Sources Directory     A to Z Index     Topic Index News Releases     RSS Sources Select News RSS Feed     Sources Calendar      

Spying: Experts and Sources
Sources Directory - Subject Index


Sources Experts & Spokespersons

News Releases

Companies that cooperate with dictatorships must be sanctioned
2011-09-06
Reporters without Borders
Reporters Without Borders condemns the criminal cooperation that exists between many western companies, especially those operating in the new technology area, and authoritarian regimes.
EFF Calls Out DOJ for Failing to Provide Crucial Public Information in NSA Case
2014-01-19
Electronic Frontier Foundation
Latest Filing in Jewel v. NSA Demands Documents Government Is Trying to Conceal
EFF Files FOIA Suit Over U.S. Marshals' Spy Planes
2015-02-12
Electronic Frontier Foundation
The Electronic Frontier Foundation (EFF) has filed a Freedom of Information Act (FOIA) lawsuit to shine light on the U.S. Marshals Service's (USMS) use of small aircraft mounted with controversial cel...
EFF Wins Battle Over Secret Legal Opinions on Government Spying
2015-02-02
The Electronic Frontier Foundation (EFF) has won its four-year Freedom of Information Act lawsuit over secret legal interpretations of a controversial section of the Patriot Act.
Electronic Frontier Foundation to Court: There's No Doubt the Government Destroyed NSA Spying Evidence
2014-06-02
Electronic Frontier Foundation
The Electronic Frontier Foundation (EFF) told a federal court today that there was no doubt that the government has destroyed years of evidence of NSA spying -- the government itself has admitted to i...
Human rights organisations alarmed by bill that will give surveillance agencies dangerous new powers
2015-03-26
Reporters without Borders
Privacy International, Amnesty International, FIDH, the French League for Human Rights and Reporters Without Borders are alarmed by the expansive surveillance powers to be granted to surveillance agen...
Human Rights Watch Sues DEA Over Bulk Collection of Americans' Telephone Records
2015-04-10
Electronic Frontier Foundation
EFF Lawsuit Challenges Drug Enforcement Administration Surveillance of International Call Records
Massive eavesdropping in Europe: international NGOs urge the Assembly to support the resolution
2013-09-20
international NGOs urge the Assembly to support the resolution Massive eavesdropping in Europe
New Behind-the-Scenes Video: Airship Flight Over the NSA Data Center
2014-08-09
Electronic Frontier Foundation
The Internet's Own Boy Director Brian Knappenberger Releases Short Doc as Senate Introduces New Reform Bill
New Street-Level Surveillance Project Tracks Spying Technologies Used by Local Law Enforcement
2015-08-09
Electronic Frontier Foundation
EFF Web Portal Provides In-Depth Resources About License Plate Readers, Biometric Collection, and Other High-Tech Surveillance Tools.
Spies for Hire: New Online Database of U.S. Intelligence Contractors
2009-12-06
CorpWatch
Starting today, journalists, activists, and corporate researchers will be able to use the Internet site SpiesForHire.org to track the nation#s most important intelligence contractors.
Spooky Business: A New Report on Corporate Espionage Against Non-profits
2013-12-04
Center for Corporate Policy
Giant corporations are employing highly unethical or illegal tools of espionage against nonprofit organizations with near impunity, according to a new report by Essential Information.
The Day We Fight Back Against Mass Surveillance: February 11, 2014
2014-01-28
Electronic Frontier Foundation
On February 11, on the Day We Fight Back, the world will demand an end to mass surveillance in every country, by every state, regardless of boundaries or politics.
UN body urged to take position on export of surveillance material
2014-06-21
Reporters Without Borders
As the UN Human Rights Council continues its 26th session and a panel discussion is held today on corporate social responsibility, Reporters Without Borders urges the council to promote the adoption o...

Sources Select Resources

Australian government orders ASIO raids to suppress East Timor spying evidence
Head, Mike
Article
2013
World Socialist Web Site
The Abbott governmen ordered Australian Security Intelligence Organisation (ASIO) and Australian Federal Police (AFP) raids on the homes and offices of a lawyer and former intelligence agency whistleb...
The Big Secret That Makes the FBI's Anti-Encryption Campaign a Big Lie
McLaughlin, Jenna
Article
2015
The Intercept
McLaughlin discusses how hacking techniques and their increasing use are justified in a prevalent way by the American government.
The boss is spying
Lin, Htun
Article
2013
News & Letters
The data mining by large U.S. corporations gets less attention than U.S. government surveillance. It goes beyond the tracking of every mouse-click, purchase and "like" registered by every consumer on ...
Canada's Spy Groups Divulge Secret Intelligence to Energy Companies
Groves, Tim
Article
2012
The Dominion
Documents raise fears that info on environmentalists, indigenous groups and more shared with industry at biannual, secret-level, briefings.
China's Cyberspying Is 'on a Scale No One Imagined' -- if You Pretend NSA Doesn't Exist
Jackson, Janine
Article
2015
FAIR
Stories about cyberespionage -- like the data theft at the US Office of Personal Management believed but not officially stated to have been carried out by China -- are weird. For one thing, they inclu...
Companies that cooperate with dictatorships must be sanctioned
Sources News Release
Article
2011
Reporters without Borders
Reporters Without Borders condemns the criminal cooperation that exists between many western companies, especially those operating in the new technology area, and authoritarian regimes.
Complaints filed against telecom companies for their role in UK mass surveillance programme
Privacy International
Article
2013
IFEX
On 5 November 2013, Privacy International filed formal complaints with the Organisation for Economic Cooperation and Development (OECD) in the UK against some of the world's leading telecommunication ...
The Corporate State of Surveillance
Opting Out
Nader, Ralph
Article
2013
CounterPunch
America was founded on the ideals of personal liberty, freedom and democracy. Now mass spying, surveillance and the unending collection of personal data undermine civil liberties and our privacy right...
Corporations Spy on Nonprofits with Impunity
Dow Chemical vs. Greenpeace
Nader, Ralph
Article
2014
CounterPunch
Here's a dirty little secret you won't see in the daily papers: corporations conduct espionage against US nonprofit organizations without fear of being brought to justice.
CSE monitors millions of Canadian emails to government
Hildebrandt, Amber; Seglins, Dave; Pereira, Michael
Article
2015
CBC
Canada's electronic spy agency collects millions of emails from Canadians and stores them for "days to months" while trying to filter out malware and other attacks on government computer networks.
EFF Files FOIA Suit Over U.S. Marshals' Spy Planes
Sources News Release
Article
2015
Electronic Frontier Foundation
The Electronic Frontier Foundation (EFF) has filed a Freedom of Information Act (FOIA) lawsuit to shine light on the U.S. Marshals Service's (USMS) use of small aircraft mounted with controversial cel...
Electronic Frontier Foundation to Court: There's No Doubt the Government Destroyed NSA Spying Evidence
Sources News Release
Article
2014
Electronic Frontier Foundation
The Electronic Frontier Foundation (EFF) told a federal court today that there was no doubt that the government has destroyed years of evidence of NSA spying -- the government itself has admitted to i...
Extraordinary Violence at 500 Pearl Street
The Sentencing of Jeremy Hammond
Tarrant, Anthony
Article
2013
Dissident Voice
On Friday, November 15, 2013, extreme violence with malicious intent was meted out by Federal District Court Judge Loretta Preska in the sentencing phase of 28 year old hacktivist Jeremy Hammond befor...
Eyes Wide Open
Article
2013
Privacy International
The recent revelations, made possible by NSA-whistleblower Edward Snowden, of the reach and scope of global surveillance practices have prompted a fundamental reexamination of the role of intelligence...
Fake cell phone 'towers' may be spying on Americans' calls, texts
Munoz, Eduardo
Article
2014
RT
More than a dozen 'fake cell phone towers' could be secretly hijacking Americans' mobile devices in order to listen in on phone calls or snoop on text messages, a security-focused cell phone company c...
FBI director wants access to encrypt Apple, Google users' data, demands law 'fix'
Article
2014
RT.com
The FBI director has slammed Apple and Google for offering their customers encryption technology that protects users’ privacy. "Deeply concerned" James Comey wants to push on Congress to "fix" laws to...
The FBI Director's Evidence Against Encryption Is Pathetic
Froomkin, Dan; Vargas-Cooper, Natasha
Article
2014
The Intercept
FBI Director James Comey gave a speech Thursday about how cell-phone encryption could lead law enforcement to a “very dark place” where it “misses out” on crucial evidence to nail criminals. To make h...
GCHQ and European spy agencies worked together on mass surveillance
Borger, Julian
Article
2013
Guardian Weekly
Edward Snowden papers unmask close technical cooperation and loose alliance between British, German, French, Spanish and Swedish spy agencies.
Google doesn't want you to limit its ability to follow you around the internet
Article
2014
Theguardian
Behind our screens, tech companies are racing to extract a price for what we read and watch on the web: our personal information.
Google: don't expect privacy when sending to Gmail
Rushe, Dominic
Article
2013
Guardian Weekly
People sending email to any of Google's 425 million Gmail users have no "reasonable expectation" that their communications are confidential, the internet giant has said in a court filing.
Gouzenko, Igor
Sources Select Resources Encyclopedia
Article
Igor Sergeyevich Gouzenko (January 13, 1919 – June 28, 1982) was a cipher clerk for the Soviet Embassy to Canada in Ottawa, Ontario. He defected on September 5, 1945, with 109 documents on Soviet es...
Government Spying Aims to Silence Us
Spritzler, John
Article
2013
New Democracy World
What the ruling class is aiming at, with these occasional "leaks" about its spying on us, is not so much to collect information about us but rather to make us feel so totally spied upon that we will b...
GovernmentSources.ca
Website
A portal with information about government, Canadian and international, with articles, documents, books, websites, and experts and spokespersons. The home page features a selection of recent and impor...
How Corporations and Law Enforcement Are Spying on Environmentalists
Federman, Adam
Article
2015
Truth-Out.org
In August 2010, the Federal Bureau of Investigation's Domestic Terrorism Analysis Unit distributed an intelligence bulletin to all field offices warning that environmental extremism would likely becom...
How the Government Secretly Demanded the IP Address of Every Visitor to Political News Site Indymedia.us
Article
2009
Electronic Frontier Foundation
Secrecy surrounds law enforcement's communications surveillance practices like a dense fog. Particularly shrouded in secrecy are government demands issued under 18 U.S.C. § 2703 of the Stored Communic...
Human rights organisations alarmed by bill that will give surveillance agencies dangerous new powers
Sources News Release
Article
2015
Reporters without Borders
Privacy International, Amnesty International, FIDH, the French League for Human Rights and Reporters Without Borders are alarmed by the expansive surveillance powers to be granted to surveillance agen...
Human Rights Watch Sues DEA Over Bulk Collection of Americans' Telephone Records
Sources News Release
Article
2015
Electronic Frontier Foundation
EFF Lawsuit Challenges Drug Enforcement Administration Surveillance of International Call Records
I, spy: Edward Snowden in exile
Rusbridger, Alan; MacAskill, Ewen
Article
2014
The Guardian
The Guardian interviews Edward Snowden, the former NSA contractor who leaked thousands of classified documents to media outlets. Snowden shares his views on the events that have occured since his exil...
IntelligentSearch.ca
Website
2017
Sources
A web portal featuring topics related to research and the Internet. The home page features a selection of recent and important articles. A search feature, subject index, and other research tools make ...
Interior Ministry protection programme for journalists also used for "close-quarters spying"
Article
2009
Reporters without Borders
Journalist Claudia Julieta Duque, who is under an interior ministry protection programme for journalists, has been harassed and intimidated by Colombia's intelligence services, who obtained informatio...
Is Your Printer Spying On You?
Article
Electronic Frontier Foundation
Imagine that every time you printed a document it automatically included a secret code that could be used to identify the printer - and potentially the person who used it.
Labour spies
Sources Select Resources Encyclopedia
Article
Labour spies are persons recruited or employed for the purpose of gathering intelligence, committing sabotage, sowing dissent, or engaging in other similar activities, typically within the context of ...
Lessons of the Snowden Revelations
You are the Target!
Lopez, Alfredo
Article
2013
CounterPunch
We in the Left have long worried about “police state tactics”. Now we have to confront the police state structure. It’s here and it can morph into a real police state with very little effort. Opposing...
The Logic behind Mass Spying: Empire and Cyber Imperialism
Petras, James
Article
2013
Dissident Voice
Revelations about the long-term global, intrusive spying by the US National Security Agency (NSA) and other allied intelligence apparatuses have provoked widespread protests and indignation and threat...
Manual teaches intelligence agency employees how to spy on problem journalists
Article
2009
The weekly Semana has revealed the existence of an instruction manual for employees of the Administrative Department of Security (DAS), Colombia's leading intelligence agency, that explains how they s...
Media spies put all journalists in danger
Madsen, Wayne
Article
2014
Strategic Culture Foundation
The increasing tendency of the Central Intelligence Agency and other U.S. intelligence agencies to disregard previous prohibitions against the use of journalists as agents puts every legitimate report...
Microsoft handed the NSA access to encrypted messages
Greenwald, Glenn, et. al
Article
2013
Guardian Weeky
Microsoft has collaborated closely with US intelligence services to allow users' communications to be intercepted, including helping the National Security Agency to circumvent the company's own encryp...
Mistaking Omniscience for Omnipotence
In a World Without Privacy, There Are No Exemptions for Our Spies
Engelhardt, Tom
Article
2013
TomDispatch.com
Given how similar they sound and how easy it is to imagine one leading to the other, confusing omniscience (having total knowledge) with omnipotence (having total power) is easy enough. It’s a reasona...
No Safe Harbor: How NSA Spying Undermined U.S. Tech and Europeans' Privacy
O'Brien, Danny
Article
2015
Electronic Frontier Foundation
The spread of knowledge about the NSA's surveillance programs has shaken the trust of customers in U.S. Internet companies like Facebook, Google, and Apple: especially non-U.S. customers who have disc...
NSA and GCHQ target Tor network that protects anonymity of web users
Ball, James; Schneier, Bruce; Greenwald, Glenn
Article
2013
Guardian Weekly
The National Security Agency has made repeated attempts to develop attacks against people using Tor, a popular tool designed to protect online anonymity, despite the fact the software is primarily fun...
NSA surveillance may cause breakup of internet, warn experts
Taylor, Matthew; Hopkins, Nick; Kiss, Jemima
Article
2013
Internet specialists highlight moves by Brazil, Germany and India towards creating separate networks in order to block spying.
The NSA's Invasion of Google and Yahoo Servers
Your Email is Likely Being Monitored
Lopez, Alfredo
Article
2013
CounterPunch
The American National Security Agency (NSA) has been intercepting information coming in and out of Google and Yahoo servers over non-public, internal network fibre optic lines. In December, 2012 alone...
NSA's Path to Totalitarianism
Ever-Shrinking Democracy in America
Pollack, Norman
Article
2013
CounterPunch
The American National Security Agency (NSA) appears as a “rogue” organization, extremism in the putative service of liberty. Or better, call it, stripped of all cosmetics, the unerring mark of a Polic...
The NSA's Spying Operation on Mexico
Systematic Eavesdropping on the Government
Carlsen, Laura
Article
2013
CounterPunch
The American NSA has been systematically eavesdropping on the Mexican government for years. Three major programs constitute a massive espionage operation against Mexico.
The Orwellian Re-Branding of 'Mass Surveillance' as Merely 'Bulk Collection'
Greenwald, Glenn
Article
2015
The Intercept
Just as the Bush administration and the U.S. media re-labelled "torture" with the Orwellian euphemism "enhanced interrogation techniques" to make it more palatable, the governments and media of the Fi...
Other Voices: The Connexions Newsletter - September 4, 2014
Diemer, Ulli (editor); Khan, Tahmid (production)
Article
2014
Connexions
Information about the Connexions Alternative Media List and the Labor Film Archive. Articles on corporations spying on non-profits, workplace deaths, Monsanto and Ukraine, and liberal environmentalism...
Other Voices: The Connexions Newsletter - September 19 2014
Spying, terrorism, and protest
Diemer, Ulli (editor); Khan, Tahmid (production)
Serial Publication (Periodical)
2014
Connexions
Coverage of spying, terrorism, and protest. Articles on how the ISIS (Islamic State group) comes to be using American weapons; the U.S. government's secret plans to spy for American corporations; the ...
Profiled
From Radio to Porn, British Spies Track Web Users' Online Identities
Gallagher, Ryan
Article
2015
The Intercept
Amid a renewed push from the U.K. government for more surveillance powers, more than two dozen documents being disclosed by The Intercept reveal for the first time several major strands of GCHQ’s (Gov...
Reflections on a whistleblower: Two years after Snowden
Tzabiras, Marianna
Article
2015
IFEX
Two years after Snowden, the international state of surveillance and the ranks of whistleblowers both continue to grow.
Secret 'BADASS' Intelligence Program Spied on Smartphones
Lee, Micah
Article
2015
The Intercept
British and Canadian spy agencies accumulated sensitive data on smartphone users, by piggybacking on ubiquitous software from advertising and analytics companies, according to a document obtained by N...
Selling your Secrets
The Invisible World of Software Backdoors and Bounty Hunters
Chatterjee, Pratap
Article
2014
CorpWatch
The documents released by whistleblower Edward Snowden reveal that the world of NSA mass surveillance involves close partnerships with a series of companies most of us have never heard of that design ...
Snowden, Surveillance And The Secret State
Cromwell, David; Edwards, David
Article
2013
Media Lens
There is plenty to be said about living under a giant system of government surveillance. Just don't expect the corporate media to explore the full extent of what it really all means.
Software Meant to Fight Crime Is Used to Spy on Dissidents
Perlroth, Nicole
Article
2012
New York Times
Morgan Marquis-Boire works as a Google engineer and Bill Marczak is earning a Ph.D. in computer science. But this summer, the two men have been moonlighting as detectives, chasing an elusive surveilla...
Spies for Hire
Website
Company profiles and articles related to intelligence outsourcing.
Spies for Hire: New Online Database of U.S. Intelligence Contractors
Sources News Release
Article
2009
CorpWatch
Starting today, journalists, activists, and corporate researchers will be able to use the Internet site SpiesForHire.org to track the nation#s most important intelligence contractors.
Spies Hacked Computers Thanks to Sweeping Secret Warrants, Aggressively Stretching U.K. Law
Fishman, Andrew; Greenwald, Glenn
Article
2015
The Intercept
British spies have received government permission to intensively study software programs for ways to infiltrate and take control of computers. The GCHQ spy agency was vulnerable to legal action for th...
Spooky Business: A New Report on Corporate Espionage Against Non-profits
Sources News Release
Article
2013
Center for Corporate Policy
Giant corporations are employing highly unethical or illegal tools of espionage against nonprofit organizations with near impunity, according to a new report by Essential Information.
Spooky Business: Corporate Espionage Against Nonprofit Organizations
Ruskin, Gary
Article
2013
Corporate Policy
This report is an effort to document something about corporate espionage against nonprofit organizations. Law enforcement should prioritize investigating and prosecuting corporate espionage against no...
Spying by the Numbers
Hundreds of Thousands Subject to Government Surveillance and No Real Protection
Quigley, Bill
Article
2013
CounterPunch
Thanks to NSA whistleblower Edward Snowden many more people in the US and world-wide are learning about extensive US government surveillance and spying. There are publicly available numbers which sho...
Surveillance firms spied on campaign groups for big companies, leak shows
Evans, Rob; Jones, Meirion
Article
2017
The Guardian
British Airways, the Royal Bank of Scotland and Porsche are among five large companies that have been identified as having paid corporate intelligence firms to monitor political groups that challenged...
Three Leaks, Three Weeks, and What We've Learned About the US Government's Other Spying Authority: Executive Order 12333
Jaycox, Mark M.
Article
2013
Electronic Frontier Foundation
The National Security Agency has been siphoning off data from the links between Yahoo and Google data centers, which include the fiber optic connections between company servers at various points aroun...
Top-Secret Document Reveals NSA Spied on Porn Habits as Part of Plan to Discredit 'Radicalizers'
Article
2013
Huffington Post
The National Security Agency has been gathering records of online sexual activity and evidence of visits to pornographic websites as part of a proposed plan to harm the reputations of those whom the a...
Unmasking the Five-Eyed monster, a global and secret intelligence-sharing regime
Article
2013
IFEX
Privacy International is proud to announce our new project, Eyes Wide Open, which aims to pry open the Five Eyes arrangement and bring it under the rule of law.
The U.S. Government's Secret Plans to Spy for American Corporations
Greenwald, Glenn
Article
2014
The Intercept
Throughout the last year, the U.S. government has repeatedly insisted that it does not engage in economic and industrial espionage, in an effort to distinguish its own spying from China's infiltration...

Sources Bookshelf

Covert Entry
Spies, Lies and Crimes Inside Canada's Secret Service
Mitrovica, Andrew
Book
2002
A glimpse into the inner workings of Canada's secret service.
Spies for Hire
The Secret World of Intelligence Outsourcing
Shorrock, Tim
Book
2008
According to investigative journalist Tim Shorrock, the CIA and other American intelligence agencies now have more contractors working for them than they do spies of their own. Often former staff hire...


Sources is an online portal and directory for journalists, writers, news editors, researchers. Use Sources to find experts, media contacts, spokespersons, scientists, lobbyists, officials, speakers, university professors, researchers, newsmakers, CEOs, executive directors, media relations contacts, spokespeople, talk show guests, PR representatives, Canadian sources, story ideas, research studies, databases, universities, colleges, associations, businesses, government, research institutions, lobby groups, non-government organizations (NGOs), in Canada and internationally.
© Sources 1977-2021. The information provided is copyright and may not be reproduced in any form or by any means (whether electronic, mechanical or photographic), or stored in an electronic retrieval system, without written permission of the publisher. The content may not be resold, republished, or redistributed. Indexing and search applications by Ulli Diemer and Chris DeFreitas.