Sources Directory     A to Z Index     Topic Index News Releases     RSS Sources Select News RSS Feed     Sources Calendar      

E-Mail Security: Experts and Sources
Sources Directory - Subject Index


News Releases

Companies that cooperate with dictatorships must be sanctioned
2011-09-06
Reporters without Borders
Reporters Without Borders condemns the criminal cooperation that exists between many western companies, especially those operating in the new technology area, and authoritarian regimes.
Email scam which targets professional speakers
2009-08-13
Sources
An email scam targetting professional speakers is making the rounds. The NSA, a British speakers' association reports that the scam has been aimed at its members. Speakers listed with SOURCES - www.so...

Sources Select Resources

Caveat Surfer: Beware When Using Electronic Communication
Cowan, Kirsten
Article
2000
Sources
Points about electronic communication and online security.
Companies that cooperate with dictatorships must be sanctioned
Sources News Release
Article
2011
Reporters without Borders
Reporters Without Borders condemns the criminal cooperation that exists between many western companies, especially those operating in the new technology area, and authoritarian regimes.
CSE monitors millions of Canadian emails to government
Hildebrandt, Amber; Seglins, Dave; Pereira, Michael
Article
2015
CBC
Canada's electronic spy agency collects millions of emails from Canadians and stores them for "days to months" while trying to filter out malware and other attacks on government computer networks.
Email privacy
Wikipedia article
Article
2012
Email privacy is the broad topic dealing with issues of unauthorized access and inspection of electronic mail. This unauthorized access can happen while an email is in transit, as well as when it is s...
The FBI Can Bypass Encryption
Why Cyber Security is a Magic Act
Blunden, Bill
Article
2014
CounterPunch
For journalists, danger lurking in your email
O'Brien, Danny
Article
2012
Committee to Protect Journalists
Citizen Lab provided a disturbing look into the likely use of a commercial surveillance program, FinFisher, to remotely invade and control the computers of Bahraini activists. After the software insta...
Google: don't expect privacy when sending to Gmail
Rushe, Dominic
Article
2013
Guardian Weekly
People sending email to any of Google's 425 million Gmail users have no "reasonable expectation" that their communications are confidential, the internet giant has said in a court filing.
How the US government secretly reads your email
Brooke, Heather
Article
2011
Guardian
Secret orders forcing Google and Sonic to release a WikiLeaks volunteer's email reveal the scale of US government snooping.
Israeli hackers reportedly gave Cambridge Analytica stolen private emails of two world leaders
Perpel, Rosie
Article
2018
Business Insider
Israeli hackers reportedly gave information from the hacked emails of two world leaders to Cambridge Analytica, the political-research company at the centre of a massive Facebook-data scandal.
Lessons of the Snowden Revelations
You are the Target!
Lopez, Alfredo
Article
2013
CounterPunch
We in the Left have long worried about “police state tactics”. Now we have to confront the police state structure. It’s here and it can morph into a real police state with very little effort. Opposing...
The NSA's Invasion of Google and Yahoo Servers
Your Email is Likely Being Monitored
Lopez, Alfredo
Article
2013
CounterPunch
The American National Security Agency (NSA) has been intercepting information coming in and out of Google and Yahoo servers over non-public, internal network fibre optic lines. In December, 2012 alone...
The NSA's Spying Operation on Mexico
Systematic Eavesdropping on the Government
Carlsen, Laura
Article
2013
CounterPunch
The American NSA has been systematically eavesdropping on the Mexican government for years. Three major programs constitute a massive espionage operation against Mexico.
Polishing Putin: hacked emails suggest dirty tricks by Russian youth group
Elder, Miriam
Article
2012
Guardian
Nashi runs web of online trolls and bloggers paid to praise Vladimir Putin and denigrate enemies.
Security experts urge clients to stop using Yahoo Mail after spying report
Johnson, Tim
Article
2016
McClatchyDC
Yahoo is once again under scrutiny after a report that at the behest of the U.S. government, its engineers had written software to scan every email message sent and received by its users.
Sending encrypted emails using Thunderbird and PGP
Article
2013
We fight censorship
There are easy ways to ensure your Internet activities remain confidential.
Spying by the Numbers
Hundreds of Thousands Subject to Government Surveillance and No Real Protection
Quigley, Bill
Article
2013
CounterPunch
Thanks to NSA whistleblower Edward Snowden many more people in the US and world-wide are learning about extensive US government surveillance and spying. There are publicly available numbers which sho...
What Are Your Options Now For Secure Email?
Nosowitz, Dan
Article
2014
Popular Science
It's shockingly, disturbingly easy for the government to snoop on your emails. Here are your weapons in the fight for your email privacy.
Will Full Encryption Sideline Google's Targeted Ads?
Miners, Zach
Article
2014
PCWorld
Mining personal data to deliver targeted ads is the lifeblood of Google’s business—and of many other online firms. But what if that data dries up at the source?


Sources is an online portal and directory for journalists, writers, news editors, researchers. Use Sources to find experts, media contacts, spokespersons, scientists, lobbyists, officials, speakers, university professors, researchers, newsmakers, CEOs, executive directors, media relations contacts, spokespeople, talk show guests, PR representatives, Canadian sources, story ideas, research studies, databases, universities, colleges, associations, businesses, government, research institutions, lobby groups, non-government organizations (NGOs), in Canada and internationally.
© Sources 1977-2021. The information provided is copyright and may not be reproduced in any form or by any means (whether electronic, mechanical or photographic), or stored in an electronic retrieval system, without written permission of the publisher. The content may not be resold, republished, or redistributed. Indexing and search applications by Ulli Diemer and Chris DeFreitas.