Surveillance Shadows: The Secret Rise of U.S. Spying in ‘Means of Control’

Byron Tau's "Means of Control" delves into the shadowy expansion of surveillance by the U.S. national security establishment post-9/11, initiated by John Poindexter with the Total Information Awareness program. Despite public outcry and its apparent discontinuation, the initiative persisted under different guises, employing commercially available data without a federal privacy law. Tau highlights how surveillance, often conducted through smartphone apps and lacking transparency, contrasts with the overt monitoring in countries like China. The book also explores the implications of this surveillance and offers advice on evading digital tracking, questioning the feasibility of complete privacy.


In the aftermath of the 9/11 terror attacks, former national security advisor John Poindexter launched Total Information Awareness, intent on preventing future assaults on the homeland by amassing extensive databases on people and their movements.

The Pentagon program had a creepy eye-surveilling-the-globe-from-a-pyramid logo and was roundly rejected by civil libertarians as Orwellian overkill. Adm. Poindexter, an Iran-Contra conspirator, was skewered by late-night talk show hosts and Congressional resistance moved to defund it.

Except TIA wasn’t DOA. Not by a longshot.

A book cover titled "means of control" by byron tau, discussing the alliance of tech and government in creating a surveillance state.

The data collection that Poindexter envisioned instead went underground, with code names such as “Basketball” and classified budgets. How private Beltway contractors grew what has become a secretive surveillance regime is exposed in disturbing detail by journalist Byron Tau in his first book, “Means of Control.” In the absence of a federal privacy law, the U.S. national security establishment has used commercially available data to craft a creeping panopticon.

As a Wall Street Journal reporter, Tau broke important stories on how the shadowy U.S. data collection and brokering industry has been indirectly — and legally, it seems — eavesdropping on tens of millions of Americans and foreigners in the service of U.S. military, intelligence and homeland security.

“In China, the state wants you to know you’re being watched. In America, the success lies in the secrecy,” he writes. “The government does not want you to notice the proliferation of license plate readers. It does not want citizens to understand that mobile phones are a surveillance system… that social media is being eavesdropped on.”

When Tau does get a breakthrough, it is often on surveillance partnerships that help foil a bad guy — like the U.S. border drug tunnel Department of Homeland Security agents uncover in 2018 with cellphone geolocation data obtained from a company called Venntel.

To gather intelligence, firms working closely with U.S. national security operators have embedded data-collecting software in smartphone apps — such as Muslim prayer apps popular in the Middle East. The app owners may or may not be aware of the software modules’ surveillance mission, though there’s a reason they’re getting paid to include the data-gathering SDKs (software development kits).

Some of these tools have been developed with CIA funding and some, like VISR (Virtual Intelligence, Surveillance and Reconnaissance), have been widely shared inside U.S. intelligence and among U.S. military special operators, Tau writes. The companies involved come and go in the sort of musical chair game we’ve come expect in U.S. national security contracting.

Which hasn’t prevented some from being outed by privacy warriors led by Sen. Ron Wyden of Oregon and, now, the Biden administration’s activist Federal Trade Commission.

Take X-Mode, one firm Tau examines.

In 2021, X-Mode was found to have been selling access to location data to the U.S. military. In January, the FTC banned X-Mode and its successor, Outlogic, from sharing or selling data on cellphone users’ location without their explicit consent. It expressed concern such data could be used to track visits to places like abortion clinics, places of worship and domestic abuse shelters.

Near the end of the helpfully annotated 291-page book, Tau offers a chapter on how to protect yourself from digital tracking. There are privacy/convenience tradeoffs. But is complete erasure truly possible? He asks Michael Bazzell, an expert in the field.

“Of course,” Bazzell says. “Will you enjoy that life? Maybe not.”

SOURCEby The Associated Press
Previous articleUS judge condemns FBI while ordering release of man in ‘Newburgh Four’ terror sting
Next articleBob Graham, 9/11, the FBI and me

Since 2004, 911Truth.Org has educated the public about the suppressed realities of the September 11 attacks.

We worked with the 9/11 Families to pressure the Bush administration to convene an investigation into the deadliest attacks on US soil since Pearl Harbor. We attended many of the commission hearings and questioned commissioners and bird-dogged elected officials to get answers to the Unanswered Questions that remain so to this day.

We reported the contradictions, lies and omissions on the public record. 911Truth.Org staff have given hundreds of interviews on radio and mainstream network TV.

We cover a wide range of 9/11-related issues in publishing academic papers, original research, and opinion pieces.

We wish to thank our donors who have kept us on the web since 2004! We appreciate your continued support!

We continue to update the website to make the nearly 3000 articles easier to find, read and share. Thanks for visiting us!