Home Title Index Topic Index Sources Directory News Releases Sources Calendar RSS Sources Select News RSS Feed

E-Mail Security
AlterLinks Topic Index

  1. Caveat Surfer: Beware When Using Electronic Communication
    Resource Type: Article
    Published: 2000
    Points about electronic communication and online security.
  2. Companies that cooperate with dictatorships must be sanctioned
    Sources News Release

    Resource Type: Article
    Published: 2011
    Reporters Without Borders condemns the criminal cooperation that exists between many western companies, especially those operating in the new technology area, and authoritarian regimes.
  3. CSE monitors millions of Canadian emails to government
    Resource Type: Article
    Published: 2015
    Canada's electronic spy agency collects millions of emails from Canadians and stores them for "days to months" while trying to filter out malware and other attacks on government computer networks.
  4. Email privacy
    Wikipedia article

    Resource Type: Article
    Published: 2012
    Email privacy is the broad topic dealing with issues of unauthorized access and inspection of electronic mail. This unauthorized access can happen while an email is in transit, as well as when it is stored on email servers or on a user computer. In countries with a constitutional guarantee of the secrecy of correspondence, whether email can be equated with letters and get legal protection from all forms of eavesdropping comes under question because of the very nature of email. This is especially important as more and more communication occurs via email compared to postal mail.
  5. Email scam which targets professional speakers
    Sources News Release

    Resource Type: Article
    Published: 2009
    An email scam targetting professional speakers is making the rounds. The NSA, a British speakers' association reports that the scam has been aimed at its members. Speakers listed with SOURCES - www.sources.com - have also reported being targetted.
  6. The FBI Can Bypass Encryption
    Why Cyber Security is a Magic Act

    Resource Type: Article
    Published: 2014
  7. For journalists, danger lurking in your email
    Resource Type: Article
    Published: 2012
    Citizen Lab provided a disturbing look into the likely use of a commercial surveillance program, FinFisher, to remotely invade and control the computers of Bahraini activists. After the software installs itself onto unsuspecting users' computer, it can record and relay emails, screenshots, and Skype audio conversations.
  8. Google: don't expect privacy when sending to Gmail
    Resource Type: Article
    Published: 2013
    People sending email to any of Google's 425 million Gmail users have no "reasonable expectation" that their communications are confidential, the internet giant has said in a court filing.
  9. How the US government secretly reads your email
    Resource Type: Article
    Published: 2011
    Secret orders forcing Google and Sonic to release a WikiLeaks volunteer's email reveal the scale of US government snooping.
  10. Hushmail
    Resource Type: Website
    Confidential email service based in Canada
  11. Israeli hackers reportedly gave Cambridge Analytica stolen private emails of two world leaders
    Resource Type: Article
    Published: 2018
    Israeli hackers reportedly gave information from the hacked emails of two world leaders to Cambridge Analytica, the political-research company at the centre of a massive Facebook-data scandal.
  12. Lessons of the Snowden Revelations
    You are the Target!

    Resource Type: Article
    Published: 2013
    We in the Left have long worried about “police state tactics”. Now we have to confront the police state structure. It’s here and it can morph into a real police state with very little effort. Opposing and dismantling it should now be among our top priorities.
  13. The NSA's Invasion of Google and Yahoo Servers
    Your Email is Likely Being Monitored

    Resource Type: Article
    Published: 2013
    The American National Security Agency (NSA) has been intercepting information coming in and out of Google and Yahoo servers over non-public, internal network fibre optic lines. In December, 2012 alone, the program (revealingly called “MUSCULAR”) processed 181,280,466 Google and Yahoo records that included email, searches, videos and photos.
  14. The NSA's Spying Operation on Mexico
    Systematic Eavesdropping on the Government

    Resource Type: Article
    Published: 2013
    The American NSA has been systematically eavesdropping on the Mexican government for years. Three major programs constitute a massive espionage operation against Mexico.
  15. Polishing Putin: hacked emails suggest dirty tricks by Russian youth group
    Resource Type: Article
    Published: 2012
    Nashi runs web of online trolls and bloggers paid to praise Vladimir Putin and denigrate enemies.
  16. Security experts urge clients to stop using Yahoo Mail after spying report
    Resource Type: Article
    Published: 2016
    Yahoo is once again under scrutiny after a report that at the behest of the U.S. government, its engineers had written software to scan every email message sent and received by its users.
  17. Sending encrypted emails using Thunderbird and PGP
    Resource Type: Article
    Published: 2013
    There are easy ways to ensure your Internet activities remain confidential.
  18. Spying by the Numbers
    Hundreds of Thousands Subject to Government Surveillance and No Real Protection

    Resource Type: Article
    Published: 2013
    Thanks to NSA whistleblower Edward Snowden many more people in the US and world-wide are learning about extensive US government surveillance and spying. There are publicly available numbers which show the reality of these problems are bigger than most think and most of this spying is happening with little or no judicial oversight.
  19. What Are Your Options Now For Secure Email?
    Resource Type: Article
    Published: 2014
    It's shockingly, disturbingly easy for the government to snoop on your emails. Here are your weapons in the fight for your email privacy.
  20. Will Full Encryption Sideline Google's Targeted Ads?
    Resource Type: Article
    Published: 2014
    Mining personal data to deliver targeted ads is the lifeblood of Google’s business—and of many other online firms. But what if that data dries up at the source?

Sources-journalists use the sources website to find you


AlterLinks


© 2019. The information provided is copyright and may not be reproduced in any form or by any means (whether electronic, mechanical or photographic), or stored in an electronic retrieval system, without written permission of the publisher. The content may not be resold, republished, or redistributed. Indexing and search applications by Ulli Diemer and Chris DeFreitas.