Surveillance Networks
Who’s watching whom, and how? We investigate the technologies, systems, and methodologies used to monitor individuals and groups, examining both official surveillance programs and alleged covert observation networks that operate beyond public scrutiny.
Condor’s Ghost – How a Cold War Assassination Program Was Rebranded
On September 16, 1976, the U.S. State Department was ordered to "take no further action" on a warning against Condor's assassination plots. Five days later, a car bomb exploded on Embassy Row. This wasn't an intelligence failure.