in clandestine forms, hidden from the spotlight.


The significant differences that set the modern Targeted Individual (TI) program apart from its predecessors are its advanced technological capabilities and its deep integration into society:
1. Targeted Individuals are being covertly and remotely beta tested by classified advanced military weapons and emerging technologies that has exceeded traditional espionage, reconnaissance, psychological warfare and mind control tactics, so much so it is beyond interpretation to the average person and has no scientific or legal recognition.
2. Today's TI targeting is deeply embedded in everyday society, law enforcement, and government structures. It operates behind justifications such as counter-terrorism, sustainable development goals, or pandemic preparedness measures. This networked system connects intelligence firms, private companies, fusion centres and artificial intelligence.




                                  MKUltra 1950s-1970s

Picture
MKUltra was the CIA’s illegal, ultra-secretive mind-control and interrogation program that ran officially from 1953 to 1973 (with many documented side projects continuing well into the late 1970s). Born out of Cold War paranoia about Soviet and Chinese “brainwashing” techniques, the Agency poured millions into finding ways to completely shatter and reprogram the human mind—almost always without informed consent. Under the direction of chemist Sidney Gottlieb, MKUltra funded over 150 subprojects across universities, hospitals, prisons, and even brothels, using unwitting American and Canadian citizens as guinea pigs. The program was finally exposed in 1975 by the Church Committee and the Rockefeller Commission after CIA Director Richard Helms ordered most records destroyed in 1973—yet the surviving 20,000+ pages still paint a horrifying picture.

The following individuals conducted some of the most invasive and ethically condemned human experimentation involving direct brain stimulation and remote behavioral control:
Dr. José Manuel Rodríguez Delgado
Spanish-born neuroscientist working at Yale University. In a widely publicized 1963 demonstration in Córdoba, Spain, Delgado implanted electrodes in the caudate nucleus of a fighting bull and, using a handheld radio transmitter, remotely stopped the animal mid-charge in the arena, bringing it to a complete halt with a single button press. Delgado later implanted his “stimoceiver” device in human psychiatric patients, allowing researchers to induce or suppress emotions, movements, and aggression from a distance. His 1969 book Physical Control of the Mind advocated for the future use of brain implants in social control.

Dr. Ewen Cameron
Head of psychiatry at McGill University (Montreal) and director of MKUltra Subproject 68. Between 1957 and 1964, Cameron implanted electrodes in patients’ brains, combined massive electroconvulsive therapy (up to 75 times standard intensity) with prolonged drug-induced comas and repetitive audio loops in an attempt to erase existing personalities and implant new ones (“psychic driving” and “depatterning”). Hundreds of non-consenting patients suffered permanent memory loss and psychological damage.

Dr. Robert G. Heath
Chairman of Psychiatry and Neurology at Tulane University, New Orleans. From the 1950s through the 1970s, Heath implanted deep-brain electrodes in over 54 psychiatric patients with funding from the CIA and U.S. military. His most publicized case involved Patient B-19 (1970–1972), a young homosexual man subjected to septal stimulation that triggered intense pleasure, followed by attempts to alter his sexual orientation through remote-controlled stimulation paired with heterosexual imagery and encounters. Heath’s work demonstrated that specific emotions and behaviors could be induced or suppressed externally.

These experiments, conducted largely without informed consent and often on vulnerable populations, remain among the most documented historical examples of direct, remote manipulation of thought and behavior using implanted brain electrodes.

Key methods used in MKUltra included:
Drugs: Massive dosing of LSD, mescaline, psilocybin, scopolamine, and a cocktail called BZ (3-quinuclidinyl benzilate) to induce amnesia, confusion, or total mental breakdown. Some subjects were dosed daily for months (e.g., Operation Midnight Climax in San Francisco).
Psychological Torture: Extreme sensory deprivation tanks (up to weeks), prolonged isolation, verbal/sexual abuse, induced despair, and “depatterning”—using electroshock and coma-inducing drugs to wipe personalities completely blank.
Hypnosis & Suggestion: Attempts to create hypnotic couriers who could carry out orders without memory, or to plant false memories and triggers.
Electroshock & Coma Therapy: Up to 75 times the normal voltage, combined with barbiturates and amphetamines in a technique called “psychic driving” by Dr. Ewen Cameron in Montreal—fully funded by the CIA under subproject 68.
Biological & Chemical Weapons Testing: Secret spraying of LSD-like substances over entire towns (e.g., the 1950s tests in San Francisco Bay fog) and attempts to develop poison dart guns, shellfish toxins, and cobra venom for assassinations.


MKUltra
https://en.wikipedia.org/wiki/MKUltra
PROJECT MKULTRA, THE CIA'S PROGRAM OF RESEARCH INBEHAVIORAL MODIFICATION
https://www.intelligence.senate.gov/wp-content/uploads/2024/08/sites-default-files-hearings-95mkultra.pdf
The CIA seeks key to mind control
https://www.thetribune.ca/mind-control-mcgill-mk-ultra/
CIA MKULTRA
https://info.publicintelligence.net/CIA-MKULTRA-IG.pdf
José Manuel Rodríguez Delgado
https://en.wikipedia.org/wiki/Jos%C3%A9_Manuel_Rodr%C3%ADguez_Delgado
José Delgado, implants, and electromagnetic mind control: Stopping the furious Bull
https://cognitive-liberty.online/jose-delgado-implants-and-electromagnetic-mind-control-stopping-the-furious-bull/
The work of Donald Ewen Cameron: from psychic driving to MK Ultra
https://pmc.ncbi.nlm.nih.gov/articles/PMC10443815/
Donald Ewen Cameron
https://en.wikipedia.org/wiki/Donald_Ewen_Cameron
Montreal experiments
https://en.wikipedia.org/wiki/Montreal_experiments
Robert Galbraith Heath
https://en.wikipedia.org/wiki/Robert_Galbraith_Heath
Dr. Robert G. Heath: a controversial figure in the history of deep brain stimulation
https://thejns.org/focus/view/journals/neurosurg-focus/43/3/article-pE12.xml
Dr Robert Heath (1915 - 1999)
https://www.wireheading.com/robert-heath.html



The Minds of Men | Official Documentary by Aaron & Melissa Dykes
https://www.youtube.com/watch?v=LQucESRF3Sg

A 3-hour masterpiece by Truthstream Media that exposes the hidden history of government mind-control research from the 1940s to today. Featuring rare archival footage and declassified documents, it traces MKUltra’s roots through Operation Paperclip, the Macy Conferences on cybernetics, and the CIA’s secret quest to turn human beings into programmable machines.
Highlights include: Dr. José Delgado stopping a charging bull with a brain implant (1963), Dr. Ewen Cameron’s “psychic driving” memory-erasure experiments in Montreal, Dr. Robert Heath’s pleasure-center electrode trials and the infamous Patient B-19 case, The birth of remote electromagnetic influence (Subproject 119) and the dream of a “psycho-civilized society”

Cognitive Liberty: Mind Control
https://www.youtube.com/watch?v=QZPEB0kseyM


Pulling back the veil on the global Targeted Individual program—a sophisticated military-grade torture campaign of stalking and harassment with cutting-edge neuroweapons. Its tactics are akin to MKUltra & COINTELPRO and it's still in operation today, driving ordinary, innocent civilians to homelessness, suicide and maybe even murder.

     COINTELPRO 1956-1971 (Counter Intelligence Program)

Picture
COINTELPRO (Counter Intelligence Program) was a series of covert and often illegal operations run by the FBI from 1956 to at least 1971 (and widely believed to continue under new names). Its stated goal was to “expose, disrupt, misdirect, discredit, or otherwise neutralize” any group or individual the Bureau deemed subversive. In practice, it became a full-scale psychological and physical assault on civil rights, anti-war, Black liberation, Native American, socialist, and even liberal organizations inside the United States.Declassified in 1971 by activists who broke into an FBI office in Media, Pennsylvania, the stolen documents proved the program used tactics that violated the First, Fourth, and Fifth Amendments on a massive scale.

Primary Targets:
-Black Panther Party (highest priority – J. Edgar Hoover ordered them “neutralized” by any means)
-Martin Luther King Jr. & Southern Christian Leadership Conference
-American Indian Movement (AIM)
-Socialist Workers Party, Communist Party USA
-Anti–Vietnam War groups (Students for a Democratic Society, etc.)
-Puerto Rican independence movement
-White liberal supporters of civil rights


COINTELPRO Core Tactics:
Surveillance: 24/7 wiretaps, mail opening, bugs, and physical tails.
Infiltration: Over 1,000 informants inside targeted groups; agents provocateurs incited violence to justify crackdowns.
Psychological Warfare (“Psywar”): Anonymous poison-pen letters, forged documents, fake news stories designed to create paranoia and infighting. Example: FBI sent MLK a tape of alleged affairs with a letter urging him to commit suicide (“There is but one way out for you”).
Bad-Jacketing: Spreading rumors that loyal members were informants, resulting in several murders (e.g., Fred Hampton’s bodyguard was drugged by an FBI informant the night Hampton was assassinated).
Media Manipulation: Leaking false stories to friendly journalists; planting cartoons and articles ridiculing targets.
Legal & Financial Sabotage: Bogus tax audits, frame-ups, endless arrests on minor charges to bankrupt movements.
Direct Violence: FBI coordination with local police in the 1969 murder of Fred Hampton and Mark Clark in Chicago (agents drugged Hampton, gave police the apartment layout, and stood by during the raid).


The Surreptitious Reincarnation of COINTELPRO with the COPS Gang-Stalking Program
https://moderndiplomacy.eu/2016/08/22/the-surreptitious-reincarnation-of-cointelpro-with-the-cops-gang-stalking-program/
FBI Domestic Intelligence Activities
https://whatreallyhappened.com/RANCHO/POLITICS/COINTELPRO/COINTELPRO-FBI.docs.html
Church Committee Final Report, Book III (1976)
https://www.intelligence.senate.gov/wp-content/uploads/2024/08/sites-default-files-94755-iii.pdf
COINTELPRO
https://en.wikipedia.org/wiki/COINTELPRO
FBI Records The Vault COINTELPRO
https://vault.fbi.gov/cointel-pro
The COINTELPRO Papers
https://baobaxia.net/api/v2/baobaxia-2014_a954/abdias_d79c/acervo/download/ward-churchill-and-jim-vander-w_144a
The 1969 Raid That Killed Black Panther Leader Fred Hampton
https://www.history.com/articles/black-panther-fred-hampton-killing
War at home : covert action against U.S. activists and what we can do about it
https://archive.org/details/warathomecoverta0000glic
Historical Case Studies of U.S. Government Disinformation: COINTELPRO (1956–1971)
https://newparadigminstitute.org/learn/library/disinformation-series-cointelpro/

COINTELPRO The Secret FBI Program - Explained
https://www.youtube.com/watch?v=Zsv2DWczG_Y
"It's not too hard to believe that a secret government agency is behind many crimes that should be illegal, but when the US government is concerned, anything goes. Check out today's insane new video where we look at the COINTELPRO program under the FBI that conducted assassinations, and murders so that activists and anyone else stirring up controversy for the government was silenced. This video may have you rethinking your trust in the FBI"

The Burglary That Exposed COINTELPRO: Activists Mark 50th Anniversary of Daring FBI Break-in
https://www.youtube.com/watch?v=CQH9I-aUNa0
"Fifty years ago, on March 8, 1971, a group of eight activists staged one of the most stunning acts of defiance of the Vietnam War era when they broke into an FBI office in Media, Pennsylvania, and stole every document they found. The activists, calling themselves the Citizens’ Commission to Investigate the FBI, began leaking shocking details about FBI abuses to the media. The documents exposed COINTELPRO, the FBI’s secret Counterintelligence Program, a global, clandestine, unconstitutional practice of surveillance, infiltration and disruption of groups engaged in protest, dissent and social change."

The STASI 1950-1990 (the Ministry for State Security of the German Democratic Republic)

Picture
The STASI was the secret police of East Germany from 1950 until the fall of the Berlin Wall in 1989. It was one of the most effective and repressive intelligence and secret police agencies in the world, dedicated to maintaining control by suppressing dissent and ensuring the loyalty of the populace to the socialist state. The Stasi was responsible for both domestic security and foreign espionage. It had a vast network of informants (estimated at around 1 in 6.5 citizens) and a formal staff of over 90,000 at its peak. The Stasi targeted anyone perceived as a threat to the state, including political dissidents, religious groups, intellectuals, and even people trying to leave the country. It also kept tabs on ordinary citizens to ensure conformity.
STASI Tactics:
Surveillance: The Stasi used extensive surveillance methods, including wiretapping, bugging devices, and mail interception and inspection. They also employed photography and video surveillance. They planted listening devices in homes, offices, cars, and even public places.
Database and Record Keeping: The Stasi maintained detailed files on a million citizens, documenting private lives, conversations, and even thoughts, which were used to blackmail or manipulate individuals.
Informant Network: Perhaps their most notorious tactic, the Stasi cultivated an extensive network of informants who reported on friends, neighbors, and colleagues. Informants were everywhere - in workplaces, schools, churches, and within families. An estimated 1 in 6.5 East Germans was an informant at some point.
Psychological Warfare: Tactics included "Zersetzung”, where individuals would be subjected to systematic psychological harassment to discredit them or push them into mental breakdown. This could involve spreading rumors, manipulating living conditions, or breaking into homes to rearrange items.
Interrogation and Detention: The Stasi was notorious for its interrogation techniques, which often led to false confessions due to psychological pressure, sleep deprivation, or physical coercion.
Control of Information: The Stasi controlled media, censored art, and manipulated information to control public perception and suppress any form of dissent or alternative thought.
Observation Points: They established observation posts in buildings or other strategic locations to watch individuals or groups. These could be long-term surveillance operations.
Deception and Disguise: Stasi agents would sometimes pose as ordinary citizens or even as members of targeted groups to infiltrate and gather intelligence. They used a variety of disguises to blend in.
Technical Surveillance: This included everything from night vision equipment to X-ray scanners for mail, and special photographic techniques for covert operations.
Scent Samples: In an unusual and invasive practice, the Stasi collected scent samples from individuals using odor jars, which could later be used to identify or track them with scent dogs.


STASI
https://en.wikipedia.org/wiki/Stasi
Stasi Records Agency
https://en.wikipedia.org/wiki/Stasi_Records_Agency
Enemies everywhere: photos show absurdity of life under the Stasi
https://www.theguardian.com/world/2020/mar/20/enemies-everywhere-photos-show-absurdity-life-under-stasi-east-germany
How the Stasi suppressed resistance in East Germany
https://www.britannica.com/topic/Stasi/images-videos
Stasi: How the GDR kept its citizens under surveillance
https://www.dw.com/en/east-germany-spy-agency-stasi-surveillance/a-73491436
Stasi
https://www.ebsco.com/research-starters/history/stasi

The Stasi - East Germany's Secret Police
https://www.youtube.com/watch?v=vkrw1KdEzgY


The Stasi was the largest secret police that ever existed. This video will give an introduction, touching topics like:
When was the Stasi founded?
Who was the head of the Stasi?
Did The Stasi work together with the KGB?
How many people worked for the Stasi?
What kind of businesses was The Stasi involved in?
The Stasi files

                        Dick Cheney: The Post-9/11 Architect

Picture
Dick Cheney stands as one of the most pivotal and controversial figures in the dramatic expansion of global surveillance networks and executive power following the September 11 attacks. A Washington insider since the Nixon era, Cheney had long nurtured a vision of restoring robust presidential authority, eroded in his view by post-Watergate congressional constraints and the Iran-Contra fallout. As CEO of Halliburton in the 1990s, he honed a disciplined, business-like approach to power and contracts that would later prove instrumental. Hand-selected as George W. Bush’s running mate in 2000—after personally leading the VP search committee—Cheney brought unmatched national security experience and gravitas to an administration whose president lacked deep foreign policy background. In the chaos after 9/11, Cheney seized the moment, wielding outsized influence to drive an aggressive "War on Terror" framework that redefined intelligence collection, domestic monitoring, warrantless surveillance, and the boundaries of presidential authority. These foundational changes, often justified through the unitary executive theory he championed for decades, continue to underpin much of the modern surveillance state.
As Vice President (2001–2009), Cheney wielded unprecedented influence over a foreign-policy-inexperienced George W. Bush, effectively shaping the administration's national security response.
Hand-picked as VP after leading Bush's search committee, his decades-long fixation on restoring executive power (from Ford-era Watergate backlash and Iran-Contra defenses) found its moment post-9/11.
Aggressively pushed the Unitary Executive Theory to justify bypassing laws: warrantless NSA surveillance (Stellar Wind), ignoring FISA courts, signing statements to nullify congressional limits, and "enhanced interrogation" programs.
Championed the rushed PATRIOT Act, expanding domestic surveillance powers, and hyped intelligence linking Iraq to WMDs/al-Qaeda—driving the broader "War on Terror" framework.
Without Cheney's hawkish drive and exploitation of the crisis, the explosive growth of mass surveillance networks, executive overreach, and global intel expansions post-9/11 likely would have been far more restrained.

As vice president during 9/11, Cheney was at the center of an enduring debate over US spy powers
https://apnews.com/article/cheney-patriot-act-surveillance-911-iraq-war-d88fc0acfe2df7c6f66d5b4379623f51
The World Dick Cheney Built
https://www.theatlantic.com/ideas/archive/2020/01/dick-cheney-charted-americas-future-september-11/603313/
On 9/11 and after, Dick Cheney shaped the American response to terrorism
https://www.npr.org/2025/11/04/nx-s1-5597891/on-9-11-and-after-dick-cheney-shaped-the-american-response-to-terrorism
Dick Cheney, former Vice President and trailblazer of ‘unitary executive theory,’ dies at 84
https://fortune.com/2025/11/04/dick-cheney-obituary-former-vice-president-dead-84-unitary-executive/
George Bush Sr book reveals a more dangerous Dick Cheney than anyone knew
https://www.theguardian.com/us-news/2015/nov/05/george-bush-sr-book-reveals-a-more-dangerous-dick-cheney-than-anyone-knew
5 Ways Dick Cheney Influenced History
https://www.history.com/articles/dick-cheney-impact
As vice president during 9/11, Cheney is at the center of an enduring debate over U.S. spy powers
https://www.latimes.com/world-nation/story/2025-11-05/as-vice-president-during-9-11-cheney-is-at-the-center-of-an-enduring-debate-over-us-spy-powers
Dick Cheney’s Legacy: Architect of Presidential Power and Trump’s Unleashed Authority
https://news.ssbcrack.com/dick-cheneys-legacy-architect-of-presidential-power-and-trumps-unleashed-authority/


Significant Surveillance and Intelligence Disclosure Events (2004–Present) 

The exposure of MKUltra, COINTELPRO, and Stasi Zersetzung in the 1970s prompted congressional investigations and promises of reform. Subsequent decades, however, revealed that domestic and international surveillance programs had evolved, expanded, and incorporated advanced technological capabilities.
The following major disclosures, made possible by whistleblowers and investigative journalism, document the persistence and growth of mass surveillance and targeted intelligence operations:

2004–2005 – Thomas Tamm / New York Times Revealed NSA’s warrantless “Stellar Wind” bulk collection of U.S. telephone metadata.
2006–present – WikiLeaks founded Secure platform that became the primary distribution channel for almost every major intelligence leak that followed.
2010 – Chelsea Manning → WikiLeaks Released Iraq/Afghanistan war logs, 250,000 diplomatic cables, and “Collateral Murder” video; exposed systematic global blackmail-grade dossiers.
2013 – Edward Snowden → The Guardian / Washington Post Disclosed PRISM, XKeyscore, TEMPORA, MYSTIC, and the NSA’s “collect it all” doctrine; tools still cited in real-time TI monitoring claims.

2014 - Obama issues PPD-28 limiting signals intel, but Executive Order 12333 remains unchanged, continuing warrantless overseas collection that incidentally captures U.S. persons' data .
2015 – The Drone Papers (The Intercept) Exposed U.S. military geolocation tracking of cell phones for targeted drone strikes; same tech now allegedly used for continuous civilian stalking.
2017 – Vault 7 (WikiLeaks) CIA cyber-arsenal capable of turning smart TVs, phones, and cars into remote listening/control devices (“Weeping Angel” program).
2020 – BlueLeaks 269 GB of U.S. police and fusion-center files showing active watchlisting and psychological-disruption manuals mirroring Zersetzung.
2021 – The Pegasus Project (Amnesty International / Forbidden Stories)
NSO Group’s zero-click spyware deployed against journalists, activists, and ordinary citizens worldwide.

These disclosures collectively illustrate that the surveillance and disruption techniques developed during the Cold War have been preserved, digitized, and outsourced. Capabilities once limited to state intelligence agencies are now accessible to local law enforcement, private contractors, and foreign governments, creating an environment in which highly targeted, deniable harassment can occur at scale.

NSA Whistle blowers that exposed unethical surveillance practices : 1. Perry Fellwock (also known as Winslow Peck) 2. Thinthread Whistle blowers Thomas Drake, William Binney, and J. Kirk Wiebe 3. Edward Snowden 4. Karen Melton Stewart 5. Thomas Tamm 6. Mark Klein


The Snowden files in 2013 unveiled

In 2013, Edward Snowden revealed the NSA’s global mass-surveillance apparatus through a handful of programs:
PRISM: Forced major tech companies (Google, Facebook, Apple, Microsoft, Yahoo, etc.) to hand over user emails, chats, files, and video calls—often in real time.
XKeyscore: A searchable database of almost everyone’s internet activity (emails read, websites visited, searches made)—accessible to analysts with no warrant, sometimes just a justification email.
Upstream (with UK’s Tempora): Tapped undersea fiber-optic cables to copy virtually all international internet traffic passing through the US and UK.
Boundless Informant: NSA’s internal scorecard showing billions of records collected daily—including tens of millions from inside the United States alone.
These leaks proved the post-9/11 “emergency” powers had morphed into permanent, routine, warrantless spying on citizens and allies alike.

Snowden Archive
https://snowden.xsurveillance.site/
2010s global surveillance disclosures
https://en.wikipedia.org/wiki/2010s_global_surveillance_disclosures
NSA Timeline 1791–2015 NSA Surveillance History from December 15, 1791 through November, 9 2015.

https://www.eff.org/nsa-spying/timeline


Vault 7 2017

Vault 7 refers to one of the most significant document leaks in history, initiated by WikiLeaks in 2017. It exposed CIA's hacking tools and cyber-warfare capabilities. Included details on malware, hacking techniques for “SMART DEVICES”, and surveillance methods. It Raised concerns about privacy, security, and the extent of CIA's hacking powers. Vault 7 has left a lasting impact on the discourse around cyber security, surveillance, and the balance between national security and individual privacy rights.
Key revelations:

- The CIA had built an entire arsenal of zero-day exploits, malware, and remote hacking tools targeting iPhones, Android devices, Samsung smart TVs, Windows, macOS, and even car control systems.
- “Weeping Angel”: Turned Samsung TVs into hidden microphones that recorded living-room conversations even when the TV appeared off.
- Ability to bypass encryption in WhatsApp, Signal, Telegram, and others by hacking the device before messages were encrypted.
- Tools to falsely attribute CIA attacks to foreign actors (Russia, China, etc.) via reusable “fingerprints.”
- Lost control of much of this arsenal years earlier—meaning rogue actors or foreign agencies likely already possessed it.


Vault 7: CIA Hacking Tools Revealed
https://wikileaks.org/ciav7p1/
Vault 7
https://en.wikipedia.org/wiki/Vault_7



Wikileaks Vault 7: What's in the CIA Hacking Toolbox? hacking smartphones,smart t.vs, computer operating systems, automobiles, messenger applications.
https://www.youtube.com/watch?v=X45Bb8O-gMI

"WikiLeaks has released thousands of documents and files dubbed Vault 7 that it says expose how the CIA is capable of hacking smartphones, computer operating systems, automobiles, messenger applications and even internet-connected televisions."

BlueLeaks 2020

BlueLeaks was a massive 2020 data breach in which hackers obtained and released nearly 270 gigabytes of internal files from over 200 U.S. law enforcement agencies and training centers. The leak contained two decades of documents from numerous DHS-funded “fusion centers” across the country, including intelligence reports, watchlists, emails, and surveillance records. The exposure revealed that fusion centers routinely monitored non-violent political activists, protesters, and journalists, often using data and tips from private companies and far-right sources.
It exposed major security weaknesses in the nationwide information-sharing network and triggered widespread criticism over privacy violations, poor oversight, and the misuse of counter-terrorism resources against domestic dissent. The post-9/11 fusion-center network—sold as counter-terrorism protection, was in reality a sprawling, poorly secured domestic surveillance system aimed at dissent rather than terrorists. “See something, say something” had quietly morphed into “monitor everyone, trust no one, secure nothing.”


The Intercept Blue Leaks
https://theintercept.com/collections/blueleaks/
BlueLeaks
https://en.wikipedia.org/wiki/BlueLeaks



BlueLeaks: San Diego fusion center's records hacked, posted online

https://www.youtube.com/watch?v=6R7jjhi9qT8





William Binney: NSA whistleblower & Targeted Individual.

Picture
William Binney is a former NSA Technical Director and 36-year veteran who resigned in October 2001 after the agency abandoned his privacy-first surveillance program (ThinThread) in favor of illegal mass data collection on U.S. citizens. One of the earliest post-9/11 whistleblowers, he warned Congress and the DoD Inspector General that the NSA was conducting warrantless bulk surveillance in direct violation of the Fourth Amendment. His disclosures, made years before Snowden, were ignored and met with FBI raids, intimidation, and threats under the Espionage Act. Binney remains a leading voice proving that mass surveillance was never about terrorism—it was about total information control.


William Binney

https://www.pbs.org/wgbh/pages/frontline/government-elections-politics/united-states-of-secrets/the-frontline-interview-william-binney/
William Binney (intelligence official)
https://en.wikipedia.org/wiki/William_Binney_(intelligence_official)
Bill Binney, the ‘original’ NSA whistleblower, on Snowden, 9/11 and illegal surveillance
https://www.computerweekly.com/feature/Interview-the-original-NSA-whistleblower
Government Accountability Project
https://whistleblower.org/bio-william-binney-and-j-kirk-wiebe/


William Binney | Snowden Debate | Oxford Union
https://www.youtube.com/watch?v=KQpTofvZJWU



Bill Binney NSA whistleblower on how the agency tracks you.
https://www.youtube.com/watch?v=XGwL3QIz_lY


            Edward Snowden: NSA whistleblower

Picture
Edward Snowden is a former NSA contractor and one of the most consequential whistleblowers in history. In June 2013, at age 29, he leaked thousands of classified documents proving the United States and its Five Eyes partners had built a permanent, planetary mass-surveillance system that collected the phone calls, emails, texts, and web activity of billions of people, most of whom were neither terrorists nor suspects. 
Working first as a CIA systems administrator and then as an NSA infrastructure analyst for Booz Allen Hamilton in Hawaii, Snowden discovered programs like PRISM, XKeyscore, and Upstream that gave the agency direct access to Google, Facebook, Apple, Microsoft servers and the ability to tap undersea fiber cables carrying the world’s internet traffic.
Realizing the scale violated the U.S. Constitution and every major privacy law, he copied the files, fled to Hong Kong, and handed them to journalists Glenn Greenwald, Laura Poitras, and Ewen MacAskill.
The revelations ignited global outrage, forced Congress to pass the USA Freedom Act (the first rollback of post-9/11 surveillance powers), and proved that “targeted” collection had quietly become total collection on everyone.
Exiled in Russia since 2013 after the U.S. revoked his passport mid-flight and charged him under the Espionage Act, Snowden remains the living symbol that one person with a conscience and a thumb drive can still expose the biggest machine the security state ever built.

Edward Snowden
https://en.wikipedia.org/wiki/Edward_Snowden
Edward Snowden: Leaks that exposed US spy programme
https://www.bbc.com/news/world-us-canada-23123964
What the revelations mean for you.
https://www.theguardian.com/world/interactive/2013/nov/01/snowden-nsa-files-surveillance-revelations-decoded
Edward Snowden Speaks Out: 'I Haven't And I Won't' Cooperate With Russia
https://www.npr.org/2019/09/19/761918152/exiled-nsa-contractor-edward-snowden-i-haven-t-and-i-won-t-cooperate-with-russia



Edward Snowden: Whistleblower or Traitor?
https://www.youtube.com/watch?v=eILRyreZFa8
Edward Snowden’s 2013 leak of classified NSA documents ignited one of the most consequential debates of the 21st century. To supporters, he is a courageous whistleblower who exposed massive government surveillance programs that violated constitutional rights and global privacy standards. His disclosures revealed the scope of programs like PRISM, prompting worldwide conversations on privacy, civil liberties, and the limits of government power.

Edward Snowden: How Your Cell Phone Spies on You
https://www.youtube.com/watch?v=VFns39RXPrU

                    How is New Zealand Involved in this?

                                                                                            The Five Eyes (FVEY)
Picture

New Zealand maintains strategic alliances with the United States, notably through the ANZUS Treaty (Australia, New Zealand, United States Security Treaty, signed in 1951) and the Five Eyes (FVEY) intelligence alliance, which includes Australia, Canada, New Zealand, the United Kingdom, and the United States. These partnerships enhance New Zealand’s national security, defense capabilities, and global intelligence cooperation.
ANZUS Treaty: Historically, ANZUS was a cornerstone of New Zealand’s defense policy, fostering military cooperation with the U.S. and Australia. However, in 1985, the U.S. suspended New Zealand’s participation due to its nuclear-free policy, which banned nuclear-powered or nuclear-armed ships from its ports. Since then, ANZUS has been effectively bilateral between the U.S. and Australia, with New Zealand maintaining a less formal partnership.
Five Eyes Alliance: Originating from the 1946 UKUSA Agreement, FVEY focuses on signals intelligence (SIGINT) human intelligence, Geospatial intelligence, Counterintelligence, and Counterterrorism. New Zealand’s Government Communications Security Bureau (GCSB) contributes via facilities like Waihopai Station. The alliance’s global SIGINT reach is critical for counterterrorism and cyber threats, though 2013 Snowden leaks and 2025 India-Canada tensions highlight privacy and diplomatic challenges. New Zealand balances its Pacific role with independent policies, navigating U.S.-led dynamics.

Five Eyes
https://en.wikipedia.org/wiki/Five_Eyes
The Phantom Eye: New Zealand and the Five Eyes
https://www.tandfonline.com/doi/full/10.1080/02684527.2023.2212557#abstract
The Five Eyes brings the UK, the United States, Canada, Australia and New Zealand into the world’s most complete and comprehensive intelligence alliance.
https://ukdefencejournal.org.uk/the-five-eyes-the-intelligence-alliance-of-the-anglosphere/

Five Eyes Intelligence Oversight and Review Council (FIORC)
https://www.dni.gov/index.php/ncsc-how-we-work/217-about/organization/icig-pages/2660-icig-fiorc


Nicky Hager New Zealand Author :  "Secret Power" 1996

Picture
Nicky Hager’s Secret Power (1996) is a landmark exposé of New Zealand’s Government Communications Security Bureau (GCSB), established in 1977, and its critical role in the Five Eyes alliance (US, UK, Canada, Australia, NZ). Through insider accounts and documents, Hager reveals how the GCSB powered the ECHELON system, intercepting global communications like phone calls and early internet traffic, primarily for US-led objectives over national interests. The book criticizes the GCSB’s secrecy, lack of accountability, and focus on Pacific nations and activists, as noted by concerned staff. Hager underscores the New Zealand government’s minimal knowledge and oversight of GCSB activities in the 1970s–1990s, with prime ministers uninformed and Parliament excluded, while the NSA shaped decisions, leaving NZ without influence, compromising sovereignty and privacy. Predating the 9/11 (2001) and Snowden (2013) surveillance revelations, Secret Power reveals widespread global spying, making it a key exposé of hidden surveillance.
Nicky Hager Author and Investigative Journalist
https://www.nickyhager.org/


September 11 - 2001 “War on Terror” 
The Five Eyes Surveillance Networks: Global Intelligence Hubs and Their Operational Parallels

Picture
Following the September 11, 2001 attacks, the USA PATRIOT Act spurred the expansion of global surveillance networks within the Five Eyes alliance (United Kingdom, Canada, Australia, New Zealand). This Alliance of interconnected mass surveillance networks, parallels the U.S. National Network of Fusion Centers, though often under different names and structures. In the U.S, 80 fusion centers integrate intelligence from federal, state, local, and private sources to combat terrorism, cybercrime, and other threats. They form a top-to-bottom data-sharing hierarchical structure of networks that collect vast communications data which often occurs without adequate oversight. This leads to privacy violations, such as monitoring activists and minorities, as revealed by Edward Snowden’s 2013 disclosures of NSA’s PRISM, XKEYSCORE, and Section 215 bulk metadata collection. Despite public backlash, whistleblower exposures, and the expired, reformed and reinstated acts in the succeeding years, this unscrupulous process is still in effect in 2025. It has embedded itself in enigmatic laws while remaining ineffective against privacy and protection laws. The Targeted Individual phenomenon represents a continued exploitation of the Five Eyes global surveillance networks’ expansion post-9/11.

9/11 Patriot Act >NSA >Exploitation of Public and Private Partnerships that evade laws to surveil everyone globally  > FISA Court section 702 >Courts and Governments have no real power and oversight >Mass data mining and data aggregation for consumers and profit >Terrorist and Civilian watch list programs formed >Fusion Centers >Secret ambiguous due processes to blacklist anyone without consent or knowledge >Warrantless surveillance laws  Deputizing civilians spies >Everyone is subjected to targeting >Targeted Individual 
 
                                     

Five Eyes Threat Assessment Networks: As It Stands in 2025

The United Kingdom’s Joint Terrorism Analysis Centre (JTAC) and National Counter Terrorism Security Office coordinate intelligence through agencies like MI5 and GCHQ, channeling data from national to local levels via advanced surveillance systems.
Canada’s Integrated Threat Assessment Centre (ITAC), part of the Canadian Security Intelligence Service (CSIS), consolidates data across federal, provincial, and local entities, collaborating with the Communications Security Establishment (CSE) to monitor terrorism and cybersecurity threats through Five Eyes intelligence-sharing networks.
Australia’s National Threat Assessment Centre (NTAC), under the Australian Security Intelligence Organisation (ASIO), coordinates with state and territory police, leveraging the Australian Signals Directorate (ASD) to process intelligence for regional and local threat analysis within Five Eyes frameworks.
New Zealand’s Combined Threat Assessment Group (CTAG), within the Government Communications Security Bureau (GCSB), facilitates Pacific data flows, partnering with the New Zealand Security Intelligence Service (NZSIS) and police to share intelligence for national and regional counterterrorism efforts.


New Zealand Combined Threat Assessment Group
https://www.nzsis.govt.nz/our-work/countering-violent-extremism-and-terrorism/combined-threat-assessment-group
Australian National Security
https://www.nationalsecurity.gov.au/
Australia, National Terrorism Threat Level
https://www.asio.gov.au/resources/speeches-and-statements/national-terrorism-threat-level
Canada, ITAC Integrated Threat Assessment Centre
https://www.canada.ca/en/security-intelligence-service/integrated-threat-assessment-centre.html
UK, The National Counter Terrorism Security Office (NaCTSO)
https://www.gov.uk/government/organisations/national-counter-terrorism-security-office/about
Five Eyes
https://en.wikipedia.org/wiki/Five_Eyes
The Five Eyes brings the UK, the United States, Canada, Australia and New Zealand into the world’s most complete and comprehensive intelligence alliance.
https://ukdefencejournal.org.uk/the-five-eyes-the-intelligence-alliance-of-the-anglosphere/
Unmasking the Five Eyes’ global surveillance practices
https://giswatch.org/en/communications-surveillance/unmasking-five-eyes-global-surveillance-practices
Five Eyes
https://privacyinternational.org/learn/five-eyes

The Global Surveillance Web of the Five, Nine, and Fourteen Eyes"

Picture

Beyond the Five Eyes, the Nine Eyes and Fourteen Eyes alliances operate distinct yet parallel surveillance networks to the U.S.’s sprawling intelligence web. The Five Eyes, Nine Eyes, and Fourteen Eyes alliances were conceived in the Cold War, and have been operational ever since. 9/11 was the seismic tectonic shift, the catalyst that ignited the “EYE”s’ explosive growth, widened their global reach, and unleashed an era of relentless surveillance with the world’s silent complicity.
Nine Eyes: This alliance expands the Five Eyes framework to include Denmark, France, Netherlands, and Norway. Like Five Eyes, it operates a top-to-bottom intelligence-sharing network coordinated by national SIGINT agencies (e.g., Denmark’s FE, France’s DGSE, Netherlands’ MIVD, Norway’s NIS). Data is collected at the national level through intercepts, cyber operations, and human intelligence, then shared across the alliance and funneled to regional and local hubs. These hubs, similar to Five Eyes fusion centers, integrate intelligence from military, police, and private entities, ensuring coordinated surveillance and rapid response capabilities.
Fourteen Eyes: This broader alliance incorporates Belgium, Germany, Italy, Spain, and Sweden, alongside the Nine Eyes nations. National SIGINT agencies (e.g., Germany’s BND, Sweden’s FRA, Italy’s AISE) drive the network, collecting and sharing data across federal, regional, and local levels. For example, Germany’s BAMAD and Italy’s AISE operate fusion center-like hubs that mirror the U.S. model, pooling intelligence from law enforcement, military, and private sectors. Sweden’s FRA, known for its robust signals intelligence, plays a key role in intercepting communications across Europe, feeding data into the broader Fourteen Eyes network.


UKUSA Agreement
https://en.wikipedia.org/wiki/UKUSA_Agreement
Five Eyes
https://en.wikipedia.org/wiki/Five_Eyes 
What You Should Know About the 5 Eyes, 9 Eyes, and 14 Eyes Alliances
https://allaboutcookies.org/what-is-the-five-eyes-alliance
What Is The Five Eyes Alliance?
https://www.forbes.com/advisor/business/what-is-five-eyes/

You’re Being Watched: Inside the 5, 9, and 14 Eyes Alliances
https://www.youtube.com/watch?v=BcvwTxRlOWo
You’ve probably heard of the CIA or MI6, but have you ever heard of the Five Eyes Alliance? This powerful global surveillance network includes the U.S., U.K., Canada, Australia, and New Zealand. In this video, we break down what the Eyes alliances are, how they operate, and what they can see (which includes your internet activity).

America's Surveillance State: Inside the NSA | ENDEVR Documentary
https://www.youtube.com/watch?v=hN2J4r6nw2k
The tightly-guarded NSA Headquarters in Maryland covers more than 325 acres and has more than 30,000 employees with a vast number of buildings. They have a small army to protect them from foreign and domestic enemies, as well as their own fire department and swat team. Yet despite a large amount of space it occupies, the NSA had been created in secret and designed to be invisible. But what does the NSA do? It’s a simple question, but because it is a top-secret agency, a clear understanding has been hard to grasp.

America's intelligence community, explained
https://www.youtube.com/watch?v=OFIG6k4B3zg
From the Armed Forces to the NSA to the Treasury Department, PostTV breaks down the 16 different agencies and organizations that collect intelligence for the U.S. government—and the 17th office that oversees them all.

                  Section 702 and Executive Order 12333 

Section 702 of the FISA Amendments Act of 2008 authorizes the U.S. government to conduct warrantless surveillance of non-U.S. persons located outside the United States for foreign intelligence purposes. Enacted in response to post-9/11 technological advancements and legal developments, it permits the acquisition of electronic communications, such as emails, phone calls, and internet activity, through programs like PRISM (direct access to data from U.S. tech companies) and UPSTREAM (tapping into internet backbone cables). The Attorney General approves targeting, minimization, and querying procedures, which are annually reviewed by the Foreign Intelligence Surveillance Court (FISC) for compliance with FISA and the Fourth Amendment.
Key features include:

Targeting: Limited to non-U.S. persons abroad, with no probable cause requirement.
Incidental Collection: Communications involving U.S. persons are often captured and can be queried by agencies like the FBI without a warrant, subject to minimization rules to protect privacy.
Oversight: Includes internal agency compliance programs, annual FISC certifications, and reporting to Congress, but critics argue it enables broad "backdoor searches" of Americans' data.
As of December 2025, Section 702 remains fully operational, reauthorized in April 2024 through the Reforming Intelligence and Securing America Act (RISAA) until April 2026. Recent FISC opinions (March and September 2025) approved amended procedures, noting improvements in FBI querying compliance (over 98% adherence post-RISAA reforms). A February 2025 federal district court ruling required warrants for certain U.S. person queries under the Fourth Amendment, but this is under appeal and does not halt the program's core functions

Executive Order 12333, issued by President Ronald Reagan on December 4, 1981, establishes the framework for U.S. intelligence activities, including signals intelligence collection, counterintelligence, and covert operations. It defines the roles of intelligence agencies (e.g., NSA for electronic surveillance), prohibits targeting U.S. persons except in specific circumstances, and mandates cooperation among executive branch entities. The order emphasizes protecting privacy and civil liberties while advancing national security goals.
Key features include:

Scope: Covers foreign intelligence collection abroad, with broad authority for bulk acquisition of communications and data.
Limitations: Requires Attorney General-approved procedures for handling U.S. person information, including minimization and dissemination rules.
Oversight: Internal agency reviews, congressional notifications, and executive branch coordination, but no direct judicial review.
As of December 2025, EO 12333 remains in full effect, last amended in 2008 by President George W. Bush (EO 13470) to strengthen the Director of National Intelligence's role. It continues to govern overseas surveillance, with recent Privacy and Civil Liberties Oversight Board (PCLOB) assessments (September 2025) confirming its use in signals intelligence activities alongside Section 702.

FISA Section 702
https://www.intel.gov/foreign-intelligence-surveillance-act/fisa-section-702
FISA Section 702 and the 2024 Reforming Intelligence and Securing America Act
https://www.congress.gov/crs-product/R48592
Foreign Intelligence Surveillance Act
https://en.wikipedia.org/wiki/Foreign_Intelligence_Surveillance_Act
Warrantless Surveillance Under Section 702 of FISA
https://www.aclu.org/warrantless-surveillance-under-section-702-of-fisa
Executive Order 12333
https://en.wikipedia.org/wiki/Executive_Order_12333
NSA Executive Order 12333
https://www.nsa.gov/Signals-Intelligence/EO-12333/
Executive Order 12333
https://www.aclu.org/documents/executive-order-12333-0
CIA Intelligence Activities
https://www.cia.gov/static/CIA-AG-Guidelines-Signed.pdf

A Primer on Executive Order 12333: The Mass Surveillance Starlet
https://www.eff.org/deeplinks/2014/06/primer-executive-order-12333-mass-surveillance-starlet

What’s Next for Reforming Section 702 of the Foreign Intelligence Surveillance Act
https://www.brennancenter.org/our-work/research-reports/whats-next-reforming-section-702-foreign-intelligence-surveillance-act

Coats outlines 'section 702' surveillance law
https://www.youtube.com/watch?v=_ZgmQSgNN8E
Director of National Intelligence Dan Coats explained why he believes section 702 of the FISA Amendments Act, the law that allows U.S. intelligence services to monitor foreign nationals under some circumstances, is important, on June 7 at the Capitol.

Executive Order 12333 (The President's Inherent Article II Power to Conduct Foreign Intelligence)
https://www.youtube.com/watch?v=Hr36zslqQMU
Executive Order 12333, Article II, the Foreign Intelligence Surveillance Act (FISA)

Screen Shots: Executive Order 12333 (The President's Inherent Article II Power to Conduct Foreign Intelligence) LINK
Picture
Picture
Picture
Picture

Overview of U.S. Surveillance reforms post Snowden Disclosures

This timeline illustrates the evolution of U.S. surveillance policy following Edward Snowden's 2013 disclosures. The leaks compelled the government to acknowledge extensive bulk and global signals intelligence (SIGINT) collection, resulting in initial reforms including Presidential Policy Directive 28 (PPD-28) in 2014 and the USA FREEDOM Act in 2015. Nevertheless, Executive Order 12333, continues to govern foreign-focused bulk SIGINT with limited external oversight and remains substantially unaltered.
June 2013: Edward Snowden leaks classified NSA documents. Revelations expose massive bulk collection programs like PRISM (under FISA Section 702), upstream internet collection, Verizon phone metadata under Section 215 of the Patriot Act, and overseas SIGINT under EO 12333. This sparks global outrage, especially in Europe, over U.S. surveillance of non-Americans and incidental collection of allies' data.
Late 2013 – Early 2014: U.S. government responses begin. Obama appoints a Review Group on Intelligence and Communications Technologies; PCLOB (Privacy and Civil Liberties Oversight Board) reviews programs. Public debate intensifies on privacy vs. national security.
January 17, 2014: President Obama issues Presidential Policy Directive 28 (PPD-28) It establishes principles for SIGINT (privacy/civil liberties as key factors), limits bulk collection uses to six specific purposes, extends some protections to non-U.S. persons, and requires proportionality/necessity considerations.
June 2, 2015: Congress passes the USA FREEDOM Act (signed by Obama). This ends the NSA's bulk collection of Americans' phone metadata under Section 215 (a key Snowden-exposed program), requires warrants for targeted queries, adds transparency (e.g., more FISA Court opinions released), and creates an amicus panel for novel issues. It's the biggest legislative reform post-Snowden but doesn't touch overseas/EO 12333 bulk collection.
July 16, 2020: Schrems II decision by the Court of Justice of the European Union (CJEU) invalidates the EU-U.S. Privacy Shield (a framework for commercial data transfers). The court rules U.S. surveillance (FISA Section 702, EO 12333, and PPD-28 safeguards) isn't "essentially equivalent" to EU privacy standards and lacks proportionality limits and effective redress for non-U.S. persons. This disrupts transatlantic data flows for thousands of companies and pressures the U.S. to act.
October 7, 2022: President Biden issues Executive Order 14086  "Enhancing Safeguards for United States Signals Intelligence Activities." This builds on/supersedes much of PPD-28: Requires SIGINT to be "necessary and proportionate," prioritizes targeted over bulk collection, strengthens minimization/retention rules, and creates a Data Protection Review Court for qualifying non-U.S. persons from approved countries to challenge unlawful collection. 

Although these legal texts are publicly accessible, the specific programmes authorised, the actual extent of bulk collection, incidental effects on U.S. persons, and the practical implementation of privacy safeguards are frequently classified, self-reported by the relevant agencies, or subject only to internal review. 

Pdf Report: Total Information Awareness: The High Costs of Post-9/11 U.S. Mass Surveillance. Link

Total Information Awareness: The High Costs of Post-9/11 U.S. Mass Surveillance, is a report from Brown University’s Watson Institute, which analyzes the expansion of U.S. surveillance programs following the September 11, 2001 attacks to bolster national security. It details how policies like the USA PATRIOT Act and programs such as the NSA’s PRISM enabled widespread data collection, capturing communications and personal information from public and private sources, often without clear justification. The report critiques the lack of oversight and accountability in these systems, highlighting privacy violations, including the monitoring of activists, journalists, and minority communities under vague national security pretexts. It notes the involvement of various entities in facilitating intelligence sharing across federal, state, and local levels, contributing to a broader surveillance network. The report includes diagrams that collectively illustrate the top-to-bottom U.S. surveillance structure, tracing the flow of data from federal agencies like the NSA and FBI through state and local fusion centers to deputized civilians, revealing the intricate, interconnected network enabled by legal frameworks like the PATRIOT Act.

                                                         The Top to bottom Mass surveillance structure post 911.
Picture
Picture
Suzie Dawson. EP2 Opening the Five Eyes: Exposing The Methods of the Spies - a #1vs5i Live Event.
https://www.youtube.com/watch?v=3A2gnP-F9jU


A diagram of the Global "Eyes" Networks, focusing on the 5 eyes flow to New Zealand, trickling down to the N.Z Military, NZ Intelligence agency, Fusion Centers, Private entities and Government departments. The same route is used to send data back upwards to the National Security Agency (NSA) in the U.S.


            The Surveillance Industrial Complex ACLU 2004

Picture
The 2004 ACLU report, "The Surveillance-Industrial Complex," examines the U.S. government’s post-9/11 surveillance expansion through partnerships with private companies and citizens, creating a pervasive surveillance network that threatens privacy and civil liberties. Enabled by laws like the Patriot Act, this "surveillance-industrial complex" leverages private-sector data, citizen informants, and centralized systems like fusion centers, often with inadequate oversight. The report critiques these efforts as intrusive, inefficient, and erosive of democratic freedoms, urging public and legislative action to protect privacy.
Key Areas:

Privatization of Surveillance and Corporate Involvement: 
The government increasingly relies on private companies to collect citizen data, bypassing legal constraints. Data brokers like ChoicePoint and Acxiom sell detailed consumer profiles ,covering financial, travel, and behavioral data to agencies like the FBI and Department of Homeland Security (DHS), enabling mass profiling. Telecommunications firms, such as AT&T, share call records, often under vague national security pretexts Corporations actively lobby for surveillance contracts, profiting from tools like data-mining software.
Total Information Awareness (TIA):
The Total Information Awareness program, launched by DARPA, aimed to build a massive database integrating government and private-sector data including transactions, travel, and communications, for predictive anti-terrorism analysis. Its data-mining approach sparked privacy concerns. Though Congress defunded TIA in 2003, the report warns that its components were redistributed to agencies like the FBI and DHS, rebranded to evade scrutiny, perpetuating its surveillance goals.
FBI’s Role in Surveillance:
The FBI uses expanded Patriot Act power to compel businesses to provide financial and communication records without judicial oversight or lack of due process, often with gag orders. Tools like the Carnivore system monitor internet communications, and the FBI’s Terrorist Screening Center compiles watchlists, raising transparency concerns. The FBI collaborates with fusion centers and private entities, aggregating data with minimal accountability, amplifying the surveillance network’s reach.
Citizen Surveillance Programs:
The Terrorism Information and Prevention System (TIPS) proposed recruiting workers like postal employees and delivery personnel to report “suspicious activity” to a national hotline. Rejected in 2002 after public backlash, it highlighted the government’s push to formalize citizen surveillance. Similar initiatives persisted, including the Highway Watch Program, funded by DHS and run by the American Trucking Associations, which trained truck drivers to report highway activities. Coastal Watch and Airport Watch programs applied this model to maritime and aviation workers. The Neighborhood Watch program, traditionally focused on community safety, was co-opted post-9/11 to encourage residents to report suspicious behaviors to law enforcement, aligning with DHS efforts to expand community-based surveillance. The report critiques this shift for turning neighbors into informants, fostering mistrust without clear security benefits. InfraGard, a partnership between the FBI and private-sector representatives, enlists businesses to share information on potential threats, acting as “eyes and ears” for the FBI. 

Fusion Centers:
Fusion centers centralize data-sharing among federal, state, local, and tribal law enforcement, integrating private-sector records like consumer data with government intelligence. By 2004, these centers were emerging, collecting vast datasets with minimal legal oversight, raising concerns about abuse and privacy violations. Operating as “one-stop shops” for surveillance, fusion centers lack transparency, merging commercial and government data in ways that threaten civil liberties. The Matrix program (Multistate Anti-Terrorism Information Exchange), which combined state and commercial data for predictive policing, was discontinued due to privacy concerns but exemplifies overreach.


The Surveillance Industrial Complex ACLU 2004
https://www.aclu.org/documents/surveillance-industrial-complex
What's wrong with Fusion Centres

https://www.aclu.org/files/pdfs/privacy/fusioncenter_20071212.pdf
A Former FBI Agent Explains the Terrorist Watch List | Explorer
https://www.youtube.com/watch?v=AhV8sfa0xPk
Former GCSB Director Admits To Mass Surveillance Of NZers
https://www.scoop.co.nz/stories/HL1503/S00045/former-gcsb-director-admits-to-mass-surveillance-of-nzers.htm#transcript




                           What are Fusion Centres?

Fusion centers are collaborative hubs where multiple agencies, typically from law enforcement, intelligence, and homeland security sectors, share information and resources to enhance situational awareness and coordinate responses to threats. Established primarily to combat terrorism post-9/11, fusion centers integrate data from federal, state, local, tribal, and private-sector sources to analyze and disseminate intelligence on potential criminal or terrorist activities. They focus on real-time information sharing, threat assessment, and prevention strategies, covering issues like organized crime, cyber threats, and public safety risks. 
While designed to combat terrorist threats and unlawful activities, Fusion Centers have a darker underbelly that raises serious concerns. These centers, often operate with murky oversight, hoovering up vast amounts of personal data from public and private sources without clear accountability. Critics, including civil liberties groups, point to their potential for overreach, with reports of fusion centers monitoring peaceful activists, political groups, and marginalized communities under vague "threat" pretenses, often disproportionately targeting minorities or dissenting voices.
With minimal transparency and a track record of questionable data retention, these centers can slide into becoming tools for unchecked surveillance and profiling, far from their stated mission of public safety.


Fusion Center
https://en.wikipedia.org/wiki/Fusion_center
Fusion Centers
https://www.dhs.gov/fusion-centers
Fixing Fusion Center Intelligence Under the ODNI Alison E. G. Dinong
https://hnspjournal.org/wp-content/uploads/2023/01/jhnsp-7.1-final-draft-combined-january-2023-3.pdf
THE NATIONAL NETWORK OF FUSION CENTERS: PERCEPTION AND REALITY
https://apps.dtic.mil/sti/tr/pdf/ADA621010.pdf
Intelligence fusion centers under scrutiny, accused of undermining civil rights
https://www.pbs.org/newshour/show/intelligence-fusion-centers-under-scrutiny-accused-of-undermining-civil-rights
ACLU Urges Court to Order Government to Release Records on Fusion Center and Joint Terrorism Task Force Surveillance
https://www.aclu.org/press-releases/aclu-urges-court-to-order-government-to-release-records-on-fusion-center-and-joint-terrorism-task-force-surveillance
How Government Fusion Centers Violate Americans’ Rights — and How to Stop It
https://www.brennancenter.org/our-work/analysis-opinion/how-government-fusion-centers-violate-americans-rights-and-how-stop-it

ACLU Report : What's Wrong With Fusion Centers?
https://www.aclu.org/files/pdfs/privacy/fusioncenter_20071212.pdf
What Is The Role Of Fusion Centers In Intelligence-Led Policing? - Law Enforcement Insider
https://www.youtube.com/watch?v=ZVP0cjdwO_k


"What Is The Role Of Fusion Centers In Intelligence-Led Policing? In this informative video, we’ll explore the important role fusion centers play in intelligence-led policing. These centers act as vital hubs for gathering, analyzing, and sharing information among various law enforcement agencies. We will discuss how fusion centers enhance collaboration among federal, state, local, tribal, and private sector organizations, ensuring that critical intelligence is effectively communicated."


Fusion Centers were Setup to Monitor U.S. Citizens for DOD & DOJ Nonconsensual Human Experimentation
https://www.youtube.com/watch?v=Aah-f_86wCc

Karen Milton Stewart Ex NSA analyst, Targeted Individual and WhistleBlower

Picture
Karen Melton Stewart served 28 years (1982–2010) at the NSA as a senior intelligence analyst with TS/SCI clearance. After exposing plagiarism and fraud by a superior in 2006–2009, she was denied promotions, retaliated against, and forced into early retirement. Beginning in 2010, she filed complaints with the NSA Inspector General and Congress, highlighting corruption and the unconstitutional expansion of warrantless domestic surveillance enabled by post-9/11 laws.From 2015 onward, Stewart became one of the most prominent former NSA officers to publicly identify as a Targeted Individual, asserting that her whistleblowing triggered her placement on secret watchlists.
She alleges this unleashed coordinated harassment, electronic attacks, and directed-energy assaults orchestrated through U.S. fusion centers and privatized contractors — a system she describes as a modern fusion of COINTELPRO and Stasi Zersetzung. Throughout the 2020s and into 2025, she has relentlessly advocated for the abolition of fusion-center “vengeance-for-hire” operations, non-consensual human experimentation, and the restoration of constitutional protections for listed citizens, remaining a polarizing yet credentialed voice in the TI and whistleblower communities.



Karen Stewart. Ex NSA intelligence analyst, whistleblows on targeted individuals. Fusion centers.
https://www.youtube.com/watch?v=AqHtr1Fy1a0&t=120s

Suzie Dawson. New Zealand Activist, Journalist and Targeted Individual.

Picture
Suzie Dawson is a New Zealand journalist and activist known for her work exposing government surveillance and corruption, particularly within the Five Eyes intelligence network. Originally from Auckland, she became prominent through her involvement in the Occupy New Zealand movement and her citizen journalism, covering issues like state-sponsored spying and supporting whistleblowers such as Julian Assange and Edward Snowden. Dawson led Kim Dotcom’s Internet Party from 2017 until its deregistration in 2018, advocating for internet freedom and privacy.
Citing severe persecution, including alleged harassment and threats by intelligence agencies, she sought temporary asylum in Russia after relocating to Berlin in 2015 and later Moscow.
Since 2020, she has focused on developing Panquake, a Web3 social media platform emphasizing user privacy and ethical technology, while continuing her activism through campaigns like Unity4J for Assange. Her claims of targeted persecution have sparked debate, with some questioning their validity. 
                                                         Suzie Dawson 
https://suzi3d.com/



Suzie Dawson. EP1 Opening the Five Eyes: Exposing The Methods of the Spies - a #1vs5i Live Event. Global Surveillamce, Fusion centres. https://www.youtube.com/watch?v=oW0KrReDiNI    

In Depth Part 1. The Loophole Ecosystem after 911: How Police, Ex-Cops, Private Entities, Vigilante Groups, and the Military Transformed Mass Surveillance into Street-Level Terror

Picture
The global surveillance architecture erected after 11 September 2001 was intentionally designed with three structural loopholes that cannot be closed without abolishing the system itself. These loopholes are now systematically exploited by serving and former law-enforcement officers, military intelligence personnel, government agencies, private corporations, licensed investigators, private security firms, and quasi-vigilante civilian networks to subject ordinary citizens to continuous, warrantless surveillance and coordinated harassment.

The Three Permanent Loopholes
1. Parallel Construction Loophole

"Parallel construction" is a law enforcement process that obscures the true origin of evidence obtained through potentially unconstitutional bulk surveillance (by agencies like the NSA or GCHQ) by manufacturing a separate, legal-appearing investigative trail. This practice functions as a "loophole" to prevent judicial review. Raw intelligence is "scrubbed" by fusion centers like the DEA Special Operations Division (SOD) and passed to domestic agencies. These agencies then use a manufactured basis—such as an "anonymous tip" or a routine traffic stop—to re-collect the information legitimately. The core issue is that the true source of the evidence is never revealed in court, preventing defense attorneys from challenging the legality of the original surveillance under the Fourth Amendment.
2. Third-Party Doctrine and Private-Sector Fusion Loophole
The Third-Party Doctrine is a US legal principle that eliminates the reasonable expectation of privacy for information individuals voluntarily share with companies like banks or telecom providers. This allows law enforcement and intelligence agencies to access a vast amount of personal data without a warrant. The Private-Sector Fusion "Loophole" leverages this doctrine, allowing government agencies instantaneous access to data through direct integrations with private companies (data brokers, IoT devices, etc.). This process bypasses the Fourth Amendment's judicial oversight requirements. Information that typically needs a warrant can be accessed as a simple data request from a private entity, allowing agencies to operate without public or judicial scrutiny.
3. Secret Watchlisting Without Due Process Loophole
Refers to the government practice of placing individuals on national and international threat-assessment registries—such as the U.S. Terrorist Screening Database (TSDB), Palantir Gotham systems, or the UK's Prevent matrices—without providing the standard constitutional right to notice, a meaningful opportunity to challenge the designation, or a defined mechanism for removal. This practice is often described as a "loophole" because it allows the government to indefinitely restrict an individual's rights and movements—including through the dissemination of their biometric, vehicular, and behavioral profiles to tens of thousands of public and private entities—while circumventing the due process requirements typically required for such government action.

Parallel construction
https://en.wikipedia.org/wiki/Parallel_construction
Parallel Construction: How to Discover the Government's Undisclosed Sources of Evidence
https://www.nacdl.org/Media/Parallel-Construction-Discover-Govt-Evidenc-Source
Fusion Centers: Too Much (Bad) Information
https://www.aclu.org/news/national-security/fusion-centers-too-much-bad-information
Third-party doctrine
https://en.wikipedia.org/wiki/Third-party_doctrine
Carpenter v. United States, the Stored Communications Act, & the Third Party Doctrine in the Digital Age
https://legaljournal.princeton.edu/carpenter-v-united-states-the-stored-communications-act-the-third-party-doctrine-in-the-digital-age/
The Supreme Court Must Allow U.S. Citizens to Challenge Placement on No Fly List
https://www.aclu.org/news/national-security/the-supreme-court-must-allow-u-s-citizens-to-challenge-placement-on-no-fly-list
The Watchlisting System Exemplifies the Government’s Post-9/11 Embrace of Biased Profiling
https://www.aclu.org/news/national-security/the-watchlisting-system-exemplifies-the-governments-post-9-11-embrace-of-biased-profiling
Watchlists
https://www.aclu.org/issues/national-security/privacy-and-surveillance/watchlists
U.S. GovernMent WatchliStinG: Unfair Process and Devastating consequences
https://www.aclu.org/sites/default/files/assets/watchlist_briefing_paper_v3.pdf


The Operational Hierarchy in 2025
The weaponisation of these loopholes is executed by the following interdependent actors, each granted varying degrees of statutory immunity and direct or indirect access to the original mass-surveillance data streams:
- Active-duty and retired military intelligence personnel and units (DIA, NSA, NGA, Army INSCOM, NORTHCOM, National Guard civil-support elements, and embedded defence contractors)
- Serving police officers and federal agents
- Former law-enforcement officers now operating as licensed private investigators or corporate threat-assessment consultants
- Private security firms possessing memoranda of understanding or limited police powers
- InfraGard members and other FBI-affiliated corporate security personnel
- Fusion-center analysts and their commercial contractors
- Community-policing volunteers, Neighbourhood Watch coordinators, and participants in DHS or equivalent “See Something, Say Something” programmes
- Cause-oriented civilian groups that receive formal or informal tips designating specific individuals for monitoring


A great day for seven Americans formerly on the No Fly List
https://www.aclusocal.org/en/news/great-day-seven-americans-formerly-no-fly-list
Combined Intelligence Fusion Center Helps Thwart Terrorist Attacks
https://www.northcom.mil/Newsroom/News/Article/Article/563137/combined-intelligence-fusion-center-helps-thwart-terrorist-attacks/
U.S. ARMY INTELLIGENCE
https://irp.fas.org/doddir/army/fm34-37_97/2-chap.htm
NSA gave other US agencies Information from Surveillance
https://www.washingtonpost.com/archive/politics/2006/01/01/nsa-gave-other-us-agencies-information-from-surveillance-span-classbankheadfruit-of-eavesdropping-was-processed-and-cross-checked-with-databasesspan/fd7d97d5-5565-4023-932d-d69bdab0e767/
The U.S. Intelligence Community is composed of the following 18 organizations:
https://www.dni.gov/index.php/what-we-do/members-of-the-ic
Fusion Center Locations and Contact Information
https://www.dhs.gov/fusion-center-locations-and-contact-information
ACLU Says Fusion Centers Remain Problematic
https://www.aclu.org/press-releases/aclu-says-fusion-centers-remain-problematic
The FBI’s InfraGard Program Leads the Way in Public/Private Partnership
https://www.rsaconference.com/library/blog/the-fbis-infragard-program-leads-the-way-in-public-private-partnership
InfraGard
https://en.wikipedia.org/wiki/InfraGard
What is InfraGard?
https://cfisa.com/what-is-infragard/
National Neighborhood Watch
https://nnw.org/
If you see something say something
https://www.dhs.gov/see-something-say-something
If You See Something, Say Something
https://www.mass.gov/info-details/if-you-see-something-say-something


How a Typical Targeting Sequence Unfolds
1. An individual is flagged for any reason—political expression, whistleblowing, prior mental-health contact, algorithmic risk score, or personal vendetta.
2. The name is entered into a fusion-center intelligence product or commercial analytical platform.
Local law enforcement receives an automated officer-safety alert or request for heightened vigilance.

3. Private investigators (frequently former police or military intelligence officers) are engaged and immediately access the full dossier through commercial data services.
4. Private security personnel at residential complexes, retail centres, medical facilities, and workplaces are provided photographs and vehicle details accompanied by descriptors such as “emotionally disturbed person” or “potential extremist.”
5. Fire and emergency medical services are similarly flagged, resulting in delayed or adversarial responses.
Community-policing volunteers and neighbours are contacted by liaison officers or receive circulated bulletins.

6. Targeted individuals are subjected to sustained, coordinated harassment by dozens or hundreds of participants, each convinced their actions are lawful and justified.


This system runs on thousands of separate, legally protected decisions made daily within the three loopholes.
Military and intelligence agencies provide the original data feeds, software platforms, legal authorities, and trained personnel. Many of those personnel later move into private-sector roles where they continue the same work with less oversight. Funding loops keep it self-sustaining: government contracts > private companies > political donations > new contracts. No illegal orders are needed; the structure itself produces the outcome. By 2025 the original counter-terrorism mission is irrelevant. The result is a permanent, largely privatized mechanism that can target and disrupt any ordinary citizen while remaining almost impossible to challenge in court.


About Neighborhood Watches
https://mpdc.dc.gov/page/neighborhood-watch
Community Policing as the Primary Prevention Strategy for Homeland Security at the Local Law Enforcement Level
https://www.hsaj.org/articles/183
Turning Americans into Snitches for the Police State: ‘See Something, Say Something’ and Community Policing
https://thefreethoughtproject.com/cop-watch/turning-americans-snitches-police-state-see-something-something-community-policing
Threat Assessment Teams & Gang Stalking
https://gangstalking.wordpress.com/tag/fusion-centers/
This Secret Domestic Surveillance Program Is About to Get Pulled Out of the Shadows
https://www.aclu.org/news/national-security/secret-domestic-surveillance-program-about-get-pulled-out-shadows
Fusion Centres
https://osa.3fprojects.org/organizations/fusion-centers
NZSIS "Know the Signs" 
https://www.nzsis.govt.nz/assets/NZSIS-Documents/Know-the-signs.pdf



"Parallel Construction":DEA Directs Agents to Cover Up Wiretap Program Used to Investigate Americans
https://www.youtube.com/watch?v=H3dCBWdwz8A


"Parallel construction is a law enforcement practice where evidence is deliberately rerouted through an alternative, legitimate source to conceal the original, often secret, investigative method. This is done to hide the use of surveillance programs or technologies, protect sensitive techniques, and prevent defense attorneys from challenging the initial discovery of evidence."

Glenn Greenwald on How Secretive DEA Unit Illegally Spies On Americans, Covers Up Actions
https://www.youtube.com/watch?v=y91jvJQQVl4

"A Reuters investigation exposed the Drug Enforcement Administration’s Special Operations Division (SOD) as a central hub that receives warrantless intelligence from the NSA, CIA, and other agencies. This intelligence is then disseminated to state and local law-enforcement agencies with explicit instructions to conceal its true origin through parallel construction."


Learn the Law | What's the Third Party Doctrine?
https://www.youtube.com/watch?v=ePsU210I4fA

"If you turn your information over to a third party (like Amazon or Google) willingly, you enjoy less privacy rights to that information. This means that in many cases law enforcement may not need a warrant to access that information."
A Former FBI Agent Explains the Terrorist Watch List | Explorer
https://www.youtube.com/watch?v=AhV8sfa0xPk

"Former FBI special agent Michael German explains how government anti-terror efforts can lead to innocent people losing basic rights."

Jeremy Scahill: Leaked U.S. Terrorist Watchlist Rulebook Reveals "Global Stop and Frisk Program"
https://www.youtube.com/watch?v=JoKpscamgKo

"The Obama administration has expanded the national terrorist watchlist system by approving broad guidelines over who can be targeted. A leaked copy of the secret government guidebook reveals that to be a deemed a "terrorist" target, "irrefutable evidence or concrete facts are not necessary." Both "known" and "suspected" suspects are tracked, and terrorism is so broadly defined that it includes people accused of damaging property belonging to the government or financial institutions. Other factors that can justify inclusion on the watchlist include postings on social media or having a relative already deemed a terrorist."
Do you have what it takes to spy for New Zealand? SIS looking for new recruits
https://www.youtube.com/watch?v=yUAUQHJ_-EE

"Applicants should be observant, have a good memory and be a good driver, among other requirements." 
The 2018 NZSIS recruitment advertisement seeks candidates possessing exceptional covert surveillance capabilities, including the ability to monitor individuals without detection, conduct discreet vehicle tailing, identify minute anomalies in public environments, and retain detailed visual information.
New Zealand Secret Service: Opposing The Govt's Covid-19 Measures Could Be a Sign You're a Terrorist
https://www.youtube.com/watch?v=Ysi3QwKtUKA


"New Zealand Intelligence Service's 'Know the Signs' guide, to "help us all identify potential terrorists in our midst". And if you see such signs in a person, you should dob them in to the police or the Security Intelligence Service"

In Depth Part 2. Primary Actors Exploiting the Post-9/11 Loopholes in 2025

Picture
The Architecture built after 2001 was never limited to state agencies. Every capability (mass data fusion, watchlisting, zero-click implants, psychological operations, and street-level interference) was deliberately engineered for privatisation and outsourcing. This ecosystem effectively operates as a unified, pyramid-like intelligence, surveillance, and harassment control chain.

Below is the 5 Eyes model which is the most documented, most leaked, most exported model on the planet. It’s the model Snowden, WikiLeaks, and every major whistleblower, and activist has exposed piece by piece. It is not the only model as every other major power like China, Russia, Israel, UAE / Saudi Arabia / Gulf petrodollar axis, runs their own parallel, privatised surveillance-harassment pyramid. Same structure, same end result:

Tier 1 – The Five Eyes Collection Alliance  (The only entities with direct, unrestricted access to global bulk data before it’s laundered into the private sector) NSA (United States), GCHQ (United Kingdom), CSE (Canada), ASD (Australia),GCSB (New Zealand)
Tier 2 – Apex Contractors
A handful of global giants (Palantir, Booz Allen, NSO Group, etc.) that ingest raw NSA/GCHQ etc bulk collection, is fused with commercial data brokers, to generate the predictive dossiers and watchlist entries that initiate every targeting sequence.
Tier 3 – The Private Operators
Former police, ex-military, and ex-spies turned private contractors (Black Cube, Kroll, Signature Reduction shells, Stratfor/RANE, etc.) convert Tier-1 intelligence into real-world actions: physical tails, disinformation campaigns, spyware deployment, and evidence manipulation, all with built-in deniability.
Tier 4 – Civilian Endpoint
This tier includes local fusion centres, corporate security programmes (InfraGard), private patrol companies (Flock Safety, SSA Security), and civilian informants. These are ordinary citizens, often neighbours, coworkers, or former offenders. Their role is to conduct foot and vehicle surveillance, record the target constantly, file false reports with police or employers, disrupt the target’s work or relationships, and spread local rumours. To put simply, they allow a single person to be systematically harassed by dozens of individuals on a daily basis.
Tier 5 – Affiliated Research Institutions and Emerging Technologies
Federally funded laboratories, private research consortia, and the global network of engineers and scientists (DARPA, IARPA, MITRE Corporation, Johns Hopkins Applied Physics Laboratory, RAND Corporation, and associated university consortia) that design, prototype, and validate next-generation surveillance and control systems, including neural interfaces, bio-digital nanosensors, quantum-enhanced tracking, autonomous decision-making swarms, emotion and cognition detection, and direct human-machine integration, for subsequent transfer to Tier 1 contractors and operational deployment.
Below are the main entities (global contractors, national firms, and civilian-level organisations) that now hold routine, legal access to the same restricted intelligence streams and routinely deploy them against ordinary citizens. 

             Tier 1: The Five eyes Collection Alliance (2025)   

The Five agencies listed below are the only entities on Earth that retain direct, unrestricted, bulk-access taps to the global communications infrastructure, including the planetary internet backbone, undersea fiber-optic cables, satellite uplinks, and microwave relay networks (tall, line-of-sight radio towers equipped with large dish antennas that transmit high-volume data 20–50 miles per hop; distinct from cellular towers. many originally constructed with built-in NSA access points. Still actively maintained and upgraded in 2025 for classified traffic that bypasses commercial fiber networks). All other actors in the surveillance and targeting ecosystem (Palantir, Booz Allen Hamilton, NSO Group, Black Cube, Kroll, local fusion centers, private security firms, InfraGard members, etc.) operate downstream and receive only the data that Tier 1 deliberately releases or launders.

Member agencies
1. National Security Agency (NSA) – United States
2. Government Communications Headquarters (GCHQ) – United Kingdom
3. Communications Security Establishment (CSE) – Canada
4. Australian Signals Directorate (ASD)
5. Government Communications Security Bureau (GCSB) – New Zealand
Under the current Five Eyes signals-intelligence sharing agreements (updated 2019–2025 and internally referred to as “Olympic Rules”), any data collected by one agency is instantly available to all five without warrants, minimization procedures, or national legal restrictions. This layer remains the sole origin point of raw global bulk collection. Everything beneath it exists to process, repackage, and act on that feed. Tier 1 is the source. The rest of the pyramid is execution.

National Security Agency (NSA) – United States

The NSA maintains the largest raw signals-intelligence apparatus on Earth. In 2025 it continues to operate direct bulk-collection programs (UPSTREAM, MYSTIC/SOMALGET successors, XKEYSCORE, QUANTUM) from facilities including the Utah Data Center, the new Texas Cryptologic Center, Fort Meade, Menwith Hill (UK), Pine Gap (Australia), and Yakima Research Station. It is the primary originator of the global feed that every downstream contractor and partner ultimately relies on.
NSA Official https://www.nsa.gov/
NSA https://en.wikipedia.org/wiki/National_Security_Agency


Government Communications Headquarters (GCHQ) – United Kingdom

GCHQ runs the world’s most extensive cable-tapping operation (TEMPORA and its 2025 successors) across more than 200 transatlantic and European fibers. Additional bulk collection flows through the Midlands Integration Centre (Scarborough), Morwenstow, and the JTRIG effects division. GCHQ is the Five Eyes’ leading innovator in online covert action and narrative-shaping capabilities.
GCHQ Official https://www.gchq.gov.uk/
GCHQ https://en.wikipedia.org/wiki/GCHQ

Communications Security Establishment (CSE) – Canada

CSE serves as the northern collection hub and primary biometric-fusion node for the alliance. The Edward Drake Building in Ottawa ingests and processes North American bulk metadata in real time while programs like LEVITATION and EON BLUE provide continuous device and geolocation tracking across the continent.
CSE Official https://www.cse-cst.gc.ca/en
CSE https://en.wikipedia.org/wiki/Communications_Security_Establishment

Australian Signals Directorate (ASD)

Under the $10 billion REDSPICE expansion (2023–2028), ASD has become the Indo-Pacific collection powerhouse. Pine Gap, Shoal Bay, and the new continental microwave ring give it direct tasking authority over NSA satellite and cable platforms in the region, making Australia the indispensable southern anchor of the Five Eyes network.
ASD Official https://www.asd.gov.au/
ASD Austraian Signals Directorate https://en.wikipedia.org/wiki/Australian_Signals_Directorate

Government Communications Security Bureau (GCSB) – New Zealand

Despite its small size, GCSB operates the critical Waihopai and Tangimoana stations that vacuum the entire South Pacific. In 2025 it quietly functions as the alliance’s primary data-laundering point: raw NSA collection is re-labeled as “New Zealand–origin” at GCSB facilities so Tier 2 contractors and foreign partners can legally ingest it without violating U.S. restrictions.
GCSB Official https://www.gcsb.govt.nz/
Government Communications Bureau Security https://en.wikipedia.org/wiki/Government_Communications_Security_Bureau




AMERICA'S SURVEILLANCE STATE - FULL DOCUMENTARY
https://www.youtube.com/watch?v=nAmU5eQBrUU
"We live in the United States of Surveillance – with cameras positioned on every street corner and much more invisible spying online and on the phone. All of this is not happening by accident – well funded powerful agencies and companies are engaged in the business of keeping tabs on what we do, what we say, and what we think. America has become a Surveillance-Industrial State where everyone’s business has become its business, and where one huge US intelligence Agency has been given the sanction and unlimited amounts of money to spy on the whole world."


Five Eyes: How the multinational spy network has grown since 9/11
https://www.youtube.com/watch?v=3m6thvZQMSg
Born out of the Cold War, Five Eyes is a multinational spy network comprised of Canada, Australia, New Zealand, Great Britain, and the United States. The member states of Five Eyes gather intelligence about foreign countries, sharing it freely between themselves.

PRISM Whistleblower — Edward Snowden in his own words
https://www.youtube.com/watch?v=3P_0iaCgKLk
For the past week, the Guardian and Washington Post have been reporting on some extraordinary revelations about previously secret massive NSA surveillance programs that invade the privacy of both Americans and those abroad. On Sunday, the whistleblower and source to the stories about the PRISM surveillance program revealed himself as 29-year-old Edward Snowden. This is his story, in his own words.

Legislation gives spy agencies mandate to spy on Kiwis
https://www.youtube.com/watch?v=cHqTl0_sEj4
Legislation giving the country's spy agencies an explicit mandate to spy on New Zealanders has been introduced to Parliament. RNZ political editor Jane Patterson joins Checkpoint.

1. The Johns Hopkins Foreign Affairs Symposium Presents: The Price of Privacy: Re-Evaluating the NSA
https://www.youtube.com/watch?v=kV2HDM86XgI
The Price of Privacy: Re-Evaluating the NSA, A Debate This year's Presidential Event was a debate between General Michael Hayden, former director of the CIA and NSA, and Dr. David Cole, Georgetown professor of constitutional law. With the prompting and critical questioning of CBS News chief White House Correspondent Major Garrett, both participants debated the constitutionality of the NSA, and the appropriate balance between personal privacy and national security.

2. "We kill people based on metadata' - General Hayden 2014
https://www.youtube.com/watch?v=OcG3M16lgAI
"A short clip from the debate above where General Michael Hayden explicitly comments.." We Kill People based on Metadata"

                               Tier 2: Apex Contractors
                                   (some of the most prominent examples)

Palantir Technologies

Palantir Technologies is a data-analytics and software company co-founded in 2003 by Peter Thiel, with early seed funding provided by the Central Intelligence Agency’s venture capital arm, In-Q-Tel. The company specializes in building platforms that fuse vast, siloed datasets—ranging from classified government intelligence feeds to private financial records and social media activity—to create a unified operational picture used for generating "predictive threat profiles."

Palantir operates two primary platforms tailored to different markets:

Gotham Platform (Government & Defense): The flagship product used by the intelligence community, military, and law enforcement. It provides the infrastructure for operations such as tracking individuals for immigration enforcement (ICE deportations), analyzing drone footage for the Department of Defense (Project Maven), and managing watchlists like the Terrorist Screening Database (TSDB).
Foundry Platform (Commercial & Industrial): This platform adapts Gotham's core data integration capabilities for private-sector clients, optimizing complex systems in supply chain management, manufacturing, and finance (including a role in the UK’s National Health Service data platform).

The company faces ongoing scrutiny regarding its operations and impact on civil liberties:
Transparency and Due Process: Critics argue that the non-transparent nature of Palantir’s algorithms creates a lack of due process, as individuals may face significant consequences (e.g., travel denials, professional blacklisting) based on AI-generated threat scores without judicial review.
Parallel Construction Allegations: Palantir is frequently accused of facilitating "parallel construction," a controversial technique that allegedly allows law enforcement to disguise the original, often warrantless, sources of intelligence data to bypass constitutional protections.
Ethical Debate: While CEO Alex Karp maintains an ethical stance by vetting clients and refusing work with regimes that abuse human rights, critics argue that the core application of the software fundamentally threatens individual privacy and democratic stability.
Palantir is widely viewed as a central intelligence engine feeding the interconnected private-public surveillance ecosystem.

Palantir Official

https://www.palantir.com/
Palantir Technologies
https://en.wikipedia.org/wiki/Palantir_Technologies
Six arrested at protest of Palantir, tech company building deportation software for Trump admin
https://www.theguardian.com/us-news/2025/jun/26/trump-palantir-protest-arrests
Peter Thiel’s Palantir poses a grave threat to Americans
https://www.theguardian.com/commentisfree/2025/jun/30/peter-thiel-palantir-threat-to-americans
Palantir, Seemingly Everywhere All at Once
https://passblue.com/2025/10/12/palantir-seemingly-everywhere-all-at-once/
When the government can see everything: How one company – Palantir – is mapping the nation’s data
https://theconversation.com/when-the-government-can-see-everything-how-one-company-palantir-is-mapping-the-nations-data-263178
What Does Palantir Actually Do? No HYPE, Just FACTS.
https://www.youtube.com/watch?v=DV1qF7AI7Jo

The REAL Story Behind Palantir's Dystopian Pre-Crime Takeover (w/ Whitney Webb)
https://www.youtube.com/watch?v=q3DFZFoJC5s

Whitney Webb traces the origins of the mass surveillance company Palantir's rise to power, starting with their ties to the main operators of the Iran Contra scandal — specifically the godfather of modern surveillance, John Poindexter, and the "Total Information Awareness" project he headed in the wake of the 9/11 attacks.

Booz Allen Hamilton

Booz Allen Hamilton is the largest private holder of U.S. Top Secret/SCI clearances in existence. As of 2025, more than 23,000 of its employees hold active clearances – a number that exceeds the entire workforce of the Central Intelligence Agency. The firm has been physically embedded inside NSA headquarters at Fort Meade, Maryland, for over three decades and remains the primary contractor for the agency’s most sensitive data-fusion, analytics, and cloud-migration programs.

Key operational roles in the privatised surveillance ecosystem:
- Designs, operates, and maintains NSA’s core signals-intelligence analytics platforms, including systems that ingest and cross-reference bulk metadata and content from programs such as UPSTREAM and MYSTIC.
- Manages critical portions of the U.S. government’s watchlisting architecture, including the Terrorist Identities Datamart Environment (TIDE), the master database that feeds the Terrorist Screening Database and no-fly lists.
- Supplies thousands of on-site personnel who work alongside uniformed NSA staff, writing the queries and algorithms that determine which individuals enter the permanent targeting pipeline.
- Repackages and resells sanitized versions of these capabilities to state and local fusion centers, select foreign partners, and corporate “insider-threat” programs under commercial contracts.

This deep integration allows raw, warrantless intelligence to flow seamlessly from classified systems into private and local law-enforcement channels "the textbook definition of parallel construction on an industrial scale" while maintaining complete legal and operational deniability.
 Despite Edward Snowden being a Booz Allen employee when he exposed global mass surveillance in 2013, and despite subsequent breaches and scandals, the firm’s intelligence-division revenue and clearance count have only increased. Booz Allen Hamilton is not simply a contractor; it functions as the private nervous system of the National Security Agency and a cornerstone of the entire Five Eyes data-fusion apparatus.

Booz Allen Hamilton

https://en.wikipedia.org/wiki/Booz_Allen_Hamilton
Boozallen Official
https://www.boozallen.com/
How Booz Allen Hamilton Quietly Took Over U.S. Intelligence
https://www.youtube.com/watch?v=vRAFDHmD8ys
Behind America’s wars, surveillance, and secret operations is a company you’ve probably never heard of—Booz Allen Hamilton. From the Pentagon to the CIA to the NSA, Booz Allen isn’t just a contractor—they’re embedded at the very heart of U.S. intelligence. This video breaks down how they won billion-dollar contracts, shaped U.S. surveillance, survived scandals like Snowden, and became one of the most powerful players in national security. Who really runs U.S. intelligence—the government or its shadow partners?

NSO Group (Israel)

NSO Group Technologies, founded in 2010 in Israel, develops and sells Pegasus: the world’s most advanced zero-click spyware. Marketed exclusively to governments for counter-terrorism and serious crime, Pegasus silently infects iOS and Android devices via exploits in iMessage, WhatsApp, and other common apps. Once installed, it grants total remote access: encrypted messages, calls, location history, photos, microphone, and camera activation on demand.
Key functions in the pyramid:

- Supplies turnkey device-compromise capability to state clients and approved subcontractors.
- Feeds harvested data into broader intelligence fusion and watchlisting systems.
- Enables fully deniable, warrantless surveillance that bypasses encryption worldwide.
Despite Israeli MoD export oversight claims, Pegasus has been repeatedly documented targeting journalists, activists, lawyers, opposition figures, and human-rights defenders across 50+ countries (Amnesty International, Citizen Lab, Pegasus Project). Remains on U.S. Entity List since 2021. 2025 U.S. federal court outcomes: found liable for 1,400 illegal infections, ordered to pay $167M+ in damages, and permanently enjoined from attacking WhatsApp.NSO Group is the premier privatised provider of undetectable phone takeover and a cornerstone of Tier 1 offensive surveillance capabilities.

NSO Group Official

https://www.nsogroup.com/
NSO Group
https://en.wikipedia.org/wiki/NSO_Group
Amnesty Int’l Calls for Moratorium on Private Spyware After Israeli NSO Group Pegasus Revelations
https://www.youtube.com/watch?v=6f8qE70j-bc
Calls are growing for stricter regulations on the use of surveillance technology after revelations that countries have used the powerful Pegasus spyware against politicians, journalists and activists around the world. The Pegasus software, sold by the Israeli cybersecurity company NSO Group, can secretly infect a mobile phone and harvest its information. While the company touts Pegasus as intended for criminals and terrorists, leaked data suggests the tool is widely abused by governments to go after political opponents and dissidents, according to reporting from The Pegasus Project, an international consortium of 17 media organizations.

The World’s Most Terrifying Spyware | Investigators
https://www.youtube.com/watch?v=QX7X4Ywuotc
Israeli cyber-surveillance company NSO Group’s Pegasus malware has reportedly been used in at least 45 countries worldwide to infect the phones of activists, journalists, and human rights defenders. This terrifying software can infiltrate your smartphone, collect your data and even listen to you... all without your knowledge. A huge leak in July 2021, revealed 50,000 phone numbers that had been targeted; including president of France Emmanual Macron, and friends of the family of Saudi journalist Jamal Kashoggi in the lead up to his murder in 2018.

The TRUTH Behind the Israeli Pegasus NSO Group (w/ Antony Lowenstein)
https://www.youtube.com/watch?v=-3ODeYuxBHk

Candiru / Paragon (Israel)

Candiru is an Israeli technology company founded in 2014 by former members of Unit 8200 and the NSO Group. The company specializes in the development of sophisticated, mercenary-grade spyware designed for government clients.
Key aspects of Candiru's operations and controversies include:

Spyware Capabilities: Candiru developed "zero-click" spyware, later rebranded as Graphite, which can infect iOS and Android devices without user interaction, often via iMessage vulnerabilities, malicious links, or network injection. Once installed, the spyware grants full remote access to a device's data, communications, microphone, camera, and location.
Client Base and Misuse: The company markets its technology exclusively to vetted "democratic" governments for lawful law-enforcement and national security purposes. However, independent investigations by organizations like Microsoft and Citizen Lab (2021-2025) have repeatedly linked the spyware's use to the surveillance of journalists, human rights activists, political figures, and dissidents across more than 35 countries.
U.S. Sanctions and Rebranding: Due to enabling human rights abuses, Candiru was added to the U.S. Department of Commerce Entity List in July 2021, effectively blacklisting the company. In response, the firm underwent several rebrands and corporate restructurings—using names like Paragon Solutions and Paragon Graphite—to continue operations and secure new investments and government contracts, including a $2 million contract reactivated by U.S. Immigration and Customs Enforcement (ICE) in September 2025.
Ongoing Monitoring: Organizations like Amnesty International and Access Now continue to document active infections of the Graphite spyware targeting civil society representatives as recently as August 2025.


Candiru / Saito Tech
https://dimse.info/candiru/
Candiru Spyware Company
https://en.wikipedia.org/wiki/Candiru_(spyware_company)

BAE Systems (UK/US)

BAE Systems is a British multinational defense, security, and aerospace company formed in 1999 from the merger of British Aerospace and Marconi Electronic Systems. The firm operates globally, with major footprints in the United States and Australia, employing over 90,000 people and generating substantial annual revenue primarily from the sale of military electronics, intelligence systems, and surveillance technology.
Key capabilities and areas of operation include:
Technology Development: BAE Systems develops advanced Intelligence, Surveillance, and Reconnaissance (ISR) platforms. This includes systems like the Network Tactical Common Data Link (NTCDL) for real-time data sharing, the AI-driven Insight platform for multi-sensor threat prediction, and the Evident suite of cyber-surveillance tools designed for the mass interception and decryption of electronic communications.
Global Sales and Scrutiny: While the company markets its technology as "ethical" solutions for national defense, it has faced consistent scrutiny for selling arms and surveillance technology to regimes with documented human rights concerns. Reports from organizations like Action on Armed Violence (2024) note sales to at least 13 countries on the UK’s human rights watchlist, including Saudi Arabia and Egypt.
Notable Controversies: Investigations, such as a 2017 BBC report, detailed the supply of Evident surveillance systems to Middle Eastern states accused of using the technology to suppress activists and dissidents following the Arab Spring. Historically, the company has also faced significant allegations regarding bribery and slush funds related to large arms deals with Saudi Arabia.
Current Contracts: The company remains a critical Tier 1 provider for U.S. and allied militaries, securing ongoing contracts worth millions of dollars for essential defense technology, including data links for the U.S. Navy and AI analytics for the Air Force.


BAE Systems Official
https://www.baesystems.com/en
BAE Systems
https://en.wikipedia.org/wiki/BAE_Systems



How BAE sold cyber-surveillance tools to Arab states - BBC News
https://www.youtube.com/watch?v=u7eT-FboQIk
A year-long investigation by BBC Arabic and a Danish newspaper has uncovered evidence that the UK defence giant BAE Systems has made large-scale sales across the Middle East of sophisticated surveillance technology, including to many repressive governments. These sales have also included decryption software which could be used against the UK and its allies.

L3Harris Technologies: A large aerospace and defense company with $21.8 billion in annual revenue. L3Harris (and its predecessor Harris Corporation) is the original designer and primary manufacturer of the Stingray family of cell-site simulators (IMSI-catchers) used by the FBI, DEA, DHS, ICE, and hundreds of local police departments to conduct warrantless mass phone tracking on entire neighborhoods. The company also builds HADES high-altitude spy planes, ROVER battlefield video links, and advanced cyber-exploitation tools for the Five Eyes intelligence alliance.

L3 Harris Official
https://www.l3harris.com/
L3 Harris
https://en.wikipedia.org/wiki/L3Harris


How StingRay cellphone surveillance devices work
https://www.youtube.com/watch?v=5HF1qzl_xo0
The Department of Homeland Security has detected what appeared to be the use of a controversial cellphone surveillance technology in D.C.

World Leading ISR Technologies | L3Harris
https://www.youtube.com/watch?v=Ny84Jh1x5OM
L3Harris Greenville, Texas shares a history of almost 70 years, spearheading innovations to serve our nation, our military and its allies. We deliver integrated solutions for the global Intelligence Surveillance and Reconnaissance (ISR) market and provide system design modernization, upgrade and sustainment for a wide variety of aircraft and ground systems.

NYT: L3Harris pursues deal with U.S. blacklisted spyware company
https://www.youtube.com/watch?v=vGnELHwcurs
According to the New York Times, a team of executives from military contractor company, L3 Harris, which has offices in Rochester, recently made several quiet trips to Israel to pursue a deal to purchase a cyber hacking firm called NSO Group.

https://www.rochesterfirst.com/news/business/nyt-l3harris-pursues-deal-with-u-s-blacklisted-spyware-company/
SAIC (Science Applications International Corporation) A publicly traded U.S. defense and intelligence contractor with approximately $8.3 billion in annual revenue (2025). SAIC provides large-scale data-integration and analytics services to the NSA, FBI, DHS, and other agencies, fusing raw signals-intelligence feeds with commercial and open-source data to produce predictive risk profiles, and watchlists. The company has faced repeated enforcement actions, including a 2025 settlement with the Department of Justice for defective pricing on Army contracts, earlier multi-million-dollar False Claims Act resolutions, and export-control violations that resulted in unauthorized transfers of sensitive technology. These incidents have raised concerns about cost overruns borne by taxpayers and increased risks to data security for individuals whose information passes through SAIC-managed systems.

SAIC Official
https://www.saic.com/
Science Applications International Corporation
https://en.wikipedia.org/wiki/Science_Applications_International_Corporation

Peraton A publicly traded U.S. contractor with approximately $7.5 billion in annual revenue (2025). Peraton provides large-scale data-integration, cyber, and mission-support services to the NSA, NRO, DHS, and other federal agencies, combining government signals-intelligence feeds with commercial and open-source data to produce analytical products, risk assessments, and watchlist entries. The company has been the subject of multiple False Claims Act settlements, Foreign Corrupt Practices Act investigations, and privacy-related litigation, resulting in financial penalties and concerns over cost overruns borne by taxpayers as well as risks to individual privacy and accuracy in government decision-making processes.

Peraton
https://www.peraton.com/
Peraton
https://en.wikipedia.org/wiki/Peraton

Commercial Security Service Providers & ISPs – The Private Pipeline

These entities are not conventional government contractors, yet they occupy a critical position in the surveillance architecture by providing direct, warrantless access to communications traffic, metadata, location records, and physical security feeds. Under classified programs such as PRISM, UPSTREAM, and TEMPORA, as well as national-security letters and statutory immunity provisions, telecommunications carriers and security-service providers are both legally compelled and financially compensated to deliver raw data to Tier 0 agencies in real time. This cooperation transforms ostensibly private infrastructure into an extension of state intelligence collection, enabling bulk ingestion that is subsequently fused and operationalised by Tier 1 contractors.

Representative examples include:

- Telecommunications carriers: Verizon, AT&T, BT, Vodafone, Level 3 Communications, Spark NZ, Telstra, Singtel
- Commercial security providers: ADT, Securitas, Allied Universal (special missions division), G4S Secure Solutions
- Cloud infrastructure hosts: Amazon Web Services (AWS) GovCloud, Microsoft Azure Government, Google Cloud
Their systematic participation ensures that the pyramid’s reach is comprehensive, continuous, and effectively unaccountable to ordinary judicial oversight.

NSA Prism program taps in to user data of Apple, Google and others
https://www.theguardian.com/world/2013/jun/06/us-tech-giants-nsa-data
PRISM
https://en.wikipedia.org/wiki/PRISM
Unprecedented and Unlawful: The NSA’s 'Upstream' Surveillance
https://www.aclu.org/news/national-security/unprecedented-and-unlawful-nsas-upstream
BT and Vodafone among telecoms companies passing details to GCHQ
https://www.theguardian.com/business/2013/aug/02/telecoms-bt-vodafone-cables-gchq
The Battle Over Compelled Data Sharing
https://theprivacyissue.com/government-surveillance/battle-compelled-data-sharing
GCHQ taps fibre-optic cables for secret access to world's communications
https://www.theguardian.com/uk/2013/jun/21/gchq-cables-secret-world-communications-nsa


Upstream Surveillance (Under Section 702 of the FISA Amendments Act)
https://www.youtube.com/watch?v=g0lDKVqhwZM
The National Security Agency (NSA), the Foreign Intelligence Surveillance Act (FISA), the FISA Amendments Act (FAA), section 702, 50 U.S.C. § 1881a
AT&T Gave NSA a Billion Cell Phone Records a Day
https://www.youtube.com/watch?v=HRDzwLT6sGA
Telecom giant AT&T pioneered a data collection program that gathered hundreds of billions of Internet records for the National Security Agency.

The Nsa Prism Surveillance Program In One Minute | TIME
https://www.youtube.com/watch?v=2O9F7Oq2_70
TIME provides a run-down of the significant statistics for the National Security Agency PRISM surveillance program

PRISM: Why the NSA is Mining Internet Data
https://www.youtube.com/watch?v=hvMKFTBMmJM
The NSA has been obtaining information from the servers of major websites such as Google and Facebook for years! The Washington Post recently made public the classified "PRISM" program, and Annie has all the details. She takes a look at what the program is, what websites were being targeted, and whether or not you should be worried.

The GCHQ Tempora Program
https://www.youtube.com/watch?v=9p231YWX1qM
Tempora is the codename for a secret data gathering operation run by Britain's Government Communications Headquarters (GCHQ). Documents released by whistleblower Edward Snowden reveal that Tempora surpasses even the American Prism program in scope. Never before in the history of the world has a government had so much information about their citizens at its fingertips!

                                  Tier 3: Private Operators
                                        (some of the most notorious examples)

Black Cube

Black Cube Founded in 2010 by former Mossad and Unit 8200 officers Dan Zorella and Avi Yanus, Black Cube is a private intelligence firm headquartered in Tel Aviv with offices in London, Madrid, and Paris. Employing over 100 ex-Israeli intelligence veterans, it specializes in corporate espionage, asset recovery, litigation support, and reputation management for high-net-worth clients, including oligarchs, corporations, and governments. Annual revenue estimated at $150–$250 million (2025), with no public contracts or regulatory oversight.

Key activities and documented controversies include:
Operational Tactics: Black Cube utilizes former intelligence operatives to execute its missions. Signature tactics involve the use of fake identities, covert recordings, fabricated evidence, and disinformation campaigns to achieve client objectives. Operatives have reportedly used diplomatic passports and fake NGOs as cover.
High-Profile Clientele and Misuse: The firm has been hired by high-profile clients for controversial tasks, notably by Harvey Weinstein to silence his accusers. Other clients have used their services to stalk journalists, intimidate rivals, and conduct smear campaigns against anti-corruption prosecutors in Romania and FIFA rivals in Qatar.
Lack of Oversight: Black Cube operates with zero public contracts and no formal oversight, maintaining total deniability for its operations.
Recent Cases: Documented cases from 2023-2025 involve targeting UK climate activists on behalf of oil majors, running psychological operations against German journalists investigating arms deals, and working for a U.S. hedge fund to derail a short-selling campaign.
Black Cube acts as a privatized provider of corporate intelligence and influence operations, operating outside traditional oversight channels.

Black Cube Official
https://www.blackcube.com/
Black Cube
https://en.wikipedia.org/wiki/Black_Cube
Meta Bans Black Cube and Other ‘Cyber Mercenaries’ from its Platforms
https://www.occrp.org/en/news/meta-bans-black-cube-and-other-cyber-mercenaries-from-its-platforms
Playtech defends Black Cube investigation, Evolution calls it a ‘defamatory smear campaign’
https://igamingbusiness.com/legal-compliance/evolution-playtech-black-cube-smear-campaign/
LinkedIn says spy firm targeted Hungarian activists, journalists before 2022 election
https://www.reuters.com/technology/cybersecurity/linkedin-says-spy-firm-targeted-hungarian-activists-journalists-before-2022-2023-11-10/
California attorney tried to hire Black Cube hackers to smear judge, state bar alleges
https://therecord.media/california-attorney-alleged-hacker-for-hire
Harvey Weinstein’s Army of Spies
https://www.newyorker.com/news/news-desk/harvey-weinsteins-army-of-spies
Israel Defence Ministry hired controversial spy firm Black Cube
https://www.middleeastmonitor.com/20190822-israel-defence-ministry-hired-controversial-spy-firm-black-cube/

The Shady Business of Espionage - Black Cube Israeli Intelligence Company
https://www.youtube.com/watch?v=lnSxvWotEIE

This video delves into the enigmatic world of Black Cube, an Israeli intelligence company known for its clandestine operations and controversial methods. It highlights Black Cube's involvement in high-profile cases such as the Harvey Weinstein scandal and its government contracts, including espionage on behalf of the Hungarian government. The report discusses the firm's methods, which range from cyber espionage to surveillance, and examines the ethical dilemmas it raises. Despite its controversies, Black Cube has amassed considerable wealth and influence, reflecting the complex landscape of modern espionage.
BLACK CUBE - DARKNET OF SPIES (Private Intelligence,Mossad,Harvey Weinstein,Ronan Farrow)
https://www.youtube.com/watch?v=p5CkKtMpFNU
Black Cube a private intelligence agency made up of ex israeli mossad agents and form one organization in a number of mystery organizations that form a network and darknet of spies. Black cube the israeli intelligence agency has been involved in a number of scandals including that of spying on Laura Kovesi in Romania where agents were arrested, being hired by harvey Weinstein to gather information on accusers, such as Rose Mcgowan to also being involved in spying to undermine the Iran Nuclear deal of the Obama administration. There methods include using false identities, setting up fake recruitment firms and businesses to cover false identities, hacking, intimidation and political espionage. 

Kroll Inc.

Kroll Inc. is a global risk consulting firm founded in 1972 by Jules Kroll as a corporate fraud investigation service, now a subsidiary of Duff & Phelps (acquired by private-equity firm EQT in 2018). Headquartered in New York with over 70 offices worldwide, the company employs thousands of former intelligence and law-enforcement personnel, delivering services such as due diligence, investigations, cyber risk management, and asset recovery to major corporations, banks, law firms, and governments. Annual revenue exceeds $2.5 billion (2025), with operations conducted under minimal regulatory oversight and no public contracts, emphasizing client confidentiality and deniability.

Core operations
Kroll provides "strategic intelligence" services including surveillance, pretexting, infiltration, parallel construction (feeding intelligence to law enforcement via backchannels to obscure origins), and disinformation to support litigation, compliance, and reputation management. Marketed as ethical risk mitigation, these tactics enable deniable corporate espionage and influence operations for clients in high-stakes disputes, often leveraging ex-spy networks for real-world execution.

Kroll Official
https://www.kroll.com/en
Kroll
https://en.wikipedia.org/wiki/Kroll_Inc.
Kroll Hit With Class Suit Over 2023 FTX Bankruptcy Data Breach
https://news.bloomberglaw.com/bankruptcy-law/kroll-hit-with-class-suit-over-2023-ftx-bankruptcy-data-breach
Kroll hit with class action over FTX data breach
https://www.mitrade.com/insights/news/live-news/article-3-1061333-20250822
Chevron Outed for Corporate Espionage Spy Scandal in Ecuador's Amazon Rainforest
https://chevroninecuador.org/news-and-multimedia/2010/0803-chevron-outed-for-corporate-espionage-spy-scandal
Who are Kroll, the investigators brought in to run rule over National Children’s Hospital?
https://www.irishtimes.com/politics/2023/07/18/who-are-kroll-the-investigators-brought-in-to-run-rule-over-national-childrens-hospital/
Welcome to the murky world of Kroll Inc – the private CIA
https://www.smh.com.au/business/welcome-to-the-murky-world-of-kroll-inc-the-private-cia-20050625-gdlkpn.html

DoD Signature Reduction Program

The U.S. Department of Defense (DoD) operates a classified initiative officially known as the Signature Reduction Program. A Newsweek investigation in May 2021 exposed this as a secret "army" of approximately 60,000 active-duty personnel. This force is ten times larger than the CIA's clandestine service and is trained to operate under fabricated civilian identities both domestically and internationally.

Key aspects and alleged operations of the program include:
Cover Identities: Operatives utilize sophisticated cover methods, including forged official documents (driver’s licenses, credit cards, utility bills), fabricated social media histories, and private-sector cover jobs created through shell companies.
Mission Units: Personnel are drawn from elite units, including remnants of the Army's Asymmetric Warfare Group, Navy SEALs, Air Force special operations, and Marine Raiders.
Controversial Missions (Alleged): Leaks from 2021-2025 allege involvement in controversial activities, including domestic surveillance and asset recruitment on U.S. soil (which is typically illegal for the military), online influence operations, psychological operations against targets, and physical infiltration of workplaces and neighborhoods.
Lack of Oversight: The program reportedly operates with zero public budget lines, zero congressional oversight, and is exempt from Freedom of Information Act (FOIA) requests, providing the Pentagon with highly deniable operational capabilities.
The program functions as a deniable, "privatized" force that executes intelligence operations that originate from Tier 1 intelligence flags.

Pentagon reportedly running secret army of 60,000 around the world

https://nypost.com/2021/05/18/pentagon-reportedly-running-secret-global-army-of-60000/
The US National-Security State Has an Invisible Army
https://jacobin.com/2021/06/us-signature-reduction-program-william-arkin-interview
US Pentagon’s ‘secret army’ of clandestine operatives dwarfs CIA spy force: report
https://intelnews.org/tag/us-dod-signature-reduction-program/
US military running a massive undercover army and conducting warrantless surveillance of Americans
https://www.wsws.org/en/articles/2021/05/22/cong-m22.html
Directive 5240.01: A Threat to American Liberty
https://americarenewing.com/issues/directive-5240-01-a-threat-to-american-liberty/

The Pentagon's Secret Army: Pentagon operates 60,000-strong secret force | Latest English News
https://www.youtube.com/watch?v=94BKN43B8pY
The Pentagon has created a huge secret army of about 60,000 people over the past 10 years.
Pentagon reportedly running secret army of 60,000 around the world | New York Post
https://www.youtube.com/watch?v=1cK3L_hqYYA

The Pentagon is running a 60,000-strong secret army made up of soldiers, civilians and contractors, who travel the world under false identities embedded in consultancies and name-brand companies — without the knowledge of the American people or most of Congress — according to a report. The top-secret army was created by the Pentagon over the past 10 years as part of a program called “signature reduction,” and operates both domestically and internationally using a low-profile force of clandestine warriors who sometimes wear civilian clothes as they carry out their assignments,

The Anonymous Shell Network

The Anonymous Shell Company Network is a documented global web of thousands of limited-liability companies with no real offices, employees, or business activity. They are registered in secrecy-friendly jurisdictions such as the United States (especially Delaware), British Virgin Islands, Cayman Islands, Panama, Cyprus, Seychelles, Belize, and dozens of others. These shells serve as cut-outs for intelligence agencies (U.S. DoD/CIA/NSA, UK MI6/GCHQ, Israeli Unit 8200, Russian GRU, Chinese MSS, and others) and their private contractors. Investigative leaks (Pandora Papers, Paradise Papers, FinCEN Files) and FOIA releases between 2021 and 2025 show they exist only to give operatives fake corporate identities, rent safe houses, win small contracts, launder money, and run surveillance with total deniability. Ownership is hidden, companies are dissolved and re-registered at will, and the network is estimated to include tens of thousands of active entities tied to classified programs worldwide.

Core operations
The shells register as ordinary commercial enterprises in sectors such as consulting, information technology, logistics, real-estate management, and import-export. In practice they perform the following functions:
- Embed former intelligence personnel into civilian workplaces, residential buildings, and social circles under the guise of legitimate employment
- Obtain administrative or physical access to private networks, facilities, and residences through routine commercial contracts
- Conduct prolonged physical and electronic surveillance while maintaining the appearance of normal business activity
- Apply parallel construction techniques to conceal the warrantless or foreign origin of collected intelligence
Dissolve the legal entity and re-register under a new name whenever scrutiny arises, thereby eliminating traceability

Note: the same route is used by the rich and famous
The exact same shell-company structure and jurisdictions that intelligence agencies use for covert operations are also the standard tool for celebrities, athletes, billionaires, and politicians to legally hide wealth, avoid taxes, and keep their purchases private. Shakira, Elton John, Jackie Chan, King Abdullah II, Tony Blair, and hundreds of others named in the Pandora Papers all used identical anonymous shells in Delaware, BVI, and Cayman. 


How anyone (spy or celebrity) gets a shell company. The 5-step process
  • The client (celebrity, corporation, or intelligence contractor) engages a registered agent or offshore service provider.
  • A generic corporate name is selected and registered in a secrecy jurisdiction.
  • Formation documents are filed with the jurisdiction’s registry; beneficial ownership is not disclosed.
  • The shell entity opens bank accounts, acquires assets, or enters contracts using the corporate name as the legal owner.
  • Annual maintenance fees are paid to the registered agent; if exposure occurs, the entity is dissolved and an identical replacement is registered under a new name.

Offshore havens and hidden riches of world leaders and billionaires exposed in unprecedented leak
https://www.icij.org/investigations/pandora-papers/global-investigation-tax-havens-offshore/
Shell Corporations Facilitate Contracting Fraud at the Department of Defense
https://www.lawfaremedia.org/article/shell-corporations-facilitate-contracting-fraud-department-defense
FACT Sheet: Anonymous Shell Companies (August 2017)
https://thefactcoalition.org/fact-sheet-anonymous-shell-companies-august-2017/
Hiding in Plain Sight: How Criminals Use Anonymous Shell Companies
https://www.fraudconferencenews.com/home/2018/6/17/breaking-the-shell
Corporate Transparency Act in Limbo: The National Security Risks of Anonymous Shell Companies
https://irregularwarfare.org/articles/corporate-transparency-act-in-limbo-the-national-security-risks-of-anonymous-shell-companies/
How tax dodging and corporate secrecy found a home in Delaware, with Hal Weitzman
https://news.uchicago.edu/how-tax-dodging-and-corporate-secrecy-found-home-delaware-hal-weitzman
How cybercriminals are using Wyoming shell companies for global hacks
https://www.reuters.com/technology/cybersecurity/how-cybercriminals-are-using-wyoming-shell-companies-global-hacks-2023-12-12/
US poised to crack down on anonymous shell companies
https://www.icij.org/investigations/paradise-papers/us-poised-to-crack-down-on-anonymous-shell-companies/

The Russian Laundromat
https://www.occrp.org/en/project/the-russian-laundromat

How money laundering works through shell companies
https://www.youtube.com/watch?v=_P222VijThE
In this video, we dive into Money laundering which is the process of disguising the origins of illegally obtained money to make it appear legitimate.

How The Wealthy Hide Billions Using Tax Havens
https://www.youtube.com/watch?v=46W5MSk-NBk
"Secrecy World" author Jake Bernstein explains how the super-wealthy hide billions using tax havens and shell companies.
The Panama Papers: Victims of Offshore
https://www.youtube.com/watch?v=F6XnH_OnpO0

The Panama Papers is a global investigation into the sprawling, secretive industry of offshore that the world's rich and powerful use to hide assets and skirt rules by setting up front companies in far-flung jurisdictions. Based on a trove of more than 11 million leaked files, the investigation exposes a cast of characters who use offshore companies to facilitate bribery, arms deals, tax evasion, financial fraud and drug trafficking.
Pandora Papers: An unprecedented leak exposes the inner workings of a shadow economy
https://www.youtube.com/watch?v=dHAtIFyDB8k

The International Consortium of Investigative Journalists' 2021 investigation the Pandora Papers reveals how the offshore money machine operates in every corner of the planet, including the world’s largest democracies.

Stratfor / RANE Network (Strategic Forecasting, Inc.)

Founded in 1996 by ex-military analyst George Friedman, Stratfor (Strategic Forecasting, Inc.) built a reputation as the “shadow CIA for corporations.” After the 2011–2012 WikiLeaks dump of 5+ million internal emails, the company rebranded and merged into RANE (Risk Assistance Network + Exchange) in 2019, keeping the same core team of ex-CIA, MI6, NSA, and State Department analysts. Headquartered in Austin, Texas, RANE now serves Fortune 500 clients, hedge funds, energy giants, and select government entities with subscription intelligence, custom dossiers, and real-time risk monitoring. 

Core operations
Although RANE (formerly Stratfor) positions its primary expertise as applied geopolitics, the 2012 WikiLeaks email dump brought to light a contentious aspect of its past operations. The leaked documents suggested that the company cultivated networks of paid human sources within various non-governmental organizations (NGOs), activist groups, trade unions, and media entities globally. These activities reportedly involved producing opposition-research dossiers, tracking protest movements, monitoring whistle-blowers, and supplying intelligence to corporate security teams and, through unofficial channels, to state agencies. The alleged methods included infiltration, paying informants, employing parallel construction techniques, and deliberate narrative-shaping campaigns

WikiLeaks StratFor dumps
https://wikileaks.org/gifiles/
Stratfor
https://en.wikipedia.org/wiki/Stratfor
Rane (formerly StratFor)  Official 
https://www.ranenetwork.com/
Wikileaks publishes confidential emails from Stratfor
https://www.bbc.com/news/world-us-canada-17176602
Coca Cola Hired Spy Firm Stratfor to Investigate PETA
http://www.greenisthenewred.com/blog/coca-cola-hired-spy-firm-stratfor-to-investigate-peta/5791/
WikiLeaks expose: Corporate giants caught spying
https://www.greenleft.org.au/2012/913/world/wikileaks-expose-corporate-giants-caught-spying
Wikileaks emails allege ‘Stratfor spied on activists’
https://theworld.org/stories/2017/05/13/wikileaks-emails-allege-stratfor-spied-activists
WikiLeaks: “Private Spies” Stratfor Helped Dow Chemical Monitor Bhopal Activists, The Yes Men
https://www.democracynow.org/2012/2/28/wikileaks_private_spies_stratfor_helped_dow
Dow paid U.S. firms to spy on Bhopal activists: WikiLeaks emails
https://www.thehindu.com/news/national/dow-paid-us-firms-to-spy-on-bhopal-activists-wikileaks-emails/article2939308.ece

JTRIG / GCHQ Effects Operations

The Joint Threat Research Intelligence Group (JTRIG) is a unit of the Government Communications Headquarters (GCHQ), the British intelligence agency. Its existence was revealed in documents leaked by Edward Snowden in 2013–2015. JTRIG specializes in online covert action, using techniques to influence, disrupt, and deceive targets in both the real and cyber worlds.

Core operations

JTRIG conducts "effects" operations to destroy, deny, degrade, and disrupt adversaries by discrediting them, planting misinformation, and shutting down their communications. These include information operations for influence or disruption, such as deploying fake accounts, fabricated content, honeytraps, and psychological pressure to shape public and individual perceptions across social media and traditional outlets. It operates the Human Science Operations Cell to apply behavioral psychology at scale and collaborates with NSA's Tailored Access Operations and Five Eyes partners.

Documented controversies and civilian impacts
Slides leaked by Snowden disclosed JTRIG's use of sexual honeytraps, DDoS attacks, and "dirty tricks" like reputation destruction and false flag operations, raising ethical concerns over bypassing legal protections by routing through foreign partners or private entities. Documented campaigns (2013–2025) include interference in foreign elections, smearing whistle-blowers and journalists, domestic perception management during protests and referenda, and disrupting Taliban communications with floods of faxes, calls, and texts. JTRIG's tools, such as the URL shortener Lurl.me for manipulating social media users during the Arab Spring and the virus Ambassadors Reception for cyber effects, have been criticized for infringing free speech and enabling imprisonment without due process. It operates under the UK Intelligence Services Act and Regulation of Investigatory Powers Act with minimal parliamentary oversight, leading to calls for greater transparency and accountability.

JTRIG Joint Threat Research Group
https://en.wikipedia.org/wiki/Joint_Threat_Research_Intelligence_Group
GCHQ JTRIG Tools and Techniques for propaganda and internet deception
https://securityaffairs.com/26635/hacking/gchq-jtrig-techniques.html
How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations
https://theintercept.com/2014/02/24/jtrig-manipulation/
Exclusive: Snowden Docs Show British Spies Used Sex and 'Dirty Tricks'
https://www.nbcnews.com/feature/edward-snowden-interview/exclusive-snowden-docs-show-british-spies-used-sex-dirty-tricks-n23091

JTRIG Tools and Techniques
https://www.documentcloud.org/documents/1217406-jtrigall/
GCHQ & NSA exposed - JTRIG
https://www.youtube.com/watch?v=JdDhkV9UzgQ

GCHQ & NSA exposed - JTRIG - Illegal activity& NSA exposed - JTRIG - Illegal activityGCHQ & NSA exposed - JTRIG - Illegal activity
Suzie Dawson.Episode 6:  Opening the Five Eyes: Deciphering JTRIG
https://www.youtube.com/watch?v=6KNVWWd2pNY
EPISODE 6 JTRIG : Suzie Dawson and Lissa Johnson, a clinical psychologist, explores JTRIG, a GCHQ unit, using Snowden-leaked documents to reveal how it uses psychological and cyber tactics to target activists and dissidents. Dawson and Johnson discuss the unethical methods used to destabilize people, highlighting how these tactics exploit psychological vulnerabilities to create chaos in targets’ lives. Johnson provides expert insight, condemning the misuse of psychological principles to manipulate and break down individuals, especially without legal oversight.

TigerSwan (US)

TigerSwan is a private security and intelligence firm founded in 2008 by James Reese, a retired U.S. Army Delta Force commander, and headquartered in Apex, North Carolina. The company specializes in global risk management, protective services, and threat intelligence for governments, corporations, and high-net-worth individuals. With approximately 86 employees and an estimated $3.5 million in annual revenue (2025), TigerSwan draws on its founder's elite special operations background to offer full-spectrum surveillance, executive protection, and counterinsurgency-style tactics adapted from War on Terror operations. It operates worldwide, with major contracts in the Middle East, Latin America, and the U.S., emphasizing its "GuardianAngel" platform for real-time situational awareness and emergency response.

Core operations
TigerSwan conducts aerial and ground surveillance, social media scraping, radio eavesdropping, and human intelligence infiltration to monitor threats. It coordinates with law enforcement for neutralization, provides asset tracking, and deploys counterinsurgency tactics, including camp infiltration and fake social media accounts, to secure infrastructure projects and high-value targets.

Documented controversies and civilian impacts (2016–2025)
Dakota Access Pipeline (2016–2017)
Energy Transfer paid TigerSwan $1.1 million to protect the pipeline. TigerSwan used drones, sent undercover agents into camps, ran fake social-media accounts that called peaceful protesters “jihadists,” and passed daily reports to police. Result: over 700 arrests, many people injured by rubber bullets, and the main camp bulldozed (2,000+ people forced out). A 2017 leak of 50,000 internal documents caused North Dakota to revoke TigerSwan’s licence and fine them. A 2025 lawsuit from the Standing Rock Sioux Tribe is still seeking over $100 million for civil-rights violations.

Selling the same tactics to other pipelines (2017–2023)
After Standing Rock, TigerSwan offered the exact same surveillance package to other oil companies (Enbridge Line 3, Keystone XL, etc.) for $500,000+ each. Result: at Line 3 in 2021 there were over 1,000 arrests and 200 injuries. 2024 documents showed TigerSwan was linked to dozens of personal doxxings that scared off many Indigenous activists.

Syria oil deal (2020–2025)
TigerSwan’s founder helped set up Delta Crescent Energy and won a $2 million U.S. government contract to protect oil fields in Syria. Result: the deal made money while half a million Kurds were displaced and $30 million in oil sales went untracked, feeding local corruption. In 2025 Congress is investigating the conflict of interest that hurt over one million Syrian refugees.


Tiger Swan
https://en.wikipedia.org/wiki/TigerSwan
TigerSwan Official
https://www.crunchbase.com/organization/tigerswan
“Leaked Documents Reveal Counterinsurgency-Style Tactics Used By Pipeline Company Security Firm”
https://theintercept.com/2017/05/27/leaked-documents-reveal-security-firms-counterterrorism-tactics-at-standing-rock-to-defeat-pipeline-insurgencies/
After infiltrating Standing Rock, TigerSwan pitched its ‘counterinsurgency’ playbook to other oil companies
https://grist.org/accountability/tigerswan-documents-dakota-access-pipeline-standing-rock-surveillance/
ANSWER Coalition statement on the unconstitutional TigerSwan and police spying campaign
https://www.answercoalition.org/answer_coalition_statement_on_the_unconstitutional_tigerswan_and_police_spying_campaign
Insecure: How A Private Military Contractor's Hiring Files Leaked
https://www.upguard.com/breaches/cloud-leak-tigerswan

Hakluyt & Company (UK) Founded in 1995 by former MI6 officers, Hakluyt provides strategic intelligence and high-level access to multinational corporations and financial institutions. Historical operations include undercover surveillance of environmental campaigners for oil majors (2001) and recent undeclared lobbying arrangements (2025). Serves as an elite, deniable bridge between Tier 1 data and corporate/political influence.

Hakluyt & Company
https://en.wikipedia.org/wiki/Hakluyt_%26_Company
How tycoons and oligarchs are pushing corporate spies out into the cold
https://www.theguardian.com/business/2024/sep/21/how-tycoons-and-oligarchs-are-pushing-corporate-spies-out-into-the-cold
Shell and Hakluyt: The Corporate Spy Story Wikipedia Barely Mentions (Part 1)
https://royaldutchshellplc.com/2025/11/28/shell-and-hakluyt-the-corporate-spy-story-wikipedia-barely-mentions-part-1/
Psy-Group (Israel) Is and Israeli firm (2015–2018) specializing in online influence operations, massive avatar networks, and targeted disinformation campaigns. Directly linked to 2016 U.S. election interference proposals (Mueller investigation), anti-BDS campus smears, and multi-million-dollar corporate defamation ops. Psy-Group was shut down in February 2018 after FBI raids and interviews, but its tactics, client list, and ex-Mossad/IDF Unit 8200 personnel simply migrated to successor firms and continue today.

Psy-Group
https://en.wikipedia.org/wiki/Psy-Group

Over 30 New York Scholars and Activists Spied on by Former Mossad Agents
https://palestinelegal.org/news/2019/2/28/over-30-new-york-scholars-and-activists-spied-on-by-former-mossad-agents

Did Russian Trolls Have Company?: New Evidence on Israel-based PSY-Group’s Possible Social Media Efforts in 2016 US Electionhttps://www.justsecurity.org/57245/russian-trolls-company-evidence-israel-based-psy-groups-social-media-efforts-2016-election/
A 'private Mossad' on campus yet no one is alarmed
https://www.dailysabah.com/columns/hatem-bazian/2019/03/12/a-private-mossad-on-campus-yet-no-one-is-alarmed

Thompson & Clark (New Zealand) Auckland-based investigations firm established by former police officers, contracted by government agencies and state-owned enterprises to monitor protest and activist groups. Exposed in 2018 for unlawful database access and infiltration operations; removed from approved supplier lists yet highlighted systemic reliance on private surveillance within Five Eyes jurisdictions.

Thompson and Clark
https://en.wikipedia.org/wiki/Thompson_and_Clark
Thompson and Clark probe - all you need to know
https://www.rnz.co.nz/news/national/378687/thompson-and-clark-probe-all-you-need-to-know

Security firm spied on politicians, activists and earthquake victims
https://www.stuff.co.nz/national/109409526/security-firm-spied-on-politicians-activists-and-earthquake-victims

Managed Service Providers (MSPs)

Managed Service Providers are private IT firms that remotely manage corporate, educational, medical, and government networks, gaining full privileged administrative access to servers, email systems, endpoints, and cloud environments through standard outsourcing contracts. Under the Third-Party Doctrine and the Stored Communications Act / CLOUD Act framework, once data resides with an MSP the original owner (i.e., the client organisation such as a school, general practitioner, employer, or hospital,)loses constitutional and statutory privacy protections, allowing intelligence agencies and law enforcement to compel production without a judicial warrant typically via National Security Letters or classified directives.

Core operations
MSPs provide IT outsourcing for monitoring, maintenance, and support, but their full access enables surveillance capabilities like installing monitoring agents, exporting logs, and granting third-party entry without user knowledge. They often subcontract for Tier-1 contractors (Palantir, Leidos, CACI) in "insider threat" programs, feeding employee data to DHS and FBI portals.

Documented controversies and civilian impacts
SolarWinds breach (2020) Russian state hackers used SolarWinds Orion software (widely managed by MSPs) to push malicious updates to 18,000+ organisations, including major U.S. government agencies. MSPs’ privileged access turned it into one of the largest supply-chain attacks in history — over $100 billion in global damage and sensitive data stolen with no warrants required.
Kaseya ransomware (2021) REvil hackers exploited Kaseya VSA software used by more than 40,000 MSPs, instantly deploying ransomware to 1,500+ downstream businesses. Because MSPs have full remote access, the attack encrypted thousands of endpoints in minutes, forced $70 million+ in ransom payments, and took hospitals and schools offline for weeks.
Ongoing MSP data sharing (2024–2025) MSPs are legally forced to hand over employee communications, location data, and monitoring logs to DHS and FBI “threat assessment” portals under secret National Security Letters and CLOUD Act orders. Microsoft alone reported 5,560 U.S. legal demands in 2024, with 35% under gag orders — enabling warrantless surveillance of millions of people in corporate, medical, and educational networks.

Managed services
https://en.wikipedia.org/wiki/Managed_services
Protecting Against Cyber Threats to Managed Service Providers and their Customers
https://www.cisa.gov/news-events/cybersecurity-advisories/aa22-131a
A 'Worst Nightmare' Cyberattack: The Untold Story Of The SolarWinds Hack
https://www.npr.org/2021/04/16/985439655/a-worst-nightmare-cyberattack-the-untold-story-of-the-solarwinds-hack
Updated Kaseya ransomware attack FAQ: What we know now
https://www.zdnet.com/article/updated-kaseya-ransomware-attack-faq-what-we-know-now/
U.S. Government Requests Most User Data From Big Tech Firms
https://www.forbes.com/sites/emmawoollacott/2024/08/28/us-government-requests-most-user-data-from-big-tech-firms/

Channel reacts to government move to strengthen MSP security
https://www.computerweekly.com/microscope/news/366621994/Channel-reacts-to-government-move-to-strengthen-MSP-security
A Practical Guide to Cybersecurity Frameworks for MSP
https://www.n-able.com/blog/a-practical-guide-to-cybersecurity-frameworks-for-msp
Data Privacy and Compliance in 2025: A Resource for Managed Service Providers
https://dropsuite.com/blog/data-privacy-compliance-2025-resource-msps/
Protecting Against Cyber Threats to Managed Service Providers and their Customers
https://www.cisa.gov/news-events/cybersecurity-advisories/aa22-131a

The Supply Chain Attack Explained | MSPs, Beware
https://www.youtube.com/watch?v=zgr5DVxxELk

The supply chain attack is among the most dangerous threats MSPs face today, and ignoring this type of threat can lead to devastating consequences.
Kaseya Ransomware Attack Explained: What You Need To Know | Breach Report
https://www.youtube.com/watch?v=RgpNY6theKg

In this week’s episode of The Breach Report, we cover one of the largest ransomware attacks in history impacting up to 1500 companies. The breach we’re talking about of course is Kaseya with a staggering ransom note of $70 million. We’ll cover the ransomware terms, the method and indicator of compromises of the attack, and how Kaseya is responding.

Digital Identity & Data Brokers (Global) The Permanent Dossier Layer

Data brokers (also known as digital-identity and data-management companies) aggregate, enrich, and resell lifelong personal profiles compiled from public records, commercial transactions, social media, device telemetry, and bulk government feeds. Operating legally as licensed data brokers or identity-verification providers, they sell these dossiers to employers, banks, landlords, insurers, law-enforcement agencies, and intelligence contractors.

Core operations
These firms maintain real-time records on billions of individuals, including birth records, addresses, relatives, employment history, credit headers, phone numbers, IP addresses, biometric hashes, and social-graph connections. They offer API-driven “risk scores,” “threat indicators,” and “identity confidence” ratings for background checks, hiring, leasing, and watchlisting, fusing open-source intelligence with restricted datasets obtained under contractual or statutory authority.

Representative firms
LexisNexis Risk Solutions, Thomson Reuters (CLEAR, Westlaw), Acxiom / LiveRamp, ID.me, Clearview AI, Experian, TransUnion TLOxp.Legal and ethical implications

They operate under the same Third-Party Doctrine framework as telecoms and MSPs:
Once data is shared or sold, constitutional privacy protections are deemed waived. Contracts with federal agencies (ICE, FBI, DHS) and Tier-1 contractors grant access to restricted government databases. Minimal consent or deletion rights for individuals; 2025 state-level privacy laws (California, Virginia) contain broad national-security exemptions.
These data brokers are the permanent, commercial backbone that turns Tier-0 collection and Tier-1 fusion into instantly buyable, lifelong dossiers — once you’re in the file, you’re in it forever.


Data Broker
https://en.wikipedia.org/wiki/Data_broker
Closing the Data Broker Loophole
https://www.brennancenter.org/our-work/research-reports/closing-data-broker-loophole

Data Brokers Are Running Wild, and Only Congress Can Rein Them In
https://www.brennancenter.org/our-work/analysis-opinion/data-brokers-are-running-wild-and-only-congress-can-rein-them

LexisNexis illegally collected and sold people's personal data, lawsuit alleges
https://www.cbsnews.com/news/lexisnexis-lawsuit-collected-sold-personal-data-immigration-advocates-allege/
Thomson Reuters CLEAR Lawsuit" – S.T.O.P. (The Surveillance Technology Oversight Project)
https://www.stopspying.org/clear

Consumer Privacy: Changes to Legal Framework Needed to Address Gaps
https://www.gao.gov/products/gao-19-621t

Data brokers raise privacy concerns — but get millions from the federal government
https://www.politico.com/news/2022/12/21/data-brokers-privacy-federal-government-00072600
Data Brokers: The Dark Industry of Selling Your Identity for Profit.
https://www.youtube.com/watch?v=uZ2l-kk5ihk
Data Brokers… a dark industry based on selling your identity for profit that is currently worth billions. When people say “data is the new oil” there’s no other industry that better illustrates this than the world of data brokers. In this video we’ll take a look at exactly how data brokers are taking your personal information and selling it off for a hefty profit… all behind your back.

Google, Surveillance, and Data Brokers: How Americans Lost Their Privacy Rights
https://www.youtube.com/watch?v=ZwtaMwdl30c

Technology journalist and data privacy expert Naomi Brockwell explains the complexities of online privacy and the ever-expanding reach of both government and corporate surveillance. The “if you've got nothing to hide, you've got nothing to fear” mindset accepted by much of the American public is, best-case scenario, a sign a great privilege and comfort and, worst-case scenario, full-blown head-in-the-sand denial of reality. Almost every device, app, and wifi network you use sends out an unimaginable amount of data all the time. Data brokers sell your information to whoever is willing to pay, and you can be sure that governments are some of their most reliable customers.

FBI Terrorist Watchlist (TSDB)

The FBI Terrorist Watchlist, formally known as the Terrorist Screening Database (TSDB), is the consolidated U.S. government blacklist maintained by the FBI’s Terrorist Screening Center since 2003. As of 2025 it contains over 1.8 million records, including roughly 8,000–10,000 U.S. persons, with nominations accepted on the lowest “reasonable suspicion” standard — often a single uncorroborated tip or family association.
Core operations
The TSDB is the master screening database disseminated to over 18,000 law-enforcement agencies, more than 500 private entities, and dozens of foreign governments. Once added, individuals face enhanced airport screenings (SSSS), border detentions, visa denials, gun-purchase blocks, financial restrictions, and possible FBI visits. Subsets include the No Fly List (~81,000 in 2023) and the broader “Handled” list. Nominations require no judicial oversight and can be made by any federal agency or foreign partner.

Documented controversies and civilian impacts
The TSDB has been ruled unconstitutional by a federal court (2019, still under appeal in 2025) for violating Fifth Amendment due-process rights, with error rates as high as 35 % and thousands of innocent U.S. citizens — disproportionately Muslim Americans and activists — suffering travel bans, job loss, family separation, and lifelong stigma without ever being told they are listed or given a meaningful way to get off. Audits show deceased people and fully cleared individuals remain on the list for years, and the system enjoys broad exemptions from the Privacy Act, making legal challenges nearly impossible.


Terrorist Screening Database
https://en.wikipedia.org/wiki/Terrorist_Screening_Database
FBI Terrorist Watchlisting Transparency Document (April 2024)
https://www.fbi.gov/file-repository/counterterrorism/terrorist-watchlisting-transparency-document-april-2024-050224.pdf
Federal judge rules FBI terrorism watchlist violates constitutional rights
https://www.nbcnews.com/news/amp/ncna1050271
Terrorist Watchlist: Nomination and Redress Processes for U.S. Persons
https://www.gao.gov/products/gao-25-108349
How did the U.S. terrorist watchlist grow to 2 million people?
https://www.youtube.com/watch?v=PKd53KSYiUw

CBS News gained special access to the people who created the U.S. terrorist watchlist 20 years ago, and to those who are now looking into reforming it.
Jeremy Scahill: Leaked U.S. Terrorist Watchlist Rulebook Reveals "Global Stop and Frisk Program"
https://www.youtube.com/watch?v=JoKpscamgKo

The Obama administration has expanded the national terrorist watchlist system by approving broad guidelines over who can be targeted. A leaked copy of the secret government guidebook reveals that to be a deemed a "terrorist" target, "irrefutable evidence or concrete facts are not necessary." Both "known" and "suspected" suspects are tracked, and terrorism is so broadly defined that it includes people accused of damaging property belonging to the government or financial institutions. Other factors that can justify inclusion on the watchlist include postings on social media or having a relative already deemed a terrorist.
Judge rules FBI terror watchlist violates Constitution
https://www.youtube.com/watch?v=3hEB75nz88I

Fox News senior judicial analyst Judge Andrew Napolitano reacts to a federal judge’s ruling that the FBI’s terror watchlist violates the Constitution.
Americans on FBI watchlist face detention, extra screenings when flying
https://www.youtube.com/watch?v=FA7zIfTg12k

ABC News' Trevor Ault tells the story of two Muslim Americans who say they were put on the FBI's terrorist screening watchlist without due process.

                                     Tier 4: Civilian End/ Street Level 
                                            (some of the primary mechanisms)

InfraGard

InfraGard is a public-private partnership between the FBI and the private sector, launched in 1996 in Cleveland and expanded nationwide after 9/11. As of December 2025 it has over 110,000 vetted members across all 50 U.S. states and several Five Eyes partner countries. The program turns ordinary corporate executives, property managers, IT staff, university officials, HOA presidents, and private-security contractors into official FBI “eyes and ears” inside workplaces, apartment complexes, campuses, and neighbourhoods. They retrieve classified briefings and a direct secure line to submit tips on anyone they deem suspicious, instantly routing those reports to fusion centres and FBI field offices for action.

Core operations
InfraGard members are background-checked by the FBI and sworn to secrecy. They receive classified threat briefings, direct access to portions of FBI watchlists, and secure portals for submitting Suspicious Activity Reports (SARs) that feed into fusion centers. Members participate in joint exercises with federal agencies and can request FBI assistance for “threat mitigation” against individuals or groups flagged within their organisations or communities. The program explicitly recruits corporate security directors, IT managers, university officials, property managers, HOA presidents, and private-security company owners.


Documented controversies and civilian impacts
Between 2018 and 2025 multiple cases have shown InfraGard members using the program to report employees, tenants, neighbours, and activists, resulting in welfare checks, workplace investigations, HR complaints, tenant evictions, and permanent entries into federal databases without judicial oversight or notification to the targeted person. There is no public membership list and no formal process for individuals to challenge or remove false reports. Members enjoy statutory immunity for reports made in “good faith.” The 2024–2025 recruitment drives specifically targeted HOA leadership and private-security firms, with webinars titled “Protecting Your Community Through Public-Private Partnership.” InfraGard effectively extends federal surveillance reach into private workplaces, apartment buildings, campuses, and residential neighbourhoods through ordinary citizens acting with official cover and zero accountability.


FBI Official Fact Sheet:
https://www.fbi.gov/file-repository/infragard_factsheet.pdf
InfraGard
https://en.wikipedia.org/wiki/InfraGard
What is InfraGard?
https://www.infragardlosangeles.org/
The Surveillance-Industrial Complex: How the American Government IsConscripting Businesses and Individuals
in the Construction of a Surveillance Society

https://www.aclu.org/sites/default/files/FilesPDFs/surveillance_report.pdf
FBI Calls “Progressive’s” InfraGard Story “Patently False,” Author Responds
https://progressive.org/latest/fbi-calls-progressive-s-infragard-story-patently-false-author-responds/
Engaging the Private Sector to Promote Homeland Security: Law Enforcement Private Security Partnerships
https://www.ojp.gov/pdffiles1/bja/210678.pdf
FBI’s Vetted Info Sharing Network ‘InfraGard’ Hacked
https://krebsonsecurity.com/2022/12/fbis-vetted-info-sharing-network-infragard-hacked/ 
MIT: World Without Walls When everything that can be recorded is recorded, our means of protecting privacy must fundamentally change.
https://www.technologyreview.com/2011/10/25/190229/world-without-walls/
The FBI Deputizes Business
https://progressive.org/magazine/fbi-deputizes-business/
FBI to Brooklyn: Watch your neighbors for us
https://nypost.com/2010/11/23/fbi-to-brooklyn-watch-your-neighbors-for-us/




InfraGard
https://www.youtube.com/watch?v=LBrk1QR3yB8
Security is a shared responsibility between the American business community and law enforcement. InfraGard members discuss how the program strengthens the protection of critical infrastructure through partnership.

FBI and the InfraGard partnership
https://www.youtube.com/watch?v=eVMFJyzcG30
FBI wants more companies, organizations, and individuals to join.

DHS / State & Local Fusion Centers

DHS / State & Local Fusion Centers are regional intelligence hubs established post-9/11 under the Department of Homeland Security (DHS) to facilitate information sharing between federal agencies and state, local, tribal, and territorial (SLTT) partners. As of 2025, there are 79 DHS-sponsored fusion centers across the U.S. (one per state plus major urban areas), serving as the primary coordinators for fusing federal intelligence with local tips to identify and respond to threats.
Core operations
Fusion centers act as clearinghouses for threat information, receiving raw intelligence from federal sources (e.g., FBI, DHS, NSA) and local inputs like Suspicious Activity Reports (SARs) from law enforcement, private partners, and the public. They analyze this data in the context of local environments, produce actionable products (e.g., bulletins, assessments), and disseminate them to over 18,000 law enforcement agencies, private entities, and community stakeholders. Centers support the Nationwide SAR Initiative by standardizing reporting, training stakeholders on "suspicious behaviors," and integrating tools like the DHS Guardian database for real-time sharing. While state- or locally-run, DHS provides $100M+ annually in grants, personnel, and technology, with centers participating in joint exercises and prioritizing counterterrorism, cyber threats, and all-crimes analysis.

Documented controversies and civilian impacts
Fusion centers have drawn intense criticism for mission creep beyond counterterrorism into routine policing, generating vast volumes of SARs (over 1 million annually by 2025, with 97% unrelated to terrorism per DHS audits) that reframes lawful activities—like photographing public spaces, attending protests, or political organizing—as potential threats, leading to unwarranted investigations, surveillance of activists, and dossiers on innocent civilians without judicial oversight. Reports from 2018–2025 document centers labeling Muslim communities, environmental groups, pro-choice/anti-abortion activists, and Tea Party supporters as "extremists," resulting in false arrests, job losses, community stigma, and First/Fourth Amendment violations. A 2022 hack exposed 296GB of records from 200+ agencies, revealing illegal data retention on non-suspects and cooperation with ICE in sanctuary cities, bypassing local laws. Centers operate with minimal federal oversight despite DHS funding, enabling biased profiling of BIPOC and dissident groups, and no redress for those wrongly flagged, as SARs are exempt from Privacy Act requirements and often shared indefinitely.

National Network of Fusion Centers Fact Sheet
https://www.dhs.gov/national-network-fusion-centers-fact-sheet
Fusion Centers' Support of National Strategies and Guidance
https://www.dhs.gov/topic/fusion-centers-support-national-strategies-and-guidance
How Fusion Centres Circumvent Sanctuary Laws
https://www.stopspying.org/deportation-data-centers
Ending Fusion Center Abuses
https://www.brennancenter.org/our-work/policy-solutions/ending-fusion-center-abuses
Fusion center
https://en.wikipedia.org/wiki/Fusion_center
How Government Fusion Centers Violate Americans’ Rights — and How to Stop It
https://www.brennancenter.org/our-work/analysis-opinion/how-government-fusion-centers-violate-americans-rights-and-how-stop-it
Why Fusion Centers Matter: FAQ
https://www.eff.org/deeplinks/2014/04/why-fusion-centers-matter-faq

Flock Safety

Flock Safety is a private surveillance company founded in 2017, specializing in automated license plate recognition (ALPR) technology deployed nationwide. As of 2025, Flock operates in over 5,000 communities across 49 U.S. states, with its network scanning more than 300 million license plates weekly through solar-powered cameras mounted on utility poles and other public infrastructure. Unlike traditional police ALPR units mounted only on patrol cars, Flock Safety installs fixed, solar-powered cameras on utility poles, traffic lights, neighborhood entrances, apartment gates, and private property, creating a permanent, always-on network that scans more than 300 million license plates every week across over 6,000 communities in 49 U.S. states. 
Core operations
Flock's core product is a cloud-based ALPR system that captures vehicle images, extracts license plates, make/model/color, and timestamps, uploading data to a centralized platform for real-time searches and hot-list alerts. The company expanded in 2025 with the Nova platform, which fuses ALPR data with commercial breach records, public sources, and predictive analytics for warrantless individual tracking, and the Raven audio detector, which identifies gunshots or "human distress" (e.g., screams) to alert police. Revenue exceeds $500 million annually, driven by subscriptions ($2,400–$3,000 per camera/year) to law enforcement, HOAs, and businesses, with integrations for 4,800+ agencies enabling cross-jurisdictional queries without user consent. Flock markets itself as a "public safety operating system," emphasizing crime reduction while sharing data with fusion centers and federal partners under client contracts.

Documented controversies and civilian impacts
Flock has faced escalating backlash for enabling mass warrantless surveillance, with 2024–2025 reports documenting misuse for tracking abortion seekers (e.g., Texas sheriff's nationwide query for a woman post-self-managed abortion, mislabeled as a "missing person" search), immigrants via ICE access (despite state bans in CA/OR), and protesters (e.g., 2025 logs from 3,900+ agencies showing hundreds of queries on 50501/Hands Off/No Kings events). In November 2025, Oakland rejected a $2.25M expansion citing privacy violations and federal data sharing, while Eugene, OR, faced an ACLU lawsuit for hiding camera locations amid fears of targeting vulnerable groups. EFF lawsuits in Virginia/Norfolk (2024–2025) allege Fourth Amendment breaches from broad searches (e.g., Detroit's 2024 Dodge Charger dragnet detaining innocents), with error-prone tech (misreads leading to wrong addresses) causing stigma, false stops, and family separations. A 2022 hack exposed 296GB of records, revealing indefinite retention of non-suspects' data; centers like Evanston, IL, deactivated 19 cameras in 2025 for privacy law violations. Flock's national network amplifies harms, as local opt-outs can't block cross-state/federal queries, disproportionately impacting BIPOC, low-income, and dissident communities with no redress or deletion rights.


Flock Safety
https://en.wikipedia.org/wiki/Flock_Safety
Flock Safety Official
https://www.flocksafety.com/blog/product-announcement-q2-2023

Oakland Committee Rejects $2.25M Surveillance Contract with Flock Safety
https://davisvanguard.org/2025/11/flock-safety-surveillance-concerns/

Flock Safety and Texas Sheriff Claimed License Plate Search Was for a Missing Person. It Was an Abortion Investigation.
https://www.eff.org/deeplinks/2025/10/flock-safety-and-texas-sheriff-claimed-license-plate-search-was-missing-person-it

Washington Court Rules That Data Captured on Flock Safety Cameras Are Public Records
https://www.eff.org/deeplinks/2025/11/washington-court-rules-data-captured-flock-safety-cameras-are-public-records

How Cops Are Using Flock Safety's ALPR Network to Surveil Protesters and Activists
https://www.eff.org/deeplinks/2025/11/how-cops-are-using-flock-safetys-alpr-network-surveil-protesters-and-activists

Communities Should Reject Surveillance Products Whose Makers Won't Allow Them to be Independently Evaluated
https://www.aclu.org/news/privacy-technology/communities-should-reject-surveillance-products-whose-makers-wont-allow-them-to-be-independently-evaluated

Liberal towns backtrack on license plate trackers amid concerns about privacy — and Trump
https://www.politico.com/news/2025/11/30/license-plate-trackers-pushback-00670550

Activists and journalists raise concerns over systemic human rights risks linked to Flock Safety’s products; Company response included
https://www.business-humanrights.org/en/latest-news/flock-safety-responds/

Hundreds of license-plate reading cameras blanket Dallas. Here’s how they’re used
https://www.dallasnews.com/news/public-safety/2025/12/01/hundreds-of-license-plate-reading-cameras-blanket-dallas-heres-how-theyre-used/

Flock Safety Overview | How we stop crime and protect privacy
https://www.youtube.com/watch?v=sbrMbcifA5g
Introducing Flock Safety, the first public safety operating system that helps communities and law enforcement in 1000+ cities work together to eliminate crime, protect privacy, and mitigate bias. We build devices that capture objective evidence and use machine learning to create and deliver unbiased investigative leads to law enforcement.
Flock Safety: The Billion Dollar Surveillance Company Tracking Your Every Move!
https://www.youtube.com/watch?v=GlJqQkY-GmY
Flock Safety is one of the fastest-growing public safety tech companies in America—valued at $7.5 billion and operating over 80,000 license plate cameras nationwide. Cities, police departments, and even HOAs can use its dashboard to search vehicles, get real-time crime alerts, and identify suspects. But with massive reach comes big questions: Can it be trusted? Are we trading privacy for safety? And who’s really watching?
Flock's Creepy Surveillance System Coming to a City Near You
https://www.youtube.com/watch?v=0Mc3MTpkZEQ
In 2023, the city installed over 172 cameras around town. These are not your standard traffic cameras. The cameras are strategically placed to capture everybody’s daily travel. They’re straight-up surveillance cameras, set up to watch people 24/7 as they go about their lives. The cameras snap photos of every car as they drive by and upload them into a database. Officials can then use this database to go back in time and create maps of where people have been, where they tend to drive, and even who they tend to meet up with. All of this happens without a warrant or even probable cause.
Mapping Flock cameras | FOX6 News Milwaukee
https://www.youtube.com/watch?v=ripn9JaNQmk
Flock Safety says one of the hallmarks of its surveillance technology is transparency, but when FOX6 Investigators asked for public records disclosing camera locations in 20 Wisconsin cities, we found the responses were all over the map

Private Security Firms ( i.e Allied Universal and GardaWorld )

Private security firms such as Allied Universal and GardaWorld provide armed and uniformed neighbourhood patrol services primarily to homeowners associations, gated communities, apartment complexes, and commercial districts. Founded and staffed predominantly by former law-enforcement and military personnel, these companies operate under state private-security licensing with no meaningful federal oversight.
Core Operations and Surveillance
These firms deploy thousands of marked patrol vehicles and foot patrols that operate 24/7 across residential streets and private property. Guards conduct flashlight sweeps, run mobile ALPR units, film with body and dash cams, perform "resident welfare checks," and generate real-time incident reports and "suspicious person" alerts that are shared directly with local police, fusion centers, and HOA boards. Many guards are off-duty or retired police officers who retain active access to federal and state databases. Contracts routinely include "directed patrols" or extra drive-bys on specific addresses flagged by property managers, neighbours, or anonymous community apps (Nextdoor, Ring Neighbors) without resident consent or disclosure.
Significant Controversies and Impacts
These private operations are often linked to documented controversies. While acting under private contracts, firms have faced criticism for excessive use of force, accusations of racial profiling, and documented issues with inadequate training. GardaWorld, for instance, faced intense scrutiny over "life-threatening" conditions and abuse allegations in migrant detention facilities it managed in the US and Canada. Allied Universal (via its G4S acquisition) has a history of serious accusations involving abuse and deaths in UK detention centers, highlighting a pattern of significant civilian impact and a failure to protect vulnerable populations under their watch.
Legal and Ethical Implications
These operations exist in a regulatory gray area. Because security personnel operate as private actors on private property, the Fourth Amendment protections against unreasonable government searches and seizures often do not apply. This creates a scenario where data collected via private ALPRs or surveillance apps can be shared with law enforcement partners without a warrant or public disclosure requirements. This operational model transforms residential streets into privatized enforcement zones, where higher-tier surveillance and targeted patrols can occur while maintaining legal deniability for the originating government agencies.


Allied Universal 
https://en.wikipedia.org/wiki/Allied_Universal
Allied Universal Official
https://www.aus.com/about-us
Gardaworld Official
https://www.gardaworld.com/about
GardaWorld
https://en.wikipedia.org/wiki/GardaWorld
Criticism of G4S
https://en.wikipedia.org/wiki/Criticism_of_G4S
ICE’s Deportation Machine Runs on Private Security
https://jacobin.com/2025/07/ice-deportation-trump-private-security
G4S PLC
https://investigate.afsc.org/company/g4s
Allied Universal Debt Syndication Highlights Grey Area In ESG Investing When It Comes To Private Security Businesses
https://www.forbes.com/sites/debtwire/2021/05/24/allied-universal-debt-syndication-highlights-grey-area-in-esg-investing-when-it-comes-to-private-security-businesses/
Denver not moving forward with controversial $40 million contract for security firm to run migrant shelters
https://www.denverpost.com/2023/07/06/denver-migrant-sheltering-gardaworld-contract/
What To Know About GardaWorld, The Controversial Security Company Tapped To Build Migrant Tent Camps
https://blockclubchicago.org/2023/09/26/what-to-know-about-gardaworld-the-controversial-security-company-tapped-to-build-migrant-tent-camps/

FBI Confidential Human Sources (CHS) & Fusion-Center Community Informants

To address the street-level surveillance, this section examines the role of human informants, both coerced and voluntary, recruited by the FBI and state/local fusion centers. These networks extend federal intelligence into everyday social spheres, leveraging ordinary citizens for monitoring and disruption. While informant programs are legally authorized and often essential for disrupting genuine threats, they raise profound ethical concerns: routine coercion via leverage (immigration status, pending charges, family threats, financial ruin), chronic lack of oversight, and repeated misuse against non-criminal targets, including political activists, journalists, and marginalized communities. Drawing from DOJ audits, whistleblower accounts, and congressional oversight between 2018 and 2025, the following balances operational realities with documented abuses and civil-liberties erosion.
Core Operations and Surveillance
Informants, officially termed Confidential Human Sources (CHS) by the FBI, deliver real-time intelligence on movements, conversations, relationships, political opinions, mental state, and daily routines of designated individuals. Fusion centers expand this reach by folding local tips into federal systems such as eGuardian and the Nationwide Suspicious Activity Reporting Initiative.
Many informants are explicitly tasked with provocation, secret recording, spreading disinformation, or manufacturing scenarios to elicit reactions and activities authorized under the FBI’s “Otherwise Illegal Activity” (OIA) rules when supervisors sign off. Handlers issue instructions through encrypted apps, burner phones, or dead drops and frequently exploit personal vulnerabilities (debt, custody battles, immigration fears) to maintain control. Payments range from cash and gift cards to sentencing reductions; the FBI alone disburses tens of millions annually. Fusion centers train civilians on “suspicious behavior indicators,” turning neighbors, coworkers, and even family members into de facto eyes and ears of the state.


Key Terms and Distinctions
Confidential Human Source (CHS): The FBI's current official term (updated around 2000s). Covers anyone providing info secretly—paid, coerced, or voluntary. Includes criminals getting leniency, concerned citizens, or recruited civilians. Identity protected where possible, but not always (court testimony can expose them).
Confidential Informant (CI): Older/common slang term, still used interchangeably. Often refers to criminal informants (paid or for reduced sentences), but overlaps with CHS.
Fusion Center Community Informants/Tips: Fusion centers (state/local hubs tied to DHS/FBI) recruit "community partners" or take anonymous tips from civilians via programs like "See Something, Say Something." Less formal than FBI CHS—often unpaid neighbors/coworkers reporting "suspicious activity." Feeds into national databases (eGuardian, SARs).


Nationwide Suspicious Activity Reporting Initiative

https://en.wikipedia.org/wiki/Nationwide_Suspicious_Activity_Reporting_Initiative
SAR See Something Say Something
https://stlfc.gov/sar-reporting
SAR Training Courses
https://sar-training.ncirc.gov/
Undercover and Sensitive Operations Unit, Attorney General's Guidelines on FBI Undercover Operations, November 13, 1992
https://www.justice.gov/archives/ag/undercover-and-sensitive-operations-unit-attorney-generals-guidelines-fbi-undercover-operations
FBI Severely Underreported How Many Times It Authorized Informants to Break the Law
https://gizmodo.com/fbi-severely-underreported-how-many-times-it-authorized-1818517490
FBI And Other Agencies Paid Informants $548 Million In Recent Years With Many Committing Authorized Crimes
https://www.forbes.com/sites/adamandrzejewski/2021/11/18/fbi-and-other-agencies-paid-informants-548-million-in-recent-years-with-many-committing-authorized-crimes/
DOJ OIG Releases Report on the FBI’s Handling of Its Confidential Human Sources and Intelligence Collection Efforts in the Lead Up to the January 6, 2021 Electoral Certification
https://oig.justice.gov/news/doj-oig-releases-report-fbis-handling-its-confidential-human-sources-and-intelligence
CONFIDENTIAL INFORMANTS Updates to Policy and Additional Guidance Would Improve Oversight by DOJ and DHS Agencies
https://www.gao.gov/assets/gao-15-807.pdf
Confidential Human Source Policy Guide how the FBI handles its army of informants
https://theintercept.com/document/2017/01/31/confidential-human-source-policy-guide/#page-1
The FBI Gives Itself Lots of Rope to Pull in Informants
https://theintercept.com/2017/01/31/the-fbi-gives-itself-lots-of-rope-to-pull-in-informants/
Revealed: The FBI’s Secret Methods for Recruiting Informants at the Border"
https://theintercept.com/2016/10/05/fbi-secret-methods-for-recruiting-informants-at-the-border/
DOJ OIG Releases Report on the FBI’s Management of its Confidential Human Source Validation Processes
https://oig.justice.gov/news/doj-oig-releases-report-fbis-management-its-confidential-human-source-validation-processes 
I Refused to Become an FBI Informant, and the Government Put Me on the No Fly List Nationwide
https://www.aclu.org/news/national-security/i-refused-to-become-an-fbi-informant-and-the-government-put-me-on-the-no-fly-list
Attorney General's Guidelines Regarding the Use of FBI Confidential Human Sources
https://www.justice.gov/oip/foia-library/foia-processed/general_topics/ag_guidelines_FBI_human_confidential_sources_2/dl
Government Snoops in Maine Caught Spying on Peaceful Americans
https://reason.com/2023/01/06/government-snoops-in-maine-caught-spying-on-peaceful-americans/

Audit of the FBI’s Management of its Confidential Human Source Validation Processes
https://www.youtube.com/watch?v=D_xMwVLR_kw
Department of Justice Inspector General Michael E. Horowitz announces the release of an Audit on the FBI’s Management of its Confidential Human Source Validation Processes.

How Does The FBI Use Informants? - Law Enforcement Insider
https://www.youtube.com/watch?v=bQf-w9pXwLQ
How Does The FBI Use Informants? In this informative video, we will discuss the role of informants in the Federal Bureau of Investigation's efforts to combat crime. Informants serve as critical sources of information, assisting law enforcement in identifying criminal activities and networks. We will cover how the FBI recruits informants, including the various motivations behind their involvement, from seeking protection to financial incentives. 
A look at the controversial use of college students as informants
https://www.youtube.com/watch?v=VBiXcfrP_4s

Confidential informants aren't uncommon in drug busts -- but they are when the informants are young college students. 60 Minutes launched an investigation into the controversial use of young undercover informants. 60 Minutes producers Shari Finkelstein and Nieves Zuberbuhler joins CBSN with more on their investigation.
Do you have what it takes to spy for New Zealand? SIS looking for new recruits
https://www.youtube.com/watch?v=yUAUQHJ_-EE

"Applicants should be observant, have a good memory and be a good driver, among other requirements." 
The 2018 NZSIS recruitment advertisement seeks candidates possessing exceptional covert surveillance capabilities, including the ability to monitor individuals without detection, conduct discreet vehicle tailing, identify minute anomalies in public environments, and retain detailed visual information.

Neighborhood Watch / Nextdoor / Ring Neighbors / Citizen App Networks.

Neighborhood Watch programmes, amplified by private digital platforms such as Nextdoor, Amazon Ring Neighbors, and the Citizen app, have evolved into hyper-local reporting ecosystems that mobilise millions of civilians to monitor, observe, record, and report daily activity in real time. As of 2025 these networks collectively reach over 150 million users worldwide, with heavy concentration in the United States, United Kingdom, Canada, Australia, and New Zealand. 

These programmes are primarily connected to the local law enforcement agencies which serve as intermediaries between these community platforms/programs and the wider U.S. intelligence apparatus, including fusion centers. 
Here's how the information flow works:
Law Enforcement Partnerships:
The tech platforms (Nextdoor, Ring Neighbors, Citizen App) have formal or informal partnerships with local police and sheriff's departments across the country. These agencies can receive tips, access publicly shared posts, and in some cases, specifically request footage or information from users through verified portals.
Suspicious Activity Reporting (SAR): Information gathered by local law enforcement, whether from traditional Neighborhood Watch programs or modern apps, is often categorized as "Suspicious Activity Reporting" (SAR).
Information Sharing with Fusion Centers: Fusion centers serve as central hubs for receiving, analyzing, and disseminating threat-related information and intelligence between federal, state, local, and sometimes private sector partners. Local law enforcement agencies are primary contributors to, and recipients from, the fusion center network.
Data Integration: Data (tips, incident reports, footage) collected by local police through these apps and programs can be integrated into local police databases and analytical systems. Since fusion centers often have personnel from various agencies (local, state, federal) working together and accessing these systems, this creates a pathway for community-sourced information to be incorporated into the broader intelligence and homeland security information-sharing environment. 


All of these programs and platforms have been associated with significant controversies, primarily centered on
racial profiling, the potential for vigilantism, privacy issues, and whether they genuinely improve safety or simply fuel a "mean world syndrome" of fear and paranoia. 


Racial Profiling and Bias
Nextdoor: The platform has a well-documented history of users making posts about "suspicious" people based solely on their race, often targeting Black or Latino individuals for simply existing in a neighborhood. Nextdoor has implemented changes, like requiring additional descriptors beyond race for "suspect" reporting, but critics and users report the problem persists.
Ring Neighbors: An investigation into posts on the Neighbors app found similar patterns, with a majority of reported "suspicious" individuals in affluent areas being people of color.
Neighborhood Watch (Traditional): While not a tech platform, traditional watch programs have long faced criticism that they can encourage bias, leading residents (often white residents in racially integrated areas) to view people of color as inherent threats, resulting in unnecessary police interactions or harassment. 

Vigilantism and Misinformation
The real-time nature of these platforms can encourage users to take action themselves or spread false information.
Citizen App: The app's original name was "Vigilante," and despite the rebrand, it has been criticized for encouraging users to go to the scene of ongoing incidents. In a high-profile incident in May 2021, the app's CEO mistakenly put a large bounty on an innocent, unhoused man's head, accusing him of arson, which incited a dangerous manhunt.
Nextdoor / Ring: Posts describing "suspicious" behavior can lead to residents confronting individuals or making false police reports, sometimes escalating into threats or violence. 

Privacy Concerns and Police Partnerships
The partnerships between tech companies and law enforcement have raised significant civil liberties and privacy concerns. 
Ring Neighbors: Ring actively recruited police departments to join its platform, allowing them to request video footage from residents' private cameras, often without a warrant. While Ring recently ended the practice of police directly emailing users for footage, law enforcement can still request assistance publicly through the app, which critics argue is an extension of the surveillance state.
Fusion Centers Connection: The conduit of data from community apps to local law enforcement, and subsequently to fusion centers, raises concerns about personal data (images, locations, descriptions) being integrated into broader intelligence databases, disproportionately affecting marginalized communities who are already over-policed.
Data Sharing: Companies like Nextdoor and Ring have been found to share user data with third parties and use information for commercial purposes, which can put users at risk of data breaches. 


Fostering Fear ("Mean World Syndrome")A common psychological criticism is that constant exposure to minor, unfounded, or exaggerated crime reports on these apps makes people feel their neighborhoods are far more dangerous than they actually are, eroding social trust and fostering paranoia. Furthermore, there is little independent evidence that these apps actually reduce crime rates.

National Neighborhood Watch
https://nnw.org/
Nextdoor Official
https://nextdoor.com/
About Nextdoor
https://about.nextdoor.com/
Ring Neighbors App
https://ring.com/support/categories/neighbors-app-help?page=1
Citizen App
https://citizen.com/
The Spy Next Door/ The Dangers Of Neighborhood Surveillance Apps
https://www.stopspying.org/thespynextdoor
Is media platform Nextdoor a friend in need or a vigilante nightmare?
https://www.theguardian.com/media/2022/mar/20/is-nextdoor-a-friend-in-need-or-vigilante-nightmare
Citizen App Falsely Accuses Man of Starting Los Angeles Wildfire
https://www.nytimes.com/2021/05/18/business/citizen-app-arson-wildfire-devin-hilton.html
Amazon Drops Neighborhood Surveillance Program
https://www.aclu-il.org/en/news/amazon-drops-neighborhood-surveillance-program
Amazon Ring Cashes in on Techno-Authoritarianism and Mass Surveillance
https://www.eff.org/deeplinks/2025/07/amazon-ring-cashes-techno-authoritarianism-and-mass-surveillance

Amazon Ring security cameras moving deeper into law enforcement with Flock Safety, Axon deals
https://www.cnbc.com/2025/10/16/amazon-ring-cameras-surveillance-law-enforcement-crime-police-investigations.html
Amazon Ring has teamed up with Flock Safety - Lets police request footage directly from Ring users!
https://www.youtube.com/watch?v=FVFa6_P5U_s
Amazon’s Ring has quietly teamed up with Flock Safety, a controversial company known for tracking license plates and movement across cities. This partnership lets police request footage directly from Ring users nearby, blurring the line between neighborhood security and government surveillance.

Homeowners Associations (HOAs) Private Patrols & Camera Poles

Homeowners Associations (HOAs) implement private patrols and install surveillance cameras, such as ALPR (Automated License Plate Reader) systems, as security measures to deter crime and enforce community rules. These systems typically involve contracted security firms conducting patrols of common areas and the strategic placement of cameras at entry points and shared spaces to monitor activity, provide evidence for law enforcement, and enhance residents' overall sense of safety. The goal is to safeguard property values, prevent vandalism, and reduce incidents like package theft, providing a security layer that may not be consistently available from public police forces that prioritize violent crimes.

Controversial Sides
The use of these security measures is highly controversial, primarily due to concerns over privacy infringements, limited accountability, and potential abuses of power:

Privacy Invasion: A major concern is that pervasive camera systems and data collection turn residential areas into surveillance grids, potentially chilling residents' freedom within their own homes and common areas. There are legal limits on where cameras can point; they must not intrude on areas where individuals have a reasonable expectation of privacy, such as private backyards or windows of a home.
Limited Accountability and Recourse: HOAs operate as private entities, which means they are not subject to the same constitutional constraints as public law enforcement. While legal recourse exists, challenging an HOA in court can be a lengthy, expensive, and complex process, which often deters homeowners from pursuing action.
Abuse of Power: Concerns exist that HOA boards or security personnel may selectively enforce rules or abuse their authority due to a lack of external oversight and regulation. Private security guards generally have limited authority compared to public police, often restricted to citizen's arrests, yet their actions can lead to legal disputes if they overstep their bounds.
Data Management and Sharing: The collection of extensive data, including license plate information, raises questions about how this sensitive data is stored, who has access to it, and how long it is retained. Clear policies are needed to ensure data isn't misused or improperly shared with third parties.
False Sense of Security: Installing security measures without professional assessment can lead to a false sense of security. For example, relying solely on cameras without active monitoring or sufficient coverage can create blind spots or lead residents to believe a crime is being recorded when it is not.

HOA And Police: Jurisdiction, Boundaries, And Cooperation
https://www.grahammanagementhouston.com/hoa-and-police/

The Dark Side of Homeowners Associations
https://www.nachi.org/dark-side-homeowner-associations.htm
Things to Know Before Your Neighborhood Installs an Automated License Plate Reader
https://www.eff.org/deeplinks/2020/09/flock-license-plate-reader-homeowners-association-safe-problems
Handling Privacy Issues in HOA Communities
https://www.hoalegal.com/blog/handling-privacy-issues-in-hoa-communities/
HOA or Big Brother? Suncoast neighborhoods use controversial technology to fine speeders
https://suncoastsearchlight.org/hoa-traffic-cameras-speeding-tickets-sarasota-manatee/
7 Top Recommendations to Help Protect Your HOA's Sensitive Data
https://realmanage.com/blog/protect-your-hoa-sensitive-data
HOA Security Unveiled: Responsibilities and Patrols
https://techprosecurity.com/security-articles/access-control-and-security/hoa-security/
Top Ten Security Mistakes HOAs Make
https://echo-ca.org/top-ten-security-mistakes-hoas-make/

Rekor / Vigilant Solutions The largest private license-plate tracking database in the United States, containing over 20 billion historical images and 150 million new scans monthly. Built by former law-enforcement and ICE personnel, it sells unlimited access to police, fusion centers, repo companies, and private investigators with no warrant required, creating a permanent, nationwide vehicle-movement dossier that feeds directly into higher-tier targeting systems.

AI license plate reader tech is an Orwellian nightmare
https://proton.me/blog/ai-license-plate-reader
Border Patrol is monitoring US drivers and detaining those with ‘suspicious’ travel patterns
https://apnews.com/article/immigration-border-patrol-surveillance-drivers-ice-trump-9f5d05469ce8c629d6fecf32d32098cd
Records Reveal ICE Using Mass Surveillance Database to Track People With Aid of Local Law Enforcement
https://www.aclu.org/press-releases/records-reveal-ice-using-mass-surveillance-database-track-people-aid-local-law
ICE’s license plate app quietly expands a nationwide surveillance web
https://www.biometricupdate.com/202511/ices-license-plate-app-quietly-expands-a-nationwide-surveillance-web
Vigilant Solutions
https://www.surveillancewatch.io/entities/vigilant-solutions

Tier 5 – Affiliated Research Institutions and Emerging Technologies (some of the leading players)

Tier 5 encompasses government research agencies, federally funded laboratories, policy think-tanks, and philanthropic consortia (private mega-foundations) that advance technologies in areas such as cyber-physical systems, neuroscience, bio-digital convergence, quantum sensing, artificial intelligence, and autonomous systems. These efforts support national security, defense, and public health objectives, with outputs transitioning to operational use through established mechanisms like Cooperative Research and Development Agreements (CRADAs), Other Transaction Authorities (OTAs), and public-private partnerships — legal and funding pathways that enable rapid collaboration between classified programs and civilian entities while minimizing public disclosure requirements.
Purpose and Importance
The core objective is to pioneer breakthroughs that provide long-term strategic advantages, addressing challenges like rapid threat detection, enhanced human performance, and resilient infrastructure. By funding high-risk research, Tier 5 ensures that capabilities evolve ahead of adversaries and commercial competitors, often within 3–10 years ( Officially  ). Dual-use framing is central: for instance, brain-computer interfaces developed for military human-machine teaming also enable medical rehabilitation for veterans and civilians. This approach not only bolsters defense readiness but also drives economic growth through technology transfer to private sectors.

The Post-Snowden Dual-Use Veil
The years following Edward Snowden’s 2013 disclosures witnessed a marked acceleration in the migration of advanced Research and Development (R&D) from classified military channels to dual-use programs framed as civilian health and humanitarian initiatives. Technologies once confined to opaque black budgets neural interfaces, predictive cognition systems, quantum sensing, and autonomous decision tools, were now positioned under protective dual-use covers that combined medical rehabilitation, public-health research, and philanthropic funding. This shift provided multiple layers of deniability, shielded projects from Freedom of Information Act (FOIA) requests, and enabled continued development at scale while maintaining full military applicability.
 
Technology Developments After the 2013 Snowden Leaks
  • April 2013: Obama announces the BRAIN Initiative with initial $100 million funding
  • 2014–2015: BRAIN Initiative funding surges (DARPA slice nearly doubles → total exceeds $6 billion cumulative by 2025)
  • 2014: DARPA launches SUBNETS, Neuro-FAST, and RAM programs for advanced neural interfaces
  • 2015: DARPA launches ElectRx for neuromodulation implants
  • 2016: Obama signs Executive Order 13702 boosting national AI R&D ($1.1 billion over 10 years)
  • 2016: DARPA launches TNT (Targeted Neuroplasticity Training) for brain stimulation and learning enhancement
  • 2018: DARPA announces N3 program ($104 million) for nonsurgical nanoparticle brain-computer interfaces
  • 2019: Trump signs Executive Order 13859 maintaining U.S. leadership in artificial intelligence
  • May 2020: Trump launches Operation Warp Speed ($10 billion) — fast-tracks mRNA vaccines and biosensor technology
  • May 2020: Wellcome Leap launches with $300 million for neuroscience and organoid research
  • October 2023: Biden issues Executive Order 14110 on safe, secure, and trustworthy AI development
  • 2023–2025: N3 nanoparticle brain-interface technology enters advanced human trials at military hospitals
  • January 2025: Trump issues Executive Order 14179 revoking prior AI order and prioritizing U.S. dominance in emerging technologies

Primary Organizations Driving These Advancements
IARPA  (Intelligence Advanced Research Projects Activity) :
High-risk projects in AI and neuroscience, and KRNS (neural representations of conceptual knowledge to improve inference from intelligence data)  
https://www.iarpa.gov/  
DARPA (Defense Advanced Research Projects Agency) 
 :
Breakthroughs in neurotechnology and autonomy, such as the N3 program (nonsurgical brain-computer interfaces using nanoparticles, advancing toward human trials for enhanced soldier cognition and medical applications)
and Assured Autonomy (formal verification for safe learning-enabled cyber-physical systems like drones)
https://www.darpa.mil/
MITRE Corporation / JHU/APL / MIT Lincoln Laboratory :
Engineering and testing of behavioral analytics, quantum sensors, and urban networks. 
https://www.mitre.org/
RAND Corporation : Predictive models for security trends and societal impacts, informing policy on emerging technologies. https://www.rand.org/
NIH (National Institutes of Health) :
Lead coordinator and primary federal funder of the BRAIN Initiative, channeling billions into mapping and interfacing with the human brain under medical and public-health banners.
https://braininitiative.nih.gov/
Wellcome Leap :
$300M+ global health fund launched in 2020 and run by former DARPA director Regina Dugan, directly replicating DARPA’s high-risk, high-reward model for neurotechnology and organoid research outside government oversight.
https://wellcomeleap.org/
Gates Foundation & Schmidt Futures :
Major parallel funders of neuroscience, AI-cognition hybrids, and bio-digital convergence projects, often partnering with BRAIN Initiative labs and global health consortia under humanitarian and disease-prevention framing. 
https://www.gatesfoundation.org/ 
NNI (National Nanotechnology Initiative) :
U.S. inter-agency program (DoD, NIH, NSF, etc.) that has pumped $40B+ since 2000 into nanoscale sensors, brain implants, and bio-digital materials – the invisible backbone of WBANs, N3 nanoparticles, and smart-dust networks.
https://www.nano.gov/
Neuralink (Elon Musk) :
Implantable brain-computer interface company (1,024-electrode N1 “Link”) with $650M+ raised in 2025; 20+ human trials by end-2025 for paralysis control, speech decoding, and vision restoration; advancing toward non-medical “cognition enhancement” implants in healthy volunteers. 
https://neuralink.com/

iarpa History
https://www.iarpa.gov/who-we-are/history
iarpa our mission
https://www.iarpa.gov/who-we-are/history/our-mission
The U.S. Military Could Someday Use Microbes as Tiny Spies
https://www.popularmechanics.com/military/research/a43865477/darpa-project-tellus-developing-microbial-spies/
10 Years After Snowden: Some Things Are Better, Some We’re Still Fighting For
https://www.eff.org/deeplinks/2023/05/10-years-after-snowden-some-things-are-better-some-were-still-fighting
Wellcome Leap nabs $300M, ex-DARPA, Illumina execs to battle global health problems
https://www.fiercebiotech.com/biotech/wellcome-leap-nabs-300m-ex-darpa-illumina-execs-to-battle-global-health-problems
Regina E. Dugan
https://en.wikipedia.org/wiki/Regina_E._Dugan
DARPA Neurotechnology: The Deep Dive
https://www.asimov.press/p/darpa-neurotech
Exclusive: NSA Program Can Target Thoughts of Millions of Targets, Thousands of Americans
https://www.lawfaremedia.org/article/exclusive-nsa-program-can-target-thoughts-millions-targets-thousands-americans
IARPA: The Spooks’ Magic Shop
https://greydynamics.com/iarpa-the-spooks-magic-shop/
Technocracy
https://corporatefinanceinstitute.com/resources/economics/technocracy/
A 1930s movement wanted to merge the US, Canada and Greenland. Here’s why it has
https://theconversation.com/a-1930s-movement-wanted-to-merge-the-us-canada-and-greenland-heres-why-it-has-modern-resonances-252587
Intelligence Advanced Research Projects Activity
https://en.wikipedia.org/wiki/Intelligence_Advanced_Research_Projects_Activity
Biosecurity risks associated with vaccine platform technologies
https://www.sciencedirect.com/science/article/pii/S0264410X21001717
The effectiveness of coercive measures in motivating vaccination: Evidence from China during the COVID-19 pandemic
https://www.tandfonline.com/doi/full/10.1080/17441692.2024.2445827


Global Organizations and Initiatives Expanding Emerging Technologies
World Economic Forum (WEF)
Centre for the Fourth Industrial Revolution (C4IR) and annual Top 10 Emerging Technologies reports.
 
https://centres.weforum.org/centre-for-frontier-technologies-and-innovation/home 
United Nations (UN) Human Rights Council resolutions and Office for Disarmament Affairs on emerging tech governance. https://www.ohchr.org/en/hrbodies/hrc/home
European Union (EU) Horizon Europe program and EU AI Act shaping global standards. https://research-and-innovation.ec.europa.eu/funding/funding-opportunities/funding-programmes-and-open-calls/horizon-europe_en  
IEEE (Institute of Electrical and Electronics Engineers) AI ethics, 6G/WBAN standards, smart-city sensor networks. 
https://www.ieee.org/  
ITU (International Telecommunication Union) IMT-2030 framework for 6G human-centric networks and WBAN guidelines. https://www.itu.int/en/Pages/default.aspx 
G20 Global Smart Cities Alliance (with WEF) policy roadmaps for AI/IoT in urban environments.
https://www.globalsmartcitiesalliance.org/home
Policy Horizons Canada Foresight research on biodigital convergence impacts, influencing Canadian and global policy on biology-digital merging. https://horizons.service.canada.ca/en/2020/02/11/exploring-biodigital-convergence/
Israel Innovation Authority – National Bio-Convergence Program  $350M+ initiative merging biology, nanotechnology, AI, and digital health to position Israel as the global leader in biodigital integration.
https://innovationisrael.org.il/en/
IEC/ISO JTC 1  Joint standards committee for bio-digital innovations, including WBANs and nanosensors for health and industrial applications. https://www.iso.org/committee/45020.html 
WHO (World Health Organization) Global Strategy on Digital Health promoting mHealth and biosensor integration for biodigital population monitoring.  https://www.who.int/
OECD (Organisation for Economic Co-operation and Development) AI Principles and Neurotechnology Recommendations guiding international biodigital ethics and governance. https://www.oecd.org/en.html 

Potential Benefits
- Accelerated medical treatments, such as neural interfaces for paralysis recovery or PTSD management
darpa.mil
- Enhanced public safety via autonomous systems for disaster response and early pandemic detection.
- Stronger defense capabilities against cyber and asymmetric threats through AI-driven analytics.
- Broader economic impacts from commercial spin-offs, like improved wearables for cognitive health monitoring.
Recognized Concerns
- Privacy risks from advanced sensors potentially extending into civilian surveillance, echoing historical misuses like MKUltra.
- Ethical dilemmas in neurotechnology, including consent for brain interfaces and biases in behavioral scoring.
- Transparency gaps in classified or privately funded work, limiting public oversight.
- Proliferation dangers, as dual-use tech could enable unauthorized applications abroad.

Tier 5 functions as an innovation accelerator, balancing rapid advancement with ethical safeguards through congressional oversight, ethics boards, and public discourse. The institutions and programs and select international counterparts highlighted above, represent only the publicly acknowledged tip of a far larger, global, and often classified technology ecosystem. Beneath the surface lies a vastly broader network of laboratories, consortia, corporate partners, and allied programs whose full scope, funding streams, and operational timelines remain shielded from routine scrutiny.
 

China's Ubiquitous Surveillance Cities and Social Credit  System is the poster child for The Smart City.

Picture
           How China Is Using “Social Credit Scores” to Reward and Punish Its Citizens
             https://time.com/collection/davos-2019/5502592/china-social-credit-score/


China’s surveillance structure represents a bold and transparent framework for governance, positioning the nation as a global archetype for the smart city paradigm. Unlike the clandestine surveillance programs post-9/11 in Western nations, China’s system operates in plain sight. An estimated 626 million facial recognition cameras monitor cities like Beijing and Shenzhen, capturing pedestrian movement and online behavior. Integrated with platforms like WeChat and Alipay, which double as state monitoring tools, this infrastructure is embedded in daily life. Remarkably, over 80% of urban Chinese citizens support this oversight viewing it as essential for social order in a nation of 1.4 billion. 
China’s Social Credit System (SCS), launched in 2014 and steadily expanding, is a nationwide data-driven framework that scores citizens, businesses, and even government officials based on their behavior—everything from paying bills on time and traffic violations to online speech, charity work, and “trust-breaking” acts like spreading rumors or cheating on exams. Good behavior earns rewards like faster loans, priority healthcare, or cheaper flights; bad behavior triggers punishments such as travel bans, slower internet, or having your kids barred from elite schools. It’s not one single “score” (despite the Black Mirror memes) but a web of blacklists, redlists, and industry-specific ratings run by both the state and giant tech platforms like Alibaba and Tencent, who share data with the government.

The Social Credit System operates through several distinct categories of lists and scoring mechanisms, each serving different functions:
Blacklist (officially the “Judgment Debtor Blacklist” or “List of Dishonest Persons Subject to Enforcement”):
The primary punitive tool. Individuals or entities are placed on this list by courts or regulators when they fail to comply with legal judgments (most commonly unpaid debts) or commit serious violations such as fraud, disseminating prohibited information, or repeated regulatory breaches. As of recent years, tens of millions of entries have been recorded. Consequences are severe and automatic: bans on purchasing plane or high-speed train tickets, restrictions on luxury consumption, exclusion of children from elite private schools, slower internet speeds, and public naming-and-shaming.

Redlist (List of Trustworthy Entities or “Red List of Good Conduct”):
The counterpart incentive mechanism. Citizens, companies, or officials demonstrating exemplary compliance, tax payment, charitable acts, or other positive behavior are included. Benefits include preferential access to loans, expedited administrative approvals, discounts on public services, and priority in healthcare or travel.

Sector-specific credit records: Hundreds of specialized scoring systems exist across domains (e.g., environmental compliance, pharmaceutical safety, e-commerce trustworthiness, traffic violations). These are managed by individual ministries or licensed private platforms (notably Alibaba’s Sesame Credit and Tencent Credit) and feed into broader evaluations.
City-level pilot scores:
Some municipalities experimented with unified numerical citizen scores (visible in apps), but most have been discontinued or scaled back in favor of the blacklist/redlist framework.

In practice, there is no single nationwide “social credit score” visible to the public like the popularized Western misconception; instead, the system functions primarily through interconnected blacklists and reward lists, with sector-specific ratings providing additional granularity.

Globally, elements of it are already creeping in: the EU’s digital ID wallets and ESG scoring for companies, Canada’s and Australia’s “misinformation” laws that can freeze bank accounts, U.S. credit bureaus now factoring in utility payments and even rental history, and private platforms like Uber, Airbnb, and Patreon effectively “social-credit” users by banning them for off-platform speech. If central bank digital currencies (CBDCs) roll out with programmable money and transaction-level tracking, the infrastructure for a planetary version becomes trivial—your purchases, carbon footprint, vaccine status, or wrongthink could auto-dock your wallet privileges in real time.
So while China’s version is the most explicit and state-run, the West is building a softer, corporate-public hybrid that could end up just as pervasive, just with better branding and fewer people noticing until the gates slam shut.


Mass surveillance in China
https://en.wikipedia.org/wiki/Mass_surveillance_in_China
What is China’s social credit system and why is it controversial?
https://www.scmp.com/economy/china-economy/article/3096090/what-chinas-social-credit-system-and-why-it-controversial
From Sensors to Smart Cities: China’s Digital Leap Forward
https://english.ckgsb.edu.cn/knowledge/article/china-smart-cities-digital-evolution-at-scale/
Digital surveillance is omnipresent in China. Here’s how citizens are coping
https://theconversation.com/digital-surveillance-is-omnipresent-in-china-heres-how-citizens-are-coping-225628
Social Credit System
https://en.wikipedia.org/wiki/Social_Credit_System 
CHINA’S SOCIAL CREDIT SYSTEM

https://www.bertelsmann-stiftung.de/fileadmin/files/aam/Asia-Book_A_03_China_Social_Credit_System.pdf

China’s Surveillance State: Why You Should Be Worried | System Error https://www.youtube.com/watch?v=xXPnXNQpTOs
China ranks 'good' and 'bad' citizens with 'social credit' system https://www.youtube.com/watch?v=NXyzpMDtpSE
Al Jazeera, How ‘smart cities’ make us more watched than ever before | The Listening Post
https://www.youtube.com/watch?v=oTZ80nLbz70


Emerging Surveillance Technologies in Law Enforcement Worldwide: Profiling and Predictive Policing 2025

Picture
Over the past two decades, law enforcement agencies and governments worldwide have increasingly integrated emerging technologies into their practices, particularly for profiling and predictive policing. These tools ranging from data analytics to biometrics, have transformed how authorities identify suspects, monitor populations, and allocate resources. The U.S. Department of Homeland Security’s (DHS) 2024 report (GAO-25-107302), underscore the global adoption of these technologies. The DHS report details over 20 surveillance tools used without warrants in public spaces, confirming the U.S. as a landmark in deploying a comprehensive suite of technologies, including cell-site simulators, facial recognition, and IoT devices, often covertly with significant public and legal pushback.
In contrast, the New Zealand Police’s Technology Capabilities List (April 2025) reveals a significant but less extensive adoption, emphasizing ethical use of biometrics, license plate readers, and AI analytics.
 

China emerges as another landmark, matching the U.S. in scope but with an overt, state-driven approach via systems like Skynet and Sharp Eyes, integrating all crux technologies (OSINT, biometrics, AI, etc.) into a social credit framework with widespread citizen compliance due to centralized control. Other nations, such as the UK and Australia, deploy similar technologies. UK with aggressive live facial recognition and Australia with growing AI and biometrics but operate on a smaller scale.
 Below is an overview of key technologies adopted within this period, their development timelines, and their implications for law enforcement practices, presented in a rough chronological order of their emergence or widespread use:

Stingrays and Dirtboxes, cell-site simulators mimic cell towers to capture phone data and metadata, often without warrants. They’ve evolved with tighter oversight in some democratic jurisdictions but continued use in authoritarian systems for mass tracking. They enable precise movement profiling but risk privacy violations through bystander data collection.
IMSI-Catchers: Emerging in the early 2000s as advanced cell-site simulators, these devices intercept mobile identifiers (IMSI numbers) and metadata, often covertly. They’re widely used for tracking individuals and groups and enhance real-time location profiling. 
Biometrics, digitized fingerprints, facial recognition, DNA, iris scans, voice, and gait analysis. By 2025, they enable rapid suspect identification in crowded settings, but unconsented data collection and higher error rates for certain demographics spark ethical debates.
Big data analytics,
processes vast datasets from multiple sources using algorithms for predictive policing’. By 2025, real-time platforms forecast crime hotspots and profile suspects, but flawed data risks amplifyin’ biases, such as over-policin’ certain communities, prompting’ transparency calls in democracies and unchecked use elsewhere.
Open Source Intelligence (OSINT) leverages public data from social media, news, and online platforms for profiling. It supports real-time threat detection. While effective for network mapping it risks overreach into semi-private data, facing legal challenges.
Automatic License Plate Readers (ALPRs) since 2008, capture vehicle plates, timestamps, and locations, storing vast datasets. By 2025, they track movements for profiling in predictive systems, but mass data collection without warrants triggers privacy concerns, with legal limitations.
Artificial Intelligence (AI) analyzes data for social media monitoring, 
reoffense prediction, and object detection. By 2025, it drives profiling in predictive models, but untransparent algorithms risk bias against certain groups, prompting transparency demands.
Social Media Scraping monitors online platforms for threat detection. By 2025, it supports targeted investigations in democracies and mass surveillance in authoritarian regimes, facing privacy backlash for overreach in protests and political movements.
Drones and IoT Devices provide real-time footage for crowd and area profiling By 2025, they’re widespread across democratic and authoritarian systems, but warrantless data from private devices raises privacy concerns, with legal challenges in some regions and unchecked use in others.

Data Aggregators and Private Sector Information: Emerging in the 2010s and expanding by 2025, private companies (e.g., Clearview AI, Palantir) collect and sell vast datasets from social media, commercial transactions, or public records to law enforcement. Used for facial recognition, predictive policing, and profiling, they amplify surveillance capabilities. Lack of transparency and consent fuels privacy concerns, with legal pushback in democracies (e.g., U.S. public backlash per DHS report) and seamless integration in authoritarian systems.


Pdf : DHS Could Better Address Bias Risk and Enhance Privacy Protections for Technologies Used in Public
https://www.gao.gov/assets/gao-25-107302.pdf
Technology capabilities list
https://www.police.govt.nz/about-us/programmes-and-initiatives/police-use-emergent-technologies/technology-capabilities-list
Police surveillance and facial recognition: Why data privacy is imperative for communities of color
https://www.brookings.edu/articles/police-surveillance-and-facial-recognition-why-data-privacy-is-an-imperative-for-communities-of-color/

NZ Police finally has facial recognition policy - but is it strict enough?
https://www.rnz.co.nz/news/media-technology/525642/nz-police-finally-has-facial-recognition-policy-but-is-it-strict-enough
China: Voice Biometric Collection Threatens Privacy
https://www.hrw.org/news/2017/10/22/china-voice-biometric-collection-threatens-privacy
China’s homegrown tech boosts global surveillance, social controls: report
https://www.rfa.org/english/china/2025/02/20/china-ai-neuro-quantum-surveillance-security-threat/
Government expands police use of facial recognition vans
https://www.bbc.com/news/articles/cj4wy21dwkwo
Top 10 police technology stories of 2024
https://www.computerweekly.com/news/366617312/Top-10-police-technology-stories-of-2024
Artificial intelligence and policing in Australia
https://policinginsight.com/feature/analysis/artificial-intelligence-and-policing-in-australia/
Covid 19, surveillance and the threat to your rights.
https://amnesty.org.nz/covid-19-surveillance-and-threat-your-rights/

Revealed: This Is Palantir’s Top-Secret User Manual for Cops 2019. Fusion Centers. Link

The article, published July 13, 2019, reveals a Palantir Gotham user manual obtained via public records, showing how cops use the software to track people. Palantir, a secretive big data firm, powers surveillance for agencies like ICE and fusion centers, aggregating data from public and private sources. With just a name or license plate, police can map someone’s movements, relationships, addresses, bank accounts, and more using tools like Object Explorer (charts, timelines) and ALPR searches. Critics call it a “secondary surveillance network,” raising privacy concerns, especially for non-suspects.

Excerpt"Through a public record request, Motherboard has obtained a user manual that gives unprecedented insight into Palantir Gotham (Palantir’s other services, Palantir Foundry, is an enterprise data platform), which is used by law enforcement agencies like the Northern California Regional Intelligence Center. The NCRIC serves around 300 communities in northern California and is what is known as a “fusion center,” a Department of Homeland Security intelligence center that aggregates and investigates information from state, local, and federal agencies, as well as some private entities, into large databases that can be searched using software like Palantir."

All diagrams are from the Vice Report Link
Person Search.

Picture
Vehicle Search.
Picture
Automatic License Plate Recognition (ALPR) Search Results
Picture