The American deep state: Wall Street, big oil and the attack on U.S. democracy by Peter Dale Scott

Lobster Issue 69 (Summer 2015) FREE

[PDF file]: […] protests of the 1960s and resolved ‘never again’. 9/11 was the green light for the deep state to move into action: warrantless arrests, no fly lists, mass surveillance, data mining, and anti-terrorist ‘fusion centres’ of military and civil organisations. If deep politics is ‘all those political practices and arrangements, deliberate or not, which are […]

The State of Secrecy: Spies and the Media in Britain by Richard Norton-Taylor

Lobster Issue 80 (Winter 2020) FREE

[PDF file]: […] while often presented in an off-hand or even slightly amused way, some of the historical asides are horrifying in their implications. One such example is the extensive surveillance MI5 imposed on the undeniably brilliant polymath Jacob Bronowski. It is alleged that Bronowski had to eventually emigrate to the U.S. to find any decent work […]

Running Rings

Lobster Issue 90 (2025) FREE
To access this content, you must subscribe to Lobster (click for details).

[PDF file]: […] large hay stack.6 On the other hand, the Electronic Frontier Foundation (EFF), a digital campaign organisation reported in 2021: Almost one year after EFF called on Amazon’s surveillance doorbell company Ring to encrypt footage end-to-end, it appears they are starting to make this necessary change. This call was a response to a number of […]

ViewfromtheBridge

Lobster Issue

[…] Party, (2) the institutional agenda of the intelligence and security agencies, and (3) the narrative power and moral fervor of the media with (4) the tech companies’ surveillance architecture. The claim that Russia hacked the 2016 vote allowed federal agencies to implement the new public-private censorship machinery under the pretext of ensuring “election integrity”. […]

General Władysław Sikorski and the B-24

Lobster Issue 79 (Summer 2020) FREE

[PDF file]: […] background to Leading Aircraftsman Bill Walker’s experience can be found at . His son’s transcription of the memoir is in the PDF file at or . 26 surveillance from the German observation hut near Bill’s billet. He reckoned that the co-pilot (who died in the crash) might have spent twenty minutes when the engines […]

Lob86 View from Bridge

Lobster Issue

[…] Party, (2) the institutional agenda of the intelligence and security agencies, and (3) the narrative power and moral fervor of the media with (4) the tech companies’ surveillance architecture. The claim that Russia hacked the 2016 vote allowed federal agencies to implement the new public-private censorship machinery under the pretext of ensuring “election integrity”. […]

View from Bridge 89

Lobster Issue

[…] American politicians? A couple of of interesting essays about the CIA recently. Covert Action has editor Jeremy Kuzmarov’s account of the joint CIA and New Zealand SIS surveillance operations in the 1980s against the New Zealanders who opposed the expansion of US bases in their country.43 The Intercept describes how the CIA used the […]

Lob86ViewfromBridgepdf

Lobster Issue

[…] Party, (2) the institutional agenda of the intelligence and security agencies, and (3) the narrative power and moral fervor of the media with (4) the tech companies’ surveillance architecture. The claim that Russia hacked the 2016 vote allowed federal agencies to Clint Watts and Andrew Weisburd, ‘How Russia Dominates Your Twitter Feed to Promote […]

That option no longer exists: Britain 1974-76 by John Medhurst

Lobster Issue 69 (Summer 2015) FREE

[PDF file]: […] account of this in 1974-6: the rise of the anti-subversion lobby (he mentions Brian Crozier’s ISC but not IRD); the so-called private armies, GB75 and Unison; the surveillance and bugging of many on the left; the smear campaigns 1 The author does not mention the Soviet money. MI5 had been tracking the Soviet funds […]

Historical notes on the use of troops during the 1984-85 miners’ strike

Lobster Issue 89 (2024) FREE
To access this content, you must subscribe to Lobster (click for details).

[PDF file]: […] of how far the Secret State had become involved in the dispute. It ran covert operations against NUM members and on occasion committed murder.18 It used electronic surveillance by GCHQ and employed a network of spies and informers, some in the heart of the mining communities.19 These informers (whose identities would be at risk […]

Accessibility Toolbar