- Chatter: Dispatches From the Secret World of Global Eavesdropping
Resource Type: Book Published: 2005
- Companies that cooperate with dictatorships must be sanctioned
Sources News Release Resource Type: Article Published: 2011 Reporters Without Borders condemns the criminal cooperation that exists between many western companies, especially those operating in the new technology area, and authoritarian regimes.
- Complaints filed against telecom companies for their role in UK mass surveillance programme
Resource Type: Article Published: 2013 On 5 November 2013, Privacy International filed formal complaints with the Organisation for Economic Cooperation and Development (OECD) in the UK against some of the world's leading telecommunication companies, for providing assistance to British spy agency GCHQ in the mass interception of internet and telephone traffic passing through undersea fibre optic cables.
- The Computers are Listening
How the NSA Converts Spoken Words Into Searchable Text Resource Type: Article Published: 2015 Top-secret documents from the archive of Edward Snowden show the National Security Agency can now automatically recognize the content within phone calls by creating rough transcripts and phonetic representations that can be easily searched and stored.
- Connexions Library: Human Rights and Civil Liberties Focus
Resource Type: Website Selected articles, books, websites and other resources on civil liberties and human rights.
- CSE monitors millions of Canadian emails to government
Resource Type: Article Published: 2015 Canada's electronic spy agency collects millions of emails from Canadians and stores them for "days to months" while trying to filter out malware and other attacks on government computer networks.
- EFF Calls Out DOJ for Failing to Provide Crucial Public Information in NSA Case
Sources News Release Resource Type: Article Published: 2014 Latest Filing in Jewel v. NSA Demands Documents Government Is Trying to Conceal
- EFF Demands Release of More Secret Surveillance Court Rulings
Sources News Release Resource Type: Article Published: 2014 In a continuing campaign to uncover the government's secret interpretations of the surveillance laws underlying the National Security Agency (NSA)'s spying programs, the Electronic Frontier Foundation (EFF) today filed another lawsuit
- Email privacy
Wikipedia article Resource Type: Article Published: 2012 Email privacy is the broad topic dealing with issues of unauthorized access and inspection of electronic mail. This unauthorized access can happen while an email is in transit, as well as when it is stored on email servers or on a user computer. In countries with a constitutional guarantee of the secrecy of correspondence, whether email can be equated with letters and get legal protection from all forms of eavesdropping comes under question because of the very nature of email. This is especially important as more and more communication occurs via email compared to postal mail.
- Fake cell phone 'towers' may be spying on Americans' calls, texts
Resource Type: Article Published: 2014 More than a dozen 'fake cell phone towers' could be secretly hijacking Americans' mobile devices in order to listen in on phone calls or snoop on text messages, a security-focused cell phone company claims. It is not clear who controls the devices.
- The FBI Can Bypass Encryption
Why Cyber Security is a Magic Act Resource Type: Article Published: 2014
- FBI director wants access to encrypt Apple, Google users' data, demands law 'fix'
Resource Type: Article Published: 2014 The FBI director has slammed Apple and Google for offering their customers encryption technology that protects users privacy. "Deeply concerned" James Comey wants to push on Congress to "fix" laws to ensure police can still access private data.
- The FBI Director's Evidence Against Encryption Is Pathetic
Resource Type: Article Published: 2014 FBI Director James Comey gave a speech Thursday about how cell-phone encryption could lead law enforcement to a very dark place where it misses out on crucial evidence to nail criminals. To make his case, he cited four real-life examples examples that would be laughable if they werent so tragic.
- The Great SIM Heist: How Spies Stole the Keys to the Encryption Castle
Resource Type: Article Published: 2015 American and British spies hacked into the internal computer network of the largest manufacturer of SIM cards in the world, stealing encryption keys used to protect the privacy of cellphone communications across the globe, according to top-secret documents provided by National Security Agency whistleblower Edward Snowden.
- I, spy: Edward Snowden in exile
Resource Type: Article Published: 2014 The Guardian interviews Edward Snowden, the former NSA contractor who leaked thousands of classified documents to media outlets. Snowden shares his views on the events that have occured since his exile, and describes his life in Moscow.
- Inside NSA, Officials Privately Criticize 'Collect It All' Surveillance
Resource Type: Article Published: 2015 As Members of Congress struggle to agree on which surveillance programs to re-authorize before the Patriot Act expires, they might consider the unusual advice of an intelligence analyst at the National Security Agency who warned about the danger of collecting too much data.
- The Intercept
Resource Type: Website A platform to report on the documents previously provided by NSA whistleblower Edward Snowden, with a long-term mission is to produce fearless, adversarial journalism across a wide range of issues.
- Is Your Printer Spying On You?
Resource Type: Article Imagine that every time you printed a document it automatically included a secret code that could be used to identify the printer - and potentially the person who used it.
- 'I've Got Nothing to Hide' and Other Misunderstandings of Privacy
Resource Type: Article Published: 2007 According to the nothing to hide argument, there is no threat to privacy unless the government uncovers unlawful activity, in which case a person has no legitimate justification to claim that it remain private.
- Journalists Welcome European Call to Review Anti-Terrorism Laws
Sources News Release Resource Type: Article Published: 2009 Ministers of the human rights network of the Council of Europe have called on their governments to review anti-terrorism laws in the face of strong criticism from journalists that some laws are in practice limiting free expression and press rights.
- The Logic behind Mass Spying: Empire and Cyber Imperialism
Resource Type: Article Published: 2013 Revelations about the long-term global, intrusive spying by the US National Security Agency (NSA) and other allied intelligence apparatuses have provoked widespread protests and indignation and threatened ties between erstwhile imperial allies.
- Mass Surveillance is Driven by the Private Sector
The Lesson of Hacking Team's Malware Resource Type: Article Published: 2015 A report published by Privacy International as well as an article posted by Vice Motherboard clearly show that both the DEA and the United States Army have long-standing relationships with Hacking Team, an Italian company thats notorious for selling malware to any number of unsavory characters.
- New Behind-the-Scenes Video: Airship Flight Over the NSA Data Center
Sources News Release Resource Type: Article Published: 2014 The Internet's Own Boy Director Brian Knappenberger Releases Short Doc as Senate Introduces New Reform Bill
- New Documents and Reports Confirm AT&T and NSA's Longstanding Surveillance Partnership
Resource Type: Article Published: 2015 Reports today in the New York Times and ProPublica confirm what EFF's Jewel v. NSA lawsuit has claimed since 2008 -- that the NSA and AT&T have collaborated to build a domestic surveillance infrastructure, resulting in unconstitutional seizure and search of of millions, if not hundreds of millions, of Americans' Internet communications.
- No Safe Harbor: How NSA Spying Undermined U.S. Tech and Europeans' Privacy
Resource Type: Article Published: 2015 The spread of knowledge about the NSA's surveillance programs has shaken the trust of customers in U.S. Internet companies like Facebook, Google, and Apple: especially non-U.S. customers who have discovered how weak the legal protections over their data is under U.S. law.
- NSA, GCHQ mapping "political alignment" of cellphone users
New report reveals Resource Type: Article Published: 2014 New information made public by Edward Snowden reveals that the governments of the United States and United Kingdom are trawling data from cellphone apps to accumulate dossiers on the political alignments of millions of smartphone users worldwide.
- The NSA's Invasion of Google and Yahoo Servers
Your Email is Likely Being Monitored Resource Type: Article Published: 2013 The American National Security Agency (NSA) has been intercepting information coming in and out of Google and Yahoo servers over non-public, internal network fibre optic lines. In December, 2012 alone, the program (revealingly called MUSCULAR) processed 181,280,466 Google and Yahoo records that included email, searches, videos and photos.
- NSA's Path to Totalitarianism
Ever-Shrinking Democracy in America Resource Type: Article Published: 2013 The American National Security Agency (NSA) appears as a rogue organization, extremism in the putative service of liberty. Or better, call it, stripped of all cosmetics, the unerring mark of a Police State, itself become identical with Fortress America, the National-Security State.
- The NSA's Spying Operation on Mexico
Systematic Eavesdropping on the Government Resource Type: Article Published: 2013 The American NSA has been systematically eavesdropping on the Mexican government for years. Three major programs constitute a massive espionage operation against Mexico.
- Orwell's Triumph: How Novels Tell the Truth of Surveillance
Resource Type: Article Published: 2015 Novels may be the best medium for describing a distopian world in which everyone is under constant surveillance.
- Other Voices: The Connexions Newsletter - December 5, 2015
Ecosocialism, environment, and urban gardening Resource Type: Serial Publication (Periodical) Published: 2015 This issue of Other Voices covers a wide range of issues, from the climate crisis and the ecosocialist response, to terrorism and the struggle against religious fundamentalism, as well as items on urban gardening, the destruction of olive trees, and how the police are able to use Google's timeline feature to track you every move, now and years into the past.
- Profiled
From Radio to Porn, British Spies Track Web Users' Online Identities Resource Type: Article Published: 2015 Amid a renewed push from the U.K. government for more surveillance powers, more than two dozen documents being disclosed by The Intercept reveal for the first time several major strands of GCHQs (Government Communications Headquarters) existing electronic eavesdropping capabilities.
- Protect Yourself from Electronic Spying with Surveillance Self-Defense
Sources News Release Resource Type: Article Published: 2014 The Electronic Frontier Foundation (EFF) has launched its updated "Surveillance Self-Defense" report, a comprehensive how-to guide to protecting yourself from electronic spying for Internet users all over the world.
- Reflections on a whistleblower: Two years after Snowden
Resource Type: Article Published: 2015 Two years after Snowden, the international state of surveillance and the ranks of whistleblowers both continue to grow.
- Revealed: how Whisper app tracks anonymous users
Resource Type: Article Published: 2014 The company behind Whisper, the social media app that promises users anonymity and claims to be the safest place on the internet, is tracking the location of its users, including some who have specifically asked not to be followed.
- Secret 'BADASS' Intelligence Program Spied on Smartphones
Resource Type: Article Published: 2015 British and Canadian spy agencies accumulated sensitive data on smartphone users, by piggybacking on ubiquitous software from advertising and analytics companies, according to a document obtained by NSA whistleblower Edward Snowden.The document outlines a secret program run by the intelligence agencies called BADASS.
- Selling your Secrets
The Invisible World of Software Backdoors and Bounty Hunters Resource Type: Article Published: 2014 The documents released by whistleblower Edward Snowden reveal that the world of NSA mass surveillance involves close partnerships with a series of companies most of us have never heard of that design or probe the software we all take for granted to help keep our digital lives humming along.
- 6 Ideas For Those Needing Defensive Technology to Protect Free Speech from Authoritarian Regimes
4 Ways the Rest of Us Can Help Resource Type: Article Published: 2010 The Internet remains one of the most powerful means ever created to give voice to repressed people around the world. Unfortunately, new technologies have also given authoritarian regimes new means to identify and retaliate against those who speak out despite censorship and surveillance.
- Spooky Business: A New Report on Corporate Espionage Against Non-profits
Sources News Release Resource Type: Article Published: 2013 Giant corporations are employing highly unethical or illegal tools of espionage against nonprofit organizations with near impunity, according to a new report by Essential Information.
- The Terrifying World of Electronic Monitoring
From Drone Strikes to Martha Stewart Resource Type: Article Published: 2013 Electronic monitoring is about tracking and marking. The GPS technology that is trending in electronic monitors tracks peoples every movement with the purpose of marking them for punishment if they deviate from the program
- The Day We Fight Back Against Mass Surveillance: February 11, 2014
Sources News Release Resource Type: Article Published: 2014 On February 11, on the Day We Fight Back, the world will demand an end to mass surveillance in every country, by every state, regardless of boundaries or politics.
- The Threat of the Tag
Resource Type: Article Tracking anklets for convicts are not a good way to alleviate prison overcrowding.
- Three Leaks, Three Weeks, and What We've Learned About the US Government's Other Spying Authority: Executive Order 12333
Resource Type: Article Published: 2013 The National Security Agency has been siphoning off data from the links between Yahoo and Google data centers, which include the fiber optic connections between company servers at various points around the world. While the user may have an encrypted connection to the website, the internal data flows were not encrypted and allowed the NSA to obtain millions of records each month, including both metadata and content like audio, video and text.
- UN body urged to take position on export of surveillance material
Sources News Release Resource Type: Article Published: 2014 As the UN Human Rights Council continues its 26th session and a panel discussion is held today on corporate social responsibility, Reporters Without Borders urges the council to promote the adoption of clear and binding rules on online surveillance
- Uncivil Obedience
The Tactics and Tales of a Democratic Agitator Resource Type: Book Published: 1991 How to push for social change without breaking the law.
- Why I'm Saying Goodbye to Apple, Google and Microsoft
I'm putting more trust in communities than corporations Resource Type: Article Published: 2015 Gillmor discusses how we are losing control over the technology tools that once promised equal opportunity in speech and innovation.
- Work and New Technologies
Other Perspectives (Volume 3) Resource Type: Book Published: 1987 Essays covering health hazards, labour concerns, and issues of deskilling related to new technologies in the workplace.
|
AlterLinks
© 2021.
|