Trump, the US Military and the American Empire

Lobster Issue 80 (Winter 2020) FREE

[PDF file]: […] pushing his Playing to the Edge. He expected that he was going to have to spend a lot of his time defending ‘Bush-era tactics that included electronic surveillance, metadata collection, renditions, detentions, interrogations, and targeted killings’, trying to convince his audience that after 9/11 ‘we had to play to the legal and ethical edge’. […]

The State of Secrecy: Spies and the Media in Britain by Richard Norton-Taylor

Lobster Issue 80 (Winter 2020) FREE

[PDF file]: […] while often presented in an off-hand or even slightly amused way, some of the historical asides are horrifying in their implications. One such example is the extensive surveillance MI5 imposed on the undeniably brilliant polymath Jacob Bronowski. It is alleged that Bronowski had to eventually emigrate to the U.S. to find any decent work […]

That option no longer exists: Britain 1974-76 by John Medhurst

Lobster Issue 69 (Summer 2015) FREE

[PDF file]: […] account of this in 1974-6: the rise of the anti-subversion lobby (he mentions Brian Crozier’s ISC but not IRD); the so-called private armies, GB75 and Unison; the surveillance and bugging of many on the left; the smear campaigns 1 The author does not mention the Soviet money. MI5 had been tracking the Soviet funds […]

Running Rings

Lobster Issue 90 (2025) FREE
To access this content, you must subscribe to Lobster (click for details).

[PDF file]: […] large hay stack.6 On the other hand, the Electronic Frontier Foundation (EFF), a digital campaign organisation reported in 2021: Almost one year after EFF called on Amazon’s surveillance doorbell company Ring to encrypt footage end-to-end, it appears they are starting to make this necessary change. This call was a response to a number of […]

Is a new ‘cold war’ coming?

Lobster Issue 68 (Winter 2014) FREE

[PDF file]: […] the preamble, while the rest was drafted by experts to privilege the permanent members of the Security Council. 3 See, inter alia, Frank Donner, The Age of Surveillance (1980), Ward Churchill & Jim Vanderwall, The Cointelpro Papers (1990). 4 Tony Benn (1925-2014) ‘After the war people said, “If you can plan for war, why […]

ViewfromtheBridge

Lobster Issue

[…] Party, (2) the institutional agenda of the intelligence and security agencies, and (3) the narrative power and moral fervor of the media with (4) the tech companies’ surveillance architecture. The claim that Russia hacked the 2016 vote allowed federal agencies to implement the new public-private censorship machinery under the pretext of ensuring “election integrity”. […]

Tittle-tattle

Lobster Issue 68 (Winter 2014) FREE

[PDF file]: […] to stop Siddique Khan before 7/7 they are also admitting that they have no evidence that he was actually a suicide bomber. Despite their many hours of surveillance of Khan they never came across anything suggesting he was preparing to kill himself or anyone else. Thus, in slowly revealing tidbit-by-tidbit what information they did […]

General Władysław Sikorski and the B-24

Lobster Issue 79 (Summer 2020) FREE

[PDF file]: […] background to Leading Aircraftsman Bill Walker’s experience can be found at . His son’s transcription of the memoir is in the PDF file at or . 26 surveillance from the German observation hut near Bill’s billet. He reckoned that the co-pilot (who died in the crash) might have spent twenty minutes when the engines […]

Lob86 View from Bridge

Lobster Issue

[…] Party, (2) the institutional agenda of the intelligence and security agencies, and (3) the narrative power and moral fervor of the media with (4) the tech companies’ surveillance architecture. The claim that Russia hacked the 2016 vote allowed federal agencies to implement the new public-private censorship machinery under the pretext of ensuring “election integrity”. […]

Secrecy in Britain

Lobster Issue 68 (Winter 2014) FREE

[PDF file]: […] European countries can do this there can be no conceivable reason for not doing so other than it would shock the public as to the extent of surveillance, spying and the use of informants. MI5 is on record as destroying a vast number of these files – what has not been destroyed should be […]

Accessibility Toolbar