The North American Congress on Latin America (NACLA)
Abstract:
Newly declassified CIA documents reveal the links between Mexico’s contemporary surveillance state and a uniquely close Cold War collaboration with U.S. intelligence agencies.
Topic:
Cold War, Intelligence, Surveillance, and Central Intelligence Agency (CIA)
The North American Congress on Latin America (NACLA)
Abstract:
After a two-year investigation, a comprehensive report, BBC documentary, and whistleblower dossier reveal alleged widespread contamination, health impacts, and surveillance by Colombia’s state-owned Ecopetrol.
Topic:
Oil, Surveillance, Journalism, Investigations, State-Owned Enterprises, and Contamination
Sahar Aziz, Michael German, Ayah Zaki, and Dillon Reisman
Publication Date:
03-2024
Content Type:
Video
Institution:
Center for Security, Race and Rights (CSRR), Rutgers University School of Law
Abstract:
Civil liberties are vulnerable to infringement in large part due to the post-9/11 expansion of a government surveillance apparatus. Join us as we examine the threats to civil liberties and rights posed by Fusion Centers, as highlighted in the Center for Security, Race and Rights’ groundbreaking report Shining a Light on New Jersey's Secret Intelligence System. Host Sahar Aziz addresses these issues with Brennan Center for Justice law enforcement expert Michael German, CAIR New Jersey staff attorney Ayah Zaki, and ACLU of New Jersey attorney Dillon Reisman.
Topic:
Intelligence, Law Enforcement, Surveillance, and Civil Liberties
Political Geography:
North America, New Jersey, and United States of America
Center for the Opening and Development of Latin America (CADAL)
Abstract:
We should be worried about China’s AI capacities, not only because
it enhances the powers of the Party-state, but also because it
is exporting its population control technology and policy abroad.
Topic:
Science and Technology, Governance, Authoritarianism, Surveillance, Artificial Intelligence, Social Control, and Threat Assessment
China Maritime Studies Institute, U.S. Naval War College
Abstract:
Since 2017, the People’s Liberation Army Navy (PLAN) has commissioned a new class of ocean surveillance vessel into its order of battle: the Type 927. Similar in design and function to the U.S. Navy’s Victorious and Impeccable class T-AGOS ships, the Type 927 was introduced to help remedy the PLAN’s longstanding weakness in anti-submarine warfare. The PLAN has likely built six Type 927 ships to date, most based for easy access to the South China Sea. In peacetime, these ships use their towed array sonar to collect acoustic data on foreign submarines and track their movements within and beyond the first island chain. In wartime, Type 927 vessels could contribute to PLAN anti-submarine warfare operations in support of a range of different maritime campaigns. However, their lack of self-defense capabilities would make them extremely vulnerable to attack.
Topic:
Defense Policy, Navy, Maritime, Surveillance, Submarines, and People's Liberation Army (PLA)
Beijing promotes digital sovereignty in its engagements with other countries but with the caveat that it can maintain access to partner countries’ digital systems.
Leaked documents from cyber contracting firm iS00N indicate a focus on One Belt One Road partner countries, targeting critical systems, including telecoms, government ministries, and financial institutions.
A new paradigm of using nominally private firms allows Beijing to put distance between its inclusive rhetoric of “win-win cooperation” while companies hack partner countries’ infrastructure at the direction of its security services.
Topic:
Cybersecurity, Surveillance, Belt and Road Initiative (BRI), and Digital Sovereignty
While Iranian officials acknowledge the significance of cyber tools and AI for foreign policy, they are acutely aware of the country’s financial and scientific limitations.
Discussions and debates surrounding the utilization and significance of cyberspace and artificial intelligence in Iran primarily revolve around two key perspectives: viewing them as integral components of national security strategy, and understanding cyber capabilities and AI as essential tools for safeguarding national interests. Within the context of Tehran’s extensively publicized forward defense doctrine, it is reasonable to expect that Tehran would develop (AI assisted) offensive cyber capabilities, allowing it to infiltrate its adversaries’ systems and execute preemptive actions against perceived threats. A critical prerequisite for doing so, in turn, would be to put in place robust surveillance capabilities which can alarm the officials of any potential incoming attack. However, available evidence suggests a dire lack of such capabilities not least because Iran’s critical infrastructure has been the target of frequent cyberattacks, allegedly originating from Israel.
Topic:
Foreign Policy, National Security, Cybersecurity, and Surveillance
The global spyware and digital forensics industry continues to grow despite public backlash following an array of surveillance scandals, many linked to NSO Group’s Pegasus program. This paper explores the resilience of the commercial spyware market and offers ideas about how to limit the spread of invasive cyber surveillance tools. It highlights several factors driving the industry, including elevated demand for intrusion technology from government clients and private customers, as well as inconsistent political will from democratic governments to crack down on these technologies.
Topic:
Science and Technology, Cybersecurity, Democracy, Surveillance, Industry, Forensic Science, and Autocracy
In this latest Strategic Update, Valentin Weber explores Chinese scientific research and industry application of smart cities, with ‘city brains’. The geostrategic implications for these complex Chinese smart city construction projects outside of China – particularly surrounding surveillance and artificial intelligence – and a potential future ‘world digital brain’ must be considered by policymakers, even if we are far away from an eventual bifurcation of the global internet.
Topic:
Science and Technology, Geopolitics, Surveillance, Artificial Intelligence, and Smart Cities
Both Russian and Ukrainian forces are now working with groups of drones launched against adversary positions. This often involves different drone types working in pairs—such as an intelligence, surveillance and reconnaissance (ISR) drone directing and guiding a loitering munition to a target. There is growing evidence that Ukrainian forces are using these tactics to identify and target Russian positions. A typical group raid on the Russian trenches involves one drone to draw the attention of a counter-UAV unit, exposing their position, while other drones subsequently attack exposed soldiers.
Topic:
Intelligence, Weapons, Drones, Surveillance, Reconnaissance, and Russia-Ukraine War