Sources Directory     A to Z Index     Topic Index News Releases     RSS Sources Select News RSS Feed     Sources Calendar      

Privacy Rights: Experts and Sources
Sources Directory - Subject Index


Sources Experts & Spokespersons

News Releases

Australia: Journalists' sources under threat with data retention regime
2015-10-17
International Federation of Journalists
The International Federation of Journalists (IFJ) joins its affiliate the Media, Entertainment & Arts Alliance (MEAA) in condemning the commencement of new data retention laws in Australia.
Coalition Announces New ‘Do Not Track’ Standard for Web Browsing
2015-08-09
Electronic Frontier Foundation
The Electronic Frontier Foundation (EFF), privacy company Disconnect and a coalition of Internet companies have announced a stronger “Do Not Track” (DNT) setting for Web browsing - a new policy st...
Free Speech Groups Issue New Guide to the International 'Necessary & Proportionate Principles'
2014-06-02
Electronic Frontier Foundation
EFF and ARTICLE 19 Urges Governments to Preserve Fundamental Freedoms in the Age of Mass Surveillance
Journalists Welcome European Call to Review Anti-Terrorism Laws
2009-06-01
International Federation of Journalists
Ministers of the human rights network of the Council of Europe have called on their governments to review anti-terrorism laws in the face of strong criticism from journalists that some laws are in pra...
Justice department ordered Twitter to hand over details of users linked to WikiLeaks
2011-01-11
Reporters without Borders
Reporters Without Borders deplores the US Department of Justice’s apparent determination to prosecute WikiLeaks and its leading supporters.
Protecting the Choice to Speak Anonymously Is Key to Fighting Online Harassment
2016-01-22
Electronic Frontier Foundation
EFF Urges Department of Education to Uphold First Amendment Rights in University Anti-Harassment Policies
Reporters Without Borders and Torservers.net, partners against online surveillance and censorship
2014-04-29
Reporters Without Borders
Reporters Without Borders and Torservers.net have joined forces to create and maintain 250 additional relays for the Tor network.
Sources welcomes OrangeWebsite
2011-03-16
OrangeWebsite
Sources welcomes a new member: OrangeWebsite. OrangeWebsite is an Icelandic web hosting service provider. Most of our clients are foreign journalists, bloggers, leakers and publishers.

Sources Select Resources

The Absurd Consequences of a "Right to Privacy"
Knapp, Thomas
Article
2017
CounterPunch
British MP David Davis’s text messages poking fun at the appearance of a female colleague make him the latest whipping boy for those determined to root out sexism and misogyny in public life, the Dail...
Australia: Journalists' sources under threat with data retention regime
Sources News Release
Article
2015
International Federation of Journalists
The International Federation of Journalists (IFJ) joins its affiliate the Media, Entertainment & Arts Alliance (MEAA) in condemning the commencement of new data retention laws in Australia.
Connexions Library: Human Rights and Civil Liberties Focus
Website
Connexions Information Sharing Services
Selected articles, books, websites and other resources on civil liberties and human rights.
Corporate Coercion and the Drive to Eliminate Buying with Cash
Nader, Ralph
Article
2018
Counterpunch
Consumer freedom and privacy are examined as coercive commercialism quickly moves toward a cashless economy, when all consumers are forced into corporate payment systems from credit/debit cards, mobil...
The Devil Is In the Details: How Patients' Mental Health Data Is At Risk
Chideya, Farai
Article
2015
The Intercept
It seems like "Patient doctor confidentiality" doesn’t apply to other doctors. Overly diligent doctors are free to snoop around in the psychiatric medical records of their patients. As if that weren't...
Eavesdropping on the Planet
The Inalienable Right to Snoop?
Blum, William
Article
2013
CounterPunch
Like a mammoth vacuum cleaner in the sky, the National Security Agency (NSA) sucks it all up: home phone, office phone, cellular phone, email, fax, telex … satellite transmissions, fiber-optic communi...
Edward Snowden's Warning to Canada
Snowden, Edward
Article
2015
The Tyee
Whistleblower Edward Snowden talks about Bill C-51 and the weak oversight of Canada's intelligence agencies.
Email privacy
Wikipedia article
Article
2012
Email privacy is the broad topic dealing with issues of unauthorized access and inspection of electronic mail. This unauthorized access can happen while an email is in transit, as well as when it is s...
Eyes Wide Open
Article
2013
Privacy International
The recent revelations, made possible by NSA-whistleblower Edward Snowden, of the reach and scope of global surveillance practices have prompted a fundamental reexamination of the role of intelligence...
The FBI's secret biometrics database they don't want you to see
Article
2016
RT
The Federal Bureau of Investigation (FBI) wants to prevent information about its creepy biometric database, which contains fingerprint, face, iris, and voice scans of millions of Americans, from getti...
Free Speech Groups Issue New Guide to the International 'Necessary & Proportionate Principles'
Sources News Release
Article
2014
Electronic Frontier Foundation
EFF and ARTICLE 19 Urges Governments to Preserve Fundamental Freedoms in the Age of Mass Surveillance
Genetic Testing of Citizens Is a Backdoor into Total Population Surveillance by Governments and Companies
Wallace, Helen
Article
2014
Independent Science News
The new Chief Executive of the National Health Service (NHS) in England, Simon Stevens, was recently reported arguing that the NHS must be transformed to make people’s personal genetic information the...
Get your head out of the clouds
If we allow our personal data to be stored in giant electornic centres, we deserve what we get
Harris, John
Article
2011
The Guardian
Appraising the risks to personal data held in cloud computing systems.
Hillary Clinton on the Sanctity of Protecting Classified Information
Greenwald, Glenn
Article
2015
The Intercept
It turns out that at least two of the emails which traversed Hillary Clinton’s personal email account and server were "top secret," according to the inspector general for the Intelligence Community. T...
If U.S. Mass Media Were State-Controlled, Would They Look Any Different?
Snowden Coverage
Cohen, Jeff
Article
2013
CounterPunch
The Edward Snowden leaks have revealed a U.S. corporate media system at war with independent journalism. Many of the same outlets that missed the Wall Street meltdown and cheer-led the Iraq invasion h...
The Institutionalization of Tyranny
When Victory Has Nothing to do With Justice
Roberts, Paul Craig
Article
2013
CounterPunch
Republicans and conservative Americans are still fighting Big Government in its welfare state form. Apparently, they have never heard of the militarized police state form of Big Government, or, if the...
IntelligentSearch.ca
Website
2017
Sources
A web portal featuring topics related to research and the Internet. The home page features a selection of recent and important articles. A search feature, subject index, and other research tools make ...
The Intercept
Website
A platform to report on the documents previously provided by NSA whistleblower Edward Snowden, with a long-term mission is to produce fearless, adversarial journalism across a wide range of issues.
Internet Companies: Confusing Consumers for Profit
Cordozo, Nate
Article
2015
Electronic Frontier Foundation
In the age of information, companies are hungry for your data. They want it - even if it means resorting to trickery.
'I've Got Nothing to Hide' and Other Misunderstandings of Privacy
Solove, Daniel J.
Article
2007
San Diego Law Review
According to the nothing to hide argument, there is no threat to privacy unless the government uncovers unlawful activity, in which case a person has no legitimate justification to claim that it remai...
Journalists Welcome European Call to Review Anti-Terrorism Laws
Sources News Release
Article
2009
International Federation of Journalists
Ministers of the human rights network of the Council of Europe have called on their governments to review anti-terrorism laws in the face of strong criticism from journalists that some laws are in pra...
Lessons of the Snowden Revelations
You are the Target!
Lopez, Alfredo
Article
2013
CounterPunch
We in the Left have long worried about “police state tactics”. Now we have to confront the police state structure. It’s here and it can morph into a real police state with very little effort. Opposing...
No Child Left Un-Mined? Student Privacy at Risk in the Age of Big Data
Chideya, Farai
Article
2015
The Intercept
Chideya discusses the implications of the compilation of big data trails containing information about children's performance in school.
No Safe Harbor: How NSA Spying Undermined U.S. Tech and Europeans' Privacy
O'Brien, Danny
Article
2015
Electronic Frontier Foundation
The spread of knowledge about the NSA's surveillance programs has shaken the trust of customers in U.S. Internet companies like Facebook, Google, and Apple: especially non-U.S. customers who have disc...
NSA, GCHQ mapping "political alignment" of cellphone users
New report reveals
London, Eric
Article
2014
World Socialist Web Site
New information made public by Edward Snowden reveals that the governments of the United States and United Kingdom are trawling data from cellphone “apps” to accumulate dossiers on the “political alig...
The NSA Has Effectively Destroyed Internet Privacy
Snowden's Latest
Lopez, Alfredo
Article
2013
Counter Punch
Whistle-blower Edward Snowden prove that the NSA, working with its British counterpart the Government Communications Headquarters has conducted an intentional and largely sucessful campaign to destroy...
The NSA's Invasion of Google and Yahoo Servers
Your Email is Likely Being Monitored
Lopez, Alfredo
Article
2013
CounterPunch
The American National Security Agency (NSA) has been intercepting information coming in and out of Google and Yahoo servers over non-public, internal network fibre optic lines. In December, 2012 alone...
Obama defiant over NSA revelations ahead of summit with Chinese premier
Ackerman, Spencer; Roberts, Dan
Article
2013
Guardian
President says oversight of NSA surveillance programme should be left to Congress in comments criticising media 'hype.'
The Obliteration of Privacy
Snowden and the NSA
Kandutsch, Carl E
Article
2014
CounterPunch
It’s remarkable how little outrage Edward Snowden’s NSA revelations have provoked in the American public. One often heard response is something like, “Well, I don’t have anything to hide, so I don’t c...
On Locational Privacy, and How to Avoid Losing it Forever
Blumberg, Andrew J.; Eckersley, Peter
Article
2009
Electronic Frontier foundation
Over the next decade, systems which create and store digital records of people's movements through public space will be woven inextricably into the fabric of everyday life. We are already starting to ...
Other Voices: The Connexions Newsletter - July 22, 2017
Secrecy and Power
Diemer, Ulli (ed.)
Serial Publication (Periodical)
2017
Connexions
Secrecy is a weapon the powerful use against their enemies: us. This issue of Other Voices explores the relationship of secrecy and power.
The Peruvian "Stalker Law" Will Be Reviewed By Congress, We Can Still Stop It
Bogado, David; Rodriguez, Katitza
Article
2015
Electronic Frontier Foundation
Bogado and Rodriguez discuss the new decree in Peru known as "Ley Acosadora", or "the Stalker Law", allows warrantless access to Peruvians' location data and creates a new power for the government to ...
Police Go on Fishing Expedition, Search the Home of Seattle Privacy Activists Who Maintain Tor Network
Herz, Ansel
Article
2016
The Stranger
Seattle police descended on the Queen Anne condo of two outspoken privacy activists with a search warrant early this morning, leaving them shaken and upset. Jan Bultmann and David Robinson, a married ...
Preparing for a Digital 9/11
Greenberg, Karen
Article
2012
TomDispatch
In recent years, in one of the more dangerous, if largely undiscussed, developments of our time, the Bush and then Obama administrations have launched the first state-planned war in cyber space. First...
Privacy tapped out
Price, David
Article
2013
Le Monde diplomatique
For over a century, Americans and their judiciary fiercely fought any attempt by security agencies and law enforcement to listen in on private electronic communications. Now they’ve stopped fighting, ...
Protecting the Choice to Speak Anonymously Is Key to Fighting Online Harassment
Sources News Release
Article
2016
Electronic Frontier Foundation
EFF Urges Department of Education to Uphold First Amendment Rights in University Anti-Harassment Policies
Raleigh police are asking Google to provide user data for all people near crime scenes
Article
2018
Police in Raleigh, North Carolina, have presented Google with warrants to obtain data from mobile phones from not just specific suspects who were in a crime scene area, but from the mobile phones of a...
Reporters Without Borders and Torservers.net, partners against online surveillance and censorship
Sources News Release
Article
2014
Reporters Without Borders
Reporters Without Borders and Torservers.net have joined forces to create and maintain 250 additional relays for the Tor network.
Revealed: How DOJ Gagged Google over Surveillance of WikiLeaks Volunteer
Gallagher, Ryan
Article
2015
The Intercept
The Obama administration fought a legal battle against Google to secretly obtain the email records of a security researcher and journalist associated with WikiLeaks.
San Diego's Facial Recognition Program Shows Why We Need Records on Police Use of Mobile Biometric Technology
Maass, David
Article
2015
Electronic Frontier Foundation
The New York Times has a story out on how San Diego police use mobile facial recognition devices in the field, including potentially on non-consenting residents who aren't suspected of a crime. One ac...
Software that tracks people on social media created by defence firm
Gallagher, Ryan
Article
2013
Guardian
Raytheon's Riot program mines social network data like a 'Google for spies', drawing ire from civil rights groups.
Spies Hacked Computers Thanks to Sweeping Secret Warrants, Aggressively Stretching U.K. Law
Fishman, Andrew; Greenwald, Glenn
Article
2015
The Intercept
British spies have received government permission to intensively study software programs for ways to infiltrate and take control of computers. The GCHQ spy agency was vulnerable to legal action for th...
Spying by the Numbers
Hundreds of Thousands Subject to Government Surveillance and No Real Protection
Quigley, Bill
Article
2013
CounterPunch
Thanks to NSA whistleblower Edward Snowden many more people in the US and world-wide are learning about extensive US government surveillance and spying. There are publicly available numbers which sho...
The Stasi could only dream of such data
Britain, the birthplace of liberalism, has become the database state
Ash, Timothy Garton
Article
2008
Guardian Weekly
As technology increases the flow of stored data about individual actions, assurances of the "right to informational self-determination" must be hard won from governments. Government surveillance of ci...
Surveillance USA
NSA and the PRISM Project
Kampmark, Binoy
Article
2013
CounterPunch
The government is merrily going about its business of keeping tabs on you in virtually every conceivable way.
Think the Left Won the Culture War? Think Again
deBoer, Fredrik
Article
2015
Observer
With the recent AshleyMadison leak and Gawker.com's notorious naming and shaming of an obscure, married publishing executive, deBoer questions who really won in this culture war.
Thousands Join Legal Fight Against UK Surveillance — And You Can, Too
Gallagher, Ryan
Article
2015
The Intercept
Thousands of people are signing up to join an unprecedented legal campaign against the United Kingdom’s leading electronic surveillance agency.
Three Leaks, Three Weeks, and What We've Learned About the US Government's Other Spying Authority: Executive Order 12333
Jaycox, Mark M.
Article
2013
Electronic Frontier Foundation
The National Security Agency has been siphoning off data from the links between Yahoo and Google data centers, which include the fiber optic connections between company servers at various points aroun...
Uber Plans to Track Users Should Not Be Allowed, Says Privacy Group
Chatterjee, Pratap
Article
2015
Corp Watch
A formal complaint has been filed against Uber, the car ride company, by the Electronic Privacy Information Center (EPIC), a non-profit advocacy group. The NGO says Uber plans to use their smart phone...
U.N. Report Asserts Encryption as a Human Right in the Digital Age
Froomkin, Dan
Article
2015
The Intercept
Encryption is not the refuge of scoundrels, as Obama administration law-enforcement officials loudly proclaim – it is an essential tool needed to protect the right of freedom of opinion and expression...
UN slams UK surveillance law, calls for privacy reforms in Canada, France and Macedonia
Article
2015
Privacy International
In yet another blow to the UK's surveillance proponents, the UN Human Rights Committee has criticised the British legal regime governing the interception of communications, observing that it allows fo...
The use of encryption tools and the protection of anonymity online as safeguards for freedom of the press
Kaye, David
Unclassified
2015
International Press Institute
David Kaye is the UN Special Rapporteur on the promotion and protection of the right to freedom of expression. In his latest report, he stressed that governments are obligated to protect encryption to...


Sources is an online portal and directory for journalists, writers, news editors, researchers. Use Sources to find experts, media contacts, spokespersons, scientists, lobbyists, officials, speakers, university professors, researchers, newsmakers, CEOs, executive directors, media relations contacts, spokespeople, talk show guests, PR representatives, Canadian sources, story ideas, research studies, databases, universities, colleges, associations, businesses, government, research institutions, lobby groups, non-government organizations (NGOs), in Canada and internationally.
© Sources 1977-2021. The information provided is copyright and may not be reproduced in any form or by any means (whether electronic, mechanical or photographic), or stored in an electronic retrieval system, without written permission of the publisher. The content may not be resold, republished, or redistributed. Indexing and search applications by Ulli Diemer and Chris DeFreitas.