Home Title Index Topic Index Sources Directory News Releases Sources Calendar

Privacy
AlterLinks Topic Index

  1. Alternatives to Body Scans Do Exist
    Sources News Release

    Resource Type: Article
    Published: 2010
    If the technology exists to detect even greater hazards and protect privacy concerns, why wouldn't our government want to consider them?
  2. The Big Brother Game
    Resource Type: Book
    Published: 1975
  3. Big Brother's Getting Bigger
    Resource Type: Article
    Published: 2012
    Government surveillance and attacks on the privacy of American citizens were bad enough under the Bush regime but they are getting even worse during the Obama years.
  4. Canadian Council of Christian Charities
    Media Profile in Sources

    Resource Type: Organization
  5. The Car of the Future Will Sell Your Data
    Resource Type: Article
    Published: 2018
    As "smarter" vehicles provide storehouses of personal information, carmakers are building databases of consumer preferences that could be sold to outside vendors for marketing purposes, much like Google and Facebook.
  6. The City in History
    Its Origins, Its Transformations, and Its Prospects

    Resource Type: Book
    Published: 1961
    Beginning with an interpretation of the origin and nature of the city, Mumford follows the city's development from Egypt and Mesopotamia through Greece, Rome, and the Middle Ages to the modern world.
  7. Coalition Announces New ‘Do Not Track’ Standard for Web Browsing
    Sources News Release

    Resource Type: Article
    Published: 2015
    The Electronic Frontier Foundation (EFF), privacy company Disconnect and a coalition of Internet companies have announced a stronger “Do Not Track” (DNT) setting for Web browsing - a new policy standard that, coupled with privacy software
  8. Connexions
    Volume 4, Number 1 - February 1979 - National Security/Securite Nationale

    Resource Type: Serial Publication (Periodical)
    Published: 1979
  9. Connexions
    Volume 5, Number 1 - January 1980 - Literacy/Alphabetisation

    Resource Type: Serial Publication (Periodical)
    Published: 1980
  10. Connexions
    Volume 7, Number 1 - March 1982

    Resource Type: Serial Publication (Periodical)
    Published: 1982
  11. Connexions
    Volume 9, Number 2 - Summer 1984 - Rights and Liberties - A Digest of Resources & Groups for Social

    Resource Type: Serial Publication (Periodical)
    Published: 1984
  12. Connexions Annual Resource and Reading List
    Resource Type: Article
    Published: 1994
    A short and selective list of resources on issues addressed in the Connexions Annual, such as environment, education, peace, interntional development, women's issues, urban issues, housing, human rights, civil liberties, social change.
  13. Connexions Digest
    Issue 54 - February 1992- A Social Change Sourcebook

    Resource Type: Serial Publication (Periodical)
    Published: 1992
  14. Connexions Library: Human Rights and Civil Liberties Focus
    Resource Type: Website
    Selected articles, books, websites and other resources on civil liberties and human rights.
  15. Continuous Excursions
    Politics and Personal Life

    Resource Type: Book
    Published: 1982
    Colman looks at the idea that 'the personal is political'. He looks at personal life in pre-capitalist societies, the nature of politics and social relations, patriarchy and sexual relations, intimacy and personal life, indviduality and public life.
  16. Corporate Coercion and the Drive to Eliminate Buying with Cash
    Resource Type: Article
    Published: 2018
    Consumer freedom and privacy are examined as coercive commercialism quickly moves toward a cashless economy, when all consumers are forced into corporate payment systems from credit/debit cards, mobile phones and perhaps even through facial recognition technology.
  17. The Corporate State of Surveillance
    Opting Out

    Resource Type: Article
    Published: 2013
    America was founded on the ideals of personal liberty, freedom and democracy. Now mass spying, surveillance and the unending collection of personal data undermine civil liberties and our privacy rights. We find ourselves in the midst of an all-out invasion on what’s-none-of-their-business and its coming from both government and corporate sources. Snooping and data collection have become big business. Nothing is out of their bounds anymore.
  18. Data Mining You
    How the Intelligence Community Is Creating a New American World

    Resource Type: Article
    Published: 2012
    Joseph K., that icon of single-lettered anonymity from Franz Kafka’s novel The Trial, would undoubtedly have felt right at home in Washington.
  19. Directory of U.S. Mail Drops
    Resource Type: Book
    Published: 1987
  20. Edward Snowden's Warning to Canada
    Resource Type: Article
    Published: 2015
    Whistleblower Edward Snowden talks about Bill C-51 and the weak oversight of Canada's intelligence agencies.
  21. EFF Report Charts Companies on Next Frontier of User Privacy
    Sources News Release

    Resource Type: Article
    Published: 2015
    Annual Survey Delves Deeper into Practices of Apple, Google, Twitter, and More
  22. Electronic Nightmare
    The Home Communications Set and Your Freedom

    Resource Type: Book
    Published: 1981
  23. Email privacy
    Wikipedia article

    Resource Type: Article
    Published: 2012
    Email privacy is the broad topic dealing with issues of unauthorized access and inspection of electronic mail. This unauthorized access can happen while an email is in transit, as well as when it is stored on email servers or on a user computer. In countries with a constitutional guarantee of the secrecy of correspondence, whether email can be equated with letters and get legal protection from all forms of eavesdropping comes under question because of the very nature of email. This is especially important as more and more communication occurs via email compared to postal mail.
  24. The End of Privacy
    How Total Surveillance Is Becoming a Reality

    Resource Type: Book
    Published: 1999
    Whitaker argues that we live in a surveillance society; in order to get rewards and privileges, we have to give up our personal privacy to the government and corporations.
  25. The Face Off: Law Enforcement Use of Face Recognition Technology
    Resource Type: Article
    Published: 2018
    Face recognition is poised to become one of the most pervasive surveillance technologies, and law enforcement's use of it is increasing rapidly. However, the adoption of face recognition technologies like these is occurring without meaningful oversight, without proper accuracy testing of the systems as they are actually used in the field, and without the enactment of legal protections to prevent internal and external misuse.
  26. Fifteen minutes of online anonymity
    Resource Type: Article
    Published: 2013
    Making sure that your communications and data are confidential is not easy. Jean-Marc Manach, a journalist specialized in digital privacy and security, has an interesting alternative – how to have 15 minutes of online anonymity.
  27. For journalists, danger lurking in your email
    Resource Type: Article
    Published: 2012
    Citizen Lab provided a disturbing look into the likely use of a commercial surveillance program, FinFisher, to remotely invade and control the computers of Bahraini activists. After the software installs itself onto unsuspecting users' computer, it can record and relay emails, screenshots, and Skype audio conversations.
  28. For Owners of Amazon’s Ring Security Cameras, Strangers May Have Been Watching Too
    Resource Type: Article
    Published: 2019
    Amazon's Ring security cameras have a history of lax, sloppy oversight when it comes to deciding who has access to some of the most precious, intimate data belonging to any person: a live, high-definition feed from around -and perhaps inside- their house.
  29. Free Speech Groups Issue New Guide to the International 'Necessary & Proportionate Principles'
    Sources News Release

    Resource Type: Article
    Published: 2014
    EFF and ARTICLE 19 Urges Governments to Preserve Fundamental Freedoms in the Age of Mass Surveillance
  30. Get your head out of the clouds
    If we allow our personal data to be stored in giant electornic centres, we deserve what we get

    Resource Type: Article
    Published: 2011
    Appraising the risks to personal data held in cloud computing systems.
  31. Die Globale Teleueberwachung des 21. Jahrhunderts
    Resource Type: Article
    Es entsteht zur Zeit eine globale Teleuberwachung, die sich von allen ethischen oder diplomatischen Voreingenomenheiten freimacht.
  32. Google: don't expect privacy when sending to Gmail
    Resource Type: Article
    Published: 2013
    People sending email to any of Google's 425 million Gmail users have no "reasonable expectation" that their communications are confidential, the internet giant has said in a court filing.
  33. Google and the future of search: Amit Singhal and the Knowledge Graph
    Resource Type: Article
    Published: 2013
    An interview with the current head of Google Search, discussing some of the thought processes behind the current functionality of 'search' and some of its possibilites for the future.
  34. Google keeps tracking you even when you specifically tell it not to: Maps, Search won't take no for an answer
    Resource Type: Article
    Published: 2018
    Google has admitted that its option to "pause" the gathering of your location data doesn't apply to its Maps and Search apps – which will continue to track you even when you specifically choose to halt such monitoring.
  35. Google's upcoming Allo messaging app is 'dangerous', Edward Snowden claims
    Resource Type: Article
    Published: 2016
    Using Google's upcoming messaging app is "dangerous", according to Edward Snowden. In a tweet, the whistleblower advised against using Allo, the search giant’s latest app, saying: "Google's decision to disable end-to-end encryption by default in its new Allo chat app is dangerous, and makes it unsafe. Avoid it for now."
  36. Gowling Lafleur Henderson LLP
    Media Profile in Sources

    Resource Type: Organization
  37. How the US government secretly reads your email
    Resource Type: Article
    Published: 2011
    Secret orders forcing Google and Sonic to release a WikiLeaks volunteer's email reveal the scale of US government snooping.
  38. How to Avoid Electronic Eavesdropping and Privacy Invasion
    Resource Type: Book
    Published: 1972
  39. Improve your privacy and security on the Internet using Tor
    Resource Type: Article
    Published: 2013
    This user manual contains information about how to download Tor, how to use it, and what to do if Tor is unable to connect to the network
  40. IntelligentSearch.ca
    Resource Type: Website
    Published: 2017
    A web portal featuring topics related to research and the Internet. The home page features a selection of recent and important articles. A search feature, subject index, and other research tools make it possible to find additional resources and information.
  41. Is Your Printer Spying On You?
    Resource Type: Article
    Imagine that every time you printed a document it automatically included a secret code that could be used to identify the printer - and potentially the person who used it.
  42. 'I've Got Nothing to Hide' and Other Misunderstandings of Privacy
    Resource Type: Article
    Published: 2007
    According to the nothing to hide argument, there is no threat to privacy unless the government uncovers unlawful activity, in which case a person has no legitimate justification to claim that it remain private.
  43. Lessons of the Snowden Revelations
    You are the Target!

    Resource Type: Article
    Published: 2013
    We in the Left have long worried about “police state tactics”. Now we have to confront the police state structure. It’s here and it can morph into a real police state with very little effort. Opposing and dismantling it should now be among our top priorities.
  44. Media Awareness Network
    Media Profile in Sources

    Resource Type: Organization
  45. Medical Privacy Under Threat in the Age of Big Data
    Resource Type: Article
    Published: 2015
    Medical privacy is a high-stakes game, in both human and financial terms, given the growing multibillion-dollar legal market for anonymized medical data. The threats to individuals seeking to protect their medical data can come externally, from data breaches; internally, from "rogue employees" and others with access; or through loopholes in regulations.
  46. Met police using surveillance system to monitor mobile phones
    Resource Type: Article
    Published: 2011
    Civil liberties group raises concerns over Met police purchase of technology to track public handsets over a targeted area.
  47. Metadata - your files talk for you
    Resource Type: Article
    Published: 2013
    Few Internet users are aware that many file formats contain hidden data, or metadata. Text processing files or PDFs are likely to contain the name of the author, the date and time of the creation of the file, and often even part of its editing history.
  48. Microsoft handed the NSA access to encrypted messages
    Resource Type: Article
    Published: 2013
    Microsoft has collaborated closely with US intelligence services to allow users' communications to be intercepted, including helping the National Security Agency to circumvent the company's own encryption, according to top-secret documents obtained by the Guardian.
  49. Mistaking Omniscience for Omnipotence
    In a World Without Privacy, There Are No Exemptions for Our Spies

    Resource Type: Article
    Published: 2013
    Given how similar they sound and how easy it is to imagine one leading to the other, confusing omniscience (having total knowledge) with omnipotence (having total power) is easy enough. It’s a reasonable supposition that, before the Snowden revelations hit, America's spymasters had made just that mistake. If the drip-drip-drip of Snowden’s mother of all leaks -- which began in June and clearly won’t stop for months to come -- has taught us anything, however, it should be this: omniscience is not omnipotence. At least on the global political scene today, they may bear remarkably little relation to each other. In fact, at the moment Washington seems to be operating in a world in which the more you know about the secret lives of others, the less powerful you turn out to be.
  50. A More Perfect Union
    Why Straight America Must Stand Up for Gay Rights

    Resource Type: Book
    Mohr uses lively examples and historical cases to explore both private and public issues affecting the gay and lesbian community.
  51. The Naked Society
    Resource Type: Book
    Published: 1964
    An expose of the forces which are increasingly depriving Americans of their right to privacy.
  52. The New Police Surveillance State
    The Rising Price of Political Assembly

    Resource Type: Article
    Published: 2012
    Police are increasingly being deployed to restrict if not prevent mass political actions, especially directed at the banks.
  53. No Child Left Un-Mined? Student Privacy at Risk in the Age of Big Data
    Resource Type: Article
    Published: 2015
    Chideya discusses the implications of the compilation of big data trails containing information about children's performance in school.
  54. The No-Nonsense Guide to Global Media
    Resource Type: Book
    Published: 2004
    Peter Steven aims to make readers realize the power and influence of dominant media but, at the same time, also understand that they are not "omnipotent" and that there are alternative forms available.
  55. No Safe Harbor: How NSA Spying Undermined U.S. Tech and Europeans' Privacy
    Resource Type: Article
    Published: 2015
    The spread of knowledge about the NSA's surveillance programs has shaken the trust of customers in U.S. Internet companies like Facebook, Google, and Apple: especially non-U.S. customers who have discovered how weak the legal protections over their data is under U.S. law.
  56. Nobody's Business
    The Paradoxes of Privacy

    Resource Type: Book
    Published: 1990
  57. 'Not a Good Answer': Privacy Advocates Reject Democratic Proposal for 'Technological Wall' With Expanded Border Surveillance
    'More surveillance' has become the default answer to far too many difficult policy questions

    Resource Type: Article
    Published: 2019
    Digital rights advocates called on Democratic lawmakers to expand their fight against the wall into a fight for all human and constitutional rights-instead of suggesting alternative "border security" proposals that would infringe on civil liberties.
  58. NSA and GCHQ target Tor network that protects anonymity of web users
    Resource Type: Article
    Published: 2013
    The National Security Agency has made repeated attempts to develop attacks against people using Tor, a popular tool designed to protect online anonymity, despite the fact the software is primarily funded and promoted by the US government itself.
  59. The Obliteration of Privacy
    Snowden and the NSA

    Resource Type: Article
    Published: 2014
    It’s remarkable how little outrage Edward Snowden’s NSA revelations have provoked in the American public. One often heard response is something like, “Well, I don’t have anything to hide, so I don’t care if the government is listening to what I say. And if they catch some terrorists, so much the better.”
  60. On Locational Privacy, and How to Avoid Losing it Forever
    Resource Type: Article
    Published: 2009
    Over the next decade, systems which create and store digital records of people's movements through public space will be woven inextricably into the fabric of everyday life. We are already starting to see such systems now, and there will be many more in the near future.
  61. Open Marriage
    A New Life Style for Couples

    Resource Type: Book
    Published: 1972
    The authors propose open marriage as a way to help couples realize that there can be both relatedness and freedom in marriage, and that freedom, with the growth and responsibility it entails, can be the basis for intimacy and love.
  62. Eugene Oscapella, Barrister and Solicitor/Oscapella and Associates
    Media Profile in Sources

    Resource Type: Organization
  63. The Other Police State
    Private Cops vs. the Public Good

    Resource Type: Article
    Published: 2013
    A revealing study on "Spooky Business: A New Report on Corporate Espionage Against Non-profits" written by Gary Ruskin confirms one’s worst suspicions about the ever-expanding two-headed U.S. security state. It details how some companies use the security apparatus, including questionable espionage tactics, against anyone who challenges their authority.
  64. Other Voices: The Connexions Newsletter - December 5, 2015
    Ecosocialism, environment, and urban gardening

    Resource Type: Serial Publication (Periodical)
    Published: 2015
    This issue of Other Voices covers a wide range of issues, from the climate crisis and the ecosocialist response, to terrorism and the struggle against religious fundamentalism, as well as items on urban gardening, the destruction of olive trees, and how the police are able to use Google's timeline feature to track you every move, now and years into the past.
  65. Other Voices: The Connexions Newsletter - July 22, 2017
    Secrecy and Power

    Resource Type: Serial Publication (Periodical)
    Published: 2017
    Secrecy is a weapon the powerful use against their enemies: us. This issue of Other Voices explores the relationship of secrecy and power.
  66. A practical guide to protecting your identity and security when using mobile phones
    Resource Type: Article
    Published: 2013
    Many activists have been tracked via their mobile phones. Assess the risk for your own activities given the practices used in your country, how high-profile your work is, and what others in your community have experienced.
  67. Pragmatic Anonymity
    Resource Type: Article
    Create an account with an anonymization service. Tell everyone about that account, including the password. The account basically acts as a public mail drop, anyone can use it to send messages, with no way for the recipient to determine who originally sent it. The more people that know about this account, the better, since it makes the list of potential recipients longer and longer. If you choose the anonymizer service well, then technical means of identifying the sender will be impossible, and if you make sure enough people know about it, then the pragmatic means (i.e. "I only know one person who might set this up, so I know who sent it") are also stopped short.
  68. Preparing for a Digital 9/11
    Resource Type: Article
    Published: 2012
    In recent years, in one of the more dangerous, if largely undiscussed, developments of our time, the Bush and then Obama administrations have launched the first state-planned war in cyber space. First, there were the "Olympic Games," then the Stuxnet virus, then Flame, and now it turns out that other sophisticated malware programs have evidently followed.
  69. Privacy!
    How to get it .... How to enjoy it

    Resource Type: Book
    Published: 1977
  70. Privacy
    A Manifesto

    Resource Type: Book
    Published: 2008
    Sofsky attributes loss of privacy not only to technology and fear but also our indifference.
  71. Privacy For Sale
    How Computerization Has Made Everyone's Private Life an Open Secret

    Resource Type: Book
    Published: 1992
  72. Privacy for the other five billion
    Resource Type: Article
    Published: 2013
    Aadhaar is but one example of the development sector's growing fascination with technologies for registering, identifying, and monitoring citizens
  73. Privacy and the Right to Strike in Canada
    Resource Type: Article
    Published: 2013
    The neoliberal assault on labour has now entered its fourth decade. Equally concerning for the labour movement has been the long assault on the post-war labour freedoms to organize, bargain, and strike.
  74. Privacy tapped out
    Resource Type: Article
    Published: 2013
    For over a century, Americans and their judiciary fiercely fought any attempt by security agencies and law enforcement to listen in on private electronic communications. Now they’ve stopped fighting, and the surveillance is out of control.
  75. Protect Students from Corporate Data-Mining in the Classroom
    Resource Type: Article
    Published: 2015
    Across the political spectrum there is debate as to whether data should be collected about students.
  76. The Puritanical Glee Over the Ashley Madison Hack
    Resource Type: Article
    Published: 2015
    High school students have long read The Scarlet Letter, the 1850 novel by Nathaniel Hawthorne set in a Puritanical Massachusetts town in the mid-17th century. As The Atlantic noted in 1886, "the punishment of the scarlet letter is a historical fact." To see just how current is the mentality driving the scarlet letter, observe the reaction to the Ashley Madison hack.
  77. Release of the Full TPP Text After Five Years of Secrecy Confirms Threats to Users' Rights
    Resource Type: Article
    Published: 2015
    Trade offices involved in negotiating the Trans-Pacific Partnership (TPP) agreement have finally released all 30 chapters of the trade deal today, a month after announcing the conclusion of the deal in Atlanta. Some of the more dangerous threats to the public's rights to free expression, access to knowledge, and privacy online are contained in the copyright provisions in the Intellectual Property (IP) chapter. Now that the entire agreement is published, we can see how other chapters of the agreement contain further harmful rules that undermine our rights online and over our digital devices and content.
  78. Secrecy and Power
    Introduction to the July 22, 2017 issue of Other Voices

    Resource Type: Article
    Published: 2017
    It is one of the essential attributes of power that it insists on secrecy. Or, more precisely, those who wield power over others routinely claim that the details of what they do, and why they do it, are far too sensitive to be revealed to the public.
  79. Sending encrypted emails using Thunderbird and PGP
    Resource Type: Article
    Published: 2013
    There are easy ways to ensure your Internet activities remain confidential.
  80. Shame, Exposure and Privacy
    Resource Type: Book
    Published: 1992
    The author defends the individual's need for privacy, presenting healthy shame as a distinguishing mark of humanity.
  81. Six Tips to Protect Your Search Privacy
    Resource Type: Article
    Published: 2006
    Google, MSN Search, Yahoo!, AOL, and most other search engines collect and store records of your search queries. If these records are revealed to others, they can be embarrassing or even cause great harm.
  82. Someone's Watching You!
    From Micropchips in your Underwear to Satellites Monitoring Your Every Move, Find Out Who's Tracking You and What You Can Do about It

    Resource Type: Book
    Published: 2011
    An expose and explanation of the little-known secret surveillance programs run by both the public and private sectors, including practical steps on how to keep your private life private.
  83. Sources welcomes Eugene Oscapella, Barrister and Solicitor/Oscapella and Associates
    Sources News Release

    Resource Type: Article
    Published: 2009
    Sources welcomes Eugene Oscapella, Barrister and Solicitor/Oscapella and Associates.
  84. Sources welcomes OrangeWebsite
    Sources News Release

    Resource Type: Article
    Published: 2011
    Sources welcomes a new member: OrangeWebsite. OrangeWebsite is an Icelandic web hosting service provider. Most of our clients are foreign journalists, bloggers, leakers and publishers.
  85. Spying by the Numbers
    Hundreds of Thousands Subject to Government Surveillance and No Real Protection

    Resource Type: Article
    Published: 2013
    Thanks to NSA whistleblower Edward Snowden many more people in the US and world-wide are learning about extensive US government surveillance and spying. There are publicly available numbers which show the reality of these problems are bigger than most think and most of this spying is happening with little or no judicial oversight.
  86. Spying on Democracy
    Government Surveillance, Corporate Power, and Public Resistance

    Resource Type: Book
    Published: 2013
    Heidi Boghosian documents the disturbing increase in surveillance of ordinary citizens and the danger it poses to our privacy, our civil liberties, and to the future of democracy itself.
  87. The Stasi could only dream of such data
    Britain, the birthplace of liberalism, has become the database state

    Resource Type: Article
    Published: 2008
    As technology increases the flow of stored data about individual actions, assurances of the "right to informational self-determination" must be hard won from governments. Government surveillance of citizens has become an accepted 'counter-terrorism' measure.
  88. Stop replacing London's phone boxes with corporate surveillance
    New connected kiosks are replacing London's payphones. Every time you use them, you're allowing Google, BT and Primesight to track you

    Resource Type: Article
    Published: 2018
    Concerns over privacy in London, UK, as Google, BT and Primesight provide free wifi and phone charging in exchange for allowing the consortium to identify users and track their movements through the city.
  89. Surveillance Self-Defense
    Resource Type: Website
    Published: 2018
    Modern technology has given those in power new abilities to eavesdrop and collect data on innocent people. Surveillance Self-Defense is EFF's guide to defending yourself and your friends from surveillance by using secure technology and developing careful practices.
  90. Tails: The amnesic Incognito Live System
    Resource Type: Article
    Published: 2013
    Tails is an operating system like Windows or Mac OS, but one specially designed to preserve your anonymity and privacy.
  91. The Age of Accountability is Now: Are You Prepared?
    Sources News Release

    Resource Type: Article
    Published: 2012
    Questions of accountability and building a reputation of integrity in personal and professional relationships.
  92. Think the Left Won the Culture War? Think Again
    Resource Type: Article
    Published: 2015
    With the recent AshleyMadison leak and Gawker.com's notorious naming and shaming of an obscure, married publishing executive, deBoer questions who really won in this culture war.
  93. Thirteen Ways Government Tracks Us
    Resource Type: Article
    Published: 2012
    Privacy is eroding fast as technology offers government increasing ways to track and spy on citizens. Here are thirteen examples of how some of the biggest government agencies and programs track people.
  94. Tor is for Everyone
    Why You Should Use Tor

    Resource Type: Article
    Published: 2014
    EFF recently kicked off their second Tor Challenge, an initiative to strengthen the Tor network for online anonymity and improve one of the best free privacy tools in existence. This is great news, but how does it affect you? To understand that, we have to dig into what Tor actually is, and what people can do to support it.
  95. Uber Plans to Track Users Should Not Be Allowed, Says Privacy Group
    Resource Type: Article
    Published: 2015
    A formal complaint has been filed against Uber, the car ride company, by the Electronic Privacy Information Center (EPIC), a non-profit advocacy group. The NGO says Uber plans to use their smart phone app to access user's locations at all times, and to send advertisements to user's contact lists.
  96. UN slams UK surveillance law, calls for privacy reforms in Canada, France and Macedonia
    Resource Type: Article
    Published: 2015
    In yet another blow to the UK's surveillance proponents, the UN Human Rights Committee has criticised the British legal regime governing the interception of communications, observing that it allows for mass surveillance and lacks sufficient safeguards.
  97. Unmasking the Five-Eyed monster, a global and secret intelligence-sharing regime
    Resource Type: Article
    Published: 2013
    Privacy International is proud to announce our new project, Eyes Wide Open, which aims to pry open the Five Eyes arrangement and bring it under the rule of law.
  98. Virtual Private Network (VPN)
    Resource Type: Article
    Published: 2013
    This technology allows the creation of an Internet tunnel (a virtual link) between two physical networks in different locations in a way that is transparent for users.
  99. Vodafone Reveals Existence of Secret Wires that Allow State Surveillance
    Resource Type: Article
    Published: 2014
    Wires allow agencies to listen to or record live conversations, in what privacy campaigners are calling a 'nightmare scenario'.
  100. Wanted: A Hackers' Charter
    Resource Type: Article
  101. The Watchers
    The Rise of America's Surveillance State

    Resource Type: Book
    Published: 2010
    An exploration of how and why the American government increasingly spies on its own citizens.
  102. Who Knows
    Safegurding Your Privacy in a Networked World

    Resource Type: Book
    Published: 1995
  103. Will the government's counter-extremist programme criminalise dissent?
    Resource Type: Article
    Published: 2015
    From 1 July, a broad range of public bodies - from nursery schools to optometrists - will be legally obliged to participate in the U.S. government’s Prevent policy to identify would-be extremists. Under the fast-tracked Counter-Terrorism and Security Act 2015, schools, universities and health service providers can no longer opt out of monitoring students and patients for supposed radicalised behaviour.
  104. You selling to me?
    Resource Type: Article
    Published: 2013
    Individually targeted online marketing, based on unwittingly supplied consumer information and monitoring of online activities, is replacing conventional advertising media.

Experts on Privacy in the Sources Directory

  1. Article 19
  2. Connexions


AlterLinks


© 2021.