Home Title Index Topic Index Sources Directory News Releases Sources Calendar RSS Sources Select News RSS Feed

Privacy Rights
AlterLinks Topic Index

  1. The Absurd Consequences of a "Right to Privacy"
    Resource Type: Article
    Published: 2017
    British MP David Davis’s text messages poking fun at the appearance of a female colleague make him the latest whipping boy for those determined to root out sexism and misogyny in public life, the Daily Mail reports. Curiously, they also make him the latest poster boy for exponents of an expansive "right to privacy."
  2. Australia: Journalists' sources under threat with data retention regime
    Sources News Release

    Resource Type: Article
    Published: 2015
    The International Federation of Journalists (IFJ) joins its affiliate the Media, Entertainment & Arts Alliance (MEAA) in condemning the commencement of new data retention laws in Australia.
  3. Capitalist Surveillance State: Everyone's a Target
    Threatening Reporters, Spying on Public

    Resource Type: Article
    Published: 2013
    There is an inherent tendency for the state, which governs on behalf of a minuscule, ruthless class of obscenely wealthy exploiters, to attempt to amass ever greater power to control the population because it hates and fears the working people.
  4. Coalition Announces New ‘Do Not Track’ Standard for Web Browsing
    Sources News Release

    Resource Type: Article
    Published: 2015
    The Electronic Frontier Foundation (EFF), privacy company Disconnect and a coalition of Internet companies have announced a stronger “Do Not Track” (DNT) setting for Web browsing - a new policy standard that, coupled with privacy software
  5. Connexions
    Volume 4, Number 1 - February 1979 - National Security/Securite Nationale

    Resource Type: Serial Publication (Periodical)
    Published: 1979
  6. Connexions
    Volume 5, Number 1 - January 1980 - Literacy/Alphabetisation

    Resource Type: Serial Publication (Periodical)
    Published: 1980
  7. Connexions
    Volume 9, Number 2 - Summer 1984 - Rights and Liberties - A Digest of Resources & Groups for Social

    Resource Type: Serial Publication (Periodical)
    Published: 1984
  8. Connexions Digest
    Issue 54 - February 1992- A Social Change Sourcebook

    Resource Type: Serial Publication (Periodical)
    Published: 1992
  9. Connexions Library: Human Rights and Civil Liberties Focus
    Resource Type: Website
    Selected articles, books, websites and other resources on civil liberties and human rights.
  10. Corporate Coercion and the Drive to Eliminate Buying with Cash
    Resource Type: Article
    Published: 2018
    Consumer freedom and privacy are examined as coercive commercialism quickly moves toward a cashless economy, when all consumers are forced into corporate payment systems from credit/debit cards, mobile phones and perhaps even through facial recognition technology.
  11. The Devil Is In the Details: How Patients' Mental Health Data Is At Risk
    Resource Type: Article
    Published: 2015
    It seems like "Patient doctor confidentiality" doesn’t apply to other doctors. Overly diligent doctors are free to snoop around in the psychiatric medical records of their patients. As if that weren't bad enough, non-psychiatric doctors can highlight this psychiatric history on their patient's medical records. For Julia, doctors will only ever know her as the "woman with bipolar disorder". Not the "mother with a master’s degree".
  12. Eavesdropping on the Planet
    The Inalienable Right to Snoop?

    Resource Type: Article
    Published: 2013
    Like a mammoth vacuum cleaner in the sky, the National Security Agency (NSA) sucks it all up: home phone, office phone, cellular phone, email, fax, telex … satellite transmissions, fiber-optic communications traffic, microwave links … voice, text, images … captured by satellites continuously orbiting the earth, then processed by high-powered computers … if it runs on electromagnetic energy, NSA is there, with high high tech. Twenty-four hours a day. Perhaps billions of messages sucked up each day. No one escapes. Not presidents, prime ministers, the UN Secretary-General, the pope, the Queen of England, embassies, transnational corporation CEOs, friend, foe, your Aunt Lena …
  13. Edward Snowden's Warning to Canada
    Resource Type: Article
    Published: 2015
    Whistleblower Edward Snowden talks about Bill C-51 and the weak oversight of Canada's intelligence agencies.
  14. Email privacy
    Wikipedia article

    Resource Type: Article
    Published: 2012
    Email privacy is the broad topic dealing with issues of unauthorized access and inspection of electronic mail. This unauthorized access can happen while an email is in transit, as well as when it is stored on email servers or on a user computer. In countries with a constitutional guarantee of the secrecy of correspondence, whether email can be equated with letters and get legal protection from all forms of eavesdropping comes under question because of the very nature of email. This is especially important as more and more communication occurs via email compared to postal mail.
  15. Eyes Wide Open
    Resource Type: Article
    Published: 2013
    The recent revelations, made possible by NSA-whistleblower Edward Snowden, of the reach and scope of global surveillance practices have prompted a fundamental reexamination of the role of intelligence services in conducting coordinated cross-border surveillance.
  16. The FBI's secret biometrics database they don't want you to see
    Resource Type: Article
    Published: 2016
    The Federal Bureau of Investigation (FBI) wants to prevent information about its creepy biometric database, which contains fingerprint, face, iris, and voice scans of millions of Americans, from getting out to the public. The Department of Justice has come up with a proposal to exempt the biometric database from public disclosure. It states that the Next Generation Identification System (NGI) should not be subject to the Privacy Act, which requires federal agencies to give people access to records that have been collected concerning them, "allowing them to verify and correct them if needed."
  17. Free Speech Groups Issue New Guide to the International 'Necessary & Proportionate Principles'
    Sources News Release

    Resource Type: Article
    Published: 2014
    EFF and ARTICLE 19 Urges Governments to Preserve Fundamental Freedoms in the Age of Mass Surveillance
  18. Genetic Testing of Citizens Is a Backdoor into Total Population Surveillance by Governments and Companies
    Resource Type: Article
    Published: 2014
    The new Chief Executive of the National Health Service (NHS) in England, Simon Stevens, was recently reported arguing that the NHS must be transformed to make people’s personal genetic information the basis of their treatments.
  19. Get your head out of the clouds
    If we allow our personal data to be stored in giant electornic centres, we deserve what we get

    Resource Type: Article
    Published: 2011
    Appraising the risks to personal data held in cloud computing systems.
  20. Google's 'Smart City of Surveillance' Faces New Resistance in Toronto
    Resource Type: Article
    Published: 2018
    A plan to develop 12 acres of the valuable waterfront just southeast of downtown Toronto
    by the government agency Waterfront Toronto and Sidewalk Labs, owned by Google’s parent company Alphabet Inc. has sparked concerns about privacy and lack of public consultation. A recent slew of resignations from its board has made these concerns increasingly urgent and public.
  21. Hillary Clinton on the Sanctity of Protecting Classified Information
    Resource Type: Article
    Published: 2015
    It turns out that at least two of the emails which traversed Hillary Clinton’s personal email account and server were "top secret," according to the inspector general for the Intelligence Community. To describe that as reckless is an understatement given that, as AP notes, "There is no evidence she used encryption to shield the emails or her personal server from foreign intelligence services or other potentially prying eyes." The FBI has now taken possession of that server.
  22. If U.S. Mass Media Were State-Controlled, Would They Look Any Different?
    Snowden Coverage

    Resource Type: Article
    Published: 2013
    The Edward Snowden leaks have revealed a U.S. corporate media system at war with independent journalism. Many of the same outlets that missed the Wall Street meltdown and cheer-led the Iraq invasion have come to resemble state-controlled media outlets in their near-total identification with the government.
  23. The Institutionalization of Tyranny
    When Victory Has Nothing to do With Justice

    Resource Type: Article
    Published: 2013
    Republicans and conservative Americans are still fighting Big Government in its welfare state form. Apparently, they have never heard of the militarized police state form of Big Government, or, if they have, they are comfortable with it and have no objection.
  24. IntelligentSearch.ca
    Resource Type: Website
    Published: 2017
    A web portal featuring topics related to research and the Internet. The home page features a selection of recent and important articles. A search feature, subject index, and other research tools make it possible to find additional resources and information.
  25. The Intercept
    Resource Type: Website
    A platform to report on the documents previously provided by NSA whistleblower Edward Snowden, with a long-term mission is to produce fearless, adversarial journalism across a wide range of issues.
  26. Internet Companies: Confusing Consumers for Profit
    Resource Type: Article
    Published: 2015
    In the age of information, companies are hungry for your data. They want it - even if it means resorting to trickery.
  27. 'I've Got Nothing to Hide' and Other Misunderstandings of Privacy
    Resource Type: Article
    Published: 2007
    According to the nothing to hide argument, there is no threat to privacy unless the government uncovers unlawful activity, in which case a person has no legitimate justification to claim that it remain private.
  28. Journalists Welcome European Call to Review Anti-Terrorism Laws
    Sources News Release

    Resource Type: Article
    Published: 2009
    Ministers of the human rights network of the Council of Europe have called on their governments to review anti-terrorism laws in the face of strong criticism from journalists that some laws are in practice limiting free expression and press rights.
  29. Justice department ordered Twitter to hand over details of users linked to WikiLeaks
    Sources News Release

    Resource Type: Article
    Published: 2011
    Reporters Without Borders deplores the US Department of Justice’s apparent determination to prosecute WikiLeaks and its leading supporters.
  30. Lessons of the Snowden Revelations
    You are the Target!

    Resource Type: Article
    Published: 2013
    We in the Left have long worried about “police state tactics”. Now we have to confront the police state structure. It’s here and it can morph into a real police state with very little effort. Opposing and dismantling it should now be among our top priorities.
  31. No Child Left Un-Mined? Student Privacy at Risk in the Age of Big Data
    Resource Type: Article
    Published: 2015
    Chideya discusses the implications of the compilation of big data trails containing information about children's performance in school.
  32. No Safe Harbor: How NSA Spying Undermined U.S. Tech and Europeans' Privacy
    Resource Type: Article
    Published: 2015
    The spread of knowledge about the NSA's surveillance programs has shaken the trust of customers in U.S. Internet companies like Facebook, Google, and Apple: especially non-U.S. customers who have discovered how weak the legal protections over their data is under U.S. law.
  33. NSA, GCHQ mapping "political alignment" of cellphone users
    New report reveals

    Resource Type: Article
    Published: 2014
    New information made public by Edward Snowden reveals that the governments of the United States and United Kingdom are trawling data from cellphone “apps” to accumulate dossiers on the “political alignments” of millions of smartphone users worldwide.
  34. The NSA Has Effectively Destroyed Internet Privacy
    Snowden's Latest

    Resource Type: Article
    Published: 2013
    Whistle-blower Edward Snowden prove that the NSA, working with its British counterpart the Government Communications Headquarters has conducted an intentional and largely sucessful campaign to destroy all privacy on the Internet.
  35. The NSA's Invasion of Google and Yahoo Servers
    Your Email is Likely Being Monitored

    Resource Type: Article
    Published: 2013
    The American National Security Agency (NSA) has been intercepting information coming in and out of Google and Yahoo servers over non-public, internal network fibre optic lines. In December, 2012 alone, the program (revealingly called “MUSCULAR”) processed 181,280,466 Google and Yahoo records that included email, searches, videos and photos.
  36. Obama defiant over NSA revelations ahead of summit with Chinese premier
    Resource Type: Article
    Published: 2013
    President says oversight of NSA surveillance programme should be left to Congress in comments criticising media 'hype.'
  37. The Obliteration of Privacy
    Snowden and the NSA

    Resource Type: Article
    Published: 2014
    It’s remarkable how little outrage Edward Snowden’s NSA revelations have provoked in the American public. One often heard response is something like, “Well, I don’t have anything to hide, so I don’t care if the government is listening to what I say. And if they catch some terrorists, so much the better.”
  38. On Locational Privacy, and How to Avoid Losing it Forever
    Resource Type: Article
    Published: 2009
    Over the next decade, systems which create and store digital records of people's movements through public space will be woven inextricably into the fabric of everyday life. We are already starting to see such systems now, and there will be many more in the near future.
  39. Other Voices: The Connexions Newsletter - July 22, 2017
    Secrecy and Power

    Resource Type: Serial Publication (Periodical)
    Published: 2017
    Secrecy is a weapon the powerful use against their enemies: us. This issue of Other Voices explores the relationship of secrecy and power.
  40. The Peruvian "Stalker Law" Will Be Reviewed By Congress, We Can Still Stop It
    Resource Type: Article
    Published: 2015
    Bogado and Rodriguez discuss the new decree in Peru known as "Ley Acosadora", or "the Stalker Law", allows warrantless access to Peruvians' location data and creates a new power for the government to track the movements of vulnerable mobile and Internet users.
  41. Police Go on Fishing Expedition, Search the Home of Seattle Privacy Activists Who Maintain Tor Network
    Resource Type: Article
    Published: 2016
    Seattle police descended on the Queen Anne condo of two outspoken privacy activists with a search warrant early this morning, leaving them shaken and upset. Jan Bultmann and David Robinson, a married couple and co-founders of the Seattle Privacy Coalition, said they were awakened at 6:15 a.m. by a team of six detectives from the SPD knocking on the door. Bultmann said were made to sit outside as the officers, who had a search warrant, examined their equipment.
  42. Preparing for a Digital 9/11
    Resource Type: Article
    Published: 2012
    In recent years, in one of the more dangerous, if largely undiscussed, developments of our time, the Bush and then Obama administrations have launched the first state-planned war in cyber space. First, there were the "Olympic Games," then the Stuxnet virus, then Flame, and now it turns out that other sophisticated malware programs have evidently followed.
  43. Privacy For Sale
    How Computerization Has Made Everyone's Private Life an Open Secret

    Resource Type: Book
    Published: 1992
  44. Privacy tapped out
    Resource Type: Article
    Published: 2013
    For over a century, Americans and their judiciary fiercely fought any attempt by security agencies and law enforcement to listen in on private electronic communications. Now they’ve stopped fighting, and the surveillance is out of control.
  45. Protecting the Choice to Speak Anonymously Is Key to Fighting Online Harassment
    Sources News Release

    Resource Type: Article
    Published: 2016
    EFF Urges Department of Education to Uphold First Amendment Rights in University Anti-Harassment Policies
  46. Raleigh police are asking Google to provide user data for all people near crime scenes
    Resource Type: Article
    Published: 2018
    Police in Raleigh, North Carolina, have presented Google with warrants to obtain data from mobile phones from not just specific suspects who were in a crime scene area, but from the mobile phones of all people in the area
  47. Reporters Without Borders and Torservers.net, partners against online surveillance and censorship
    Sources News Release

    Resource Type: Article
    Published: 2014
    Reporters Without Borders and Torservers.net have joined forces to create and maintain 250 additional relays for the Tor network.
  48. Revealed: How DOJ Gagged Google over Surveillance of WikiLeaks Volunteer
    Resource Type: Article
    Published: 2015
    The Obama administration fought a legal battle against Google to secretly obtain the email records of a security researcher and journalist associated with WikiLeaks.
  49. San Diego's Facial Recognition Program Shows Why We Need Records on Police Use of Mobile Biometric Technology
    Resource Type: Article
    Published: 2015
    The New York Times has a story out on how San Diego police use mobile facial recognition devices in the field, including potentially on non-consenting residents who aren't suspected of a crime. One account from a retired firefighter is especially alarming.
  50. Software that tracks people on social media created by defence firm
    Resource Type: Article
    Published: 2013
    Raytheon's Riot program mines social network data like a 'Google for spies', drawing ire from civil rights groups.
  51. Sources welcomes OrangeWebsite
    Sources News Release

    Resource Type: Article
    Published: 2011
    Sources welcomes a new member: OrangeWebsite. OrangeWebsite is an Icelandic web hosting service provider. Most of our clients are foreign journalists, bloggers, leakers and publishers.
  52. Spies Hacked Computers Thanks to Sweeping Secret Warrants, Aggressively Stretching U.K. Law
    Resource Type: Article
    Published: 2015
    British spies have received government permission to intensively study software programs for ways to infiltrate and take control of computers. The GCHQ spy agency was vulnerable to legal action for the hacking efforts, known as "reverse engineering," since such activity could have violated copyright law. But GCHQ sought and obtained a legally questionable warrant from the Foreign Secretary in an attempt to immunize itself from legal liability.
  53. Spying by the Numbers
    Hundreds of Thousands Subject to Government Surveillance and No Real Protection

    Resource Type: Article
    Published: 2013
    Thanks to NSA whistleblower Edward Snowden many more people in the US and world-wide are learning about extensive US government surveillance and spying. There are publicly available numbers which show the reality of these problems are bigger than most think and most of this spying is happening with little or no judicial oversight.
  54. The Stasi could only dream of such data
    Britain, the birthplace of liberalism, has become the database state

    Resource Type: Article
    Published: 2008
    As technology increases the flow of stored data about individual actions, assurances of the "right to informational self-determination" must be hard won from governments. Government surveillance of citizens has become an accepted 'counter-terrorism' measure.
  55. Surveillance USA
    NSA and the PRISM Project

    Resource Type: Article
    Published: 2013
    The government is merrily going about its business of keeping tabs on you in virtually every conceivable way.
  56. Think the Left Won the Culture War? Think Again
    Resource Type: Article
    Published: 2015
    With the recent AshleyMadison leak and Gawker.com's notorious naming and shaming of an obscure, married publishing executive, deBoer questions who really won in this culture war.
  57. Thousands Join Legal Fight Against UK Surveillance — And You Can, Too
    Resource Type: Article
    Published: 2015
    Thousands of people are signing up to join an unprecedented legal campaign against the United Kingdom’s leading electronic surveillance agency.
  58. Three Leaks, Three Weeks, and What We've Learned About the US Government's Other Spying Authority: Executive Order 12333
    Resource Type: Article
    Published: 2013
    The National Security Agency has been siphoning off data from the links between Yahoo and Google data centers, which include the fiber optic connections between company servers at various points around the world. While the user may have an encrypted connection to the website, the internal data flows were not encrypted and allowed the NSA to obtain millions of records each month, including both metadata and content like audio, video and text.
  59. Uber Plans to Track Users Should Not Be Allowed, Says Privacy Group
    Resource Type: Article
    Published: 2015
    A formal complaint has been filed against Uber, the car ride company, by the Electronic Privacy Information Center (EPIC), a non-profit advocacy group. The NGO says Uber plans to use their smart phone app to access user's locations at all times, and to send advertisements to user's contact lists.
  60. U.N. Report Asserts Encryption as a Human Right in the Digital Age
    Resource Type: Article
    Published: 2015
    Encryption is not the refuge of scoundrels, as Obama administration law-enforcement officials loudly proclaim – it is an essential tool needed to protect the right of freedom of opinion and expression in the digital age, a new United Nations report concludes.
  61. UN slams UK surveillance law, calls for privacy reforms in Canada, France and Macedonia
    Resource Type: Article
    Published: 2015
    In yet another blow to the UK's surveillance proponents, the UN Human Rights Committee has criticised the British legal regime governing the interception of communications, observing that it allows for mass surveillance and lacks sufficient safeguards.
  62. The use of encryption tools and the protection of anonymity online as safeguards for freedom of the press
    Resource Type: Unclassified
    Published: 2015
    David Kaye is the UN Special Rapporteur on the promotion and protection of the right to freedom of expression. In his latest report, he stressed that governments are obligated to protect encryption tools and guarantee the anonymity and privacy of users so as to safeguard the right to freedom of expression online.
  63. Le Viol du Courier/Violation of the Mail
    Resource Type: Article
    The League on Human Rights presents arguments against the legality and acceptability of Bill C-26. This bill, introduced to Parliament in February 1978, aims to authorize the opening of first-class mail.

Experts on Privacy Rights in the Sources Directory

  1. Article 19

Sources-journalists use the sources website to find you


AlterLinks


© 2019. The information provided is copyright and may not be reproduced in any form or by any means (whether electronic, mechanical or photographic), or stored in an electronic retrieval system, without written permission of the publisher. The content may not be resold, republished, or redistributed. Indexing and search applications by Ulli Diemer and Chris DeFreitas.