Sources Directory     A to Z Index     Topic Index News Releases     RSS Sources Select News RSS Feed     Sources Calendar    

Contact

Contact


Intelligent Search


  1. Surveillance Self-Defense (June 1, 2018)
    A guide on how online surveillance works and the various tools and techniques the public can use to help protect themselves from spying.
  2. Other Voices: The Connexions Newsletter - April 21, 2018 (April 21, 2018)
    The Internet, which was at one time a free and open space for sharing information and ideas, has been privatized and twisted to serve the profit-making agenda of huge corporations, working hand-in-glove with governments which want to suppress opposition and alternatives. What can we do about it? Is it our Internet or theirs?
  3. Facebook says it tracks non-users but doesn't 'sell people's data' (April 18, 2018)
    Facebook admits it also collects data on people who are not users of their service, yet what they do with that data is unclear.
  4. Facebook: A Cooperative Transformation (April 11, 2018)
    Facebook represents a standard for a global model of concentration of wealth and power in the 21st century, joined by companies like Google, Amazon, and Uber. Entrepreneurs with computer skills and good or lucky timing have privatized and enclosed the global information commons and have enriched themselves by providing services for free or for reduced prices to the billions.
  5. Facebook and the Rise of Anti-Social Media (April 2, 2018)
    For those who haven't thought about it, the internet is insidious because of the very capacity that Cambridge Analytica claims to be able to exploit: customization. Users have limited ability to confirm the authenticity of anything they see, read or hear on it. Print editions can be compared and contrasted-- technology limits print media to large-scale deceptions. With the capacity to create entire realms of deception -- identities, content, web pages and entire online publications, trust is made a function of gullibility.
  6. Beyond Implementation: Policy Considerations for Secure Messengers (March 30, 2018)
    The importance of secure Messenger tools goes beyond just reliable technology, it must be developed and have its infrastructure maintained by a trustworthy group with a history of responsible stewardship.
  7. Israeli hackers reportedly gave Cambridge Analytica stolen private emails of two world leaders (March 22, 2018)
    Israeli hackers reportedly gave information from the hacked emails of two world leaders to Cambridge Analytica, the political-research company at the centre of a massive Facebook-data scandal.
  8. Amazon's Initiative: Digital Assistants, Home Surveillance and Data (March 16, 2018)
    A look at technological developments such as Amazon Echo and Google Home, which are less innovations than intrusive tools utilized by big data companies to mine personal information and condition human approaches to the way information is shared.
  9. Google Is Helping the Pentagon Build AI for Drones (March 6, 2018)
    Google has partnered with the United States Department of Defense to help the agency develop artificial intelligence for analyzing drone footage, a move that set off a firestorm among employees of the technology giant when they learned of Google's involvement.
  10. 'NSA-proof' Tor actually funded by US govt agency, works with BBG, FBI & DOJ - FOIA docs (March 1, 2018)
    Newly released documents reveal that The Tor Project, a supposed safeguard against a surveillance state, has received funding from US government agency the Broadcasting Board of Governors (BBG), and cooperates with intelligence agencies.
  11. The Car of the Future Will Sell Your Data (February 20, 2018)
    As "smarter" vehicles provide storehouses of personal information, carmakers are building databases of consumer preferences that could be sold to outside vendors for marketing purposes, much like Google and Facebook.
  12. The Face Off: Law Enforcement Use of Face Recognition Technology (February 12, 2018)
    Face recognition is poised to become one of the most pervasive surveillance technologies, and law enforcement's use of it is increasing rapidly. However, the adoption of face recognition technologies like these is occurring without meaningful oversight, without proper accuracy testing of the systems as they are actually used in the field, and without the enactment of legal protections to prevent internal and external misuse.
  13. How Apple is Paving the Way to a 'Cloud Dictatorship' in China (February 10, 2018)
    Apple Inc. is set to hand over the operation of its iCloud data center in mainland China to a local corporation, but Apple has not explained the real issue. With the move a state-owned big data company controlled by the Chinese government will have access to all the data of its service users in China; this will allow the state apparatus to jump into the cloud and look into the data of Apple's Chinese users.
  14. Keep seeing Mondoweiss in your news feed following changes at Facebook (February 9, 2018)
    As most of you by now know, Facebook has recently made big changes to how users see content from publishers like Mondoweiss.
  15. Propaganda! Pardon me, is mine really bigger than yours? (February 8, 2018)
    They say Propaganda! In the West, both the mainstream media and even some of the so-called progressive outlets are shouting: "Those Russians and Chinese and the others like them, they are at it again! Their vicious propaganda is infiltrating our democratic, freedom-loving countries, spreading confusion and chaos!"

    Yes, ban or at least curb RT, contain TeleSur, and if at all possible, throw Press TV to the dogs. And put the writers of NEO, Sputnik, Global Times and other foreign outlets on that proverbial Western mass media 'no fly list'.
  16. Science's pirate queen (February 8, 2018)
    A profile of open access academic publishing activist Alexandra Elbakayan and the ongoing conflict between academics and for-profit academic publishing houses.
  17. A library without books? OSU and other universities purging dusty volumes (February 7, 2018)
    A library without books? Not quite, but as students abandon the stacks in favour of online reference material, university libraries are unloading millions of unread volumes in a nationwide purge that has some print-loving scholars deeply unsettled.
  18. Facebook announces latest step in censorship campaign, prioritizing "local news" (February 6, 2018)
    Facebook CEO Mark Zuckerberg announced that the social media giant will prioritize news from 'local sources' in the News Feed displayed to users. This is the third move this year in a roll-out of updates by Facebook aimed at censoring online information.
  19. Is political pressure behind YouTube's video labeling? (February 6, 2018)
    YouTube has started labeling videos by government-funded media after their recommendation program was the subject of a Guardian investigation and a letter from the Senate Intelligence Committee's ranking Democrat.
  20. How the internet 'punishes' Palestinians (February 2, 2018)
    Multinational tech companies, including Google, Facebook and PayPal are being accused of complicity in rights violations and in shaping false narratives with regard to policies in Palestinian territories.
  21. If you're going to blame a cyberattack on North Korea, you'd better show your work (January 24, 2018)
    Transit operator Metrolinx says it was hit by North Korean hackers. Experts want evidence
  22. An Inside Look At The Accounts Twitter Has Censored In Countries Around The World (January 24, 2018)
    BuzzFeed News has identified more than 1,700 Twitter accounts that have been blocked in at least one country. The list provides an unprecedented glimpse into Twitter's collaboration with national groups and governments -- democratic and authoritarian alike -- and provides new details about a surge in blocked accounts in Germany, France, and Turkey.
  23. For an international coalition to fight Internet censorship (January 23, 2018)
    In this open letter from the International Editorial Board of the World Socialist Web Site, the threat and consequences of internet censorship and reduction in access to information is highlighted.
  24. The War Against "Fake News" is a War on Us (January 23, 2018)
    Barely a day passes without a new development in the war on social media -- that is, the war on us. Today, it is a report that Twitter has emailed hundreds of thousands of its users, warning them that they shared "Russian propaganda".
  25. The data war behind net neutrality (January 18, 2018)
    The fight for the enormous volume of information the public generates with every search and click is the most precious commodity for big data companies, and the winner stands the most to gain with the end of Net Neutrality.
  26. Bitcoin's energy usage is huge - we can't afford to ignore it (January 17, 2018)
    A look at the use of cryptocurrency, its astonishingly high use of electrical power and why there is a need to take it seriously as a climate threat.
  27. Facebook will soon filter out RT news, so this is how you fix it… probably (January 16, 2018)
    In light of recent changes to Facebook's news feed, this RT article demonstrates what is needed to secure access to RT content.
  28. Surveillance Self-Defense (2018)
    Modern technology has given those in power new abilities to eavesdrop and collect data on innocent people. Surveillance Self-Defense is EFF's guide to defending yourself and your friends from surveillance by using secure technology and developing careful practices.
  29. Apple sued for deliberately slowing down older iPhones (December 22, 2017)
    A lawsuit was filed in California against technology giant Apple after the company admitted to slowing down their older iPhone models.
  30. The Internet is Already Broken (December 20, 2017)
    Nick Pemberton's article on the already broken internet.
  31. Adapt or Die: Millennials, Technology, and Net Neutrality (December 18, 2017)
    The Internet is changing the way we think, concentrate, and process information. Studies are showing the Internet is lowering our concentration because the Internet offers constant distractions. It’s reducing our attention span, and it’s ruining our interpersonal communication skills. Basically this technology is dehumanizing us.
  32. Broadband monopolies to censor Internet content (December 5, 2017)
    The recently released plan by the American Federal Communications Commission to abolish net neutrality has evoked mass opposition across the US and around the world.
  33. Internets Past (December 1, 2017)
    This article discusses the Internet and the problems with prevailing public concern over Net neutrality. The author advocates for an alternate way forward, and a need to bring political economy back to the agenda by viewing corporations as political actors and the technology corporations as powerful commercial players with their own agendas.
  34. Cutting Cords to Kurds: Facebook's Foreign Policy (November 28, 2017)
    The recent deletion and suspension of Facebook accounts of Kurdish supporters provides further troubling evidence that the popular social media company has been censoring the Kurdish resistance for the past five years.
  35. Google's de-ranking of RT in search results is a form of censorship and blatant propaganda (November 26, 2017)
    A commentary on the recent admission by an executive of Google's parent company (Alphabet) that special algorithms are being created to filter RTs news in order to make it appear less prominently in Google's search results.
  36. From an Open Internet, Back to the Dark Ages (November 22, 2017)
    Can anyone still doubt that access to a relatively free and open internet is rapidly coming to an end in the west? In China and other autocratic regimes, leaders have simply bent the internet to their will, censoring content that threatens their rule. But in the "democratic" west, it is being done differently. The state does not have to interfere directly -- it outsources its dirty work to corporations.
  37. Google's Eric Schmidt admits political censorship of search results (November 22, 2017)
    Recent remarks by the Executive Chairman of Google's parent company confirm charges that the company has been deliberately altering its search algorithms and taking other measures to prevent the public from accessing information that is critical of the US government.
  38. Google will 'de-rank' RT articles to make them harder to find - Eric Schmidt (November 20, 2017)
    The Executive Chairman of Google's parent company Alphabet states that the company will engineer specific algorithms for news services RT and Sputnik to make their content less prominent on the search engine's news delivery services.
  39. The Motherboard Guide to Not Getting Hacked (November 15, 2017)
    Do you want to stop criminals from getting into your Gmail or Facebook account? Are you worried about the cops spying on you? Motherboard Staff have answers on how to protect yourself. This is Motherboard's comprehensive guide to digital security, which will be regularly updated and replaces some of our old guides. This guide is also available as a printable PDF.
  40. Warning to Spanish (and Other) Whistleblowers: Anonymous Boxes which ARE NOT ANONYMOUS (November 13, 2017)
    Citizens' victories in the struggle against corruption, sometimes requiring information to be provided through safe anonymous channels like Xnet's Mailbox for reporting corruption, have catalysed a proliferation of similar initiatives within governments and institutions.
  41. Kaspersky Lab in crosshairs since exposing US & Israeli spies behind Stuxnet (November 10, 2017)
    The campaign to discredit Kaspersky Lab dates back to 2010, when the Russian-based cybersecurity firm uncovered the origin of the Stuxnet malicious computer worm which ruined Iran's nuclear centrifuges.
  42. CIA wrote code 'to impersonate' Russia's Kaspersky Lab anti-virus company, WikiLeaks says (November 9, 2017)
    WikiLeaks published documents exposing the elaborated malware suite used by the CIA to hack, record and control modern hi-tech appliances worldwide.
  43. The FBI Blindly Hacked Computers in Russia, China, and Iran (November 8, 2017)
    Recent court papers indicate that the FBI repeatedly broke into devices overseas as part of ordinary criminal investigations; in countries hostile to the U.S. this could have significant geopolitical fallout.
  44. Who’s Afraid of Corporate COINTELPRO? (November 3, 2017)
    On November 30, 2016, presumably right at the stroke of midnight, Google Inc. unpersoned CounterPunch. They didn't send out a press release or anything. They just quietly removed it from the Google News aggregator. Not very many people noticed.
  45. Confessions of a (verified) Russia-linked Twitter Bot (November 2, 2017)
    Twitter's defines any user who has "ever logged in, at any time, from Russia" as being "Russia-linked." This is taking the new McCarthyism to ridiculous levels.
  46. Racists and xenophobes find fertile ground in violent online world (October 28, 2017)
    Spend enough time hunting terrorists or wandering dystopian wastelands in online games and you're bound to come across players hurling xenophobic and racist taunts at each other -- from the openly Islamophobic in Europe to Korean and Japanese gamers bickering over disputed islands.
  47. Cowardly New World: Alternative Media Under Attack by Algorithms (October 26, 2017)
    An insidious assault is underway against alternative media on the internet. Leftist and progressive websites have been suffering significant declines in traffic. Some have had online income sources cut. Many others have been publicly defamed.
    The only voices speaking the truth, says Kollibri terre Sonnenblume, are those on the fringes and we must amplify them however we can. Some suggestions:
    * Read/view alternative media stories and share them in whatever venues you can.
    * Stop consuming mainstream media and stop posting links to it.
    * Actively support alternative media by donating money, time or other resources.
    * Stop using Google as your search engine; I recommend DuckDuckGo. You will be surprised at how much you've been missing.
    * Become the media: take your own photos or video and write up stories yourself for whatever outlet will take your work, even if that's only your own blog.
  48. Pay to play: Facebook rolls out nightmare scenario for publishers on its network (October 24, 2017)
    Proposed changes to the way Facebook handles posts from publishers and businesses may result in publishers having to pay Facebook to promote their stories so that people can see them.
  49. 'Pay to play': Facebook rolls out nightmare scenario for publishers on its network (October 24, 2017)
    Facebook is testing out a change to their network in six markets. As a result, posts from some publishers and businesses will be removed from the site's News Feed section. The change has caused a dramatic drop in referral traffic to news outlets.
  50. The conspiracy to censor the Internet (October 18, 2017)
    The political representatives of the American ruling class are engaged in a conspiracy to suppress free speech. Under the guise of combating "trolls" and "fake news" supposedly controlled by Russia, the most basic constitutional rights enumerated in the First Amendment are under direct attack.
  51. 'Fake news' or free speech: Is Google cracking down on left media? (October 18, 2017)
    Left leaning progressive websites say they are being unfairly penalized by Google's efforts to stamp out fake news.
  52. Germany's Network Enforcement Act: Legal framework for censorship of the Internet (October 5, 2017)
    On October 1, 2017, the Network Enforcement Act took effect in Germany. Under the cover of a fight against "fake news" and "hate speech," it creates a legal framework for censorship of the Internet.
  53. Sources News Releases (September 11, 2017)
    News releases from organizations and companies on a wide range of topics. Includes an extensive topic index, an archive of releases going back to the 1970s, and links to experts and organizations knowledgeable about the issues covered in the releases. Available via RSS feed as well as on the Sources.com website.
  54. CIA sneak undetectable 'malicious' implants onto Windows OS - WikiLeaks (September 1, 2017)
    Windows machines are targeted by the CIA under 'Angelfire,' according to the latest release from WikiLeaks' 'Vault7' series. The documents detail an implant that can allow Windows machines to create undetectable libraries.
  55. NSA's Cyberwarfare Blowback (September 1, 2017)
    In May and June 2017, hackers took over thousands of computers around the world, encrypted their contents, and demanded ransom to decrypt them. They used tools developed by the National Security Agency (NSA) to exploit vulnerabilities in the Microsoft Windows operating system.
  56. Car remotely deactivated after Quebec teen refuses to pay for removal of GPS device (August 28, 2017)
    A Quebec teenager's car was remotely deactivated by a dealership after he refused to pay to remove a GPS tracking device -- one that he never wanted installed in the first place.
  57. Google's new advertising program tracks offline line shoppers, violates privacy (August 2, 2017)
    The privacy watchdog Electronic Privacy Information Center (EPIC) filed a formal complaint against Google alleging that the company's new advertising program violates consumer privacy.
  58. Google's new search protocol is restricting access to 13 leading socialist, progressive and anti-war web sites (August 2, 2017)
    New data suggests that the implementation of changes in Google's search evaluation protocols resulted in a massive loss of readership of socialist, anti-war and progressive web sites.
  59. How Threats Against Domain Names Are Used to Censor Content (July 27, 2017)
    A summary of a whitepaper released by EFF titled "Which Internet registries offer the best protection for domain owners?", outlining important points to consider, such as the policies of the registry that operates the domain.
  60. HMS Queen Elizabeth aircraft carrier runs on Windows XP, vulnerable to cyberattack (June 27, 2017)
    The first of Britain's two brand new aircraft carriers runs on outdated Windows XP software that may be vulnerable to cyberattack.
  61. The World Center of Hacking is in Washington, Not Moscow or Beijing (June 9, 2017)
    Documents from the U.S. NSA (National Security Agency) unveiled by Edward Snowden show that whole countries, not just a number of sensitive computers, have been hacked by the NSA.
  62. How to Access Digital Files from the Nineties (April 7, 2017)
    In this step-by-step, digital archivist Tim Walsh demonstrates how to access decades old files.
  63. Digital Privacy at the U.S Border: A New How-To Guide from EFF (March 27, 2017)
    A new guide released by the Electronic Frontier Foundation (EFF) gives travelers the facts they need in order to prepare for border crossings while protecting their digital information.
  64. Real-Time Face Recognition Threatens to Turn Cops' Body Cameras Into Surveillance Machines (March 22, 2017)
    For years, the development of real-time face recognition has been hampered by poor video resolution, the angles of bodies in motion, and limited computing power. But as systems begin to transcend these technical barriers, they are also outpacing the development of policies to constrain them. Civil liberties advocates fear that the rise of real-time face recognition alongside the growing number of police body cameras creates the conditions for a perfect storm of mass surveillance.
  65. WikiLeaks Vault 7 Reveals CIA Cyberwar and the Battleground of Democracy (March 17, 2017)
    WikiLeaks dropped a bombshell on the U.S. Central Intelligence Agency. Code-named “Vault 7”, the whistleblowing site began releasing the largest publication of confidential documents that have come from the top secret security network at the Cyber Intelligence Center.
  66. Connexions Quotations (2017)
    A selection of quotations about social change, resistance, solidarity, and many other topics. Compiled by Ulli Diemer. Each quote has been turned into an image file.
  67. EFF To Canadian Court: Order Allowing Worldwide Censorship of Google Search Results Violates Users' Free Speech Rights (December 15, 2016)
    On Dec. 6, 2016, the Electronic Frontier Foundation will tell Canada's highest court that an overbroad court order that censors Google search results for users everywhere violates our rights to freely search the web without government interference.
  68. Internet Archive Received National Security Letter with FBI Misinformation about Challenging Gag Order (December 15, 2016)
    The Internet Archive published a formerly secret National Security Letter (NSL), highlighting misinformation in the letter about the process for challenging the contents of the NSL, impacting many communications providers who have received such NSLs.
  69. New Privacy Badger Upgrades Help Protect Your Online Holiday Shopping from Sneaky Data Collection (December 15, 2016)
    The Electronic Frontier Foundation (EFF) today released Privacy Badger 2.0 - a free browser extension for Chrome, Firefox, and Opera with new upgrades to help protect shoppers from online tracking.
  70. Facebook, Twitter, Google and Microsoft team up to tackle extremist content (December 6, 2016)
    Tech companies plan to create a shared database of 'unique digital fingerprints' that will able to identify images and videos promoting terrorism and extremist content.
  71. Apple Logs Your iMessage Contacts - and May Share Them With Police (September 28, 2016)
    Apple promises that your iMessage conversations are safe and out of reach from anyone other than you and your friends. But according to a document obtained by The Intercept, your blue-bubbled texts do leave behind a log of which phone numbers you are poised to contact and shares this (and other potentially sensitive metadata) with law enforcement when compelled by court order.
  72. New Film Tells the Story of Edward Snowden; Here Are the Surveillance Programs He Helped Expose (September 16, 2016)
    Oliver Stone's latest film, "Snowden," bills itself as a dramatized version of the life of Edward Snowden, the NSA whistleblower who revealed the global extent of U.S. surveillance capabilities.
  73. Delta says 740 flights cancelled after worldwide system outage (August 8, 2016)
    Delta Air Lines says it has cancelled 740 flights after a power outage that began overnight knocked out its computer systems and operations worldwide.
  74. Hackers can record everything you type on certain wireless keyboards (July 27, 2016)
    A computer security research team has identified a weakness in several brands of low-cost wireless keyboards that could allow hackers to view and record every word, number and password typed by a user from up to about 75 metres away. According to Bastille, an Atlanta-based research team, eight wireless keyboards made by companies such as Hewlett-Packard, Radio Shack and Toshiba send keystroke data from the board to the USB dongle that connects to your computer without the encryption needed to mask what someone is typing.
  75. Open Source Software: a necessary tool to build our movements | What's Left (July 25, 2016)
    Software companies are exploitative and other companies should invest in unionized products, condem work to lower wages and act in solidarity with other workers in the software industry.
  76. Snowden leak: MI5 has gathered so much data it may actually be missing 'life-saving intelligence' (June 8, 2016)
    British spies may have missed potentially "life-saving intelligence" because their surveillance systems were sweeping up more data than could be analyzed, a leaked classified report reveals. The document, given to The Intercept by NSA whistleblower Edward Snowden, was sent to top British government officials, outlining methods being developed by the UK’s domestic intelligence agency, MI5, to covertly monitor internet communications.
  77. Google voice search records and keeps conversations people have around their phones - but the files can be deleted (June 1, 2016)
    How google search can record and store conversations picked up by a phone's microphone, as well as how to prevent this and delete the stored files.
  78. OCCRP Launches New Search Engine for Investigative Journalists (May 30, 2016)
    The Organized Crime and Corruption Reporting Project (OCCRP), a non-profit network of investigative journalism centers in Europe and Eurasia, has launched a new data platform to enable journalists and researchers to sift more than 2 million documents and use the findings in their investigations. People using the new data platform, called ID Search, will be able to set up email alerts notifying them when new results appear for their searches or for persons tracked on official watchlists. They can also create their own private watchlists.
  79. Dear "Skeptics," Bash Homeopathy and Bigfoot Less, Mammograms and War More (May 16, 2016)
    So I'm a skeptic, but with a small S, not capital S. I don’t belong to skeptical societies. I don’t hang out with people who self-identify as capital-S Skeptics. Or Atheists. Or Rationalists. When people like this get together, they become tribal. They pat each other on the back and tell each other how smart they are compared to those outside the tribe. But belonging to a tribe often makes you dumber.
  80. New Study Shows Mass Surveillance Breeds Meekness, Fear and Self-Censorship (April 28, 2016)
    A newly published study from Oxford's Jon Penney provides empirical evidence for a key argument long made by privacy advocates: that the mere existence of a surveillance state breeds fear and conformity and stifles free expression. Reporting on the study, the Washington Post this morning described this phenomenon: "If we think that authorities are watching our online actions, we might stop visiting certain websites or not say certain things just to avoid seeming suspicious."
  81. Who's downloading pirated papers? Everyone (April 28, 2016)
    Researchers are increasingly turning to Sci-Hub, the world's largest largest 'pirate' website for scholarly literature. Sci-Hub is becoming the world's de facto open-access research library.
  82. UC Davis spent $175,000 to scrub online pepper spray references (April 13, 2016)
    The University of California, Davis, contracted with consultants for at least $175,000 to scrub the Internet of negative online postings following the November 2011 pepper spraying of students and to improve the reputations of both the university and Chancellor Linda P.B. Katehi, newly released documents show.
  83. EFF to Copyright Office: Improper Content Takedowns Hurt Online Free Expression (April 10, 2016)
    Safe Harbors Work for Rightsholders and Service Providers. Content takedowns based on unfounded copyright claims are hurting online free expression, says Electronic Frontier Foundation (EFF).
  84. Nest's move to stop supporting Revolv smart hub leaves customers with costly 'brick' (April 6, 2016)
    Here's a major downside to the so-called Internet of Things -- companies can potentially disconnect your smart devices and leave them essentially useless at any time.
  85. The cyber arms race (April 1, 2016)
    A look at cyber warfare between nations, a militarisation of cyberspace that is advancing far faster than the creation of positive peace keeping mechanisms.
  86. The security - digital complex (April 1, 2016)
    With the rise of the Internet and the globalisation of electronic data, there has been a shift in the university-military-industrial complex to a new security-digital complex -- a public-private hybrid that is both narrower and more far-reaching.
  87. EFF and Partners Support Media Monitoring Service in Fight for Fair Use (March 27, 2016)
    A media monitoring service that creates a text-searchable database of television and radio content is defending its fair use rights before a federal appeals court.
  88. Revealed: how facial recognition has invaded shops – and your privacy (March 25, 2016)
    Retailers are using ever more sophisticated software to watch how consumers shop.
  89. The hubris of investigators (March 24, 2016)
    A now-vacated hearing over whether to require Apple to undermine the security of its users prompted an ongoing controversy over government access to encrypted devices. While the court in San Bernardino may never rule on the flood of arguments supporting Apple's defense of user security, observers-- especially members of Congress-- should pay close attention to a few themes that have emerged in the public debate.
  90. Meet the Robin Hood of Science (February 14, 2016)
    The tale of how one researcher has made nearly every scientific paper ever published available for free to anyone, anywhere in the world. On September 5th, 2011, Alexandra Elbakyan, a researcher from Kazakhstan, created Sci-Hub, a website that bypasses journal paywalls, providing access to nearly every scientific paper ever published immediately to anyone who wants it.
  91. Chaos Computer Club: Europe's biggest hackers' congress underway in Hamburg (December 28, 2015)
    Some 12,000 hackers are challenging the power of Google, Facebook and Youtube to filter information and shape users' view of the world. One of them demonstrated how to hack into VW's cheating software.
  92. The Digital Dark Ages: Movies and Books Get Deleted as Selfies Pile Up (December 22, 2015)
    Historians and archivists call our times the "digital dark ages." The name evokes the medieval period that followed the collapse of the Roman Empire, which led to a radical decline in the recorded history of the West for 1000 years. But don't blame the Visigoths or the Vandals. The culprit is the ephemeral nature of digital recording devices. Remember all the stuff you stored on floppy discs, now lost forever? Over the last 25 years, we've seen big 8" floppies replaced by 5.25" medium replaced by little 3.5" floppies, Zip discs and CD-ROMs, external hard drives and now the Cloud -- and let's not forget memory sticks and also-rans like the DAT and Minidisc.
  93. Onlinecensorship.org Tracks Content Takedowns by Facebook, Twitter, and Other Social Media Sites (November 27, 2015)
    The Electronic Frontier Foundation (EFF) and Visualizing Impact launched Onlinecensorship.org on November 19, 2015, a new platform to document the who, what, and why of content takedowns on social media sites.
  94. 'Worse Than We Thought': TPP A Total Corporate Power Grab Nightmare (November 5, 2015)
    On issues ranging from climate change to food safety, from open Internet to access to medicines, the TransPacific Partnership (TPP) is a disaster.
  95. Insurance and the orgin of big data (November 1, 2015)
    A historical look at the origins of 'Big Data' and the collection of personal information by corporate America in the early 20th century.
  96. Towards a two-tiered knowledge society (August 27, 2015)
    On the Conservative government's actions to reduce Internet access and library access to a large portion of the population.
  97. Medical Privacy Under Threat in the Age of Big Data (August 6, 2015)
    Medical privacy is a high-stakes game, in both human and financial terms, given the growing multibillion-dollar legal market for anonymized medical data. The threats to individuals seeking to protect their medical data can come externally, from data breaches; internally, from "rogue employees" and others with access; or through loopholes in regulations.
  98. Why Facebook Failed Our Censorship Test (June 18, 2015)
    If you click around Facebook's "Government Request Report," you'll notice that, for many countries, Facebook enumerates the number of "content restrictions" the company has fulfilled. This is a sanitized term for censorship.
  99. Improbable libraries: unusual places to bury your head in a book (April 12, 2015)
    Alex Johnson looks at the imaginative forms the modern library takes.
  100. Documents Reveal Canada's Secret Hacking Tactics (March 23, 2015)
    Canada's electronic surveillance agency has secretly developed an arsenal of cyberweapons capable of stealing data and destroying adversaries' infrastructure, according to newly revealed classified documents. Communications Security Establishment, or CSE, has also covertly hacked into computers across the world to gather intelligence, breaking into networks in Europe, Mexico, the Middle East and North Africa, the documents show.
  101. Snowden's NSA Leaks Catalogued In First Searchable Database Of The Surveillance Documents (March 12, 2015)
    Canadian journalists and researchers have teamed up to create the world's first fully-searchable index of the classified documents revealing NSA surveillance leaked by whistleblower Edward Snowden.
  102. Edward Snowden's Warning to Canada (March 4, 2015)
    Whistleblower Edward Snowden talks about Bill C-51 and the weak oversight of Canada's intelligence agencies.
  103. Why I'm Saying Goodbye to Apple, Google and Microsoft (February 25, 2015)
    Gillmor discusses how we are losing control over the technology tools that once promised equal opportunity in speech and innovation.
  104. The Great SIM Heist: How Spies Stole the Keys to the Encryption Castle (February 19, 2015)
    American and British spies hacked into the internal computer network of the largest manufacturer of SIM cards in the world, stealing encryption keys used to protect the privacy of cellphone communications across the globe, according to top-secret documents provided by National Security Agency whistleblower Edward Snowden.
  105. Secret 'BADASS' Intelligence Program Spied on Smartphones (January 26, 2015)
    British and Canadian spy agencies accumulated sensitive data on smartphone users, by piggybacking on ubiquitous software from advertising and analytics companies, according to a document obtained by NSA whistleblower Edward Snowden.The document outlines a secret program run by the intelligence agencies called BADASS.
  106. Cory Doctorow Rejoins EFF to Eradicate DRM Everywhere (January 21, 2015)
    Leading digital rights champion and author Cory Doctorow has rejoined the Electronic Frontier Foundation (EFF) to battle the pervasive use of dangerous digital rights management (DRM) technologies that threaten users' security and privacy.
  107. How Verizon and Turn Defeat Browser Privacy Protections (January 14, 2015)
    Verizon advertising partner Turn is using Verizon Wireless's UIDH tracking header to resurrect deleted tracking cookies and share them, forming a vast web of non-consensual online tracking. The tehcnology makes it impossible for customers to control their online privacy.
  108. The Turn-Verizon Zombie Cookie (January 14, 2015)
    Discussion of Verizon's "supercookie," a header that tracks mobile subscribers, even if they have opted out, cleared their cookies, or entered private browsing mode.
  109. New copyright law is already being abused to threaten Canadian Internet users with ridiculous penalties for downloading (January 8, 2015)
    Less than a week after new copyright rules went into effect in Canada, ISPs are already receiving notices from Big Media giants that contain misleading and threatening statements, according to top copyright expert Professor Michael Geist.
  110. What Is the Trans-Pacific Partnership Agreement (TPP)? (2015)
    The Trans-Pacific Partnership (TPP) is a secretive, multinational agreement that, among other things, threatens to extend restrictive intellectual property (IP) laws across the globe and rewrite international rules on its enforcement.
  111. We've got our eye on you (November 1, 2014)
    Edward Snowden not only told the world about US state surveillance of national and personal secrets, he reminded us that almost all the companies surveying us for commercial gain are American.
  112. Fake cell phone 'towers' may be spying on Americans' calls, texts (September 3, 2014)
    More than a dozen 'fake cell phone towers' could be secretly hijacking Americans' mobile devices in order to listen in on phone calls or snoop on text messages, a security-focused cell phone company claims. It is not clear who controls the devices.
  113. An alternative media list (September 1, 2014)
    A selective list of English-language alternative media.
  114. Police State: US Government-Funded Database Created to Track "Subversive Propaganda" Online (August 30, 2014)
    The creation of the Truthy database by Indiana University researchers has drawn sharp criticism from free-speech advocates and others concerned over government censorship of political expression.
  115. Corporations Spy on Nonprofits with Impunity (August 25, 2014)
    Here's a dirty little secret you won't see in the daily papers: corporations conduct espionage against US nonprofit organizations without fear of being brought to justice.
  116. An Online Tracking Device That’s Virtually Impossible to Block (August 15, 2014)
    A new kind of tracking tool, canvas fingerprinting, is being used to follow visitors to thousands of top websites, from WhiteHouse.gov to YouPorn.
  117. The Price of Books, The Value of Civilization (August 1, 2014)
    I have come to think that books occupy this valuable position in our civilisation because they are the only medium for thick descriptions of the world that human beings possess. By ‘thick’ description, I mean an extended, detailed, evidence-based, written interpretation of a subject. If you want to write a feature or blog or wikipedia entry, be it about the origins of the first world war; the authoritarian turn in Russia; or the causes and effects of the 2008 financial crisis, in the end you will have to refer to a book. Or at least refer to other people who have referred to books. Even the best magazine pieces and TV documentaries – and the best of these are very good indeed – are only puddle-deep compared with the thick descriptions laid out in books. They are ‘thin’ descriptions and the creators and authors of them will have referred extensively to books to produce their work.
  118. Google doesn't want you to limit its ability to follow you around the internet (July 26, 2014)
    Behind our screens, tech companies are racing to extract a price for what we read and watch on the web: our personal information.
  119. Forward Secrecy Brings Better Long-Term Privacy to Wikipedia (July 9, 2014)
    Wikipedia readers and editors can now enjoy a higher level of long-term privacy, thanks to the Wikimedia Foundation's rollout last week of forward secrecy on its encrypted connections.
  120. Canadian Court to the Entire World: No Links For You! (June 20, 2014)
    The Supreme Court of British Columbia has ordered Google to remove entire domains from its search results — a decision that could have enormous global implications on free expression. This is the latest of several instances of courts claiming dangerous jurisdictional overreach, where they have applied local laws to remove content on the Internet.
  121. The Loneliest Library in the World (June 13, 2014)
    At 73, P.V. Chinnathambi runs one of the loneliest libraries anywhere. In the middle of the forested wilderness of Kerala’s Idukki district, the library’s 160-books — all classics — are regularly borrowed, read, and returned by poor, Muthavan adivasis.
  122. Tor is for Everyone (June 13, 2014)
    EFF recently kicked off their second Tor Challenge, an initiative to strengthen the Tor network for online anonymity and improve one of the best free privacy tools in existence. This is great news, but how does it affect you? To understand that, we have to dig into what Tor actually is, and what people can do to support it.
  123. Marx and Engels Belong to the Workers of the World (May 30, 2014)
    Lawrence & Wishart, the British publisher of the Collected Works of Karl Marx and Friedrich Engels (MECW), has compelled the Marxists Internet Archive to remove free digital versions of this 50-volume treasure from its Web site. This step is meant to further the publisher’s pursuit of private, profitable licenses with paying customers.
  124. 2013-14 Review of Free Expression in Canada (May 3, 2014)
    Evaluates people, policies and institutions that help and hinder freedom of expression. The 2013-14 Review of Free Expression in Canada contains feature articles about some of the most pressing areas of free expression, such as access to information, digital surveillance, and the failure to protectwhistleblowers. Also: a Report Card and Cross-Canada Reports.
  125. FCC Wants to Give Corporations Their Own Internet (April 29, 2014)
    When a federal court trashed its “net neutrality” compromise policy in January, the Federal Communications Commission assured us that the Internet we knew and depended on was safe. Most activists didn’t believe federal officials and this past week the FCC demonstrated how realistic our cynicism was.
  126. Without Intellectual Property Day (April 26, 2014)
    As the saying goes, though: when you're a hammer, everything looks like a nail. For the World Intellectual Property Organization, it may seem like creativity and "intellectual property" are inextricably linked. That's not the case. In the spirit of adding to the conversation, we'd like to honor all the creativity and industry that is happening without a dependence on a system intellectual property.
  127. Journalistic Autonomy in Denmark. A Study (April 17, 2014)
    A new study that looks at the subject of autonomy in the Danish media found that journalists in Denmark feel they have nearly complete freedom to make important choices concerning their work and the content they produce.
  128. Why the Web Needs Perfect Forward Secrecy More Than Ever (April 8, 2014)
    If a server is configured to support forward secrecy, then a compromise of its private key can't be used to decrypt past communications.
  129. A Short History of Spam (March 14, 2014)
    Objects can talk in cartoons and fairy tales: toys tell their stories. Now our domestic appliances have begun to speak, and they would like to sell us pills and porn, and for us to give them our bank details.
  130. Optic Nerve (February 28, 2014)
    Britain's surveillance agency GCHQ, with aid from the US National Security Agency, intercepted and stored the webcam images of millions of internet users not suspected of wrongdoing, secret documents reveal.
  131. Noah's ark was round – so the ancient tablet tells us (February 11, 2014)
    Irving Finkel, curator of the British Museum's 130,000 Mesopotamian clay tablets, has spent 20 years investigating one that challenges the story of Noah and the flood.
  132. Selling your Secrets (February 7, 2014)
    The documents released by whistleblower Edward Snowden reveal that the world of NSA mass surveillance involves close partnerships with a series of companies most of us have never heard of that design or probe the software we all take for granted to help keep our digital lives humming along.
  133. Loss of Librarians Devastating to Science and Knowledge in Canada (January 28, 2014)
    The closure of federal libraries and loss of specialized librarians impacts negatively on the state of science and knowledge in Canada.
  134. NSA, GCHQ mapping "political alignment" of cellphone users (January 28, 2014)
    New information made public by Edward Snowden reveals that the governments of the United States and United Kingdom are trawling data from cellphone “apps” to accumulate dossiers on the “political alignments” of millions of smartphone users worldwide.
  135. Smartphone Game Data Targeted by NSA (January 28, 2014)
    Millennial Media, a Baltimore based ad company, creates “intrusive” profiles of users of smartphone applications and games like Angry Birds, according to documents leaked to the media by whistleblower Edward Snowden. Such profiles have been exploited by intelligence authorities like the U.S. National Security Agency (NSA), say investigative journalists.
  136. Spread of knowledge in peril as Canada shuts federal department libraries (January 24, 2014)
  137. NHS Patient Data to be Made Available for Sale to Drug and Insurance Firms (January 19, 2014)
    Drug and insurance companies will from later this year be able to buy information on patients once a single English database of medical data has been created. Privacy experts warn there will be no way for public to work out who has their medical records or how they are using it.
  138. Museum and Gallery Curators Reopen the Cabinet of Curiosities Concept (January 13, 2014)
    Stuffed pelicans, bell-jarred oddities and unicorn horns: the wunderkammer – or 'cabinet of curiosities' – is a macabre, colonial throwback. So why is it back in vogue?
  139. Silence of the Labs (January 10, 2014)
    Scientists across the country are expressing growing alarm that federal cutbacks to research programs monitoring areas that range from climate change and ocean habitats to public health will deprive Canadians of crucial information.
  140. Canada's Science Library Closures Mirror Bush's Playbook (January 9, 2014)
    The Harper government is now eliminating seven Department of Fishery libraries containing one of the world's most comprehensive collections of information on fisheries, aquatic sciences and nautical sciences.
  141. DFO Library Closures Anger Scientific Community (January 9, 2014)
    When word first broke that the Department of Fisheries and Oceans was closing seven of their libraries, government officials promised that there would be no loss of vital historical material. Today many are skeptical of those claims.
  142. Eric Marshall laments closure of namesake Fisheries library (January 6, 2014)
    The government seems to be saying 'We want to exploit our natural resources, whether it's natural gas or oil sands, and basically to heck with environmental impacts.'
  143. Secret Memo Casts Doubt on Feds' Claims for Science Library Closures (December 30, 2013)
    A federal document marked "secret" obtained by Postmedia News indicates the closure or destruction of more than half a dozen world famous science libraries has little if anything to do with digitizing books as claimed by the Harper government.
  144. What's Driving Chaotic Dismantling of Canada's Science Libraries? (December 23, 2013)
    Scientists say the closure of some of the world's finest fishery, ocean and environmental libraries by the Harper government has been so chaotic that irreplaceable collections of intellectual capital built by Canadian taxpayers for future generations has been lost forever. Many collections ended up in dumpsters while others such as Winnipeg's historic Freshwater Institute library were scavenged by citizens, scientists and local environmental consultants. Others were burned or went to landfills.
  145. A million first steps (December 12, 2013)
    We have released over a million images onto Flickr Commons for anyone to use, remix and repurpose. These images were taken from the pages of 17th, 18th and 19th century books digitised by Microsoft who then generously gifted the scanned images to us, allowing us to release them back into the Public Domain.
  146. NSA Turns Cookies (And More) Into Surveillance Beacons (December 11, 2013)
    These Google cookies - known as 'PREF' cookies - last two years and can uniquely identify you. The NSA is using this to enable remote exploitation (hacking into people’s computers) - an act aided by the ability to uniquely identify individuals on the Internet.
  147. Dismantling of Fishery Library 'Like a Book Burning,' Say Scientists (December 9, 2013)
    The Harper government has dismantled one of the world's top aquatic and fishery libraries as part of its agenda to reduce government as well as limit the role of environmental science in policy decision-making.
  148. Scientists pledge to boycott Elsevier (December 5, 2013)
    Following the retraction of the Seralini et al scientific paper which found health damage to rats fed on GM corn, over 100 scientists have pledged in this Open Letter to boycott Elsevier, publisher of the journal responsible.
  149. Iron Cagebook (December 3, 2013)
  150. Activist archiving in Toronto (November 28, 2013)
    People gather in Toronto to discuss what many hope will grow into a movement for archiving grassroots histories.
  151. Unmasking the Five-Eyed monster, a global and secret intelligence-sharing regime (November 27, 2013)
    Privacy International is proud to announce our new project, Eyes Wide Open, which aims to pry open the Five Eyes arrangement and bring it under the rule of law.
  152. Moving 750 million pages of print archive to a new home (November 22, 2013)
    For 82 years, researchers have made the journey to Colindale in north London, the home of the British Newspaper Library, a vast collection of almost every British newspaper published in the last 300 years. Across six floors and 50 kilometres of shelving sit not only the well-known national papers, but also a vast collection of now obscure regional titles.
  153. Harper's Seven-Year War on Science (November 1, 2013)
  154. What Are Your Options Now For Secure Email? (August 9, 2013)
    It's shockingly, disturbingly easy for the government to snoop on your emails. Here are your weapons in the fight for your email privacy.
  155. How the FBI Turned Me On to Rare Books (July 30, 2013)
    I have wanted to be a historian of hope. We can take heart from the fact that no matter how dire the situation, some will find means to resist, some will find means to cope, and some will remember and tell stories about what happened.
  156. The Corporate State and Manufactured Dependence (June 7, 2013)
    The 'resistance is futile' mindset that supports plutocrats and the global corporations they own assumes the existing order is the only possible order and the costs of resistance are too great because 'they' have state power and unlimited economic resources on their side.
  157. Social Networking and the Death of the Internet (May 8, 2013)
    Social Networking is, by its nature, a capture environment. The companies that offer the services, particularly Facebook, host your site and control all the information on it. Facebook — a group of linked pages on a giant website — is constraining and not very powerful. In order to use it, you have to use it the way they want you to and that’s not a whole lot of “using”. But there is a comfort in having one’s options limited, being able to use something without learning anything about it or making many choices about how you use it. That alluring convenience is a poisoned apple, however.
  158. The Case for Grassroots Archives (May 2, 2013)
    Grassroots archives play a valuable role in what has been called "the battle of memory". People's history projects such as grassroots archives preserve and share stories of resistance, hidden histories, and alternative visions.
  159. Where the free software movement went wong-and how to fix it. (April 6, 2013)
    Finley discusses the differences between Free Software and OpenSource software from a political perspective.
  160. Oxfam donates archive to the Bodleian Libraries (February 25, 2013)
    Oxford-based international development charity Oxfam has announced it has donated the organization’s archive, spanning the last seventy years, to the University of Oxford’s Bodleian Libraries. Now, with a substantial grant from the Wellcome Trust, a four-and-a-half-year project is underway at the Bodleian to catalogue Oxfam’s extensive records and make them more accessible.
  161. Google and the future of search: Amit Singhal and the Knowledge Graph (January 19, 2013)
    An interview with the current head of Google Search, discussing some of the thought processes behind the current functionality of 'search' and some of its possibilites for the future.
  162. How To Verify Information and Debunk Myths Using Online Tools (2013)
    Did Pope Francis play a major role in Argentina’s Dirty War? Reporters published photos of dictator Jorge Videla with a cardinal, allegedly with Jorge Bergoglio, the recently elected Pope Francis. But something was wrong with these reporters’ findings. Henk van Ess explains how the internet can help you to debunk the internet.
  163. Facebook bans developer of F.B. Purity (December 19, 2012)
  164. Facebook forces Instagram users to allow it to sell their uploaded photos (December 18, 2012)
    Move means pictures could be used in advertising, with all payments going to social media giant.
  165. Anti-Science: Left and Right Together? (December 11, 2012)
    The suggestion that left and right thinking may be converging on matters scientific will, no doubt, be offensive to some on the left. After all, the right chooses myth over evolution, and oil profits over climate science.
  166. EU: Enact Controls on Digital Weapons Trade (December 11, 2012)
    Unregulated Export of Powerful Surveillance Tools Threatens Internet Freedom. Reporters Without Borders and Human Rights Watch call on the European Union to enact new controls on Internet surveillance and censorship technologies. Repressive governments use these technologies to enable human rights violation.
  167. Grassroots archive information sheet (November 24, 2012)
    Connexions is working on a project to help network grassroots archives and collections of materials about activist and radical history. If you have a collection of social justice materials in your basement/locker, etc., and would like to participate in an exploration of co-operative archiving and/or searching for shared space, please fill out this form and email it to Connexions.
  168. Memory as Resistance: Grassroots Archives and the Battle of Memory (November 2, 2012)
    CONNEXIONS and Beit Zatoun are spotlighting grassroots archives this November with an open house and networking event November 24, a talk and discussion November 27, and an exhibit (November 16-27).
  169. Selected Archive Projects (October 18, 2012)
    A list of some archive projects concerned with grassroots movements for social justice.
  170. Seven pilot sites join national digital library project with Knight Foundation funding (October 12, 2012)
  171. Eric Hobsbawm 1917-2012 (October 1, 2012)
    The historian Eric Hobsbawm dies at 95.
  172. US Military Brands Assange, WikiLeaks As "The Enemy" (September 28, 2012)
    Secret US Air Force documents reveal that the American military has branded WikiLeaks and its editor Julian Assange as "the enemy", placing them on a legal par with Al Qaeda and threatening them with the same treatment: indefinite detention without trial, and death.
  173. False positives: fraud and misconduct are threatening scientific research (September 13, 2012)
    Better detection tools and a rising retraction rate suggest scientific fraud may be widespread.
  174. Is that an archive in your basement... or are you just hoarding? (August 31, 2012)
    Are you an 'accidental archivist'? Have you been saving the publications and documents produced by the social justice projects you've been involved in? Then Connexions would like to hear from you.
  175. The New Police Surveillance State (July 31, 2012)
    Police are increasingly being deployed to restrict if not prevent mass political actions, especially directed at the banks.
  176. Trying to change the world? (July 23, 2012)
    Getting your story across is an uphill battle when you’re challenging the status quo.
    SOURCES can help you get your message out.
  177. 'The Death of Evidence' in Canada: Scientists' Own Words (July 16, 2012)
  178. Museum of Endangered Sounds enshrines audio from bygone era (June 29, 2012)
    A website preserves outmoded electronic sounds that are lost to the world.
  179. Data Mining You (April 3, 2012)
    Joseph K., that icon of single-lettered anonymity from Franz Kafka’s novel The Trial, would undoubtedly have felt right at home in Washington.
  180. WikiLeaks Begins Publishing 5 Million Emails From STRATFOR (February 27, 2012)
  181. Case study: a closer look at community partnerships (2012)
  182. Email privacy (2012)
    Email privacy is the broad topic dealing with issues of unauthorized access and inspection of electronic mail. This unauthorized access can happen while an email is in transit, as well as when it is stored on email servers or on a user computer. In countries with a constitutional guarantee of the secrecy of correspondence, whether email can be equated with letters and get legal protection from all forms of eavesdropping comes under question because of the very nature of email. This is especially important as more and more communication occurs via email compared to postal mail.
  183. Domestic reality does not match bold words on Internet freedom of expression (November 2, 2011)
    The U.S. government gives lip service to online free speech but simultaneously acts in ways to drastically limit freedom of expression.
  184. Get your head out of the clouds (May 6, 2011)
    Appraising the risks to personal data held in cloud computing systems.
  185. The Information Sage (May 1, 2011)
  186. Google a great painting (February 11, 2011)
    Google's Art Project allows viewers to browse works from 17 museums including the Metropolitcan Museum, MoMA, The National Gallery, Tate Britain and others in super-high resolution.
  187. BBC Joins Smear Campaign Against Assange and Wikileaks (February 1, 2011)
    The campaign by the establishment press against Julian Assange is intensifying.
  188. The Internet's Unholy Marriage to Capitalism (2011)
    The economic context points to the paradox of the Internet as it has developed in a capitalist society. The Internet has been subjected, to a significant extent, to the capital accumulation process, which has a clear logic of its own, inimical to much of the democratic potential of digital communication, and that will be ever more so, going forward. What seemed to be an increasingly open public sphere, removed from the world of commodity exchange, seems to be morphing into a private sphere of increasingly closed, proprietary, even monopolistic markets.
  189. The Secret Secret (December 9, 2010)
    Only those with proper clearances can participate in discussions that affect significant aspects of our lives. Certain technological achievements, our collective ethical decisions (torture, secret prisons, air strikes, etc.), our collective behavior towards other nations and peoples (foreign policy discussions) and more are often obscured by state secrecy. Like the medieval clergy, those holding classified clearances are the sole legitimate interpreters of the 'really important' knowledge. In effect, they are a caste that guides our political and technological cosmologies.
  190. Information Terrorists? (December 7, 2010)
    WikiLeaks is under concerted attack from the US government. Also under attack by the US government is the whole idea of freedom of thought and of information. It needs to be clearly understood that the attacks on WikiLeaks by the US government could as easily be used against news organizations and political organizations.
  191. A Web Pioneer Profiles Users by Name (October 24, 2010)
    An online tracking company builds extraordinarily intimate databases on people by tapping voter-registration files, shopping histories, social-networking activities and real estate records, among other things.
  192. Saving past is first step to the future (October 15, 2010)
    The archives of southern Sudan are all currently housed in a tent donated by USAid. Many documents have been damaged due to the poor storage facilities. The Rift Valley Institute, a non-profit research group and scholars from Oxford plan to digitize and find a permanent home for the collection in the near future.
  193. Fanning the flames of intolerance (September 24, 2010)
    A historical overview of book burnings by political and religious regimes.
  194. A War on Wikileaks? (August 11, 2010)
    If the state fails to make any sense - not surprising - it is because it is has no intention of doing so. The state is appealing to something more visceral with all of this posturing: fear. It wants to strike fear into the minds and bodies of people working with Wikileaks, or anyone else doing such work, and anyone contemplating leaking any classified records. Fear is its greatest weapon of psychological destruction, with proven success at home. The outcome the state hopes for is greater self-censorship and greater self-monitoring.
  195. Sites Feed Personal Details To New Tracking Industry (July 30, 2010)
    The largest U.S. websites are installing new and intrusive consumer-tracking technologies on the computers of people visiting their sites—in some cases, more than 100 tracking tools at a time. The tracking files are the leading edge of a new industry of data-gatherers who are in effect establishing a new business model for the Internet: one based on intensive surveillance of people to sell data about, and predictions of, their interests and activities, in real time.
  196. IFJ Releases Press Freedom Report for South Asia (April 30, 2010)
    The International Federation of Journalists (IFJ) in association with the South Asia Media Solidarity Network (SAMSN) will officially release the eighth annual report on press freedom in South Asia at a regional event on May 3.
  197. Microsoft, piracy, and independent media in Kyrgyzstan (April 14, 2010)
    Selective enforcement of alleged software infringement is being used with some frequency in the former Soviet republics as cover to harass independent media. Local law enforcement officials have been given broad powers, in the name of fighting piracy, to raid premises and seize hardware. For the most part, Western companies and governments have encouraged this broadening of powers.
  198. Does Wikipedia Suck? (March 26, 2010)
    Students were told to pick a concept, theory, or individual central to their paper, read the matching Wikipedia entry, and assess how useful it is for their research.
  199. Journalists assaulted and censored (March 17, 2010)
    Palestinian journalists are under attack from Israeli forces and are also subjected to raids and arrests as a result of political rivalry between the Palestinian Authority and Hamas, report the Palestinian Center for Development and Media Freedom (MADA) and Reporters Without Borders (RSF). Meanwhile, Israel continues to target and detain scores of Palestinians involved in protests against the separation barrier in the West Bank with freedom of movement and expression violations, reports Human Rights Watch.
  200. U.S. Intelligence planned to destroy Wikileaks (March 15, 2010)
    This document is a classifed (SECRET/NOFORN) 32 page U.S. counterintelligence investigation into WikiLeaks. ``The possibility that current employees or moles within DoD or elsewhere in the U.S. government are providing sensitive or classified information to Wikileaks.org cannot be ruled out''. It concocts a plan to fatally marginalize the organization. Since WikiLeaks uses ``trust as a center of gravity by protecting the anonymity and identity of the insiders, leakers or whisteblowers'', the report recommends ``The identification, exposure, termination of employment, criminal prosecution, legal action against current or former insiders, leakers, or whistlblowers could potentially damage or destroy this center of gravity and deter others considering similar actions from using the Wikileaks.org Web site''.










Related topics in the Sources Subject Index

Expert Sources  –  Internet  –  Internet Privacy  –  Research  –  Search Engine Optimization  –  Surveillance




Sources is an online portal and directory for journalists, writers, news editors, researchers. Use Sources to find experts, media contacts, spokespersons, scientists, lobbyists, officials, speakers, university professors, researchers, newsmakers, CEOs, executive directors, media relations contacts, spokespeople, talk show guests, PR representatives, Canadian sources, story ideas, research studies, databases, universities, colleges, associations, businesses, government, research institutions, lobby groups, non-government organizations (NGOs), in Canada and internationally.
© Sources 1977-2017. The information provided is copyright and may not be reproduced in any form or by any means (whether electronic, mechanical or photographic), or stored in an electronic retrieval system, without written permission of the publisher. The content may not be resold, republished, or redistributed. Indexing and search applications by Ulli Diemer and Chris DeFreitas.