We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

Watching the Watchers: Building a Sousveillance State

Formal Metadata

Title
Watching the Watchers: Building a Sousveillance State
Title of Series
Part Number
9
Number of Parts
177
Author
License
CC Attribution - ShareAlike 3.0 Germany:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor and the work or content is shared also in adapted form only under the conditions of this
Identifiers
Publisher
Release Date2015
LanguageEnglish
Production PlaceBerlin

Content Metadata

Subject Area
Genre
Abstract
Secret surveillance programs have metadata too. The same people and companies that operate secret surveillance programs also publish details about their work on the open internet. We can use this data to watch the watchers. “Proficient in Microsoft Word and Xkeyscore” and similar phrases are surprisingly common on LinkedIn profiles. NSA contractors, military, and others involved in the surveillance state post seemingly coded and harmless details about their work in job listings, social media, and other open websites. But this information provides useful metadata that can be used to understand the function of secret programs and map the surveillance state. Transparency Toolkit has been building open source tools to collect and analyze this open source intelligence. This talk discusses how we can use these data sources and tools to build a sousveillance state that holds the surveillance state accountable.