Home Title Index Topic Index Sources Directory News Releases Sources Calendar RSS Sources Select News RSS Feed

Surveillance
AlterLinks Topic Index

  1. Amnesty International Responds to U.K. Government Surveillance
    Resource Type: Article
    Published: 2015
    A British tribunal admitted on Wednesday that the U.K. government had spied on Amnesty International and illegally retained some of its communications.
  2. An Open Letter to the Members of the Wassenaar Arrangement
    Sources News Release

    Resource Type: Article
    Published: 2014
    As members of the Coalition Against Unlawful Surveillance Exports (CAUSE), Reporters Without Borders, Amnesty International, Digitale Gesellschaft, the International Federation for Human Rights (FIDH), Human Rights Watch, Open Technology Institute
  3. Australian government orders ASIO raids to suppress East Timor spying evidence
    Resource Type: Article
    Published: 2013
    The Abbott governmen ordered Australian Security Intelligence Organisation (ASIO) and Australian Federal Police (AFP) raids on the homes and offices of a lawyer and former intelligence agency whistleblower involved in an international legal challenge to Australia’s spying on the East Timor government during maritime border talks in 2004.
  4. The Big Brother Game
    Resource Type: Book
    Published: 1975
  5. Big Brother's Getting Bigger
    Resource Type: Article
    Published: 2012
    Government surveillance and attacks on the privacy of American citizens were bad enough under the Bush regime but they are getting even worse during the Obama years.
  6. Big Oil's Chokehold on Canadian Democracy
    Resource Type: Article
    Published: 2014
    The fight against Big Oil corporatism may be the most important one you ever support.
  7. The Big Secret That Makes the FBI's Anti-Encryption Campaign a Big Lie
    Resource Type: Article
    Published: 2015
    McLaughlin discusses how hacking techniques and their increasing use are justified in a prevalent way by the American government.
  8. BitTorrent study finds most file-sharers are monitored
    Resource Type: Article
    Published: 2012
    Anyone using file-sharing service BitTorrent to download the latest film or music release is likely to be monitored, UK-based researchers suggest. A Birmingham University study indicates that a file-sharer downloading popular content would be logged by a monitoring firm within three hours.
  9. Bold Scientists
    Dispatches from the Battle for Honest Science

    Resource Type: Book
    Published: 2014
    Accounts of scientists working in the public interest despite powerful opposition.
  10. The boss is spying
    Resource Type: Article
    Published: 2013
    The data mining by large U.S. corporations gets less attention than U.S. government surveillance. It goes beyond the tracking of every mouse-click, purchase and "like" registered by every consumer on the internet, and relies not only on sophisticated electronic devices, but on the currency of fear and sheer intimidation which would make a Big Brother tyrant proud, the kind depicted in George Orwell's dystopian novel 1984.
  11. Bringing the Battlefield to the Border
    The Wild World of Border Security and Boundary Building in Arizona

    Resource Type: Article
    Published: 2012
    The U.S.-Mexican border has not only become Ground Zero for every experiment in immigration enforcement and drug interdiction, but also the incubator, testing site, showcase, and staging ground for ever newer versions of border-enforcement technology that, sooner or later, are sure to be applied globally.
  12. Canada's Spy Groups Divulge Secret Intelligence to Energy Companies
    Resource Type: Article
    Published: 2012
    Documents raise fears that info on environmentalists, indigenous groups and more shared with industry at biannual, secret-level, briefings.
  13. Capitalist Surveillance State: Everyone's a Target
    Threatening Reporters, Spying on Public

    Resource Type: Article
    Published: 2013
    There is an inherent tendency for the state, which governs on behalf of a minuscule, ruthless class of obscenely wealthy exploiters, to attempt to amass ever greater power to control the population because it hates and fears the working people.
  14. Chatter: Dispatches From the Secret World of Global Eavesdropping
    Resource Type: Book
    Published: 2005
  15. 'City of Surveillance': Google-backed smart city sounds like a dystopian nightmare
    Resource Type: Article
    Published: 2018
    A Google-backed project to build the interconnected, data-driven ‘city of the future’ sounds like all George Orwell’s nightmares come true, and is now in the spotlight after a privacy expert resigned from the project in protest. Toronto’s Waterfront district used to be an industrial wasteland, but Sidewalk Labs – a sister company of Google – wants to turn that wasteland into a prototype ‘city of the future,’ where data helps planners micromanage every aspect of urban life.
  16. Companies that cooperate with dictatorships must be sanctioned
    Sources News Release

    Resource Type: Article
    Published: 2011
    Reporters Without Borders condemns the criminal cooperation that exists between many western companies, especially those operating in the new technology area, and authoritarian regimes.
  17. The Computers are Listening
    How the NSA Converts Spoken Words Into Searchable Text

    Resource Type: Article
    Published: 2015
    Top-secret documents from the archive of Edward Snowden show the National Security Agency can now automatically recognize the content within phone calls by creating rough transcripts and phonetic representations that can be easily searched and stored.
  18. Connexions
    Volume 9, Number 2 - Summer 1984 - Rights and Liberties - A Digest of Resources & Groups for Social

    Resource Type: Serial Publication (Periodical)
    Published: 1984
  19. Connexions Library: Human Rights and Civil Liberties Focus
    Resource Type: Website
    Selected articles, books, websites and other resources on civil liberties and human rights.
  20. Corporate Coercion and the Drive to Eliminate Buying with Cash
    Resource Type: Article
    Published: 2018
    Consumer freedom and privacy are examined as coercive commercialism quickly moves toward a cashless economy, when all consumers are forced into corporate payment systems from credit/debit cards, mobile phones and perhaps even through facial recognition technology.
  21. The Corporate State of Surveillance
    Opting Out

    Resource Type: Article
    Published: 2013
    America was founded on the ideals of personal liberty, freedom and democracy. Now mass spying, surveillance and the unending collection of personal data undermine civil liberties and our privacy rights. We find ourselves in the midst of an all-out invasion on what’s-none-of-their-business and its coming from both government and corporate sources. Snooping and data collection have become big business. Nothing is out of their bounds anymore.
  22. Corporations Spy on Nonprofits with Impunity
    Dow Chemical vs. Greenpeace

    Resource Type: Article
    Published: 2014
    Here's a dirty little secret you won't see in the daily papers: corporations conduct espionage against US nonprofit organizations without fear of being brought to justice.
  23. Covert Entry
    Spies, Lies and Crimes Inside Canada's Secret Service

    Resource Type: Book
    Published: 2002
    A glimpse into the inner workings of Canada's secret service.
  24. CSE monitors millions of Canadian emails to government
    Resource Type: Article
    Published: 2015
    Canada's electronic spy agency collects millions of emails from Canadians and stores them for "days to months" while trying to filter out malware and other attacks on government computer networks.
  25. Data Mining You
    How the Intelligence Community Is Creating a New American World

    Resource Type: Article
    Published: 2012
    Joseph K., that icon of single-lettered anonymity from Franz Kafka’s novel The Trial, would undoubtedly have felt right at home in Washington.
  26. Devices that track, spy on cellphones found at Montreal's Trudeau airport
    Resource Type: Article
    Published: 2017
    CBC Radio-Canada investigation already found electronic surveillance devices near Parliament Hill.
  27. The Devil Operation
    Resource Type: Film/Video
    A tale of corporate espionage unfolds in this exposé of torture, intimidation, and murder of Peruvian eco-activists and indigenous farmers. Shocking video footage, horrifying photos, and meticulous reports compiled by private security firms working for U.S. and British-owned gold mines are co-opted by the filmmakers to reveal the truth.
  28. #DomesticExtremist trend mocks UK police surveillance of protesters
    Resource Type: Article
    Published: 2015
    Non-conformists across the UK are taking to social media to declare themselves #DomesticExtremists in a bid to raise awareness about secretive police powers.
  29. Draconian cyber security bill could lead to Internet surveillance and censorship
    Sources News Release

    Resource Type: Article
    Published: 2012
    Reporters Without Borders is deeply concerned with the Cyber Intelligence Sharing and Protection Act of 2011 (CISPA), the cyber security bill now before the US Congress.
  30. Eavesdropping on the Planet
    The Inalienable Right to Snoop?

    Resource Type: Article
    Published: 2013
    Like a mammoth vacuum cleaner in the sky, the National Security Agency (NSA) sucks it all up: home phone, office phone, cellular phone, email, fax, telex … satellite transmissions, fiber-optic communications traffic, microwave links … voice, text, images … captured by satellites continuously orbiting the earth, then processed by high-powered computers … if it runs on electromagnetic energy, NSA is there, with high high tech. Twenty-four hours a day. Perhaps billions of messages sucked up each day. No one escapes. Not presidents, prime ministers, the UN Secretary-General, the pope, the Queen of England, embassies, transnational corporation CEOs, friend, foe, your Aunt Lena …
  31. Edward Snowden's Warning to Canada
    Resource Type: Article
    Published: 2015
    Whistleblower Edward Snowden talks about Bill C-51 and the weak oversight of Canada's intelligence agencies.
  32. EFF Calls Out DOJ for Failing to Provide Crucial Public Information in NSA Case
    Sources News Release

    Resource Type: Article
    Published: 2014
    Latest Filing in Jewel v. NSA Demands Documents Government Is Trying to Conceal
  33. EFF Demands Release of More Secret Surveillance Court Rulings
    Sources News Release

    Resource Type: Article
    Published: 2014
    In a continuing campaign to uncover the government's secret interpretations of the surveillance laws underlying the National Security Agency (NSA)'s spying programs, the Electronic Frontier Foundation (EFF) today filed another lawsuit
  34. EFF Launches IFightSurveillance.org and Counter-Surveillance Success Stories
    Sources News Release

    Resource Type: Article
    Published: 2014
    Sites Highlight How Opponents of Mass Surveillance Around the World Lead by Example
  35. EFF Wins Battle Over Secret Legal Opinions on Government Spying
    Sources News Release

    Resource Type: Article
    Published: 2015
    The Electronic Frontier Foundation (EFF) has won its four-year Freedom of Information Act lawsuit over secret legal interpretations of a controversial section of the Patriot Act.
  36. Electronic Frontier Foundation to Court: There's No Doubt the Government Destroyed NSA Spying Evidence
    Sources News Release

    Resource Type: Article
    Published: 2014
    The Electronic Frontier Foundation (EFF) told a federal court today that there was no doubt that the government has destroyed years of evidence of NSA spying -- the government itself has admitted to it in recent court filings.
  37. Email privacy
    Wikipedia article

    Resource Type: Article
    Published: 2012
    Email privacy is the broad topic dealing with issues of unauthorized access and inspection of electronic mail. This unauthorized access can happen while an email is in transit, as well as when it is stored on email servers or on a user computer. In countries with a constitutional guarantee of the secrecy of correspondence, whether email can be equated with letters and get legal protection from all forms of eavesdropping comes under question because of the very nature of email. This is especially important as more and more communication occurs via email compared to postal mail.
  38. Eye in the Sky
    Surveillance and the Art of Arnold Mesches

    Resource Type: Article
    Published: 2014
    Round about the turn of this century Arnold Mesches, who is neither monk nor medievalist nor Christian, began illuminating manuscripts from the world that long since had killed God but appropriated or accommodated to a version of His all-seeing eye. The manuscripts in question: Mesches’ FBI file, 1945 to 1972.
  39. Eyes Wide Open
    Resource Type: Article
    Published: 2013
    The recent revelations, made possible by NSA-whistleblower Edward Snowden, of the reach and scope of global surveillance practices have prompted a fundamental reexamination of the role of intelligence services in conducting coordinated cross-border surveillance.
  40. Face Surveillance Is a Uniquely Dangerous Technology
    CounterSpin interview with Shankar Narayan on facial recognition

    Resource Type: Article
    Published: 2019
    Lightly edited transcript of an interview regarding face recognition technology and how it will impact people who are already over-policed.
  41. Facebook and the Rise of Anti-Social Media
    Resource Type: Article
    Published: 2018
    For those who haven't thought about it, the internet is insidious because of the very capacity that Cambridge Analytica claims to be able to exploit: customization. Users have limited ability to confirm the authenticity of anything they see, read or hear on it. Print editions can be compared and contrasted-- technology limits print media to large-scale deceptions. With the capacity to create entire realms of deception -- identities, content, web pages and entire online publications, trust is made a function of gullibility.
  42. Fake cell phone 'towers' may be spying on Americans' calls, texts
    Resource Type: Article
    Published: 2014
    More than a dozen 'fake cell phone towers' could be secretly hijacking Americans' mobile devices in order to listen in on phone calls or snoop on text messages, a security-focused cell phone company claims. It is not clear who controls the devices.
  43. FBI Ignored Deadly Threat to Occupiers
    US Intelligence Machine Instead Plotted with Bankers to Attack Protest Movement

    Resource Type: Article
    Published: 2012
    Dcuments show that the FBI and other intelligence and law enforcement agencies began a campaign of monitoring, spying and disrupting the Occupy Movement at least two months before the first occupation actions began in late September 2011.
  44. The FBI: Silent Terror of the Fourth Reich
    Resource Type: Article
    Published: 2017
    Lately, there's been a lot of rhetoric comparing Donald Trump to Adolf Hitler. The concern is that a Nazi-type regime may be rising in America. That process, however, began a long time ago.
  45. The FBI's secret biometrics database they don't want you to see
    Resource Type: Article
    Published: 2016
    The Federal Bureau of Investigation (FBI) wants to prevent information about its creepy biometric database, which contains fingerprint, face, iris, and voice scans of millions of Americans, from getting out to the public. The Department of Justice has come up with a proposal to exempt the biometric database from public disclosure. It states that the Next Generation Identification System (NGI) should not be subject to the Privacy Act, which requires federal agencies to give people access to records that have been collected concerning them, "allowing them to verify and correct them if needed."
  46. The FBI's Secret Rules
    President Trump has inherited a vast domestic intelligence agency with extraordinary secret powers.

    Resource Type: Article
    Published: 2017
    A collection of articles exploring the contents and implications of a cache of internal FBI manuals, offering a rare window into the FBI’s quiet expansion since 9/11.
  47. Fighting Secrecy and the National Security State
    An Interview With Birgitta Jonsdottir, the Co-Producer of WikiLeaks's "Collateral Murder" Video

    Resource Type: Article
    Published: 2013
    An interview with Iceland Member of Parliament Birgitta Jonsdottir of the Pirate Party on the status of the international struggle against government secrecy and surveillance.
  48. For journalists, danger lurking in your email
    Resource Type: Article
    Published: 2012
    Citizen Lab provided a disturbing look into the likely use of a commercial surveillance program, FinFisher, to remotely invade and control the computers of Bahraini activists. After the software installs itself onto unsuspecting users' computer, it can record and relay emails, screenshots, and Skype audio conversations.
  49. Free Speech Groups Issue New Guide to the International 'Necessary & Proportionate Principles'
    Sources News Release

    Resource Type: Article
    Published: 2014
    EFF and ARTICLE 19 Urges Governments to Preserve Fundamental Freedoms in the Age of Mass Surveillance
  50. French surveillance law passes National Assembly, but it's not the last word
    Resource Type: Article
    Published: 2015
    After the Chalie Hebdo and Hyper Catcher killings, the French National Assembly authorized clandestine intelligence operations for mobile devices and the internet. While the french patriot act has already been set in place, so too are movements to repeal these laws.
  51. GCHQ and European spy agencies worked together on mass surveillance
    Resource Type: Article
    Published: 2013
    Edward Snowden papers unmask close technical cooperation and loose alliance between British, German, French, Spanish and Swedish spy agencies.
  52. Genetic Testing of Citizens Is a Backdoor into Total Population Surveillance by Governments and Companies
    Resource Type: Article
    Published: 2014
    The new Chief Executive of the National Health Service (NHS) in England, Simon Stevens, was recently reported arguing that the NHS must be transformed to make people’s personal genetic information the basis of their treatments.
  53. Die Globale Teleueberwachung des 21. Jahrhunderts
    Resource Type: Article
    Es entsteht zur Zeit eine globale Teleuberwachung, die sich von allen ethischen oder diplomatischen Voreingenomenheiten freimacht.
  54. Google keeps tracking you even when you specifically tell it not to: Maps, Search won't take no for an answer
    Resource Type: Article
    Published: 2018
    Google has admitted that its option to "pause" the gathering of your location data doesn't apply to its Maps and Search apps – which will continue to track you even when you specifically choose to halt such monitoring.
  55. Google voice search records and keeps conversations people have around their phones - but the files can be deleted
    Resource Type: Article
    Published: 2016
    How google search can record and store conversations picked up by a phone's microphone, as well as how to prevent this and delete the stored files.
  56. Google's new advertising program tracks offline line shoppers, violates privacy
    Resource Type: Article
    Published: 2017
    The privacy watchdog Electronic Privacy Information Center (EPIC) filed a formal complaint against Google alleging that the company's new advertising program violates consumer privacy.
  57. Government Spying Aims to Silence Us
    Resource Type: Article
    Published: 2013
    What the ruling class is aiming at, with these occasional "leaks" about its spying on us, is not so much to collect information about us but rather to make us feel so totally spied upon that we will be afraid to do or say anything we know the government doesn't want us to do or say.
  58. GovernmentSources.ca
    Resource Type: Website
    A portal with information about government, Canadian and international, with articles, documents, books, websites, and experts and spokespersons. The home page features a selection of recent and important articles. A search feature, subject index, and other research tools make it possible to find additional resources and information.
  59. Here come the thought police
    Resource Type: Article
    Published: 2014
    Canadian Prime Minister Stephen Harper has declared his intention to fast-track legislation expanding CSIS and police powers of “surveillance, detention and arrest.”
  60. How California police are tracking your biometric data in the field
    Agencies are using mobile fingerprint scanners, tattoo and facial recognition software

    Resource Type: Article
    Published: 2015
    EFF and MuckRock got together to reveal how state and local law enforcement agencies are using mobile biometric technology in the field by filing public records requests around the country. Thousands of pages of documents were obtained from more than 30 agencies.
  61. How can you protect yourself from online snooping?
    Sources News Release

    Resource Type: Article
    Published: 2013
    Reporters Without Borders has published an Online Survival Kit on its WefightCensorship.org website that has tools and practical advice that will allow you to protect your communications and data.
  62. How Drug Courier Profiles Begot Terrorism Watch Lists
    The Drug War and the Fourth Amendment

    Resource Type: Article
    Published: 2013
    More than a million names are now included on the catch-all terrorist watch list maintained by U.S. government agencies.
  63. How the Government Secretly Demanded the IP Address of Every Visitor to Political News Site Indymedia.us
    Resource Type: Article
    Published: 2009
    Secrecy surrounds law enforcement's communications surveillance practices like a dense fog. Particularly shrouded in secrecy are government demands issued under 18 U.S.C. § 2703 of the Stored Communications Act or "SCA" that seek subscriber information or other user records from communications service providers.
  64. How the US government secretly reads your email
    Resource Type: Article
    Published: 2011
    Secret orders forcing Google and Sonic to release a WikiLeaks volunteer's email reveal the scale of US government snooping.
  65. How to Avoid Electronic Eavesdropping and Privacy Invasion
    Resource Type: Book
    Published: 1972
  66. Huge Global Coalition Stands Against Unchecked Surveillance
    Sources News Release

    Resource Type: Article
    Published: 2013
    More than 100 organizations from across the globe are taking a stand against unchecked communications surveillance, calling for the governments around the world to follow international human rights law and curtail pervasive spying.
  67. Human rights organisations alarmed by bill that will give surveillance agencies dangerous new powers
    Sources News Release

    Resource Type: Article
    Published: 2015
    Privacy International, Amnesty International, FIDH, the French League for Human Rights and Reporters Without Borders are alarmed by the expansive surveillance powers to be granted to surveillance agencies contained in a French bill.
  68. Human Rights Watch Sues DEA Over Bulk Collection of Americans' Telephone Records
    Sources News Release

    Resource Type: Article
    Published: 2015
    EFF Lawsuit Challenges Drug Enforcement Administration Surveillance of International Call Records
  69. I, spy: Edward Snowden in exile
    Resource Type: Article
    Published: 2014
    The Guardian interviews Edward Snowden, the former NSA contractor who leaked thousands of classified documents to media outlets. Snowden shares his views on the events that have occured since his exile, and describes his life in Moscow.
  70. If U.S. Mass Media Were State-Controlled, Would They Look Any Different?
    Snowden Coverage

    Resource Type: Article
    Published: 2013
    The Edward Snowden leaks have revealed a U.S. corporate media system at war with independent journalism. Many of the same outlets that missed the Wall Street meltdown and cheer-led the Iraq invasion have come to resemble state-controlled media outlets in their near-total identification with the government.
  71. IFJ Condemns U.S. Justice Dept for Secretly Gathering Associated Press Records
    Sources News Release

    Resource Type: Article
    Published: 2013
    The International Federation of Journalists (IFJ) has joined its affiliate, the Newspaper Guild-CWA, in condemning the U.S. Justice Department for secretly gathering the phone records of Associated Press Journalists and called on the department
  72. Information Overload
    Driving a Stake Through the National Security State

    Resource Type: Article
    Published: 2012
    Here’s an idea. Let’s all start salting all of our conversations and our written communications with a selection of those 300 key words. If every liberty-loving person in America virus were to do this, the NSA would have to employ all 15 million unemployed Americans just to begin to look at all those transcripts!
  73. Inside NSA, Officials Privately Criticize 'Collect It All' Surveillance
    Resource Type: Article
    Published: 2015
    As Members of Congress struggle to agree on which surveillance programs to re-authorize before the Patriot Act expires, they might consider the unusual advice of an intelligence analyst at the National Security Agency who warned about the danger of collecting too much data.
  74. IntelligentSearch.ca
    Resource Type: Website
    Published: 2017
    A web portal featuring topics related to research and the Internet. The home page features a selection of recent and important articles. A search feature, subject index, and other research tools make it possible to find additional resources and information.
  75. The Intercept
    Resource Type: Website
    A platform to report on the documents previously provided by NSA whistleblower Edward Snowden, with a long-term mission is to produce fearless, adversarial journalism across a wide range of issues.
  76. Internet Companies: Confusing Consumers for Profit
    Resource Type: Article
    Published: 2015
    In the age of information, companies are hungry for your data. They want it - even if it means resorting to trickery.
  77. Journalistic Malpractice at the Post and the Times
    Rejecting the Offer of Evidence of US War Crimes

    Resource Type: Article
    Published: 2013
    Wikileaks source Bradley Manning is evidence that the USA’s two leading news organizations, the Washington Post and the New York Times, are not willing to report critically of the government.
  78. Journalists Welcome European Call to Review Anti-Terrorism Laws
    Sources News Release

    Resource Type: Article
    Published: 2009
    Ministers of the human rights network of the Council of Europe have called on their governments to review anti-terrorism laws in the face of strong criticism from journalists that some laws are in practice limiting free expression and press rights.
  79. Keystone Cops Sex Registry
    Resource Type: Article
    Published: 1998
    Washroom sex might show up on Ontario's new offender list, but real pedophiles will probably go free.
  80. The Last Post Files: Fighting subversion or protecting the government from embarrassment?
    Resource Type: Article
    Published: 2013
    The Last Post was one of the best alternative publications of the 1970s. While the small team of journalists was creating solid investigative journalism, the RCMP Security Service was keeping a close watch. One of its aims? Protect the government from embarrassment.
  81. Lessons of the Snowden Revelations
    You are the Target!

    Resource Type: Article
    Published: 2013
    We in the Left have long worried about “police state tactics”. Now we have to confront the police state structure. It’s here and it can morph into a real police state with very little effort. Opposing and dismantling it should now be among our top priorities.
  82. Location Tracking: A Pervasive Problem in Modern Technology
    Resource Type: Article
    Published: 2013
    NSA is tracking people around the Internet and the physical world. These newly-revealed techniques hijacked personal information that was being transmitted for some commercial purpose, converting it into a tool for surveillance. One technique involved web cookies, while another involved mobile apps disclosing their location to location-based services.
  83. The Logic behind Mass Spying: Empire and Cyber Imperialism
    Resource Type: Article
    Published: 2013
    Revelations about the long-term global, intrusive spying by the US National Security Agency (NSA) and other allied intelligence apparatuses have provoked widespread protests and indignation and threatened ties between erstwhile imperial allies.
  84. Mass Incarceration for Profit
    Resource Type: Article
    Published: 2015
    In the face of growing public criticism and improved technologies, companies like Securus search for new ways to remain competitive while marketing themselves as providers of a quality service that keeps the public safe. Yet with the involvement of global financial houses in the prison industrial complex, the pressure mounts to produce value for shareholders. Ultimately, this systematically incentivizes mass incarceration. While we often hear about the activities of private prison providers like Corrections Corporation of America (CCA) and the GEO Group, corporate interests are immersed in every aspect of criminal justice.
  85. Mass Surveillance is Driven by the Private Sector
    The Lesson of Hacking Team's Malware

    Resource Type: Article
    Published: 2015
    A report published by Privacy International as well as an article posted by Vice Motherboard clearly show that both the DEA and the United States Army have long-standing relationships with Hacking Team, an Italian company that’s notorious for selling malware to any number of unsavory characters.
  86. Met police using surveillance system to monitor mobile phones
    Resource Type: Article
    Published: 2011
    Civil liberties group raises concerns over Met police purchase of technology to track public handsets over a targeted area.
  87. Metadata Is More Intrusive Than Direct Listening Of Phone Calls Says Snowden
    Resource Type: Article
    Published: 2014
    Government monitoring of “metadata” is more intrusive than directly listening to phone calls or reading emails.
  88. Microsoft handed the NSA access to encrypted messages
    Resource Type: Article
    Published: 2013
    Microsoft has collaborated closely with US intelligence services to allow users' communications to be intercepted, including helping the National Security Agency to circumvent the company's own encryption, according to top-secret documents obtained by the Guardian.
  89. Mistaking Omniscience for Omnipotence
    In a World Without Privacy, There Are No Exemptions for Our Spies

    Resource Type: Article
    Published: 2013
    Given how similar they sound and how easy it is to imagine one leading to the other, confusing omniscience (having total knowledge) with omnipotence (having total power) is easy enough. It’s a reasonable supposition that, before the Snowden revelations hit, America's spymasters had made just that mistake. If the drip-drip-drip of Snowden’s mother of all leaks -- which began in June and clearly won’t stop for months to come -- has taught us anything, however, it should be this: omniscience is not omnipotence. At least on the global political scene today, they may bear remarkably little relation to each other. In fact, at the moment Washington seems to be operating in a world in which the more you know about the secret lives of others, the less powerful you turn out to be.
  90. Nature, science & power
    Questions need to be asked...

    Resource Type: Website
    Published: 2014
    Here many questions will be asked, some answers attempted. This blog connects to a new book: Bold Scientists: dispatches from the battle for honest science, published in 2014 by Between the Lines.
  91. New Behind-the-Scenes Video: Airship Flight Over the NSA Data Center
    Sources News Release

    Resource Type: Article
    Published: 2014
    The Internet's Own Boy Director Brian Knappenberger Releases Short Doc as Senate Introduces New Reform Bill
  92. New Documents and Reports Confirm AT&T and NSA's Longstanding Surveillance Partnership
    Resource Type: Article
    Published: 2015
    Reports today in the New York Times and ProPublica confirm what EFF's Jewel v. NSA lawsuit has claimed since 2008 -- that the NSA and AT&T have collaborated to build a domestic surveillance infrastructure, resulting in unconstitutional seizure and search of of millions, if not hundreds of millions, of Americans' Internet communications.
  93. The New Police Surveillance State
    The Rising Price of Political Assembly

    Resource Type: Article
    Published: 2012
    Police are increasingly being deployed to restrict if not prevent mass political actions, especially directed at the banks.
  94. New Street-Level Surveillance Project Tracks Spying Technologies Used by Local Law Enforcement
    Sources News Release

    Resource Type: Article
    Published: 2015
    EFF Web Portal Provides In-Depth Resources About License Plate Readers, Biometric Collection, and Other High-Tech Surveillance Tools.
  95. No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State
    Resource Type: Book
    Published: 2014
    Glenn Greenwald recounts his 10-day trip to Honk Kong where he acquired the Snowden Files. Additionally, Greenwald discusses the NSA's unprecedented abuse of power, as well as the media's habitual avoidance of adversarial reporting on the government and their failure to serve the interests of the people.
  96. No Safe Harbor: How NSA Spying Undermined U.S. Tech and Europeans' Privacy
    Resource Type: Article
    Published: 2015
    The spread of knowledge about the NSA's surveillance programs has shaken the trust of customers in U.S. Internet companies like Facebook, Google, and Apple: especially non-U.S. customers who have discovered how weak the legal protections over their data is under U.S. law.
  97. NSA and GCHQ target Tor network that protects anonymity of web users
    Resource Type: Article
    Published: 2013
    The National Security Agency has made repeated attempts to develop attacks against people using Tor, a popular tool designed to protect online anonymity, despite the fact the software is primarily funded and promoted by the US government itself.
  98. The NSA Has Effectively Destroyed Internet Privacy
    Snowden's Latest

    Resource Type: Article
    Published: 2013
    Whistle-blower Edward Snowden prove that the NSA, working with its British counterpart the Government Communications Headquarters has conducted an intentional and largely sucessful campaign to destroy all privacy on the Internet.
  99. NSA learning how to snoop on pacemakers
    Resource Type: Article
    Published: 2016
    The NSA is seeking new ways to satisfy its hunger for raw data by exploiting the so-called internet of things, an emerging network connecting objects such as vehicles, home appliances and biomedical devices. "We're looking at it sort of theoretically from a research point of view right now," the spy agency's Deputy Director Richard Ledgett told a conference on military technology at Washington's Newseum on Friday.
  100. NSA surveillance may cause breakup of internet, warn experts
    Resource Type: Article
    Published: 2013
    Internet specialists highlight moves by Brazil, Germany and India towards creating separate networks in order to block spying.
  101. Obama defiant over NSA revelations ahead of summit with Chinese premier
    Resource Type: Article
    Published: 2013
    President says oversight of NSA surveillance programme should be left to Congress in comments criticising media 'hype.'
  102. The Obliteration of Privacy
    Snowden and the NSA

    Resource Type: Article
    Published: 2014
    It’s remarkable how little outrage Edward Snowden’s NSA revelations have provoked in the American public. One often heard response is something like, “Well, I don’t have anything to hide, so I don’t care if the government is listening to what I say. And if they catch some terrorists, so much the better.”
  103. Old New York Police Surveillance Is Found, Forcing Big Brother Out of Hiding
    Resource Type: Article
    Published: 2016
    From the mid-1950s to the early 1970s, police surveillance of political organizations in New York was extensive enough to require more than half a million index cards, simply to catalog and cross-reference the many dossiers. But over the ensuing decades, the dossiers themselves were presumed missing or lost. Police Department lawyers said they had no idea where the files had gone.

    Now, a significant portion of the missing files have been discovered during what the city said on Thursday was a routine inventory of a Queens warehouse, where archivists found 520 brown boxes of decades-old files, believed to be the largest trove of New York Police Department surveillance records from the era.
  104. On Being Watched in the 60s
    When Police Power was Embraced as a Form of Government

    Resource Type: Article
    Published: 2013
    There would seem to be the notion that the Sixties were the product of immaculate conception. In fact, they were more an act of conversion, conversion of the isolated, unfocussed, dispersed and inarticulate alienation of the 1950s into a mass movement with common language, direction, and rules.
  105. On Locational Privacy, and How to Avoid Losing it Forever
    Resource Type: Article
    Published: 2009
    Over the next decade, systems which create and store digital records of people's movements through public space will be woven inextricably into the fabric of everyday life. We are already starting to see such systems now, and there will be many more in the near future.
  106. Online Survival Kit
    Resource Type: Article
    Published: 2013
    This Online Survival Kit offers practical tools, advice and techniques that teach you how to circumvent censorship and to secure yo communications and data. This handbook will gradually be unveiled over the coming months in order to provide everyone with the means to resist censors, governments or interests groups that want to courntrol news and information and gag dissenting voices. The Reporters Without Borders Digital Survival Kit is available in French, English, Arabic, Russian et Chinese. Published under the Creative Commons licence, its content is meant to be used freely and circulated widely.
  107. An Online Tracking Device That’s Virtually Impossible to Block
    Resource Type: Article
    Published: 2014
    A new kind of tracking tool, canvas fingerprinting, is being used to follow visitors to thousands of top websites, from WhiteHouse.gov to YouPorn.
  108. The Orwellian Re-Branding of 'Mass Surveillance' as Merely 'Bulk Collection'
    Resource Type: Article
    Published: 2015
    Just as the Bush administration and the U.S. media re-labelled "torture" with the Orwellian euphemism "enhanced interrogation techniques" to make it more palatable, the governments and media of the Five Eyes surveillance alliance are now attempting to re-brand "mass surveillance" as "bulk collection" in order to make it less menacing (and less illegal).
  109. Orwell's Triumph: How Novels Tell the Truth of Surveillance
    Resource Type: Article
    Published: 2015
    Novels may be the best medium for describing a distopian world in which everyone is under constant surveillance.
  110. The Other Police State
    Private Cops vs. the Public Good

    Resource Type: Article
    Published: 2013
    A revealing study on "Spooky Business: A New Report on Corporate Espionage Against Non-profits" written by Gary Ruskin confirms one’s worst suspicions about the ever-expanding two-headed U.S. security state. It details how some companies use the security apparatus, including questionable espionage tactics, against anyone who challenges their authority.
  111. Other Voices: The Connexions Newsletter - July 17, 2014
    Gaza

    Resource Type: Serial Publication (Periodical)
    Published: 2014
    Topic of the week is Gaza, which was under attack by Israel as this issue appeared. Articles on surveillance capitalism, the tactics and successes of the movement for same-sex marriage in the United States, and profiles of alternative archives. Website of the week is Democracy Now!
  112. Other Voices: The Connexions Newsletter - September 4, 2014
    Resource Type: Article
    Published: 2014
    Information about the Connexions Alternative Media List and the Labor Film Archive. Articles on corporations spying on non-profits, workplace deaths, Monsanto and Ukraine, and liberal environmentalism. Topic of the week is Violence Against Journalists. Book of the week is Bold Scientists.
  113. Other Voices: The Connexions Newsletter - October 30, 2014
    Refugees

    Resource Type: Serial Publication (Periodical)
    Published: 2014
    Topic of the week is Refugees. Featured articles look at migration, counter-surveillance resources, farmers in Ghana fighting to retain the freedom to save their own seeds, and rebuilding communities faced with mining companies in Ecuador. The website of the week is Mediamatters. From the archives we've got Socialist Feminism: A Strategy for the Women's Movement.
  114. Other Voices: The Connexions Newsletter - January 29, 2015
    Land seizures and land take-overs

    Resource Type: Serial Publication (Periodical)
    Published: 2015
    This issue of Other Voices focuses on the issue of land seizures and land take-overs. Also included: Greece's solidarity movement, and the challenges and opportunities it faces after the election of a Syrizia government. From the archives, there are interviews about the 1974 occupation of Anicinabe Park, an article about anti-dicrimination fighter Viola Desmond, and the publication, in 1929, of All Quiet on the Western Front.
  115. Other Voices: The Connexions Newsletter - February 26, 2015
    Ukraine

    Resource Type: Serial Publication (Periodical)
    Published: 2015
    Ukraine is spotlighted in this issue of Other Voices, with several articles on the events of the past year, from the overthrow of the government, to the rise of the far right, the armed conflict in the east, and aggressive US/NATO moves setting the stage for a possible nuclear war between the US and Russia. Also in this issue, #DomesticExtremists ridicule police state legislation in the UK, world inequality in one simple graphic, and people's history items about mass strikes in the First World War, and the new People's Archive of Rural India.
  116. Other Voices: The Connexions Newsletter - March 12, 2015
    Organizing

    Resource Type: Serial Publication (Periodical)
    Published: 2015
    The focus of this issue is organizing. How can we challenge and overcome entrenched structures of economic and political power? Our own source of power is our latent ability to join together and work toward common goals, collectively. That requires organizing. Power gives way only when it is challenged by powerful movements for change, and movements grow out of organizing. In this newsletter, we feature a number of articles, books, and other organizing resources.
  117. Other Voices: The Connexions Newsletter - July 3, 2015
    Greece and thd debt crisis

    Resource Type: Serial Publication (Periodical)
    Published: 2015
    Our spotlight this issue is on the debt crisis facing Greece. To understand the crisis, one has to look beyond the mainstream media to alternative sources of information. We've done that, with articles that set out to analyze the nature of the debt burden that has been imposed on the citizens of so many countries, not just Greece. Also: celebrating Grace Lee Bogg’s 100th birthday.
  118. Other Voices: The Connexions Newsletter - July 2, 2016
    Brexit, Jeremy Corbyn, and Contempt for Democracy

    Resource Type: Article
    Published: 2016
    Brexit, the British vote to leave the European Union, has thrown the political elites into turmoil and confusion. The referendum was supposed to be a safe political manoeuvre, a way to produce an appearance of democratic legitimacy for the profoundly undemocratic structures of the EU. The gambit turned out to be a spectacular miscalculation, as millions of people turned out to express their opposition to a state of affairs that is leaving the majority worse off while enriching a small minority. This issue of Other Voices looks at the Brexit referendum, elite loathing for democracy, and the related attempt to get rid of Labour's leftwing leader, Jeremy Corbyn.
  119. Other Voices: The Connexions Newsletter - April 30, 2017
    Affirming life, resisting war, reporting UFOs

    Resource Type: Serial Publication (Periodical)
    Published: 2017
    What do we do when those in power recklessly put the future of the entire planet at risk with their acts of aggression and military provocations, while they ignore the growing disaster of climate change? We fight back and organize, on every level, wherever we are, doing whatever offers the hope of resisting and of building a movement that can stop and overturn the out-of-control monster of late capitalism.
  120. Other Voices: The Connexions Newsletter - July 22, 2017
    Secrecy and Power

    Resource Type: Serial Publication (Periodical)
    Published: 2017
    Secrecy is a weapon the powerful use against their enemies: us. This issue of Other Voices explores the relationship of secrecy and power.
  121. Pakistan: Intelligence agency sought to tap all communications traffic, documents reveal
    Resource Type: Article
    Published: 2015
    Every government seems to want to spy in Pakistan. The US National Security Agency (NSA) tapped the fibre optic cables landing in Karachi, among others, and used 55 million phone records harvested from Pakistani telecommunications providers for an analysis exercise. The United Kingdom's Government Communications Headquarters (GCHQ) had a store of SIM keys from Mobilink and Telenor networks, two of the country's biggest providers.
  122. Police log 'domestic extremists' and keep database on activists
    Forces survey and file details of peaceful protests and political activities

    Resource Type: Article
    Published: 2009
    'Domestic Extremists' are persons involved in political meetings and protests who are photographed and added to a national database by the UK police. This surveillance falls under the purview of "terrorism and allied matters" and these police tactics are now the subject of an internal review. They have been widely criticized for lacking accountability.
  123. The Police State is Real
    It Has Happened Here

    Resource Type: Article
    Published: 2013
    The Bush regime’s response to 9/11 and the Obama regime’s validation of this response have destroyed accountable democratic government in the United States. So much unaccountable power has been concentrated in the executive branch that the US Constitution is no longer an operable document.
  124. Police State: US Government-Funded Database Created to Track "Subversive Propaganda" Online
    Resource Type: Article
    Published: 2014
    The creation of the Truthy database by Indiana University researchers has drawn sharp criticism from free-speech advocates and others concerned over government censorship of political expression.
  125. Political activist Ken Stone takes CSIS to task for alleged harassment
    Resource Type: Article
    Published: 2015
    What is it like to be targeted by Canada's spy agency? Veteran anti-war and environmental activist Ken Stone knows firsthand and is willing to talk about it.
  126. Preparing for a Digital 9/11
    Resource Type: Article
    Published: 2012
    In recent years, in one of the more dangerous, if largely undiscussed, developments of our time, the Bush and then Obama administrations have launched the first state-planned war in cyber space. First, there were the "Olympic Games," then the Stuxnet virus, then Flame, and now it turns out that other sophisticated malware programs have evidently followed.
  127. Privacy!
    How to get it .... How to enjoy it

    Resource Type: Book
    Published: 1977
  128. Profiled
    From Radio to Porn, British Spies Track Web Users' Online Identities

    Resource Type: Article
    Published: 2015
    Amid a renewed push from the U.K. government for more surveillance powers, more than two dozen documents being disclosed by The Intercept reveal for the first time several major strands of GCHQ’s (Government Communications Headquarters) existing electronic eavesdropping capabilities.
  129. Radio Frequency ID Removes Freedom
    Resource Type: Article
    Published: 2006
    Radio Frequency ID violates the Charter of Rights and Freedoms and is part of the stealthy forging of a police state.
  130. Raleigh police are asking Google to provide user data for all people near crime scenes
    Resource Type: Article
    Published: 2018
    Police in Raleigh, North Carolina, have presented Google with warrants to obtain data from mobile phones from not just specific suspects who were in a crime scene area, but from the mobile phones of all people in the area
  131. Real-Time Face Recognition Threatens to Turn Cops' Body Cameras Into Surveillance Machines
    Resource Type: Article
    Published: 2017
    For years, the development of real-time face recognition has been hampered by poor video resolution, the angles of bodies in motion, and limited computing power. But as systems begin to transcend these technical barriers, they are also outpacing the development of policies to constrain them. Civil liberties advocates fear that the rise of real-time face recognition alongside the growing number of police body cameras creates the conditions for a perfect storm of mass surveillance.
  132. Reflections on a whistleblower: Two years after Snowden
    Resource Type: Article
    Published: 2015
    Two years after Snowden, the international state of surveillance and the ranks of whistleblowers both continue to grow.
  133. Reporters Without Borders and Torservers.net, partners against online surveillance and censorship
    Sources News Release

    Resource Type: Article
    Published: 2014
    Reporters Without Borders and Torservers.net have joined forces to create and maintain 250 additional relays for the Tor network.
  134. The Return of COINTELPRO?
    Time to Target the Real Terrorists

    Resource Type: Article
    Published: 2013
    The FBI was using its offices and agents across the country as early as August 2011 to engage in a massive surveillance scheme against Occupy Wall Street. The documents show a government agency at its most paranoid.
  135. Revealed: How DOJ Gagged Google over Surveillance of WikiLeaks Volunteer
    Resource Type: Article
    Published: 2015
    The Obama administration fought a legal battle against Google to secretly obtain the email records of a security researcher and journalist associated with WikiLeaks.
  136. Rogue State
    A Guide to the World's Only Superpower

    Resource Type: Book
    Published: 2005
    A mini-encyclopedia of the numerous un-humanitarian acts perpetrated by the United States since the end of the Second World War.
  137. San Diego's Facial Recognition Program Shows Why We Need Records on Police Use of Mobile Biometric Technology
    Resource Type: Article
    Published: 2015
    The New York Times has a story out on how San Diego police use mobile facial recognition devices in the field, including potentially on non-consenting residents who aren't suspected of a crime. One account from a retired firefighter is especially alarming.
  138. Secret Service
    Political Policing in Canada From the Fenians to Fortress America

    Resource Type: Book
    Published: 2012
    A history of political policing in Canada.
  139. Seizure of AP phone records condemned as 'grave violation'
    Sources News Release

    Resource Type: Article
    Published: 2013
    Reporters Without Borders regards the US Department of Justice's seizure of the records of thousands of Associated Press phone calls as an "extremely grave violation of freedom of information."
  140. The Servility of the Satellites
    The Snowden Affair and the Destruction of Effective Democracy in Europe

    Resource Type: Article
    Published: 2013
    Recent revelations confirm the completion of the transformation of the "Western democracies" into something else, an entity that as yet has no recognized name. The outrage against the Bolivian President confirmed that this trans-Atlantic entity has absolutely no respect for international law, even though its leaders will make use of it when it suits them. But respect it, allow it to impede their actions in any way? Certainly not. And this disrespect for the law is linked to a more basic institutional change: the destruction of effective democracy at the national level.
  141. Snowden leak: MI5 has gathered so much data it may actually be missing 'life-saving intelligence'
    Resource Type: Article
    Published: 2016
    British spies may have missed potentially "life-saving intelligence" because their surveillance systems were sweeping up more data than could be analyzed, a leaked classified report reveals. The document, given to The Intercept by NSA whistleblower Edward Snowden, was sent to top British government officials, outlining methods being developed by the UK’s domestic intelligence agency, MI5, to covertly monitor internet communications.
  142. Snowden, Surveillance And The Secret State
    Resource Type: Article
    Published: 2013
    There is plenty to be said about living under a giant system of government surveillance. Just don't expect the corporate media to explore the full extent of what it really all means.
  143. Snowden's NSA Leaks Catalogued In First Searchable Database Of The Surveillance Documents
    Resource Type: Article
    Published: 2015
    Canadian journalists and researchers have teamed up to create the world's first fully-searchable index of the classified documents revealing NSA surveillance leaked by whistleblower Edward Snowden.
  144. A Social History of Wiretaps
    Memory's Half-Life

    Resource Type: Article
    Published: 2013
    American’s century-long distrust of electronic surveillance is shifting to Americans accepting and internalizing new levels of state surveillance.
  145. Software Meant to Fight Crime Is Used to Spy on Dissidents
    Resource Type: Article
    Published: 2012
    Morgan Marquis-Boire works as a Google engineer and Bill Marczak is earning a Ph.D. in computer science. But this summer, the two men have been moonlighting as detectives, chasing an elusive surveillance tool from Bahrain across five continents.
  146. Someone's Watching You!
    From Micropchips in your Underwear to Satellites Monitoring Your Every Move, Find Out Who's Tracking You and What You Can Do about It

    Resource Type: Book
    Published: 2011
    An expose and explanation of the little-known secret surveillance programs run by both the public and private sectors, including practical steps on how to keep your private life private.
  147. Sources HotLink - June 30, 2016
    Resource Type: Serial Publication (Periodical)
    Published: 2016
    Articles about the FBI and the information it gathers, Donald Trump and the media, and the role of pharmaceutical companies in suppressing information.
  148. Sources welcomes Eugene Oscapella, Barrister and Solicitor/Oscapella and Associates
    Sources News Release

    Resource Type: Article
    Published: 2009
    Sources welcomes Eugene Oscapella, Barrister and Solicitor/Oscapella and Associates.
  149. Spies Hacked Computers Thanks to Sweeping Secret Warrants, Aggressively Stretching U.K. Law
    Resource Type: Article
    Published: 2015
    British spies have received government permission to intensively study software programs for ways to infiltrate and take control of computers. The GCHQ spy agency was vulnerable to legal action for the hacking efforts, known as "reverse engineering," since such activity could have violated copyright law. But GCHQ sought and obtained a legally questionable warrant from the Foreign Secretary in an attempt to immunize itself from legal liability.
  150. The Spy Who Fired Me
    The human costs of workplace monitoring

    Resource Type: Article
    Published: 2015
    Kaplan discusses the growing practice of employers monitoring the internet use of their employees.
  151. Spying by the Numbers
    Hundreds of Thousands Subject to Government Surveillance and No Real Protection

    Resource Type: Article
    Published: 2013
    Thanks to NSA whistleblower Edward Snowden many more people in the US and world-wide are learning about extensive US government surveillance and spying. There are publicly available numbers which show the reality of these problems are bigger than most think and most of this spying is happening with little or no judicial oversight.
  152. Spying on Democracy
    Government Surveillance, Corporate Power, and Public Resistance

    Resource Type: Book
    Published: 2013
    Heidi Boghosian documents the disturbing increase in surveillance of ordinary citizens and the danger it poses to our privacy, our civil liberties, and to the future of democracy itself.
  153. The Stasi could only dream of such data
    Britain, the birthplace of liberalism, has become the database state

    Resource Type: Article
    Published: 2008
    As technology increases the flow of stored data about individual actions, assurances of the "right to informational self-determination" must be hard won from governments. Government surveillance of citizens has become an accepted 'counter-terrorism' measure.
  154. Submission to the MacDonald Commissionon the R.C.M.P
    Resource Type: Article
    The authors of this submission are concerned with the presence of the RCMP Security Services at events such as trade union meetings.
  155. Surveillance and the Corporate State
    Spying, Control and Murder Under the Imperial Presidency

    Resource Type: Article
    Published: 2013
    With all of the fear mongering the subject has received in recent decades, Americans have in fact had remarkably little to fear directly from ‘terrorism.’
  156. Surveillance Capitalism
    Monopoly-Finance Capital, the Military-Industrial Complex, and the Digital Age

    Resource Type: Article
    Published: 2014
    A massive corporate sales effort and military-industrial complex constituted the two main surplus-absorption mechanisms in the U.S. economy in the first quarter-century after the Second World War, followed by financialization after the crisis of the 1970s. Each of these means of surplus absorption were to add impetus in different ways to the communications revolution, and each necessitated new forms of surveillance and control. The result was a universalization of surveillance, associated with all three areas.
  157. Surveillance company Hacking Team's relationships with repressive regimes exposed
    Resource Type: Article
    Published: 2015
    A 400 gigabyte trove of internal documents belonging to surveillance company Hacking Team has been released online. Hacking team sells intrusive hacking tools that have allegedly been used by some of the most repressive regimes in the world.
  158. Surveillance firms spied on campaign groups for big companies, leak shows
    Resource Type: Article
    Published: 2017
    British Airways, the Royal Bank of Scotland and Porsche are among five large companies that have been identified as having paid corporate intelligence firms to monitor political groups that challenged their businesses, leaked documents reveal.
  159. Surveillance in the Time of Insecurity
    Resource Type: Book
    Published: 2010
    Threats of terrorism, natural disaster, identity theft, job loss, illegal immigration, and even biblical apocalypse — all are perils that trigger alarm in people today. Although there may be a factual basis for many of these fears, they do not simply represent objective conditions. Feelings of insecurity are instilled by politicians and the media, and sustained by urban fortification, technological surveillance, and economic vulnerability.
  160. Surveillance Self-Defense
    Resource Type: Website
    Published: 2018
    Modern technology has given those in power new abilities to eavesdrop and collect data on innocent people. Surveillance Self-Defense is EFF's guide to defending yourself and your friends from surveillance by using secure technology and developing careful practices.
  161. Surveillance USA
    NSA and the PRISM Project

    Resource Type: Article
    Published: 2013
    The government is merrily going about its business of keeping tabs on you in virtually every conceivable way.
  162. Ten Steps You Can Take Right Now Against Internet Surveillance
    Resource Type: Article
    Published: 2013
    One of the trends we've seen is how, as the word of the NSA's spying has spread, more and more ordinary people want to know how (or if) they can defend themselves from surveillance online. With a few small steps, you can make that kind of surveillance a lot more difficult and expensive, both against you individually, and more generally against everyone.
  163. The Terrifying World of Electronic Monitoring
    From Drone Strikes to Martha Stewart

    Resource Type: Article
    Published: 2013
    Electronic monitoring is about tracking and marking. The GPS technology that is trending in electronic monitors tracks people’s every movement with the purpose of marking them for punishment if they deviate from the program
  164. The Day We Fight Back Against Mass Surveillance: February 11, 2014
    Sources News Release

    Resource Type: Article
    Published: 2014
    On February 11, on the Day We Fight Back, the world will demand an end to mass surveillance in every country, by every state, regardless of boundaries or politics.
  165. 13 Things the Government is Trying to Keep Secret From You
    Constitutional Black Out

    Resource Type: Article
    Published: 2013
    The President and the Government are intentionally keeping massive amounts of information about surveillance secret.
  166. Thirteen Ways Government Tracks Us
    Resource Type: Article
    Published: 2012
    Privacy is eroding fast as technology offers government increasing ways to track and spy on citizens. Here are thirteen examples of how some of the biggest government agencies and programs track people.
  167. Thousands Join Legal Fight Against UK Surveillance — And You Can, Too
    Resource Type: Article
    Published: 2015
    Thousands of people are signing up to join an unprecedented legal campaign against the United Kingdom’s leading electronic surveillance agency.
  168. Top-Secret Document Reveals NSA Spied on Porn Habits as Part of Plan to Discredit 'Radicalizers'
    Resource Type: Article
    Published: 2013
    The National Security Agency has been gathering records of online sexual activity and evidence of visits to pornographic websites as part of a proposed plan to harm the reputations of those whom the agency believes are radicalizing others through incendiary speeches, according to a top-secret NSA document. The document, provided by NSA whistleblower Edward Snowden, identifies six targets, all Muslims, as "exemplars" of how "personal vulternabilities" can be learned through electronic surveillance, and then exploited to undermine a target's credibility, reputation and authority.
  169. Two out of Three Investigative Journalists in US Believe They're Being Spied On
    Resource Type: Article
    Published: 2015
    In the wake of the NSA mass surveillance scandal, a vast majority of investigative journalists believe that the U.S. government is spying on them, and large numbers say that this belief impacts the way they go about their reporting.
  170. Uber Plans to Track Users Should Not Be Allowed, Says Privacy Group
    Resource Type: Article
    Published: 2015
    A formal complaint has been filed against Uber, the car ride company, by the Electronic Privacy Information Center (EPIC), a non-profit advocacy group. The NGO says Uber plans to use their smart phone app to access user's locations at all times, and to send advertisements to user's contact lists.
  171. UN slams UK surveillance law, calls for privacy reforms in Canada, France and Macedonia
    Resource Type: Article
    Published: 2015
    In yet another blow to the UK's surveillance proponents, the UN Human Rights Committee has criticised the British legal regime governing the interception of communications, observing that it allows for mass surveillance and lacks sufficient safeguards.
  172. Uncivil Obedience
    The Tactics and Tales of a Democratic Agitator

    Resource Type: Book
    Published: 1991
    How to push for social change without breaking the law.
  173. Unmasking the Five-Eyed monster, a global and secret intelligence-sharing regime
    Resource Type: Article
    Published: 2013
    Privacy International is proud to announce our new project, Eyes Wide Open, which aims to pry open the Five Eyes arrangement and bring it under the rule of law.
  174. Very Mention of Snowden's Name Makes Prosecutors Tremble
    Resource Type: Article
    Published: 2015
    NSA whistleblower Edward Snowden has become such a powerful symbol of government overreach that federal prosecutors in a terror case in Chicago are asking the judge to forbid defense attorneys from even mentioning his name during trial, for fear that it would lead the jury to disregard their evidence.
  175. Le Viol du Courier/Violation of the Mail
    Resource Type: Article
    The League on Human Rights presents arguments against the legality and acceptability of Bill C-26. This bill, introduced to Parliament in February 1978, aims to authorize the opening of first-class mail.
  176. Vodafone Reveals Existence of Secret Wires that Allow State Surveillance
    Resource Type: Article
    Published: 2014
    Wires allow agencies to listen to or record live conversations, in what privacy campaigners are calling a 'nightmare scenario'.
  177. A Walking Tour of New York's Massive Surveillance Network
    Resource Type: Article
    Published: 2016
    So it felt a bit risky to be climbing up a street pole on Wall Street to closely inspect a microwave radar sensor, or to be lingering under a police camera, pointing and gesturing at the wires and antenna connected to it. Yet it was also entirely appropriate to be doing just that, especially in the company of Ingrid Burrington, author of the new book "Networks of New York: An Illustrated Field Guide to Urban Internet Infrastructure," which points out that many of the city's communications and surveillance programs were conceived and funded in response to the attacks.
  178. War Against the People
    Israel, The Palestinians and Global Pacification

    Resource Type: Book
    Published: 2015
    Governments today are waging a 'war against the people' -- whether 'securitization' against asylum seekers in Fortress Europe, 'counterinsurgency' in Afghanisation, or the subliminal war of policy and surveillance arising everywhere. Israel's contribution to this is key: exporting the high-tech weaponry, security systrems and methods of pacification perfected on the Palestinians in the Occupied Territories.
  179. The Watchers
    The Rise of America's Surveillance State

    Resource Type: Book
    Published: 2010
    An exploration of how and why the American government increasingly spies on its own citizens.
  180. West Germany: Censorship and Repression in the Model State
    Resource Type: Article
    Published: 1979
    In West Germany, repression is now 'democratically' sanctioned and seen as a model for other countries to adopt.
  181. Who's the true enemy of internet freedom - China, Russia, or the US?
    Resource Type: Article
    Published: 2015
    Beijing and Moscow are rightly chastised for restricting their citizens' online access – but it's the US that is now even more aggressive in asserting its digital sovereignty.
  182. Why Do We Expose Ourselves?
    Resource Type: Article
    Published: 2016
    Among critics of technological surveillance, there are two allusions so commonplace they have crossed into the realm of cliché. One, as you have probably already guessed, is George Orwell's Big Brother, from 1984. The other is Michel Foucault’s panopticon -- a vision, adapted from Jeremy Bentham, of a prison in which captives cannot tell if or when they are being watched. Today, both of these touchstones are considered chillingly prophetic. But in Exposed: Desire and Disobedience in the Digital Age, Bernard Harcourt has another suggestion: Both of them are insufficient.
  183. Why you shouldn't trust Geek Squad ever again
    The government reportedly pays Geek Squad technicians to dig through your PC

    Resource Type: Article
    Published: 2017
    The Orange County Weekly reports that the company's repair technicians routinely search devices brought in for repair for files that could earn them $500 reward as FBI informants. That, ladies and gentlemen, is about as blatant a case of unconstitutional search and seizure as it gets.
  184. WikiLeaks Vault 7 Reveals CIA Cyberwar and the Battleground of Democracy
    Resource Type: Article
    Published: 2017
    WikiLeaks dropped a bombshell on the U.S. Central Intelligence Agency. Code-named “Vault 7”, the whistleblowing site began releasing the largest publication of confidential documents that have come from the top secret security network at the Cyber Intelligence Center.
  185. Will the government's counter-extremist programme criminalise dissent?
    Resource Type: Article
    Published: 2015
    From 1 July, a broad range of public bodies - from nursery schools to optometrists - will be legally obliged to participate in the U.S. government’s Prevent policy to identify would-be extremists. Under the fast-tracked Counter-Terrorism and Security Act 2015, schools, universities and health service providers can no longer opt out of monitoring students and patients for supposed radicalised behaviour.
  186. With Power of Social Media Growing, Police Now Monitoring and Criminalizing Online Speech
    Resource Type: Article
    Published: 2015
    Criminal cases for online political speech are now commonplace in the UK, notorious for its hostility to basic free speech and press rights. As The Independent's James Bloodworth reported last week, "around 20,000 people in Britain have been investigated in the past three years for comments made online."
  187. The World Google Controls and Surveillance Capitalism
    Resource Type: Article
    Published: 2018
    Google's encroaching powers over our lives, to include the freedom of expression protected by most national laws, not to mention EU and UN Charters, around the planet today.
  188. XKEYSCORE: NSA's Google for the World's Private Communications
    Resource Type: Article
    Published: 2015
    The NSA's XKEYSCORE program, first revealed by The Guardian, sweeps up countless people's Internet searches, emails, documents, usernames and passwords, and other private communications. XKEYSCORE is fed a constant flow of Internet traffic from fiber optic cables that make up the backbone of the world’s communication network, among other sources, for processing.

Experts on Surveillance in the Sources Directory

  1. Wikileaks

Sources-journalists use the sources website to find you


AlterLinks


© 2019. The information provided is copyright and may not be reproduced in any form or by any means (whether electronic, mechanical or photographic), or stored in an electronic retrieval system, without written permission of the publisher. The content may not be resold, republished, or redistributed. Indexing and search applications by Ulli Diemer and Chris DeFreitas.