|
- Canadian Wireless Telecommunications Association
Media Profile in Sources Resource Type: Organization
- Email privacy
Wikipedia article Resource Type: Article Published: 2012 Email privacy is the broad topic dealing with issues of unauthorized access and inspection of electronic mail. This unauthorized access can happen while an email is in transit, as well as when it is stored on email servers or on a user computer. In countries with a constitutional guarantee of the secrecy of correspondence, whether email can be equated with letters and get legal protection from all forms of eavesdropping comes under question because of the very nature of email. This is especially important as more and more communication occurs via email compared to postal mail.
- The Great SIM Heist: How Spies Stole the Keys to the Encryption Castle
Resource Type: Article Published: 2015 American and British spies hacked into the internal computer network of the largest manufacturer of SIM cards in the world, stealing encryption keys used to protect the privacy of cellphone communications across the globe, according to top-secret documents provided by National Security Agency whistleblower Edward Snowden.
- How to Leak to The Intercept
Resource Type: Article Published: 2015 Leaking can serve the public interest, fueling revelatory and important journalism. Here are instructions for how to leak safely.
- Human Rights Watch Sues DEA Over Bulk Collection of Americans' Telephone Records
Sources News Release Resource Type: Article Published: 2015 EFF Lawsuit Challenges Drug Enforcement Administration Surveillance of International Call Records
- No Safe Harbor: How NSA Spying Undermined U.S. Tech and Europeans' Privacy
Resource Type: Article Published: 2015 The spread of knowledge about the NSA's surveillance programs has shaken the trust of customers in U.S. Internet companies like Facebook, Google, and Apple: especially non-U.S. customers who have discovered how weak the legal protections over their data is under U.S. law.
- OrangeWebsite
Media Profile in Sources Resource Type: Organization
- Pakistan: Intelligence agency sought to tap all communications traffic, documents reveal
Resource Type: Article Published: 2015 Every government seems to want to spy in Pakistan. The US National Security Agency (NSA) tapped the fibre optic cables landing in Karachi, among others, and used 55 million phone records harvested from Pakistani telecommunications providers for an analysis exercise. The United Kingdom's Government Communications Headquarters (GCHQ) had a store of SIM keys from Mobilink and Telenor networks, two of the country's biggest providers.
- Secret 'BADASS' Intelligence Program Spied on Smartphones
Resource Type: Article Published: 2015 British and Canadian spy agencies accumulated sensitive data on smartphone users, by piggybacking on ubiquitous software from advertising and analytics companies, according to a document obtained by NSA whistleblower Edward Snowden.The document outlines a secret program run by the intelligence agencies called BADASS.
- Sources welcomes OrangeWebsite
Sources News Release Resource Type: Article Published: 2011 Sources welcomes a new member: OrangeWebsite. OrangeWebsite is an Icelandic web hosting service provider. Most of our clients are foreign journalists, bloggers, leakers and publishers.
- UN slams UK surveillance law, calls for privacy reforms in Canada, France and Macedonia
Resource Type: Article Published: 2015 In yet another blow to the UK's surveillance proponents, the UN Human Rights Committee has criticised the British legal regime governing the interception of communications, observing that it allows for mass surveillance and lacks sufficient safeguards.
- The use of encryption tools and the protection of anonymity online as safeguards for freedom of the press
Resource Type: Unclassified Published: 2015 David Kaye is the UN Special Rapporteur on the promotion and protection of the right to freedom of expression. In his latest report, he stressed that governments are obligated to protect encryption tools and guarantee the anonymity and privacy of users so as to safeguard the right to freedom of expression online.
- Why I'm Saying Goodbye to Apple, Google and Microsoft
I'm putting more trust in communities than corporations Resource Type: Article Published: 2015 Gillmor discusses how we are losing control over the technology tools that once promised equal opportunity in speech and innovation.
- XKEYSCORE: NSA's Google for the World's Private Communications
Resource Type: Article Published: 2015 The NSA's XKEYSCORE program, first revealed by The Guardian, sweeps up countless people's Internet searches, emails, documents, usernames and passwords, and other private communications. XKEYSCORE is fed a constant flow of Internet traffic from fiber optic cables that make up the backbone of the worlds communication network, among other sources, for processing.
|
AlterLinks
© 2019. The information provided is copyright and may not be reproduced in any form or by any means (whether electronic, mechanical or photographic), or stored in an electronic retrieval system, without written permission of the publisher. The content may not be resold, republished, or redistributed. Indexing and search applications by Ulli Diemer and Chris DeFreitas.
|
|
|
|