Home Title Index Topic Index Sources Directory News Releases Sources Calendar RSS Sources Select News RSS Feed

Electronic Eavesdropping
AlterLinks Topic Index

  1. Chatter: Dispatches From the Secret World of Global Eavesdropping
    Resource Type: Book
    Published: 2005
  2. Email privacy
    Wikipedia article

    Resource Type: Article
    Published: 2012
    Email privacy is the broad topic dealing with issues of unauthorized access and inspection of electronic mail. This unauthorized access can happen while an email is in transit, as well as when it is stored on email servers or on a user computer. In countries with a constitutional guarantee of the secrecy of correspondence, whether email can be equated with letters and get legal protection from all forms of eavesdropping comes under question because of the very nature of email. This is especially important as more and more communication occurs via email compared to postal mail.
  3. How the Government Secretly Demanded the IP Address of Every Visitor to Political News Site Indymedia.us
    Resource Type: Article
    Published: 2009
    Secrecy surrounds law enforcement's communications surveillance practices like a dense fog. Particularly shrouded in secrecy are government demands issued under 18 U.S.C. § 2703 of the Stored Communications Act or "SCA" that seek subscriber information or other user records from communications service providers.
  4. How the US government secretly reads your email
    Resource Type: Article
    Published: 2011
    Secret orders forcing Google and Sonic to release a WikiLeaks volunteer's email reveal the scale of US government snooping.
  5. The Intercept
    Resource Type: Website
    A platform to report on the documents previously provided by NSA whistleblower Edward Snowden, with a long-term mission is to produce fearless, adversarial journalism across a wide range of issues.
  6. Is Your Printer Spying On You?
    Resource Type: Article
    Imagine that every time you printed a document it automatically included a secret code that could be used to identify the printer - and potentially the person who used it.
  7. 'I've Got Nothing to Hide' and Other Misunderstandings of Privacy
    Resource Type: Article
    Published: 2007
    According to the nothing to hide argument, there is no threat to privacy unless the government uncovers unlawful activity, in which case a person has no legitimate justification to claim that it remain private.
  8. The Logic behind Mass Spying: Empire and Cyber Imperialism
    Resource Type: Article
    Published: 2013
    Revelations about the long-term global, intrusive spying by the US National Security Agency (NSA) and other allied intelligence apparatuses have provoked widespread protests and indignation and threatened ties between erstwhile imperial allies.
  9. The NSA's Spying Operation on Mexico
    Systematic Eavesdropping on the Government

    Resource Type: Article
    Published: 2013
    The American NSA has been systematically eavesdropping on the Mexican government for years. Three major programs constitute a massive espionage operation against Mexico.
  10. Protect Yourself from Electronic Spying with Surveillance Self-Defense
    Sources News Release

    Resource Type: Article
    Published: 2014
    The Electronic Frontier Foundation (EFF) has launched its updated "Surveillance Self-Defense" report, a comprehensive how-to guide to protecting yourself from electronic spying for Internet users all over the world.
  11. 6 Ideas For Those Needing Defensive Technology to Protect Free Speech from Authoritarian Regimes
    4 Ways the Rest of Us Can Help

    Resource Type: Article
    Published: 2010
    The Internet remains one of the most powerful means ever created to give voice to repressed people around the world. Unfortunately, new technologies have also given authoritarian regimes new means to identify and retaliate against those who speak out despite censorship and surveillance.

Sources-journalists use the sources website to find you


© 2019. The information provided is copyright and may not be reproduced in any form or by any means (whether electronic, mechanical or photographic), or stored in an electronic retrieval system, without written permission of the publisher. The content may not be resold, republished, or redistributed. Indexing and search applications by Ulli Diemer and Chris DeFreitas.