Digital Control: When Tech Becomes Tyranny: How You Unknowingly Signed Away Your Rights to Big Tech—Inside the Global Web of Surveillance, Silicon Valley Power, and the Slow Death of Democracy by Whitmore Cole

Digital Control: When Tech Becomes Tyranny: How You Unknowingly Signed Away Your Rights to Big Tech—Inside the Global Web of Surveillance, Silicon Valley Power, and the Slow Death of Democracy by Whitmore Cole

Author:Whitmore, Cole
Language: eng
Format: epub
Published: 2025-05-24T00:00:00+00:00


* * *

Chapter 10

Surveillance for Export

The bunker wasn’t supposed to exist. Hidden beneath the debris of a bombed-out ministry in Tripoli, its steel doors led not to ammunition or war rooms—but to something quieter. Something colder. It was a surveillance center, complete with tapped lines, wire mesh recording panels, and outdated computer terminals once used to catalog lives.

They didn’t use the words “surveillance state.” They didn’t need to. The cables in the walls, the microphones in the lamps, the software blinking on the abandoned screens said enough.

What made this bunker so disturbing wasn’t just what had happened inside. It was who helped build it.

At the height of Muammar Gaddafi’s dictatorship, as protests brewed beneath the surface of Libyan society and the regime’s paranoia deepened, a contract was signed. Not with a local tech company. Not with Russian intelligence. But with Amesys—a French technology firm tied closely to France’s own defense sector. The deal was simple: provide Libya with advanced internet surveillance tools capable of monitoring email traffic, logging conversations, and identifying potential threats.

The sale was justified—at least on paper—as a contribution to counterterrorism efforts. Gaddafi, after all, had repositioned himself in the 2000s as a partner in fighting Islamic extremism. He was rebranding. Resurrecting his image. And Europe, desperate for regional stability and economic opportunity, was more than willing to play along.

But beneath the diplomacy was a darker reality.

The technology Amesys delivered wasn’t used to fight terror cells. It was used to hunt bloggers, academics, students, and activists—people whose only crime was demanding change. Emails were intercepted. Conversations recorded. Lives catalogued. The system Amesys sold—known by the code name Eagle—could scan the entire nation’s internet traffic in real time. Not just monitor keywords, but build behavioral profiles, track location data, map social connections.

It was digital repression, franchised out of France.

And Libya wasn’t alone.

As the Arab Spring gained momentum, bringing the hopes of democracy to the streets of Tunis, Cairo, Damascus, and Tripoli, it became increasingly clear that many of the region’s dictators had been quietly outfitted with Western spyware. Companies based in France, Germany, Italy, the UK, and even the U.S. had been exporting tools of repression—under the radar, through front companies, using vague definitions and diplomatic loopholes.

They didn’t need to sell guns. They sold code.

In Gaddafi’s case, it began with charm. Business intermediaries, arms dealers in suits, and discreet political connections smoothed the way. One such figure—Ziad Takieddine, a Lebanese-born fixer with deep connections to the French political elite—served as a key bridge between Libya and France.

Takieddine wasn’t just whispering in the ears of executives. He was in contact with senior officials within Nicolas Sarkozy’s government. Emails, memos, and payment records later revealed that he helped facilitate the sale of surveillance systems under the pretense of anti-terror cooperation, while reaping commissions tucked away in offshore accounts.

It worked because no one wanted to look too closely.

France, at the time, was eager to reestablish ties with Libya after decades of diplomatic estrangement. Gaddafi was offering lucrative contracts in oil, construction, aviation—and technology.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Popular ebooks
Whisky: Malt Whiskies of Scotland (Collins Little Books) by dominic roskrow(58034)
What's Done in Darkness by Kayla Perrin(26841)
The Ultimate Python Exercise Book: 700 Practical Exercises for Beginners with Quiz Questions by Copy(20712)
De Souza H. Master the Age of Artificial Intelligences. The Basic Guide...2024 by Unknown(20475)
D:\Jan\FTP\HOL\Work\Alien Breed - Tower Assault CD32 Alien Breed II - The Horror Continues Manual 1.jpg by PDFCreator(20467)
The Fifty Shades Trilogy & Grey by E L James(19365)
Shot Through the Heart: DI Grace Fisher 2 by Isabelle Grey(19291)
Shot Through the Heart by Mercy Celeste(19148)
Wolf & Parchment: New Theory Spice & Wolf, Vol. 10 by Isuna Hasekura and Jyuu Ayakura(17315)
Python GUI Applications using PyQt5 : The hands-on guide to build apps with Python by Verdugo Leire(17252)
Peren F. Statistics for Business and Economics...Essential Formulas 3ed 2025 by Unknown(17101)
Wolf & Parchment: New Theory Spice & Wolf, Vol. 03 by Isuna Hasekura and Jyuu Ayakura & Jyuu Ayakura(17022)
Wolf & Parchment: New Theory Spice & Wolf, Vol. 01 by Isuna Hasekura and Jyuu Ayakura & Jyuu Ayakura(16637)
The Subtle Art of Not Giving a F*ck by Mark Manson(14647)
The 3rd Cycle of the Betrayed Series Collection: Extremely Controversial Historical Thrillers (Betrayed Series Boxed set) by McCray Carolyn(14336)
Stepbrother Stories 2 - 21 Taboo Story Collection (Brother Sister Stepbrother Stepsister Taboo Pseudo Incest Family Virgin Creampie Pregnant Forced Pregnancy Breeding) by Roxi Harding(14018)
Scorched Earth by Nick Kyme(12989)
Drei Generationen auf dem Jakobsweg by Stein Pia(11178)
Suna by Ziefle Pia(11106)
Scythe by Neal Shusterman(10591)