ViewfromtheBridge

Lobster Issue

[…] Party, (2) the institutional agenda of the intelligence and security agencies, and (3) the narrative power and moral fervor of the media with (4) the tech companies’ surveillance architecture. The claim that Russia hacked the 2016 vote allowed federal agencies to implement the new public-private censorship machinery under the pretext of ensuring “election integrity”. […]

General Władysław Sikorski and the B-24

Lobster Issue 79 (Summer 2020) FREE

[PDF file]: […] background to Leading Aircraftsman Bill Walker’s experience can be found at . His son’s transcription of the memoir is in the PDF file at or . 26 surveillance from the German observation hut near Bill’s billet. He reckoned that the co-pilot (who died in the crash) might have spent twenty minutes when the engines […]

Lob86 View from Bridge

Lobster Issue

[…] Party, (2) the institutional agenda of the intelligence and security agencies, and (3) the narrative power and moral fervor of the media with (4) the tech companies’ surveillance architecture. The claim that Russia hacked the 2016 vote allowed federal agencies to implement the new public-private censorship machinery under the pretext of ensuring “election integrity”. […]

View from Bridge 89

Lobster Issue

[…] American politicians? A couple of of interesting essays about the CIA recently. Covert Action has editor Jeremy Kuzmarov’s account of the joint CIA and New Zealand SIS surveillance operations in the 1980s against the New Zealanders who opposed the expansion of US bases in their country.43 The Intercept describes how the CIA used the […]

Lob86ViewfromBridgepdf

Lobster Issue

[…] Party, (2) the institutional agenda of the intelligence and security agencies, and (3) the narrative power and moral fervor of the media with (4) the tech companies’ surveillance architecture. The claim that Russia hacked the 2016 vote allowed federal agencies to Clint Watts and Andrew Weisburd, ‘How Russia Dominates Your Twitter Feed to Promote […]

Historical notes on the use of troops during the 1984-85 miners’ strike

Lobster Issue 89 (2024) FREE
To access this content, you must subscribe to Lobster (click for details).

[PDF file]: […] of how far the Secret State had become involved in the dispute. It ran covert operations against NUM members and on occasion committed murder.18 It used electronic surveillance by GCHQ and employed a network of spies and informers, some in the heart of the mining communities.19 These informers (whose identities would be at risk […]

The devil has all the best songs: reflections on the life and times of Simon Dee

Lobster Issue 58 (Winter 2009/2010) FREE

[PDF file]: […] and The Move and won.2 1 During the period between the appearance of the postcard and the subsequent legal denouement, Secunda and The Move found themselves under surveillance by the state (presumably Special Branch) who followed them on tour around the UK as they promoted ‘Flowers in the Rain’. Wilson’s lack of humour arose […]

Historical Notes on troops and the miners’s strike

Lobster Issue

[…] of how far the Secret State had become involved in the dispute. It ran covert operations against NUM members and on occasion committed murder.18 It used electronic surveillance by GCHQ and employed a network of spies and informers, some in the heart of the mining communities.19 These informers (whose identities would be at risk […]

David Shayler, ‘Tunworth’ and the LIFG

Lobster Issue 78 (Winter 2019) FREE

[PDF file]: […] of the Communist Party of Britain and Class War’ (hence the emphasis) and that he would seem to have been careful not to use the term ‘ surveillance’. What is also immediately obvious is that any decision to have ‘closed down the study of the Communist Party of Britain and Class War’ would not […]

Accessibility Toolbar