Red Flags in Cyber-Surveillance Pt I

The vast majority of computer surveillance involves the monitoring of data and traffic on the Internet.[6] In the United States for example, under the Communications Assistance For Law Enforcement Act, all phone calls and broadband internet traffic (emails, web traffic, instant messaging, etc.) are required to be available for unimpeded real-time monitoring by Federal law enforcement agencies.[7][8][9]

Of course, most individuals know all about the controversy surrounding internet usage and surveillance. More then once upon broaching the topic, I’ve heard the argument: “What do I care if they’re watching me? I’ve got nothing to hide!”

But are you really so sure about that?

“Analyst Desktop Binder (REDACTED)” – Guidelines for internet surveillance priorities. From 2011, but still highly informative. Although they merit only the lowest security alert, ‘studies’ and ‘research’ into Federal agencies is, according to the DHS, enough to warrant investigation. If you google search “Red Flag Keywords Department of Homeland Security”, this is the document you are going to find in the fast majority of cases, in addition to the keywords listed below the picture.

11-aee97c4e3d

 

DHS “Analyst Desktop Binder” Released Keywords: Certain key words may “flag” you for monitoring – the released list is in the document above, and there is some reason to suspect that this list of words is likely not complete nor accurate. Below these images, you will find another, even more interesting and expansive list of keywords.list_one-e1338067357939list_two

key-words-3

Advertisements