Assets

In a standard greenhouse, the assets are visible: this plant, that soil, those seeds. In this one, the assets are less tangible and more layered. Nation-state surveillance operates across three tiers simultaneously, and what constitutes a valuable asset changes depending on which adversary is doing the looking and what they need it for.

Individual layer

At the individual level, the assets are the raw materials of a person’s digital life, but the value placed on them here is different from how a data broker sees them. Intelligence agencies are not primarily interested in selling you things.

Identity signals: your name, national identity number, passport details, address history, and the identifiers that attach you to accounts, devices, and services. These are the root of any surveillance file.

Behavioural patterns: your routine, your movement, your schedule, your purchasing habits, your online activity over time. Patterns are more useful than snapshots because they enable prediction. Knowing where you are is useful; knowing where you will be is more so.

Social graph: who you communicate with, how often, through which channels, and in what organisational contexts. The social graph is often more revealing than the content of communications. Mapping the graph of an activist network, a newsroom, or a diaspora community produces intelligence about structure, not just individuals.

Beliefs and affiliations: political views, religious practice, union membership, civil society participation, protest attendance, and association with groups or causes that may be of interest to a surveilling party. These attributes are particularly sensitive because they are exactly what freedom of association and freedom of thought are meant to protect, and exactly what politically motivated surveillance tends to target.

Organisational layer

Non-governmental organisations, civil society groups, trade unions, religious institutions, diaspora communities, and media organisations hold assets that are of interest to surveillance for different reasons than individual data.

Beneficiary and partner data: organisations working with vulnerable populations, refugees, people in conflict zones, or political dissidents hold records that identify people whose exposure would carry direct personal risk. A donor database, a case management system, or an encrypted communications channel is valuable to a surveilling party precisely because the people it contains may be difficult to locate through other means.

Internal strategy and communications: board discussions, legal correspondence, strategic planning documents, and confidential communications with partner organisations. The interest here is in understanding what a civil society group knows, who it is coordinating with, and what it intends to do. This is relevant both to domestic intelligence agencies monitoring political opposition and to foreign intelligence agencies assessing influence networks.

Funding and donor networks: who funds a civil society organisation and on what terms is operationally useful information. It can be used to apply pressure on funders, to map financial networks, or to generate regulatory or reputational challenges.

Structural layer

At the national and EU level, the assets are not individuals or organisations but patterns and aggregates that describe the state of a society.

Population behaviour and political sentiment: aggregate data about what large numbers of people believe, how they communicate, and how they organise. This is the input to predictive models of political stability, social unrest, and electoral behaviour. The asset here is the model, not any individual record.

Economic and research intelligence: trade secrets, R&D data, negotiating positions, procurement information, and technological capability assessments. This is the domain of industrial espionage, which is conducted by allied states as well as adversarial ones. The Snowden disclosures included documentation of US collection targeting EU trade negotiating positions.

Critical infrastructure data: communications patterns, dependency maps, and operational data about energy, transport, financial, and digital infrastructure. This is both an intelligence asset and a pre-positioning asset for offensive operations.

At the structural level, the key insight is this: the asset is not a person. It is a population model. And population models are built from individual records whether or not any individual was the intended target.