Sources Directory     A to Z Index     Topic Index News Releases     RSS Sources Select News RSS Feed     Sources Calendar    



Intelligent Search

  1. Broadband monopolies to censor Internet content (December 5, 2017)
    The recently released plan by the American Federal Communications Commission to abolish net neutrality has evoked mass opposition across the US and around the world.
  2. Cutting Cords to Kurds: Facebook's Foreign Policy (November 28, 2017)
    The recent deletion and suspension of Facebook accounts of Kurdish supporters provides further troubling evidence that the popular social media company has been censoring the Kurdish resistance for the past five years.
  3. Google's Eric Schmidt admits political censorship of search results (November 22, 2017)
    Recent remarks by the Executive Chairman of Google's parent company confirm charges that the company has been deliberately altering its search algorithms and taking other measures to prevent the public from accessing information that is critical of the US government.
  4. Warning to Spanish (and Other) Whistleblowers: Anonymous Boxes which ARE NOT ANONYMOUS (November 13, 2017)
    Citizens' victories in the struggle against corruption, sometimes requiring information to be provided through safe anonymous channels like Xnet's Mailbox for reporting corruption, have catalysed a proliferation of similar initiatives within governments and institutions.
  5. Kaspersky Lab in crosshairs since exposing US & Israeli spies behind Stuxnet (November 10, 2017)
    The campaign to discredit Kaspersky Lab dates back to 2010, when the Russian-based cybersecurity firm uncovered the origin of the Stuxnet malicious computer worm which ruined Iran's nuclear centrifuges.
  6. CIA wrote code 'to impersonate' Russia's Kaspersky Lab anti-virus company, WikiLeaks says (November 9, 2017)
    WikiLeaks published documents exposing the elaborated malware suite used by the CIA to hack, record and control modern hi-tech appliances worldwide.
  7. The FBI Blindly Hacked Computers in Russia, China, and Iran (November 8, 2017)
    Recent court papers indicate that the FBI repeatedly broke into devices overseas as part of ordinary criminal investigations; in countries hostile to the U.S. this could have significant geopolitical fallout.
  8. Who’s Afraid of Corporate COINTELPRO? (November 3, 2017)
    On November 30, 2016, presumably right at the stroke of midnight, Google Inc. unpersoned CounterPunch. They didn't send out a press release or anything. They just quietly removed it from the Google News aggregator. Not very many people noticed.
  9. Confessions of a (verified) Russia-linked Twitter Bot (November 2, 2017)
    Twitter's defines any user who has "ever logged in, at any time, from Russia" as being "Russia-linked." This is taking the new McCarthyism to ridiculous levels.
  10. Pay to play: Facebook rolls out nightmare scenario for publishers on its network (October 24, 2017)
    Proposed changes to the way Facebook handles posts from publishers and businesses may result in publishers having to pay Facebook to promote their stories so that people can see them.
  11. 'Pay to play': Facebook rolls out nightmare scenario for publishers on its network (October 24, 2017)
    Facebook is testing out a change to their network in six markets. As a result, posts from some publishers and businesses will be removed from the site's News Feed section. The change has caused a dramatic drop in referral traffic to news outlets.
  12. The conspiracy to censor the Internet (October 18, 2017)
    The political representatives of the American ruling class are engaged in a conspiracy to suppress free speech. Under the guise of combating "trolls" and "fake news" supposedly controlled by Russia, the most basic constitutional rights enumerated in the First Amendment are under direct attack.
  13. Germany's Network Enforcement Act: Legal framework for censorship of the Internet (October 5, 2017)
    On October 1, 2017, the Network Enforcement Act took effect in Germany. Under the cover of a fight against "fake news" and "hate speech," it creates a legal framework for censorship of the Internet.
  14. Sources News Releases (September 11, 2017)
    News releases from organizations and companies on a wide range of topics. Includes an extensive topic index, an archive of releases going back to the 1970s, and links to experts and organizations knowledgeable about the issues covered in the releases. Available via RSS feed as well as on the website.
  15. CIA sneak undetectable 'malicious' implants onto Windows OS - WikiLeaks (September 1, 2017)
    Windows machines are targeted by the CIA under 'Angelfire,' according to the latest release from WikiLeaks' 'Vault7' series. The documents detail an implant that can allow Windows machines to create undetectable libraries.
  16. NSA's Cyberwarfare Blowback (September 1, 2017)
    In May and June 2017, hackers took over thousands of computers around the world, encrypted their contents, and demanded ransom to decrypt them. They used tools developed by the National Security Agency (NSA) to exploit vulnerabilities in the Microsoft Windows operating system.
  17. Car remotely deactivated after Quebec teen refuses to pay for removal of GPS device (August 28, 2017)
    A Quebec teenager's car was remotely deactivated by a dealership after he refused to pay to remove a GPS tracking device -- one that he never wanted installed in the first place.
  18. Google's new advertising program tracks offline line shoppers, violates privacy (August 2, 2017)
    The privacy watchdog Electronic Privacy Information Center (EPIC) filed a formal complaint against Google alleging that the company's new advertising program violates consumer privacy.
  19. Google's new search protocol is restricting access to 13 leading socialist, progressive and anti-war web sites (August 2, 2017)
    New data suggests that the implementation of changes in Google's search evaluation protocols resulted in a massive loss of readership of socialist, anti-war and progressive web sites.
  20. How Threats Against Domain Names Are Used to Censor Content (July 27, 2017)
    A summary of a whitepaper released by EFF titled "Which Internet registries offer the best protection for domain owners?", outlining important points to consider, such as the policies of the registry that operates the domain.
  21. HMS Queen Elizabeth aircraft carrier runs on Windows XP, vulnerable to cyberattack (June 27, 2017)
    The first of Britain's two brand new aircraft carriers runs on outdated Windows XP software that may be vulnerable to cyberattack.
  22. The World Center of Hacking is in Washington, Not Moscow or Beijing (June 9, 2017)
    Documents from the U.S. NSA (National Security Agency) unveiled by Edward Snowden show that whole countries, not just a number of sensitive computers, have been hacked by the NSA.
  23. Digital Privacy at the U.S Border: A New How-To Guide from EFF (March 27, 2017)
    A new guide released by the Electronic Frontier Foundation (EFF) gives travelers the facts they need in order to prepare for border crossings while protecting their digital information.
  24. Real-Time Face Recognition Threatens to Turn Cops' Body Cameras Into Surveillance Machines (March 22, 2017)
    For years, the development of real-time face recognition has been hampered by poor video resolution, the angles of bodies in motion, and limited computing power. But as systems begin to transcend these technical barriers, they are also outpacing the development of policies to constrain them. Civil liberties advocates fear that the rise of real-time face recognition alongside the growing number of police body cameras creates the conditions for a perfect storm of mass surveillance.
  25. WikiLeaks Vault 7 Reveals CIA Cyberwar and the Battleground of Democracy (March 17, 2017)
    WikiLeaks dropped a bombshell on the U.S. Central Intelligence Agency. Code-named “Vault 7”, the whistleblowing site began releasing the largest publication of confidential documents that have come from the top secret security network at the Cyber Intelligence Center.
  26. Connexions Quotations (2017)
    A selection of quotations about social change, resistance, solidarity, and many other topics. Compiled by Ulli Diemer. Each quote has been turned into an image file.
  27. EFF To Canadian Court: Order Allowing Worldwide Censorship of Google Search Results Violates Users' Free Speech Rights (December 15, 2016)
    On Dec. 6, 2016, the Electronic Frontier Foundation will tell Canada's highest court that an overbroad court order that censors Google search results for users everywhere violates our rights to freely search the web without government interference.
  28. Internet Archive Received National Security Letter with FBI Misinformation about Challenging Gag Order (December 15, 2016)
    The Internet Archive published a formerly secret National Security Letter (NSL), highlighting misinformation in the letter about the process for challenging the contents of the NSL, impacting many communications providers who have received such NSLs.
  29. New Privacy Badger Upgrades Help Protect Your Online Holiday Shopping from Sneaky Data Collection (December 15, 2016)
    The Electronic Frontier Foundation (EFF) today released Privacy Badger 2.0 - a free browser extension for Chrome, Firefox, and Opera with new upgrades to help protect shoppers from online tracking.
  30. Facebook, Twitter, Google and Microsoft team up to tackle extremist content (December 6, 2016)
    Tech companies plan to create a shared database of 'unique digital fingerprints' that will able to identify images and videos promoting terrorism and extremist content.
  31. Apple Logs Your iMessage Contacts - and May Share Them With Police (September 28, 2016)
    Apple promises that your iMessage conversations are safe and out of reach from anyone other than you and your friends. But according to a document obtained by The Intercept, your blue-bubbled texts do leave behind a log of which phone numbers you are poised to contact and shares this (and other potentially sensitive metadata) with law enforcement when compelled by court order.
  32. New Film Tells the Story of Edward Snowden; Here Are the Surveillance Programs He Helped Expose (September 16, 2016)
    Oliver Stone's latest film, "Snowden," bills itself as a dramatized version of the life of Edward Snowden, the NSA whistleblower who revealed the global extent of U.S. surveillance capabilities.
  33. Delta says 740 flights cancelled after worldwide system outage (August 8, 2016)
    Delta Air Lines says it has cancelled 740 flights after a power outage that began overnight knocked out its computer systems and operations worldwide.
  34. Hackers can record everything you type on certain wireless keyboards (July 27, 2016)
    A computer security research team has identified a weakness in several brands of low-cost wireless keyboards that could allow hackers to view and record every word, number and password typed by a user from up to about 75 metres away. According to Bastille, an Atlanta-based research team, eight wireless keyboards made by companies such as Hewlett-Packard, Radio Shack and Toshiba send keystroke data from the board to the USB dongle that connects to your computer without the encryption needed to mask what someone is typing.
  35. Open Source Software: a necessary tool to build our movements | What's Left (July 25, 2016)
    Software companies are exploitative and other companies should invest in unionized products, condem work to lower wages and act in solidarity with other workers in the software industry.
  36. Snowden leak: MI5 has gathered so much data it may actually be missing 'life-saving intelligence' (June 8, 2016)
    British spies may have missed potentially "life-saving intelligence" because their surveillance systems were sweeping up more data than could be analyzed, a leaked classified report reveals. The document, given to The Intercept by NSA whistleblower Edward Snowden, was sent to top British government officials, outlining methods being developed by the UK’s domestic intelligence agency, MI5, to covertly monitor internet communications.
  37. Google voice search records and keeps conversations people have around their phones - but the files can be deleted (June 1, 2016)
    How google search can record and store conversations picked up by a phone's microphone, as well as how to prevent this and delete the stored files.
  38. OCCRP Launches New Search Engine for Investigative Journalists (May 30, 2016)
    The Organized Crime and Corruption Reporting Project (OCCRP), a non-profit network of investigative journalism centers in Europe and Eurasia, has launched a new data platform to enable journalists and researchers to sift more than 2 million documents and use the findings in their investigations. People using the new data platform, called ID Search, will be able to set up email alerts notifying them when new results appear for their searches or for persons tracked on official watchlists. They can also create their own private watchlists.
  39. Dear "Skeptics," Bash Homeopathy and Bigfoot Less, Mammograms and War More (May 16, 2016)
    So I'm a skeptic, but with a small S, not capital S. I don’t belong to skeptical societies. I don’t hang out with people who self-identify as capital-S Skeptics. Or Atheists. Or Rationalists. When people like this get together, they become tribal. They pat each other on the back and tell each other how smart they are compared to those outside the tribe. But belonging to a tribe often makes you dumber.
  40. New Study Shows Mass Surveillance Breeds Meekness, Fear and Self-Censorship (April 28, 2016)
    A newly published study from Oxford's Jon Penney provides empirical evidence for a key argument long made by privacy advocates: that the mere existence of a surveillance state breeds fear and conformity and stifles free expression. Reporting on the study, the Washington Post this morning described this phenomenon: "If we think that authorities are watching our online actions, we might stop visiting certain websites or not say certain things just to avoid seeming suspicious."
  41. Who's downloading pirated papers? Everyone (April 28, 2016)
    Researchers are increasingly turning to Sci-Hub, the world's largest largest 'pirate' website for scholarly literature. Sci-Hub is becoming the world's de facto open-access research library.
  42. UC Davis spent $175,000 to scrub online pepper spray references (April 13, 2016)
    The University of California, Davis, contracted with consultants for at least $175,000 to scrub the Internet of negative online postings following the November 2011 pepper spraying of students and to improve the reputations of both the university and Chancellor Linda P.B. Katehi, newly released documents show.
  43. EFF to Copyright Office: Improper Content Takedowns Hurt Online Free Expression (April 10, 2016)
    Safe Harbors Work for Rightsholders and Service Providers. Content takedowns based on unfounded copyright claims are hurting online free expression, says Electronic Frontier Foundation (EFF).
  44. Nest's move to stop supporting Revolv smart hub leaves customers with costly 'brick' (April 6, 2016)
    Here's a major downside to the so-called Internet of Things -- companies can potentially disconnect your smart devices and leave them essentially useless at any time.
  45. EFF and Partners Support Media Monitoring Service in Fight for Fair Use (March 27, 2016)
    A media monitoring service that creates a text-searchable database of television and radio content is defending its fair use rights before a federal appeals court.
  46. Revealed: how facial recognition has invaded shops – and your privacy (March 25, 2016)
    Retailers are using ever more sophisticated software to watch how consumers shop.
  47. The hubris of investigators (March 24, 2016)
    A now-vacated hearing over whether to require Apple to undermine the security of its users prompted an ongoing controversy over government access to encrypted devices. While the court in San Bernardino may never rule on the flood of arguments supporting Apple's defense of user security, observers-- especially members of Congress-- should pay close attention to a few themes that have emerged in the public debate.
  48. Meet the Robin Hood of Science (February 14, 2016)
    The tale of how one researcher has made nearly every scientific paper ever published available for free to anyone, anywhere in the world. On September 5th, 2011, Alexandra Elbakyan, a researcher from Kazakhstan, created Sci-Hub, a website that bypasses journal paywalls, providing access to nearly every scientific paper ever published immediately to anyone who wants it.
  49. Chaos Computer Club: Europe's biggest hackers' congress underway in Hamburg (December 28, 2015)
    Some 12,000 hackers are challenging the power of Google, Facebook and Youtube to filter information and shape users' view of the world. One of them demonstrated how to hack into VW's cheating software.
  50. The Digital Dark Ages: Movies and Books Get Deleted as Selfies Pile Up (December 22, 2015)
    Historians and archivists call our times the "digital dark ages." The name evokes the medieval period that followed the collapse of the Roman Empire, which led to a radical decline in the recorded history of the West for 1000 years. But don't blame the Visigoths or the Vandals. The culprit is the ephemeral nature of digital recording devices. Remember all the stuff you stored on floppy discs, now lost forever? Over the last 25 years, we've seen big 8" floppies replaced by 5.25" medium replaced by little 3.5" floppies, Zip discs and CD-ROMs, external hard drives and now the Cloud -- and let's not forget memory sticks and also-rans like the DAT and Minidisc.
  51. Tracks Content Takedowns by Facebook, Twitter, and Other Social Media Sites (November 27, 2015)
    The Electronic Frontier Foundation (EFF) and Visualizing Impact launched on November 19, 2015, a new platform to document the who, what, and why of content takedowns on social media sites.
  52. 'Worse Than We Thought': TPP A Total Corporate Power Grab Nightmare (November 5, 2015)
    On issues ranging from climate change to food safety, from open Internet to access to medicines, the TransPacific Partnership (TPP) is a disaster.
  53. Towards a two-tiered knowledge society (August 27, 2015)
    On the Conservative government's actions to reduce Internet access and library access to a large portion of the population.
  54. Medical Privacy Under Threat in the Age of Big Data (August 6, 2015)
    Medical privacy is a high-stakes game, in both human and financial terms, given the growing multibillion-dollar legal market for anonymized medical data. The threats to individuals seeking to protect their medical data can come externally, from data breaches; internally, from "rogue employees" and others with access; or through loopholes in regulations.
  55. Why Facebook Failed Our Censorship Test (June 18, 2015)
    If you click around Facebook's "Government Request Report," you'll notice that, for many countries, Facebook enumerates the number of "content restrictions" the company has fulfilled. This is a sanitized term for censorship.
  56. Improbable libraries: unusual places to bury your head in a book (April 12, 2015)
    Alex Johnson looks at the imaginative forms the modern library takes.
  57. Documents Reveal Canada's Secret Hacking Tactics (March 23, 2015)
    Canada's electronic surveillance agency has secretly developed an arsenal of cyberweapons capable of stealing data and destroying adversaries' infrastructure, according to newly revealed classified documents. Communications Security Establishment, or CSE, has also covertly hacked into computers across the world to gather intelligence, breaking into networks in Europe, Mexico, the Middle East and North Africa, the documents show.
  58. Snowden's NSA Leaks Catalogued In First Searchable Database Of The Surveillance Documents (March 12, 2015)
    Canadian journalists and researchers have teamed up to create the world's first fully-searchable index of the classified documents revealing NSA surveillance leaked by whistleblower Edward Snowden.
  59. Edward Snowden's Warning to Canada (March 4, 2015)
    Whistleblower Edward Snowden talks about Bill C-51 and the weak oversight of Canada's intelligence agencies.
  60. The Great SIM Heist: How Spies Stole the Keys to the Encryption Castle (February 19, 2015)
    American and British spies hacked into the internal computer network of the largest manufacturer of SIM cards in the world, stealing encryption keys used to protect the privacy of cellphone communications across the globe, according to top-secret documents provided by National Security Agency whistleblower Edward Snowden.
  61. Secret 'BADASS' Intelligence Program Spied on Smartphones (January 26, 2015)
    British and Canadian spy agencies accumulated sensitive data on smartphone users, by piggybacking on ubiquitous software from advertising and analytics companies, according to a document obtained by NSA whistleblower Edward Snowden.The document outlines a secret program run by the intelligence agencies called BADASS.
  62. Cory Doctorow Rejoins EFF to Eradicate DRM Everywhere (January 21, 2015)
    Leading digital rights champion and author Cory Doctorow has rejoined the Electronic Frontier Foundation (EFF) to battle the pervasive use of dangerous digital rights management (DRM) technologies that threaten users' security and privacy.
  63. How Verizon and Turn Defeat Browser Privacy Protections (January 14, 2015)
    Verizon advertising partner Turn is using Verizon Wireless's UIDH tracking header to resurrect deleted tracking cookies and share them, forming a vast web of non-consensual online tracking. The tehcnology makes it impossible for customers to control their online privacy.
  64. The Turn-Verizon Zombie Cookie (January 14, 2015)
    Discussion of Verizon's "supercookie," a header that tracks mobile subscribers, even if they have opted out, cleared their cookies, or entered private browsing mode.
  65. New copyright law is already being abused to threaten Canadian Internet users with ridiculous penalties for downloading (January 8, 2015)
    Less than a week after new copyright rules went into effect in Canada, ISPs are already receiving notices from Big Media giants that contain misleading and threatening statements, according to top copyright expert Professor Michael Geist.
  66. What Is the Trans-Pacific Partnership Agreement (TPP)? (2015)
    The Trans-Pacific Partnership (TPP) is a secretive, multinational agreement that, among other things, threatens to extend restrictive intellectual property (IP) laws across the globe and rewrite international rules on its enforcement.
  67. We've got our eye on you (November 1, 2014)
    Edward Snowden not only told the world about US state surveillance of national and personal secrets, he reminded us that almost all the companies surveying us for commercial gain are American.
  68. Fake cell phone 'towers' may be spying on Americans' calls, texts (September 3, 2014)
    More than a dozen 'fake cell phone towers' could be secretly hijacking Americans' mobile devices in order to listen in on phone calls or snoop on text messages, a security-focused cell phone company claims. It is not clear who controls the devices.
  69. An alternative media list (September 1, 2014)
    A selective list of English-language alternative media.
  70. Police State: US Government-Funded Database Created to Track "Subversive Propaganda" Online (August 30, 2014)
    The creation of the Truthy database by Indiana University researchers has drawn sharp criticism from free-speech advocates and others concerned over government censorship of political expression.
  71. Corporations Spy on Nonprofits with Impunity (August 25, 2014)
    Here's a dirty little secret you won't see in the daily papers: corporations conduct espionage against US nonprofit organizations without fear of being brought to justice.
  72. An Online Tracking Device That’s Virtually Impossible to Block (August 15, 2014)
    A new kind of tracking tool, canvas fingerprinting, is being used to follow visitors to thousands of top websites, from to YouPorn.
  73. The Price of Books, The Value of Civilization (August 1, 2014)
    I have come to think that books occupy this valuable position in our civilisation because they are the only medium for thick descriptions of the world that human beings possess. By ‘thick’ description, I mean an extended, detailed, evidence-based, written interpretation of a subject. If you want to write a feature or blog or wikipedia entry, be it about the origins of the first world war; the authoritarian turn in Russia; or the causes and effects of the 2008 financial crisis, in the end you will have to refer to a book. Or at least refer to other people who have referred to books. Even the best magazine pieces and TV documentaries – and the best of these are very good indeed – are only puddle-deep compared with the thick descriptions laid out in books. They are ‘thin’ descriptions and the creators and authors of them will have referred extensively to books to produce their work.
  74. Google doesn't want you to limit its ability to follow you around the internet (July 26, 2014)
    Behind our screens, tech companies are racing to extract a price for what we read and watch on the web: our personal information.
  75. Forward Secrecy Brings Better Long-Term Privacy to Wikipedia (July 9, 2014)
    Wikipedia readers and editors can now enjoy a higher level of long-term privacy, thanks to the Wikimedia Foundation's rollout last week of forward secrecy on its encrypted connections.
  76. Canadian Court to the Entire World: No Links For You! (June 20, 2014)
    The Supreme Court of British Columbia has ordered Google to remove entire domains from its search results — a decision that could have enormous global implications on free expression. This is the latest of several instances of courts claiming dangerous jurisdictional overreach, where they have applied local laws to remove content on the Internet.
  77. The Loneliest Library in the World (June 13, 2014)
    At 73, P.V. Chinnathambi runs one of the loneliest libraries anywhere. In the middle of the forested wilderness of Kerala’s Idukki district, the library’s 160-books — all classics — are regularly borrowed, read, and returned by poor, Muthavan adivasis.
  78. Tor is for Everyone (June 13, 2014)
    EFF recently kicked off their second Tor Challenge, an initiative to strengthen the Tor network for online anonymity and improve one of the best free privacy tools in existence. This is great news, but how does it affect you? To understand that, we have to dig into what Tor actually is, and what people can do to support it.
  79. Marx and Engels Belong to the Workers of the World (May 30, 2014)
    Lawrence & Wishart, the British publisher of the Collected Works of Karl Marx and Friedrich Engels (MECW), has compelled the Marxists Internet Archive to remove free digital versions of this 50-volume treasure from its Web site. This step is meant to further the publisher’s pursuit of private, profitable licenses with paying customers.
  80. 2013-14 Review of Free Expression in Canada (May 3, 2014)
    Evaluates people, policies and institutions that help and hinder freedom of expression. The 2013-14 Review of Free Expression in Canada contains feature articles about some of the most pressing areas of free expression, such as access to information, digital surveillance, and the failure to protectwhistleblowers. Also: a Report Card and Cross-Canada Reports.
  81. FCC Wants to Give Corporations Their Own Internet (April 29, 2014)
    When a federal court trashed its “net neutrality” compromise policy in January, the Federal Communications Commission assured us that the Internet we knew and depended on was safe. Most activists didn’t believe federal officials and this past week the FCC demonstrated how realistic our cynicism was.
  82. Without Intellectual Property Day (April 26, 2014)
    As the saying goes, though: when you're a hammer, everything looks like a nail. For the World Intellectual Property Organization, it may seem like creativity and "intellectual property" are inextricably linked. That's not the case. In the spirit of adding to the conversation, we'd like to honor all the creativity and industry that is happening without a dependence on a system intellectual property.
  83. Journalistic Autonomy in Denmark. A Study (April 17, 2014)
    A new study that looks at the subject of autonomy in the Danish media found that journalists in Denmark feel they have nearly complete freedom to make important choices concerning their work and the content they produce.
  84. Why the Web Needs Perfect Forward Secrecy More Than Ever (April 8, 2014)
    If a server is configured to support forward secrecy, then a compromise of its private key can't be used to decrypt past communications.
  85. A Short History of Spam (March 14, 2014)
    Objects can talk in cartoons and fairy tales: toys tell their stories. Now our domestic appliances have begun to speak, and they would like to sell us pills and porn, and for us to give them our bank details.
  86. Optic Nerve (February 28, 2014)
    Britain's surveillance agency GCHQ, with aid from the US National Security Agency, intercepted and stored the webcam images of millions of internet users not suspected of wrongdoing, secret documents reveal.
  87. Noah's ark was round – so the ancient tablet tells us (February 11, 2014)
    Irving Finkel, curator of the British Museum's 130,000 Mesopotamian clay tablets, has spent 20 years investigating one that challenges the story of Noah and the flood.
  88. Selling your Secrets (February 7, 2014)
    The documents released by whistleblower Edward Snowden reveal that the world of NSA mass surveillance involves close partnerships with a series of companies most of us have never heard of that design or probe the software we all take for granted to help keep our digital lives humming along.
  89. Loss of Librarians Devastating to Science and Knowledge in Canada (January 28, 2014)
    The closure of federal libraries and loss of specialized librarians impacts negatively on the state of science and knowledge in Canada.
  90. NSA, GCHQ mapping "political alignment" of cellphone users (January 28, 2014)
    New information made public by Edward Snowden reveals that the governments of the United States and United Kingdom are trawling data from cellphone “apps” to accumulate dossiers on the “political alignments” of millions of smartphone users worldwide.
  91. Smartphone Game Data Targeted by NSA (January 28, 2014)
    Millennial Media, a Baltimore based ad company, creates “intrusive” profiles of users of smartphone applications and games like Angry Birds, according to documents leaked to the media by whistleblower Edward Snowden. Such profiles have been exploited by intelligence authorities like the U.S. National Security Agency (NSA), say investigative journalists.
  92. Spread of knowledge in peril as Canada shuts federal department libraries (January 24, 2014)
  93. NHS Patient Data to be Made Available for Sale to Drug and Insurance Firms (January 19, 2014)
    Drug and insurance companies will from later this year be able to buy information on patients once a single English database of medical data has been created. Privacy experts warn there will be no way for public to work out who has their medical records or how they are using it.
  94. Museum and Gallery Curators Reopen the Cabinet of Curiosities Concept (January 13, 2014)
    Stuffed pelicans, bell-jarred oddities and unicorn horns: the wunderkammer – or 'cabinet of curiosities' – is a macabre, colonial throwback. So why is it back in vogue?
  95. Silence of the Labs (January 10, 2014)
    Scientists across the country are expressing growing alarm that federal cutbacks to research programs monitoring areas that range from climate change and ocean habitats to public health will deprive Canadians of crucial information.
  96. Canada's Science Library Closures Mirror Bush's Playbook (January 9, 2014)
    The Harper government is now eliminating seven Department of Fishery libraries containing one of the world's most comprehensive collections of information on fisheries, aquatic sciences and nautical sciences.
  97. DFO Library Closures Anger Scientific Community (January 9, 2014)
    When word first broke that the Department of Fisheries and Oceans was closing seven of their libraries, government officials promised that there would be no loss of vital historical material. Today many are skeptical of those claims.
  98. Eric Marshall laments closure of namesake Fisheries library (January 6, 2014)
    The government seems to be saying 'We want to exploit our natural resources, whether it's natural gas or oil sands, and basically to heck with environmental impacts.'
  99. Secret Memo Casts Doubt on Feds' Claims for Science Library Closures (December 30, 2013)
    A federal document marked "secret" obtained by Postmedia News indicates the closure or destruction of more than half a dozen world famous science libraries has little if anything to do with digitizing books as claimed by the Harper government.
  100. What's Driving Chaotic Dismantling of Canada's Science Libraries? (December 23, 2013)
    Scientists say the closure of some of the world's finest fishery, ocean and environmental libraries by the Harper government has been so chaotic that irreplaceable collections of intellectual capital built by Canadian taxpayers for future generations has been lost forever. Many collections ended up in dumpsters while others such as Winnipeg's historic Freshwater Institute library were scavenged by citizens, scientists and local environmental consultants. Others were burned or went to landfills.
  101. A million first steps (December 12, 2013)
    We have released over a million images onto Flickr Commons for anyone to use, remix and repurpose. These images were taken from the pages of 17th, 18th and 19th century books digitised by Microsoft who then generously gifted the scanned images to us, allowing us to release them back into the Public Domain.
  102. NSA Turns Cookies (And More) Into Surveillance Beacons (December 11, 2013)
    These Google cookies - known as 'PREF' cookies - last two years and can uniquely identify you. The NSA is using this to enable remote exploitation (hacking into people’s computers) - an act aided by the ability to uniquely identify individuals on the Internet.
  103. Dismantling of Fishery Library 'Like a Book Burning,' Say Scientists (December 9, 2013)
    The Harper government has dismantled one of the world's top aquatic and fishery libraries as part of its agenda to reduce government as well as limit the role of environmental science in policy decision-making.
  104. Scientists pledge to boycott Elsevier (December 5, 2013)
    Following the retraction of the Seralini et al scientific paper which found health damage to rats fed on GM corn, over 100 scientists have pledged in this Open Letter to boycott Elsevier, publisher of the journal responsible.
  105. Iron Cagebook (December 3, 2013)
  106. Activist archiving in Toronto (November 28, 2013)
    People gather in Toronto to discuss what many hope will grow into a movement for archiving grassroots histories.
  107. Unmasking the Five-Eyed monster, a global and secret intelligence-sharing regime (November 27, 2013)
    Privacy International is proud to announce our new project, Eyes Wide Open, which aims to pry open the Five Eyes arrangement and bring it under the rule of law.
  108. Moving 750 million pages of print archive to a new home (November 22, 2013)
    For 82 years, researchers have made the journey to Colindale in north London, the home of the British Newspaper Library, a vast collection of almost every British newspaper published in the last 300 years. Across six floors and 50 kilometres of shelving sit not only the well-known national papers, but also a vast collection of now obscure regional titles.
  109. Harper's Seven-Year War on Science (November 1, 2013)
  110. What Are Your Options Now For Secure Email? (August 9, 2013)
    It's shockingly, disturbingly easy for the government to snoop on your emails. Here are your weapons in the fight for your email privacy.
  111. How the FBI Turned Me On to Rare Books (July 30, 2013)
    I have wanted to be a historian of hope. We can take heart from the fact that no matter how dire the situation, some will find means to resist, some will find means to cope, and some will remember and tell stories about what happened.
  112. The Corporate State and Manufactured Dependence (June 7, 2013)
    The 'resistance is futile' mindset that supports plutocrats and the global corporations they own assumes the existing order is the only possible order and the costs of resistance are too great because 'they' have state power and unlimited economic resources on their side.
  113. Social Networking and the Death of the Internet (May 8, 2013)
    Social Networking is, by its nature, a capture environment. The companies that offer the services, particularly Facebook, host your site and control all the information on it. Facebook — a group of linked pages on a giant website — is constraining and not very powerful. In order to use it, you have to use it the way they want you to and that’s not a whole lot of “using”. But there is a comfort in having one’s options limited, being able to use something without learning anything about it or making many choices about how you use it. That alluring convenience is a poisoned apple, however.
  114. The Case for Grassroots Archives (May 2, 2013)
    Grassroots archives play a valuable role in what has been called "the battle of memory". People's history projects such as grassroots archives preserve and share stories of resistance, hidden histories, and alternative visions.
  115. Oxfam donates archive to the Bodleian Libraries (February 25, 2013)
    Oxford-based international development charity Oxfam has announced it has donated the organization’s archive, spanning the last seventy years, to the University of Oxford’s Bodleian Libraries. Now, with a substantial grant from the Wellcome Trust, a four-and-a-half-year project is underway at the Bodleian to catalogue Oxfam’s extensive records and make them more accessible.
  116. Google and the future of search: Amit Singhal and the Knowledge Graph (January 19, 2013)
    An interview with the current head of Google Search, discussing some of the thought processes behind the current functionality of 'search' and some of its possibilites for the future.
  117. How To Verify Information and Debunk Myths Using Online Tools (2013)
    Did Pope Francis play a major role in Argentina’s Dirty War? Reporters published photos of dictator Jorge Videla with a cardinal, allegedly with Jorge Bergoglio, the recently elected Pope Francis. But something was wrong with these reporters’ findings. Henk van Ess explains how the internet can help you to debunk the internet.
  118. Facebook bans developer of F.B. Purity (December 19, 2012)
  119. Facebook forces Instagram users to allow it to sell their uploaded photos (December 18, 2012)
    Move means pictures could be used in advertising, with all payments going to social media giant.
  120. Anti-Science: Left and Right Together? (December 11, 2012)
    The suggestion that left and right thinking may be converging on matters scientific will, no doubt, be offensive to some on the left. After all, the right chooses myth over evolution, and oil profits over climate science.
  121. EU: Enact Controls on Digital Weapons Trade (December 11, 2012)
    Unregulated Export of Powerful Surveillance Tools Threatens Internet Freedom. Reporters Without Borders and Human Rights Watch call on the European Union to enact new controls on Internet surveillance and censorship technologies. Repressive governments use these technologies to enable human rights violation.
  122. Grassroots archive information sheet (November 24, 2012)
    Connexions is working on a project to help network grassroots archives and collections of materials about activist and radical history. If you have a collection of social justice materials in your basement/locker, etc., and would like to participate in an exploration of co-operative archiving and/or searching for shared space, please fill out this form and email it to Connexions.
  123. Memory as Resistance: Grassroots Archives and the Battle of Memory (November 2, 2012)
    CONNEXIONS and Beit Zatoun are spotlighting grassroots archives this November with an open house and networking event November 24, a talk and discussion November 27, and an exhibit (November 16-27).
  124. Selected Archive Projects (October 18, 2012)
    A list of some archive projects concerned with grassroots movements for social justice.
  125. Seven pilot sites join national digital library project with Knight Foundation funding (October 12, 2012)
  126. Eric Hobsbawm 1917-2012 (October 1, 2012)
    The historian Eric Hobsbawm dies at 95.
  127. US Military Brands Assange, WikiLeaks As "The Enemy" (September 28, 2012)
    Secret US Air Force documents reveal that the American military has branded WikiLeaks and its editor Julian Assange as "the enemy", placing them on a legal par with Al Qaeda and threatening them with the same treatment: indefinite detention without trial, and death.
  128. False positives: fraud and misconduct are threatening scientific research (September 13, 2012)
    Better detection tools and a rising retraction rate suggest scientific fraud may be widespread.
  129. Is that an archive in your basement... or are you just hoarding? (August 31, 2012)
    Are you an 'accidental archivist'? Have you been saving the publications and documents produced by the social justice projects you've been involved in? Then Connexions would like to hear from you.
  130. The New Police Surveillance State (July 31, 2012)
    Police are increasingly being deployed to restrict if not prevent mass political actions, especially directed at the banks.
  131. Trying to change the world? (July 23, 2012)
    Getting your story across is an uphill battle when you’re challenging the status quo.
    SOURCES can help you get your message out.
  132. 'The Death of Evidence' in Canada: Scientists' Own Words (July 16, 2012)
  133. Museum of Endangered Sounds enshrines audio from bygone era (June 29, 2012)
    A website preserves outmoded electronic sounds that are lost to the world.
  134. Data Mining You (April 3, 2012)
    Joseph K., that icon of single-lettered anonymity from Franz Kafka’s novel The Trial, would undoubtedly have felt right at home in Washington.
  135. WikiLeaks Begins Publishing 5 Million Emails From STRATFOR (February 27, 2012)
  136. Case study: a closer look at community partnerships (2012)
  137. Email privacy (2012)
    Email privacy is the broad topic dealing with issues of unauthorized access and inspection of electronic mail. This unauthorized access can happen while an email is in transit, as well as when it is stored on email servers or on a user computer. In countries with a constitutional guarantee of the secrecy of correspondence, whether email can be equated with letters and get legal protection from all forms of eavesdropping comes under question because of the very nature of email. This is especially important as more and more communication occurs via email compared to postal mail.
  138. Domestic reality does not match bold words on Internet freedom of expression (November 2, 2011)
    The U.S. government gives lip service to online free speech but simultaneously acts in ways to drastically limit freedom of expression.
  139. Get your head out of the clouds (May 6, 2011)
    Appraising the risks to personal data held in cloud computing systems.
  140. The Information Sage (May 1, 2011)
  141. Google a great painting (February 11, 2011)
    Google's Art Project allows viewers to browse works from 17 museums including the Metropolitcan Museum, MoMA, The National Gallery, Tate Britain and others in super-high resolution.
  142. BBC Joins Smear Campaign Against Assange and Wikileaks (February 1, 2011)
    The campaign by the establishment press against Julian Assange is intensifying.
  143. The Internet's Unholy Marriage to Capitalism (2011)
    The economic context points to the paradox of the Internet as it has developed in a capitalist society. The Internet has been subjected, to a significant extent, to the capital accumulation process, which has a clear logic of its own, inimical to much of the democratic potential of digital communication, and that will be ever more so, going forward. What seemed to be an increasingly open public sphere, removed from the world of commodity exchange, seems to be morphing into a private sphere of increasingly closed, proprietary, even monopolistic markets.
  144. The Secret Secret (December 9, 2010)
    Only those with proper clearances can participate in discussions that affect significant aspects of our lives. Certain technological achievements, our collective ethical decisions (torture, secret prisons, air strikes, etc.), our collective behavior towards other nations and peoples (foreign policy discussions) and more are often obscured by state secrecy. Like the medieval clergy, those holding classified clearances are the sole legitimate interpreters of the 'really important' knowledge. In effect, they are a caste that guides our political and technological cosmologies.
  145. Information Terrorists? (December 7, 2010)
    WikiLeaks is under concerted attack from the US government. Also under attack by the US government is the whole idea of freedom of thought and of information. It needs to be clearly understood that the attacks on WikiLeaks by the US government could as easily be used against news organizations and political organizations.
  146. A Web Pioneer Profiles Users by Name (October 24, 2010)
    An online tracking company builds extraordinarily intimate databases on people by tapping voter-registration files, shopping histories, social-networking activities and real estate records, among other things.
  147. Saving past is first step to the future (October 15, 2010)
    The archives of southern Sudan are all currently housed in a tent donated by USAid. Many documents have been damaged due to the poor storage facilities. The Rift Valley Institute, a non-profit research group and scholars from Oxford plan to digitize and find a permanent home for the collection in the near future.
  148. Fanning the flames of intolerance (September 24, 2010)
    A historical overview of book burnings by political and religious regimes.
  149. A War on Wikileaks? (August 11, 2010)
    If the state fails to make any sense - not surprising - it is because it is has no intention of doing so. The state is appealing to something more visceral with all of this posturing: fear. It wants to strike fear into the minds and bodies of people working with Wikileaks, or anyone else doing such work, and anyone contemplating leaking any classified records. Fear is its greatest weapon of psychological destruction, with proven success at home. The outcome the state hopes for is greater self-censorship and greater self-monitoring.
  150. Sites Feed Personal Details To New Tracking Industry (July 30, 2010)
    The largest U.S. websites are installing new and intrusive consumer-tracking technologies on the computers of people visiting their sites—in some cases, more than 100 tracking tools at a time. The tracking files are the leading edge of a new industry of data-gatherers who are in effect establishing a new business model for the Internet: one based on intensive surveillance of people to sell data about, and predictions of, their interests and activities, in real time.
  151. IFJ Releases Press Freedom Report for South Asia (April 30, 2010)
    The International Federation of Journalists (IFJ) in association with the South Asia Media Solidarity Network (SAMSN) will officially release the eighth annual report on press freedom in South Asia at a regional event on May 3.
  152. Microsoft, piracy, and independent media in Kyrgyzstan (April 14, 2010)
    Selective enforcement of alleged software infringement is being used with some frequency in the former Soviet republics as cover to harass independent media. Local law enforcement officials have been given broad powers, in the name of fighting piracy, to raid premises and seize hardware. For the most part, Western companies and governments have encouraged this broadening of powers.
  153. Does Wikipedia Suck? (March 26, 2010)
    Students were told to pick a concept, theory, or individual central to their paper, read the matching Wikipedia entry, and assess how useful it is for their research.
  154. Journalists assaulted and censored (March 17, 2010)
    Palestinian journalists are under attack from Israeli forces and are also subjected to raids and arrests as a result of political rivalry between the Palestinian Authority and Hamas, report the Palestinian Center for Development and Media Freedom (MADA) and Reporters Without Borders (RSF). Meanwhile, Israel continues to target and detain scores of Palestinians involved in protests against the separation barrier in the West Bank with freedom of movement and expression violations, reports Human Rights Watch.
  155. U.S. Intelligence planned to destroy Wikileaks (March 15, 2010)
    This document is a classifed (SECRET/NOFORN) 32 page U.S. counterintelligence investigation into WikiLeaks. ``The possibility that current employees or moles within DoD or elsewhere in the U.S. government are providing sensitive or classified information to cannot be ruled out''. It concocts a plan to fatally marginalize the organization. Since WikiLeaks uses ``trust as a center of gravity by protecting the anonymity and identity of the insiders, leakers or whisteblowers'', the report recommends ``The identification, exposure, termination of employment, criminal prosecution, legal action against current or former insiders, leakers, or whistlblowers could potentially damage or destroy this center of gravity and deter others considering similar actions from using the Web site''.
  156. Web 2.0 versus Control 2.0 (March 12, 2010)
    The fight for free access to information is being played out to an ever greater extent on the Internet. The emerging general trend is that a growing number of countries are attemptimg to tighten their control of the Net, but at the same time, increasingly inventive netizens demonstrate mutual solidarity by mobilizing when necessary.
  157. Freedom of expression under attack in every region, say IFEX members on International Human Rights Day (December 17, 2009)
    To mark International Human Rights Day IFEX members paused to comment on violations of free expression as they commemorated the 61st anniversary of the Universal Declaration of Human Rights.
  158. The dark side of the internet (November 26, 2009)
    Search engines access only a very small fraction of the deep web, which is estimated to be five hundred times as big as the surface web.
  159. Free Speech Protection Act could slow 'libel tourism' (November 16, 2009)
    Free press advocates in Britain are looking to a bill stuck in the U.S. Congress for moral support in the fight to reform England#s draconian defamation laws. The U.S. bill, the Free Speech Protection Act 2009, is itself the product of those laws, which have made London the capital of #libel tourism.#
  160. What is Distinctive about the Library of Congress In Both its Collections and its Means of Access to Them (November 6, 2009)
    The Library cannot solve its space problems by adoption of a "digital strategy"
    without seriously damaging our larger mission to promote scholarship of unusual scope and
    depth. If the Library’s own access to its own general book collection were to be dumbed
    down to only the levels of subject access provided by Google, Amazon, or Internet search
    mechanisms, we would effectively be endorsing, and institutionalizing, the level of
    ignorance exemplified by the Six Blind Men of India.
  161. Berlin Twitter Wall website blocked just days after its launch (November 4, 2009)
    Reporters Without Borders deplores the fact that the Chinese authorities blocked the Berlin Twitter Wall website ( just days after its launch.
  162. Volunteer Translators Wanted - English to Other Languages (October 30, 2009)
    Connexions, an independent non-profit research organization and information clearinghouse based in Toronto, Canada, seeks volunteer translators to translate articles, and terms in our subject index, from English to other languages. Connexions (founded 1975) maintains an online library dealing with human rights, civil liberties, social, economic and environmental alternatives, and grassroots activism. Volunteer translators may be located anywhere, since documents can be sent by email; however, volunteers living in Toronto are welcome to work out of the Connexions office along with our other volunteers and interns.
    Volunteer translators are wanted for translation into various languages, including:
    Danish, Dutch, Finnish, French, German, Italian, Norwegian, Polish, Portuguese, Spanish, Swedish, Chinese, Arabic, Farsi, Japanese, Korean, Afrikaans, Albanian, Armenian, Bengali, Bulgarian, Burmese, Czech, Esperanto, Estonian, Persian, Georgian, Hebrew, Hindi, Hungarian, Icelandic, Javanese, Latvian, Lithuania, Macdeonian, Punjabi, Romanian, Russian, Serbo-Croatian, Sinhalese, Slovak, Slovenian, Tagalog/Filipino, Tamil, Thai, Turkish, Ukrainian, Urdu, Vietnamese.
  163. Sources Calendar (October 29, 2009)
    Listings of events of interest to journalists, editors, researchers, publishers and others working in the media and in publishing, covering Canadian and international events, press conferences, meetings, festivals and holidays, as well as award deadlines.
  164. 23 IFEX members and other organisations raise concerns about proposed mechanisms to combat racial and religious intolerance (October 22, 2009)
    23 IFEX members and other organisations raise concerns about proposed mechanisms to combat racial and religious intolerance.
  165. Windows and online banking - Just say no (October 14, 2009)
    There has been a rash of online heists that have stolen millions of dollars from businesses and non-profit organizations. While circumstances are different in each case, they all point to a single point of failure: Each theft relied on the successful compromise of a Windows-based system. It was this undeniable fact that led Brian Krebs - author of the Security Fix blog which over the past month has published a series of articles detailing high-stakes bank thefts - to recommend Windows machines no longer be used by those who choose to do their banking online.
  166. Guardian gagged from reporting Parliament (October 13, 2009)
  167. Trafigura gag attempt unites house in protest (October 13, 2009)
    Efforts by the law firm Carter-Ruck to stop reporting of a Commons question about Trafigura have outraged MPs on all sides.
  168. Guardian gagged from reporting parliament (October 12, 2009)
    Today's published Commons order papers contain a question to be answered by a minister later this week. The Guardian is prevented from identifying the MP who has asked the question, what the question is, which minister might answer it, or where the question is to be found. The Guardian is also forbidden from telling its readers why the paper is prevented # for the first time in memory # from reporting parliament. Legal obstacles, which cannot be identified, involve proceedings, which cannot be mentioned, on behalf of a client who must remain secret.
  169. The Twitterest Pill (October 9, 2009)
    Who judges the legitimate and illegitimate uses of communications technology in social movements? Which networked alliances have State-sponsorship, and which ones face criminalization and State-crackdown? Social media are relying on open network access, but this openness too easily sugarcoats itself in democratic notions (participation, interactivity, freedom). At the same historic moment, we are also witnessing an expansion, integration, and refinement of sovereign police power. When the two converge we begin to see an increase in repressive intervention into, and pre-emption of, information use.
  170. BBC High Court defence against Trafigura libel suit (September 11, 2009)
    This document was submitted to the UK's High Court by the British Broadcasting Corporation (BBC) in September 2009, as a Defence against a libel claim brought against them by the oil company Trafigura. A May 2009 BBC Newsnight feature suggested that 16 deaths and many other injuries were caused by the dumping in the Ivory Coast of a large quantity of toxic waste originating with Trafigura. A September 2009 UN report into the matter stated that 108,000 people were driven to seek medical attention. This Defence, which has never been previously published online, outlines in detail the evidence which the BBC believed justified its coverage. In December 2009 the BBC settled out of court amid reports that fighting the case could have cost as much as 3 million pounds. The BBC removed its original Newsnight footage and associated articles from its on-line archives. The detailed claims contained in this document were never aired publicly, and never had a chance to be tested in court.
  171. Volunteer Translators Wanted - English to Arabic (September 4, 2009)
    Connexions, an independent non-profit research organization and information clearinghouse based in Toronto, Canada, seeks volunteer translators to translate articles, and terms in our subject index, from English to Arabic.
  172. Volunteer Translators Wanted - English to Chinese (September 4, 2009)
    Connexions, an independent non-profit research organization and information clearinghouse based in Toronto, Canada, seeks volunteer translators to translate articles, and terms in our subject index, from English to Chinese, and from English to other languages.
  173. Volunteer Translators Wanted - English to Danish (September 4, 2009)
    Connexions, an independent non-profit research organization and information clearinghouse based in Toronto, Canada, seeks volunteer translators to translate articles, and terms in our subject index, from English to Danish, and from English to other languages.
  174. Volunteer Translators Wanted - English to Dutch (September 4, 2009)
    Connexions, an independent non-profit research organization and information clearinghouse based in Toronto, Canada, seeks volunteer translators to translate articles, and terms in our subject index, from English to Dutch, and from English to other languages.
  175. Volunteer Translators Wanted - English to Farsi (September 4, 2009)
    Connexions, an independent non-profit research organization and information clearinghouse based in Toronto, Canada, seeks volunteer translators to translate articles, and terms in our subject index, from English to Farsi, and from English to other languages.
  176. Volunteer Translators Wanted - English to Finnish (September 4, 2009)
    Connexions, an independent non-profit research organization and information clearinghouse based in Toronto, Canada, seeks volunteer translators to translate articles, and terms in our subject index, from English to Finnish, and from English to other languages.
  177. Volunteer Translators Wanted - English to French (September 4, 2009)
    Connexions, an independent non-profit research organization and information clearinghouse based in Toronto, Canada, seeks volunteer translators to translate articles, and terms in our subject index, from English to French, and from English to other languages
  178. Volunteer Translators Wanted - English to German (September 4, 2009)
    Connexions, an independent non-profit research organization and information clearinghouse based in Toronto, Canada, seeks volunteer translators to translate articles, and terms in our subject index, from English to German, and from English to other languages.
  179. Volunteer Translators Wanted - English to Italian (September 4, 2009)
    Connexions, an independent non-profit research organization and information clearinghouse based in Toronto, Canada, seeks volunteer translators to translate articles, and terms in our subject index, from English to Italian, and from English to other languages.
  180. Volunteer Translators Wanted - English to Japanese (September 4, 2009)
    Connexions, an independent non-profit research organization and information clearinghouse based in Toronto, Canada, seeks volunteer translators to translate articles, and terms in our subject index, from English to Japanese, and from English to other languages.
  181. Volunteer Translators Wanted - English to Korean (September 4, 2009)
    Connexions, an independent non-profit research organization and information clearinghouse based in Toronto, Canada, seeks volunteer translators to translate articles, and terms in our subject index, from English to Korean, and from English to other languages.
  182. Volunteer Translators Wanted - English to Norwegian (September 4, 2009)
    Connexions, an independent non-profit research organization and information clearinghouse based in Toronto, Canada, seeks volunteer translators to translate articles, and terms in our subject index, from English to Norwegian, and from English to other languages.
  183. Volunteer Translators Wanted - English to Polish (September 4, 2009)
    Connexions, an independent non-profit research organization and information clearinghouse based in Toronto, Canada, seeks volunteer translators to translate articles, and terms in our subject index, from English to Polish, and from English to other languages.
  184. Volunteer Translators Wanted - English to Portuguese (September 4, 2009)
    Connexions, an independent non-profit research organization and information clearinghouse based in Toronto, Canada, seeks volunteer translators to translate articles, and terms in our subject index, from English to Portuguese, and from English to other languages.
  185. Volunteer Translators Wanted English to Spanish (September 4, 2009)
    Connexions, an independent non-profit research organization and information clearinghouse based in Toronto, Canada, seeks volunteer translators to translate articles, and terms in our subject index, from English to Spanish, and from English to other languages.
  186. Volunteer Translators Wanted - English to Swedish (September 4, 2009)
    Connexions, an independent non-profit research organization and information clearinghouse based in Toronto, Canada, seeks volunteer translators to translate articles, and terms in our subject index, from English to Swedish, and from English to other languages.
  187. Citizen media takes the stage as protests continue in Iran (June 23, 2009)
    Wth foreign media expelled from Iran, and local journalists being targeted, citizen journalists are becoming vital in covering the situation on the ground. MENASSAT interviewed Magda Abu-Fadil, Director of the Journalism Training Program at the American University of Beirut (AUB), to discuss what this means for the future of journalism
  188. 12 States Sign World's First Treaty on Access to Information (June 19, 2009)
    12 European countries today became the first states to sign the Council of Europe Convention on Access to Official Documents.
  189. Sources Select Resources (June 15, 2009)
    Reviews and information about print and online resources for journalists and researchers.
  190. Secret Documents (June 11, 2009)
    Recent stories about misplaced cabinet documents and secret memos reminded Cecil Rosner of a similar experience 25 years ago. It was one of those moments reporters seldom experience # and never forget.
  191. Directory of Public Domain Clip Art (June 6, 2009)
    The Open Clip Art Library is a collection of clip art that#s been placed in the public domain and is free to use....
  192. Swine Flu Coverage Around the World (May 28, 2009)
    The swine flu story quickly topped the American media agenda when the story broke in late April. How did coverage in other countries compare with the U.S.? Was there any correlation between the number of confirmed cases and quantity or nature of coverage? How did Spanish-language media in the U.S. react? A new report examining press coverage of the outbreak in several countries offers answers. How did coverage in the U.S. compare to media in other countries, both in the level of coverage and the way it was framed? How did the number of cases reported or the geographic proximity to the epicenter of the outbreak impact coverage? And, did the Spanish-language press in the U.S. treat the outbreak differently than its English-language counterparts?
  193. Investigating Wrongful Convictions (May 24, 2009)
    Canadian journalists have played an important role over the last half century in the investigation of high-profile wrongful convictions. But these kinds of stories take time and resources -- commodities in short supply today. Perhaps it's time to consider new models for launching these kinds of investigations.
  194. Helping you reach the media (May 14, 2009)
    Media coverage is the most valuable kind of publicity there is because it is based on the news value or information value of what you do or say, and is therefore far more credible than paid publicity like advertising. SOURCES makes it possible for organizations, institutions, companies, and individuals to reach the media effectively, consistently, and inexpensively. SOURCES has been helping organizations, companies, institutions, and individuals get media attention for over 30 years.
  195. Have new social media made 'traditional' media obsolete? (May 12, 2009)
    New media provide additional channels for getting messages out, but they don't make older media obsolete. The task is of public relations is to reach people through the media they use. In an increasingly diverse and fragmented world, that means using as many different channels of communication as possible.
  196. Doing a Lot with a Little (May 11, 2009)
    As budgets and reporting teams shrink, lessons can be learned from what a team of University of King#s College students accomplished in an investigative workshop. Fred Vallance-Jones, the project instructor, shows how a six-week project beat the provincial media to an important story.
  197. Keeping Books Safe (April 2, 2009)
    Imagine a dystopian horror tale in which virtually all books from the past were destroyed...Books that did not meet the ideologies of the publishers, the demands of the mass market, the trends of the day would be destroyed...That incredible scenario is actually playing out in terms of children's books under a law meant to protect toddlers from lead contaminant in toys. Called the Consumer Product Safety Improvement Act (CPSIA), the law was passed in August 2008 -- quickly, without scrutiny and nearly unanimously.
  198. An investigation into the serious abuses of the 'War on Terror' is imperative (March 6, 2009)
    Reporters Without Borders asks that the new Obama administration lead an investigation into the destruction of interrogation videotapes at secret prisons.
  199. The Struggle for Electronic Records (February 3, 2009)
    Journalists have been asking for electronic records from Canadian governments for at least 15 years. There have been a few encouraging developments, writes Fred Vallance-Jones, but a recent FOI audit showed we have a long way to go.
  200. Connexions Library: Science Focus (2009)
    Selected articles, books, websites and other resources on science.

Related topics in the Sources Subject Index

Expert Sources  –  Internet  –  Internet Privacy  –  Research  –  Search Engine Optimization  –  Surveillance

Sources is an online portal and directory for journalists, writers, news editors, researchers. Use Sources to find experts, media contacts, spokespersons, scientists, lobbyists, officials, speakers, university professors, researchers, newsmakers, CEOs, executive directors, media relations contacts, spokespeople, talk show guests, PR representatives, Canadian sources, story ideas, research studies, databases, universities, colleges, associations, businesses, government, research institutions, lobby groups, non-government organizations (NGOs), in Canada and internationally.
© Sources 1977-2017. The information provided is copyright and may not be reproduced in any form or by any means (whether electronic, mechanical or photographic), or stored in an electronic retrieval system, without written permission of the publisher. The content may not be resold, republished, or redistributed. Indexing and search applications by Ulli Diemer and Chris DeFreitas.