News Releases
Companies that cooperate with dictatorships must be sanctioned2011-09-06
Reporters without Borders
Reporters Without Borders condemns the criminal cooperation that exists between many western companies, especially those operating in the new technology area, and authoritarian regimes.
EFF Calls Out DOJ for Failing to Provide Crucial Public Information in NSA Case2014-01-19
Electronic Frontier Foundation
Latest Filing in Jewel v. NSA Demands Documents Government Is Trying to Conceal
EFF Demands Release of More Secret Surveillance Court Rulings2014-05-09
Electronic Frontier Foundation
In a continuing campaign to uncover the government's secret interpretations of the surveillance laws underlying the National Security Agency (NSA)'s spying programs, the Electronic Frontier Foundation...
Journalists Welcome European Call to Review Anti-Terrorism Laws2009-06-01
International Federation of Journalists
Ministers of the human rights network of the Council of Europe have called on their governments to review anti-terrorism laws in the face of strong criticism from journalists that some laws are in pra...
New Behind-the-Scenes Video: Airship Flight Over the NSA Data Center2014-08-09
Electronic Frontier Foundation
The Internet's Own Boy Director Brian Knappenberger Releases Short Doc as Senate Introduces New Reform Bill
Protect Yourself from Electronic Spying with Surveillance Self-Defense2014-10-24
Electronic Frontier Foundation
The Electronic Frontier Foundation (EFF) has launched its updated "Surveillance Self-Defense" report, a comprehensive how-to guide to protecting yourself from electronic spying for Internet users all ...
Spooky Business: A New Report on Corporate Espionage Against Non-profits2013-12-04
Center for Corporate Policy
Giant corporations are employing highly unethical or illegal tools of espionage against nonprofit organizations with near impunity, according to a new report by Essential Information.
The Day We Fight Back Against Mass Surveillance: February 11, 20142014-01-28
Electronic Frontier Foundation
On February 11, on the Day We Fight Back, the world will demand an end to mass surveillance in every country, by every state, regardless of boundaries or politics.
UN body urged to take position on export of surveillance material2014-06-21
Reporters Without Borders
As the UN Human Rights Council continues its 26th session and a panel discussion is held today on corporate social responsibility, Reporters Without Borders urges the council to promote the adoption o...
Sources Select Resources
Companies that cooperate with dictatorships must be sanctionedSources News Release
Article
2011
Reporters without Borders
Reporters Without Borders condemns the criminal cooperation that exists between many western companies, especially those operating in the new technology area, and authoritarian regimes.
Complaints filed against telecom companies for their role in UK mass surveillance programmePrivacy International
Article
2013
IFEX
On 5 November 2013, Privacy International filed formal complaints with the Organisation for Economic Cooperation and Development (OECD) in the UK against some of the world's leading telecommunication ...
The Computers are ListeningHow the NSA Converts Spoken Words Into Searchable Text
Froomkin,Dan
Article
2015
The Intercept
Top-secret documents from the archive of Edward Snowden show the National Security Agency can now automatically recognize the content within phone calls by creating rough transcripts and phonetic repr...
Connexions Library: Human Rights and Civil Liberties FocusWebsite
Connexions Information Sharing Services
Selected articles, books, websites and other resources on civil liberties and human rights.
CSE monitors millions of Canadian emails to governmentHildebrandt, Amber; Seglins, Dave; Pereira, Michael
Article
2015
CBC
Canada's electronic spy agency collects millions of emails from Canadians and stores them for "days to months" while trying to filter out malware and other attacks on government computer networks.
EFF Demands Release of More Secret Surveillance Court RulingsSources News Release
Article
2014
Electronic Frontier Foundation
In a continuing campaign to uncover the government's secret interpretations of the surveillance laws underlying the National Security Agency (NSA)'s spying programs, the Electronic Frontier Foundation...
Email privacyWikipedia article
Article
2012
Email privacy is the broad topic dealing with issues of unauthorized access and inspection of electronic mail. This unauthorized access can happen while an email is in transit, as well as when it is s...
Fake cell phone 'towers' may be spying on Americans' calls, textsMunoz, Eduardo
Article
2014
RT
More than a dozen 'fake cell phone towers' could be secretly hijacking Americans' mobile devices in order to listen in on phone calls or snoop on text messages, a security-focused cell phone company c...
The FBI Can Bypass EncryptionWhy Cyber Security is a Magic Act
Blunden, Bill
Article
2014
CounterPunch
FBI director wants access to encrypt Apple, Google users' data, demands law 'fix'Article
2014
RT.com
The FBI director has slammed Apple and Google for offering their customers encryption technology that protects users’ privacy. "Deeply concerned" James Comey wants to push on Congress to "fix" laws to...
The FBI Director's Evidence Against Encryption Is PatheticFroomkin, Dan; Vargas-Cooper, Natasha
Article
2014
The Intercept
FBI Director James Comey gave a speech Thursday about how cell-phone encryption could lead law enforcement to a “very dark place” where it “misses out” on crucial evidence to nail criminals. To make h...
The Great SIM Heist: How Spies Stole the Keys to the Encryption CastleScahill, Jeremy; Begley, Josh
Article
2015
The Intercept
American and British spies hacked into the internal computer network of the largest manufacturer of SIM cards in the world, stealing encryption keys used to protect the privacy of cellphone communicat...
I, spy: Edward Snowden in exileRusbridger, Alan; MacAskill, Ewen
Article
2014
The Guardian
The Guardian interviews Edward Snowden, the former NSA contractor who leaked thousands of classified documents to media outlets. Snowden shares his views on the events that have occured since his exil...
Inside NSA, Officials Privately Criticize 'Collect It All' SurveillanceMaass, Peter
Article
2015
The Intercept
As Members of Congress struggle to agree on which surveillance programs to re-authorize before the Patriot Act expires, they might consider the unusual advice of an intelligence analyst at the Nationa...
The InterceptWebsite
A platform to report on the documents previously provided by NSA whistleblower Edward Snowden, with a long-term mission is to produce fearless, adversarial journalism across a wide range of issues.
Is Your Printer Spying On You?Article
Electronic Frontier Foundation
Imagine that every time you printed a document it automatically included a secret code that could be used to identify the printer - and potentially the person who used it.
'I've Got Nothing to Hide' and Other Misunderstandings of PrivacySolove, Daniel J.
Article
2007
San Diego Law Review
According to the nothing to hide argument, there is no threat to privacy unless the government uncovers unlawful activity, in which case a person has no legitimate justification to claim that it remai...
Journalists Welcome European Call to Review Anti-Terrorism LawsSources News Release
Article
2009
International Federation of Journalists
Ministers of the human rights network of the Council of Europe have called on their governments to review anti-terrorism laws in the face of strong criticism from journalists that some laws are in pra...
The Logic behind Mass Spying: Empire and Cyber ImperialismPetras, James
Article
2013
Dissident Voice
Revelations about the long-term global, intrusive spying by the US National Security Agency (NSA) and other allied intelligence apparatuses have provoked widespread protests and indignation and threat...
Mass Surveillance is Driven by the Private SectorThe Lesson of Hacking Team's Malware
Blunden, Bill
Article
2015
CounterPunch
A report published by Privacy International as well as an article posted by Vice Motherboard clearly show that both the DEA and the United States Army have long-standing relationships with Hacking Tea...
New Documents and Reports Confirm AT&T and NSA's Longstanding Surveillance PartnershipRumold, Mark
Article
2015
Electronic Frontier Foundation
Reports today in the New York Times and ProPublica confirm what EFF's Jewel v. NSA lawsuit has claimed since 2008 -- that the NSA and AT&T have collaborated to build a domestic surveillance infrastruc...
No Safe Harbor: How NSA Spying Undermined U.S. Tech and Europeans' PrivacyO'Brien, Danny
Article
2015
Electronic Frontier Foundation
The spread of knowledge about the NSA's surveillance programs has shaken the trust of customers in U.S. Internet companies like Facebook, Google, and Apple: especially non-U.S. customers who have disc...
NSA, GCHQ mapping "political alignment" of cellphone usersNew report reveals
London, Eric
Article
2014
World Socialist Web Site
New information made public by Edward Snowden reveals that the governments of the United States and United Kingdom are trawling data from cellphone “apps” to accumulate dossiers on the “political alig...
The NSA's Invasion of Google and Yahoo ServersYour Email is Likely Being Monitored
Lopez, Alfredo
Article
2013
CounterPunch
The American National Security Agency (NSA) has been intercepting information coming in and out of Google and Yahoo servers over non-public, internal network fibre optic lines. In December, 2012 alone...
NSA's Path to TotalitarianismEver-Shrinking Democracy in America
Pollack, Norman
Article
2013
CounterPunch
The American National Security Agency (NSA) appears as a “rogue” organization, extremism in the putative service of liberty. Or better, call it, stripped of all cosmetics, the unerring mark of a Polic...
The NSA's Spying Operation on MexicoSystematic Eavesdropping on the Government
Carlsen, Laura
Article
2013
CounterPunch
The American NSA has been systematically eavesdropping on the Mexican government for years. Three major programs constitute a massive espionage operation against Mexico.
Orwell's Triumph: How Novels Tell the Truth of SurveillanceFrank, Sam
Article
2015
The Intercept
Novels may be the best medium for describing a distopian world in which everyone is under constant surveillance.
Other Voices: The Connexions Newsletter - December 5, 2015Ecosocialism, environment, and urban gardening
Diemer, Ulli (ed.)
Serial Publication (Periodical)
2015
Connexions
This issue of Other Voices covers a wide range of issues, from the climate crisis and the ecosocialist response, to terrorism and the struggle against religious fundamentalism, as well as items on urb...
ProfiledFrom Radio to Porn, British Spies Track Web Users' Online Identities
Gallagher, Ryan
Article
2015
The Intercept
Amid a renewed push from the U.K. government for more surveillance powers, more than two dozen documents being disclosed by The Intercept reveal for the first time several major strands of GCHQ’s (Gov...
Protect Yourself from Electronic Spying with Surveillance Self-DefenseSources News Release
Article
2014
Electronic Frontier Foundation
The Electronic Frontier Foundation (EFF) has launched its updated "Surveillance Self-Defense" report, a comprehensive how-to guide to protecting yourself from electronic spying for Internet users all ...
Reflections on a whistleblower: Two years after SnowdenTzabiras, Marianna
Article
2015
IFEX
Two years after Snowden, the international state of surveillance and the ranks of whistleblowers both continue to grow.
Revealed: how Whisper app tracks ‘anonymous’ users Lewis, Paul; Rushe, Dominic
Article
2014
The Guardian
The company behind Whisper, the social media app that promises users anonymity and claims to be “the safest place on the internet”, is tracking the location of its users, including some who have speci...
Secret 'BADASS' Intelligence Program Spied on SmartphonesLee, Micah
Article
2015
The Intercept
British and Canadian spy agencies accumulated sensitive data on smartphone users, by piggybacking on ubiquitous software from advertising and analytics companies, according to a document obtained by N...
Selling your SecretsThe Invisible World of Software Backdoors and Bounty Hunters
Chatterjee, Pratap
Article
2014
CorpWatch
The documents released by whistleblower Edward Snowden reveal that the world of NSA mass surveillance involves close partnerships with a series of companies most of us have never heard of that design ...
6 Ideas For Those Needing Defensive Technology to Protect Free Speech from Authoritarian Regimes4 Ways the Rest of Us Can Help
Eckersley, Peter
Article
2009
Electronic Frontier Foundation
The Internet remains one of the most powerful means ever created to give voice to repressed people around the world. Unfortunately, new technologies have also given authoritarian regimes new means to ...
Spooky Business: A New Report on Corporate Espionage Against Non-profitsSources News Release
Article
2013
Center for Corporate Policy
Giant corporations are employing highly unethical or illegal tools of espionage against nonprofit organizations with near impunity, according to a new report by Essential Information.
The Terrifying World of Electronic MonitoringFrom Drone Strikes to Martha Stewart
Kilgore, James
Article
2013
Counter Punch
Electronic monitoring is about tracking and marking. The GPS technology that is trending in electronic monitors tracks people’s every movement with the purpose of marking them for punishment if they d...
Three Leaks, Three Weeks, and What We've Learned About the US Government's Other Spying Authority: Executive Order 12333Jaycox, Mark M.
Article
2013
Electronic Frontier Foundation
The National Security Agency has been siphoning off data from the links between Yahoo and Google data centers, which include the fiber optic connections between company servers at various points aroun...
Why I'm Saying Goodbye to Apple, Google and MicrosoftI'm putting more trust in communities than corporations
Gillmor, Dan
Article
2015
Backchannel
Gillmor discusses how we are losing control over the technology tools that once promised equal opportunity in speech and innovation.
Sources Bookshelf