Home Title Index Topic Index Sources Directory News Releases Sources Calendar RSS Sources Select News RSS Feed

Spying
AlterLinks Topic Index

  1. Absolute Friends
    Resource Type: Book
    Published: 2003
    Ted Mundy and Sasha, political comrades and spies.
  2. The ADL Spying Case Is Over, But The Struggle Continues
    Resource Type: Article
    Published: 2002
    The Anti-Defamation League, an organization that claims to be a defender of civil rights, has engaged in a vast spying operation directed against American citizens opposed to Israel’s policies in the Occupied West Bank and Gaza and to the apartheid policies of the government of South Africa.
  3. ADL's Massive Spy Operation
    Zionist Fingermen for Apartheid, Salvador Death Squads

    Resource Type: Article
    Published: 1993
  4. Anthropologists, Spooks, and the Boys Who Went to War
    Resource Type: Article
    Published: 2012
  5. Australian government orders ASIO raids to suppress East Timor spying evidence
    Resource Type: Article
    Published: 2013
    The Abbott governmen ordered Australian Security Intelligence Organisation (ASIO) and Australian Federal Police (AFP) raids on the homes and offices of a lawyer and former intelligence agency whistleblower involved in an international legal challenge to Australia’s spying on the East Timor government during maritime border talks in 2004.
  6. The Big Secret That Makes the FBI's Anti-Encryption Campaign a Big Lie
    Resource Type: Article
    Published: 2015
    McLaughlin discusses how hacking techniques and their increasing use are justified in a prevalent way by the American government.
  7. The boss is spying
    Resource Type: Article
    Published: 2013
    The data mining by large U.S. corporations gets less attention than U.S. government surveillance. It goes beyond the tracking of every mouse-click, purchase and "like" registered by every consumer on the internet, and relies not only on sophisticated electronic devices, but on the currency of fear and sheer intimidation which would make a Big Brother tyrant proud, the kind depicted in George Orwell's dystopian novel 1984.
  8. Canada's Spy Groups Divulge Secret Intelligence to Energy Companies
    Resource Type: Article
    Published: 2012
    Documents raise fears that info on environmentalists, indigenous groups and more shared with industry at biannual, secret-level, briefings.
  9. Capitalist Surveillance State: Everyone's a Target
    Threatening Reporters, Spying on Public

    Resource Type: Article
    Published: 2013
    There is an inherent tendency for the state, which governs on behalf of a minuscule, ruthless class of obscenely wealthy exploiters, to attempt to amass ever greater power to control the population because it hates and fears the working people.
  10. China's Cyberspying Is 'on a Scale No One Imagined' -- if You Pretend NSA Doesn't Exist
    Resource Type: Article
    Published: 2015
    Stories about cyberespionage -- like the data theft at the US Office of Personal Management believed but not officially stated to have been carried out by China -- are weird. For one thing, they include quotes about how "we need to be a bit more public" about our responses to cyberattacks -- delivered from White House officials who speak only on condition of anonymity.
  11. Companies that cooperate with dictatorships must be sanctioned
    Sources News Release

    Resource Type: Article
    Published: 2011
    Reporters Without Borders condemns the criminal cooperation that exists between many western companies, especially those operating in the new technology area, and authoritarian regimes.
  12. Complaints filed against telecom companies for their role in UK mass surveillance programme
    Resource Type: Article
    Published: 2013
    On 5 November 2013, Privacy International filed formal complaints with the Organisation for Economic Cooperation and Development (OECD) in the UK against some of the world's leading telecommunication companies, for providing assistance to British spy agency GCHQ in the mass interception of internet and telephone traffic passing through undersea fibre optic cables.
  13. The Corporate State of Surveillance
    Opting Out

    Resource Type: Article
    Published: 2013
    America was founded on the ideals of personal liberty, freedom and democracy. Now mass spying, surveillance and the unending collection of personal data undermine civil liberties and our privacy rights. We find ourselves in the midst of an all-out invasion on what’s-none-of-their-business and its coming from both government and corporate sources. Snooping and data collection have become big business. Nothing is out of their bounds anymore.
  14. Corporations Spy on Nonprofits with Impunity
    Dow Chemical vs. Greenpeace

    Resource Type: Article
    Published: 2014
    Here's a dirty little secret you won't see in the daily papers: corporations conduct espionage against US nonprofit organizations without fear of being brought to justice.
  15. Covert Entry
    Spies, Lies and Crimes Inside Canada's Secret Service

    Resource Type: Book
    Published: 2002
    A glimpse into the inner workings of Canada's secret service.
  16. CSE monitors millions of Canadian emails to government
    Resource Type: Article
    Published: 2015
    Canada's electronic spy agency collects millions of emails from Canadians and stores them for "days to months" while trying to filter out malware and other attacks on government computer networks.
  17. EFF Calls Out DOJ for Failing to Provide Crucial Public Information in NSA Case
    Sources News Release

    Resource Type: Article
    Published: 2014
    Latest Filing in Jewel v. NSA Demands Documents Government Is Trying to Conceal
  18. EFF Files FOIA Suit Over U.S. Marshals' Spy Planes
    Sources News Release

    Resource Type: Article
    Published: 2015
    The Electronic Frontier Foundation (EFF) has filed a Freedom of Information Act (FOIA) lawsuit to shine light on the U.S. Marshals Service's (USMS) use of small aircraft mounted with controversial cell-phone tracking systems.
  19. EFF Wins Battle Over Secret Legal Opinions on Government Spying
    Sources News Release

    Resource Type: Article
    Published: 2015
    The Electronic Frontier Foundation (EFF) has won its four-year Freedom of Information Act lawsuit over secret legal interpretations of a controversial section of the Patriot Act.
  20. Electronic Frontier Foundation to Court: There's No Doubt the Government Destroyed NSA Spying Evidence
    Sources News Release

    Resource Type: Article
    Published: 2014
    The Electronic Frontier Foundation (EFF) told a federal court today that there was no doubt that the government has destroyed years of evidence of NSA spying -- the government itself has admitted to it in recent court filings.
  21. Extraordinary Violence at 500 Pearl Street
    The Sentencing of Jeremy Hammond

    Resource Type: Article
    Published: 2013
    On Friday, November 15, 2013, extreme violence with malicious intent was meted out by Federal District Court Judge Loretta Preska in the sentencing phase of 28 year old hacktivist Jeremy Hammond before a chamber packed with friends, family, supporters and others.
  22. Eyes Wide Open
    Resource Type: Article
    Published: 2013
    The recent revelations, made possible by NSA-whistleblower Edward Snowden, of the reach and scope of global surveillance practices have prompted a fundamental reexamination of the role of intelligence services in conducting coordinated cross-border surveillance.
  23. Fake cell phone 'towers' may be spying on Americans' calls, texts
    Resource Type: Article
    Published: 2014
    More than a dozen 'fake cell phone towers' could be secretly hijacking Americans' mobile devices in order to listen in on phone calls or snoop on text messages, a security-focused cell phone company claims. It is not clear who controls the devices.
  24. FBI director wants access to encrypt Apple, Google users' data, demands law 'fix'
    Resource Type: Article
    Published: 2014
    The FBI director has slammed Apple and Google for offering their customers encryption technology that protects users’ privacy. "Deeply concerned" James Comey wants to push on Congress to "fix" laws to ensure police can still access private data.
  25. The FBI Director's Evidence Against Encryption Is Pathetic
    Resource Type: Article
    Published: 2014
    FBI Director James Comey gave a speech Thursday about how cell-phone encryption could lead law enforcement to a “very dark place” where it “misses out” on crucial evidence to nail criminals. To make his case, he cited four real-life examples — examples that would be laughable if they weren’t so tragic.
  26. GCHQ and European spy agencies worked together on mass surveillance
    Resource Type: Article
    Published: 2013
    Edward Snowden papers unmask close technical cooperation and loose alliance between British, German, French, Spanish and Swedish spy agencies.
  27. Google doesn't want you to limit its ability to follow you around the internet
    Resource Type: Article
    Published: 2014
    Behind our screens, tech companies are racing to extract a price for what we read and watch on the web: our personal information.
  28. Google: don't expect privacy when sending to Gmail
    Resource Type: Article
    Published: 2013
    People sending email to any of Google's 425 million Gmail users have no "reasonable expectation" that their communications are confidential, the internet giant has said in a court filing.
  29. Government Spying Aims to Silence Us
    Resource Type: Article
    Published: 2013
    What the ruling class is aiming at, with these occasional "leaks" about its spying on us, is not so much to collect information about us but rather to make us feel so totally spied upon that we will be afraid to do or say anything we know the government doesn't want us to do or say.
  30. GovernmentSources.ca
    Resource Type: Website
    A portal with information about government, Canadian and international, with articles, documents, books, websites, and experts and spokespersons. The home page features a selection of recent and important articles. A search feature, subject index, and other research tools make it possible to find additional resources and information.
  31. How Corporations and Law Enforcement Are Spying on Environmentalists
    Resource Type: Article
    Published: 2015
    In August 2010, the Federal Bureau of Investigation's Domestic Terrorism Analysis Unit distributed an intelligence bulletin to all field offices warning that environmental extremism would likely become an increasing threat to the energy industry. The eight-page document argued that, even though the industry had encountered only low-level vandalism and trespassing, recent "criminal incidents" suggested that environmental extremism was on the rise.
  32. How the Government Secretly Demanded the IP Address of Every Visitor to Political News Site Indymedia.us
    Resource Type: Article
    Published: 2009
    Secrecy surrounds law enforcement's communications surveillance practices like a dense fog. Particularly shrouded in secrecy are government demands issued under 18 U.S.C. § 2703 of the Stored Communications Act or "SCA" that seek subscriber information or other user records from communications service providers.
  33. Human rights organisations alarmed by bill that will give surveillance agencies dangerous new powers
    Sources News Release

    Resource Type: Article
    Published: 2015
    Privacy International, Amnesty International, FIDH, the French League for Human Rights and Reporters Without Borders are alarmed by the expansive surveillance powers to be granted to surveillance agencies contained in a French bill.
  34. Human Rights Watch Sues DEA Over Bulk Collection of Americans' Telephone Records
    Sources News Release

    Resource Type: Article
    Published: 2015
    EFF Lawsuit Challenges Drug Enforcement Administration Surveillance of International Call Records
  35. I, spy: Edward Snowden in exile
    Resource Type: Article
    Published: 2014
    The Guardian interviews Edward Snowden, the former NSA contractor who leaked thousands of classified documents to media outlets. Snowden shares his views on the events that have occured since his exile, and describes his life in Moscow.
  36. IntelligentSearch.ca
    Resource Type: Website
    Published: 2017
    A web portal featuring topics related to research and the Internet. The home page features a selection of recent and important articles. A search feature, subject index, and other research tools make it possible to find additional resources and information.
  37. Is Your Printer Spying On You?
    Resource Type: Article
    Imagine that every time you printed a document it automatically included a secret code that could be used to identify the printer - and potentially the person who used it.
  38. Labour Spies
    Connexipedia Article

    Resource Type: Article
    Labor spies are persons recruited or employed for the purpose of gathering intelligence, committing sabotage, sowing dissent, or engaging in other similar activities, typically within the context of an employer/labor organization relationship. Labor spying is most typically used by companies or their agents, and such activity often complements union busting.
  39. Lessons of the Snowden Revelations
    You are the Target!

    Resource Type: Article
    Published: 2013
    We in the Left have long worried about “police state tactics”. Now we have to confront the police state structure. It’s here and it can morph into a real police state with very little effort. Opposing and dismantling it should now be among our top priorities.
  40. The Logic behind Mass Spying: Empire and Cyber Imperialism
    Resource Type: Article
    Published: 2013
    Revelations about the long-term global, intrusive spying by the US National Security Agency (NSA) and other allied intelligence apparatuses have provoked widespread protests and indignation and threatened ties between erstwhile imperial allies.
  41. Massive eavesdropping in Europe: international NGOs urge the Assembly to support the resolution
    Sources News Release

    Resource Type: Article
    Published: 2013
    international NGOs urge the Assembly to support the resolution Massive eavesdropping in Europe
  42. Media spies put all journalists in danger
    Resource Type: Article
    Published: 2014
    The increasing tendency of the Central Intelligence Agency and other U.S. intelligence agencies to disregard previous prohibitions against the use of journalists as agents puts every legitimate reporter around the world in jeopardy.
  43. Microsoft handed the NSA access to encrypted messages
    Resource Type: Article
    Published: 2013
    Microsoft has collaborated closely with US intelligence services to allow users' communications to be intercepted, including helping the National Security Agency to circumvent the company's own encryption, according to top-secret documents obtained by the Guardian.
  44. Mistaking Omniscience for Omnipotence
    In a World Without Privacy, There Are No Exemptions for Our Spies

    Resource Type: Article
    Published: 2013
    Given how similar they sound and how easy it is to imagine one leading to the other, confusing omniscience (having total knowledge) with omnipotence (having total power) is easy enough. It’s a reasonable supposition that, before the Snowden revelations hit, America's spymasters had made just that mistake. If the drip-drip-drip of Snowden’s mother of all leaks -- which began in June and clearly won’t stop for months to come -- has taught us anything, however, it should be this: omniscience is not omnipotence. At least on the global political scene today, they may bear remarkably little relation to each other. In fact, at the moment Washington seems to be operating in a world in which the more you know about the secret lives of others, the less powerful you turn out to be.
  45. New Behind-the-Scenes Video: Airship Flight Over the NSA Data Center
    Sources News Release

    Resource Type: Article
    Published: 2014
    The Internet's Own Boy Director Brian Knappenberger Releases Short Doc as Senate Introduces New Reform Bill
  46. New Street-Level Surveillance Project Tracks Spying Technologies Used by Local Law Enforcement
    Sources News Release

    Resource Type: Article
    Published: 2015
    EFF Web Portal Provides In-Depth Resources About License Plate Readers, Biometric Collection, and Other High-Tech Surveillance Tools.
  47. No Safe Harbor: How NSA Spying Undermined U.S. Tech and Europeans' Privacy
    Resource Type: Article
    Published: 2015
    The spread of knowledge about the NSA's surveillance programs has shaken the trust of customers in U.S. Internet companies like Facebook, Google, and Apple: especially non-U.S. customers who have discovered how weak the legal protections over their data is under U.S. law.
  48. NSA and GCHQ target Tor network that protects anonymity of web users
    Resource Type: Article
    Published: 2013
    The National Security Agency has made repeated attempts to develop attacks against people using Tor, a popular tool designed to protect online anonymity, despite the fact the software is primarily funded and promoted by the US government itself.
  49. NSA surveillance may cause breakup of internet, warn experts
    Resource Type: Article
    Published: 2013
    Internet specialists highlight moves by Brazil, Germany and India towards creating separate networks in order to block spying.
  50. The NSA's Invasion of Google and Yahoo Servers
    Your Email is Likely Being Monitored

    Resource Type: Article
    Published: 2013
    The American National Security Agency (NSA) has been intercepting information coming in and out of Google and Yahoo servers over non-public, internal network fibre optic lines. In December, 2012 alone, the program (revealingly called “MUSCULAR”) processed 181,280,466 Google and Yahoo records that included email, searches, videos and photos.
  51. NSA's Path to Totalitarianism
    Ever-Shrinking Democracy in America

    Resource Type: Article
    Published: 2013
    The American National Security Agency (NSA) appears as a “rogue” organization, extremism in the putative service of liberty. Or better, call it, stripped of all cosmetics, the unerring mark of a Police State, itself become identical with Fortress America, the National-Security State.
  52. The NSA's Spying Operation on Mexico
    Systematic Eavesdropping on the Government

    Resource Type: Article
    Published: 2013
    The American NSA has been systematically eavesdropping on the Mexican government for years. Three major programs constitute a massive espionage operation against Mexico.
  53. On Being Watched in the 60s
    When Police Power was Embraced as a Form of Government

    Resource Type: Article
    Published: 2013
    There would seem to be the notion that the Sixties were the product of immaculate conception. In fact, they were more an act of conversion, conversion of the isolated, unfocussed, dispersed and inarticulate alienation of the 1950s into a mass movement with common language, direction, and rules.
  54. The Orwellian Re-Branding of 'Mass Surveillance' as Merely 'Bulk Collection'
    Resource Type: Article
    Published: 2015
    Just as the Bush administration and the U.S. media re-labelled "torture" with the Orwellian euphemism "enhanced interrogation techniques" to make it more palatable, the governments and media of the Five Eyes surveillance alliance are now attempting to re-brand "mass surveillance" as "bulk collection" in order to make it less menacing (and less illegal).
  55. Other Voices: The Connexions Newsletter - September 4, 2014
    Resource Type: Article
    Published: 2014
    Information about the Connexions Alternative Media List and the Labor Film Archive. Articles on corporations spying on non-profits, workplace deaths, Monsanto and Ukraine, and liberal environmentalism. Topic of the week is Violence Against Journalists. Book of the week is Bold Scientists.
  56. Other Voices: The Connexions Newsletter - September 19 2014
    Spying, terrorism, and protest

    Resource Type: Serial Publication (Periodical)
    Published: 2014
    Coverage of spying, terrorism, and protest. Articles on how the ISIS (Islamic State group) comes to be using American weapons; the U.S. government's secret plans to spy for American corporations; the insidious power of propaganda; how to spot and defeat disruption on the Internet, and steps to sustainable livestock production. Topic of the week is War Crimes; book for the week is Berkeley: The New Student Revolt, and website of the week is LabourStart.
  57. Profiled
    From Radio to Porn, British Spies Track Web Users' Online Identities

    Resource Type: Article
    Published: 2015
    Amid a renewed push from the U.K. government for more surveillance powers, more than two dozen documents being disclosed by The Intercept reveal for the first time several major strands of GCHQ’s (Government Communications Headquarters) existing electronic eavesdropping capabilities.
  58. Reflections on a whistleblower: Two years after Snowden
    Resource Type: Article
    Published: 2015
    Two years after Snowden, the international state of surveillance and the ranks of whistleblowers both continue to grow.
  59. Secret 'BADASS' Intelligence Program Spied on Smartphones
    Resource Type: Article
    Published: 2015
    British and Canadian spy agencies accumulated sensitive data on smartphone users, by piggybacking on ubiquitous software from advertising and analytics companies, according to a document obtained by NSA whistleblower Edward Snowden.The document outlines a secret program run by the intelligence agencies called BADASS.
  60. Selling your Secrets
    The Invisible World of Software Backdoors and Bounty Hunters

    Resource Type: Article
    Published: 2014
    The documents released by whistleblower Edward Snowden reveal that the world of NSA mass surveillance involves close partnerships with a series of companies most of us have never heard of that design or probe the software we all take for granted to help keep our digital lives humming along.
  61. Snowden, Surveillance And The Secret State
    Resource Type: Article
    Published: 2013
    There is plenty to be said about living under a giant system of government surveillance. Just don't expect the corporate media to explore the full extent of what it really all means.
  62. Software Meant to Fight Crime Is Used to Spy on Dissidents
    Resource Type: Article
    Published: 2012
    Morgan Marquis-Boire works as a Google engineer and Bill Marczak is earning a Ph.D. in computer science. But this summer, the two men have been moonlighting as detectives, chasing an elusive surveillance tool from Bahrain across five continents.
  63. Spies for Hire
    The Secret World of Intelligence Outsourcing

    Resource Type: Book
    Published: 2009
    According to investigative journalist Tim Shorrock, the CIA and other American intelligence agencies now have more contractors working for them than they do spies of their own. Often former staff hired back at double or triple their former government salaries, these private contractors do everything from fighting in Afghanistan to interrogating prisoners, aiming spy satellites and supervising secret agents. Shorrock gives a comprehensive rundown of the players in the industry.
  64. Spies for Hire: New Online Database of U.S. Intelligence Contractors
    Sources News Release

    Resource Type: Article
    Published: 2009
    Starting today, journalists, activists, and corporate researchers will be able to use the Internet site SpiesForHire.org to track the nation#s most important intelligence contractors.
  65. Spies Hacked Computers Thanks to Sweeping Secret Warrants, Aggressively Stretching U.K. Law
    Resource Type: Article
    Published: 2015
    British spies have received government permission to intensively study software programs for ways to infiltrate and take control of computers. The GCHQ spy agency was vulnerable to legal action for the hacking efforts, known as "reverse engineering," since such activity could have violated copyright law. But GCHQ sought and obtained a legally questionable warrant from the Foreign Secretary in an attempt to immunize itself from legal liability.
  66. Spooks
    The Haunting of America - The Private Use of Secret Agents

    Resource Type: Book
    Published: 1979
  67. Spooky Business: A New Report on Corporate Espionage Against Non-profits
    Sources News Release

    Resource Type: Article
    Published: 2013
    Giant corporations are employing highly unethical or illegal tools of espionage against nonprofit organizations with near impunity, according to a new report by Essential Information.
  68. Spooky Business: Corporate Espionage Against Nonprofit Organizations
    Resource Type: Article
    Published: 2013
    This report is an effort to document something about corporate espionage against nonprofit organizations. Law enforcement should prioritize investigating and prosecuting corporate espionage against nonprofits.
  69. Spying and lying about the left
    Resource Type: Article
    Published: 2010
    A company hired by the state of Pennsylvania has spied on left-wing, antiwar and student groups.
  70. Spying by the Numbers
    Hundreds of Thousands Subject to Government Surveillance and No Real Protection

    Resource Type: Article
    Published: 2013
    Thanks to NSA whistleblower Edward Snowden many more people in the US and world-wide are learning about extensive US government surveillance and spying. There are publicly available numbers which show the reality of these problems are bigger than most think and most of this spying is happening with little or no judicial oversight.
  71. Surveillance firms spied on campaign groups for big companies, leak shows
    Resource Type: Article
    Published: 2017
    British Airways, the Royal Bank of Scotland and Porsche are among five large companies that have been identified as having paid corporate intelligence firms to monitor political groups that challenged their businesses, leaked documents reveal.
  72. Technospies
    Resource Type: Book
    The U.S. government's technology as a sinister agent? Polygraphs, truth serums and biocybernetics that can link a man's brain directly to the computer -- these are some of the horrors that Rowan forsees. No less scary for him is the possibilty of a world in which our lives could be governed by automation that is susceptible to covert manipulation.
  73. The Day We Fight Back Against Mass Surveillance: February 11, 2014
    Sources News Release

    Resource Type: Article
    Published: 2014
    On February 11, on the Day We Fight Back, the world will demand an end to mass surveillance in every country, by every state, regardless of boundaries or politics.
  74. Three Leaks, Three Weeks, and What We've Learned About the US Government's Other Spying Authority: Executive Order 12333
    Resource Type: Article
    Published: 2013
    The National Security Agency has been siphoning off data from the links between Yahoo and Google data centers, which include the fiber optic connections between company servers at various points around the world. While the user may have an encrypted connection to the website, the internal data flows were not encrypted and allowed the NSA to obtain millions of records each month, including both metadata and content like audio, video and text.
  75. Top-Secret Document Reveals NSA Spied on Porn Habits as Part of Plan to Discredit 'Radicalizers'
    Resource Type: Article
    Published: 2013
    The National Security Agency has been gathering records of online sexual activity and evidence of visits to pornographic websites as part of a proposed plan to harm the reputations of those whom the agency believes are radicalizing others through incendiary speeches, according to a top-secret NSA document. The document, provided by NSA whistleblower Edward Snowden, identifies six targets, all Muslims, as "exemplars" of how "personal vulternabilities" can be learned through electronic surveillance, and then exploited to undermine a target's credibility, reputation and authority.
  76. UN body urged to take position on export of surveillance material
    Sources News Release

    Resource Type: Article
    Published: 2014
    As the UN Human Rights Council continues its 26th session and a panel discussion is held today on corporate social responsibility, Reporters Without Borders urges the council to promote the adoption of clear and binding rules on online surveillance
  77. Unmasking the Five-Eyed monster, a global and secret intelligence-sharing regime
    Resource Type: Article
    Published: 2013
    Privacy International is proud to announce our new project, Eyes Wide Open, which aims to pry open the Five Eyes arrangement and bring it under the rule of law.
  78. The U.S. Government's Secret Plans to Spy for American Corporations
    Resource Type: Article
    Published: 2014
    Throughout the last year, the U.S. government has repeatedly insisted that it does not engage in economic and industrial espionage, in an effort to distinguish its own spying from China's infiltrations of Google, Nortel, and other corporate targets. Turns out that isn't true.

Experts on Spying in the Sources Directory

  1. Wikileaks

Sources-journalists use the sources website to find you


AlterLinks


© 2019. The information provided is copyright and may not be reproduced in any form or by any means (whether electronic, mechanical or photographic), or stored in an electronic retrieval system, without written permission of the publisher. The content may not be resold, republished, or redistributed. Indexing and search applications by Ulli Diemer and Chris DeFreitas.