Sources Experts & Spokespersons
News Releases
An Open Letter to the Members of the Wassenaar Arrangement2014-12-04
Reporters without Borders
As members of the Coalition Against Unlawful Surveillance Exports (CAUSE), Reporters Without Borders, Amnesty International, Digitale Gesellschaft, the International Federation for Human Rights (FIDH)...
Authorities turn their sights on microblogging2010-07-19
Reporters without Borders
Reporters Without Borders is concerned about a new crackdown in China on social-networking tools, especially microblogging services.
Coalition Announces New ‘Do Not Track’ Standard for Web Browsing2015-08-09
Electronic Frontier Foundation
The Electronic Frontier Foundation (EFF), privacy company Disconnect and a coalition of Internet companies have announced a stronger “Do Not Track†(DNT) setting for Web browsing - a new policy st...
Companies that cooperate with dictatorships must be sanctioned2011-09-06
Reporters without Borders
Reporters Without Borders condemns the criminal cooperation that exists between many western companies, especially those operating in the new technology area, and authoritarian regimes.
Draconian cyber security bill could lead to Internet surveillance and censorship2012-04-12
Reporters without Borders
Reporters Without Borders is deeply concerned with the Cyber Intelligence Sharing and Protection Act of 2011 (CISPA), the cyber security bill now before the US Congress.
EFF Report Charts Companies on Next Frontier of User Privacy 2015-06-19
Electronic Frontier Foundation
Annual Survey Delves Deeper into Practices of Apple, Google, Twitter, and More
Google Deceptively Tracks Students' Internet Browsing, EFF Says in FTC Complaint 2015-12-08
Electronic Frontier Foundation
EFF Launches 'Spying on Students' Campaign to Raise Awareness About Privacy Risks of School Technology Tools
How can you protect yourself from online snooping?2013-06-13
Reporters without Borders
Reporters Without Borders has published an Online Survival Kit on its WefightCensorship.org website that has tools and practical advice that will allow you to protect your communications and data.
Journalists Welcome European Call to Review Anti-Terrorism Laws2009-06-01
International Federation of Journalists
Ministers of the human rights network of the Council of Europe have called on their governments to review anti-terrorism laws in the face of strong criticism from journalists that some laws are in pra...
Online Ad Company Adopts New 'Do Not Track' Standard for Web Browsing 2015-09-30
Electronic Frontier Foundation
Adzerk Joins Coalition Delivering Stronger Privacy and a Way Forward in the Ad Blocking Impasse
Privacy Badger 1.0 Blocks the Sneakiest Kinds of Online Tracking 2015-08-09
Electronic Frontier Foundation
The Electronic Frontier Foundation (EFF) today released Privacy Badger 1.0, a browser extension that blocks some of the sneakiest trackers that try to spy on your Web browsing habits.
Protect Yourself from Electronic Spying with Surveillance Self-Defense2014-10-24
Electronic Frontier Foundation
The Electronic Frontier Foundation (EFF) has launched its updated "Surveillance Self-Defense" report, a comprehensive how-to guide to protecting yourself from electronic spying for Internet users all ...
Sources welcomes OrangeWebsite2011-03-16
OrangeWebsite
Sources welcomes a new member: OrangeWebsite. OrangeWebsite is an Icelandic web hosting service provider. Most of our clients are foreign journalists, bloggers, leakers and publishers.
Stop Sneaky Online Tracking with EFF's Privacy Badger2014-08-03
Electronic Frontier Foundation
Electronic Frontier Foundation (EFF) has released a beta version of Privacy Badger, a browser extension for Firefox and Chrome that detects and blocks online advertising and other embedded content tha...
Test Your Online Privacy Protection with EFF's Panopticlick 2015-12-19
Electronic Frontier Foundation
The Electronic Frontier Foundation launched new online tracker-testing in its Panopticlick tool today, helping you analyze the privacy protections in your Web browser. New Feature Analyzes Your Web Br...
Sources Select Resources
Adblockers and Innovative Ad Companies are Working Together to Build a More Privacy-Friendly WebEckersley,Peter; Toner,Alan
Article
2015
EFF
Eckersley and Toner talk more about the coalition between tracker and ad-blocker companies that will respect a 'Do Not Track' policy.
Authorities turn their sights on microbloggingSources News Release
Article
2010
Reporters without Borders
Reporters Without Borders is concerned about a new crackdown in China on social-networking tools, especially microblogging services.
BitTorrent study finds most file-sharers are monitoredArticle
2012
BBC
Anyone using file-sharing service BitTorrent to download the latest film or music release is likely to be monitored, UK-based researchers suggest. A Birmingham University study indicates that a file-s...
Caveat Surfer: Beware When Using Electronic CommunicationCowan, Kirsten
Article
2000
Sources
Points about electronic communication and online security.
Companies that cooperate with dictatorships must be sanctionedSources News Release
Article
2011
Reporters without Borders
Reporters Without Borders condemns the criminal cooperation that exists between many western companies, especially those operating in the new technology area, and authoritarian regimes.
Complaints filed against telecom companies for their role in UK mass surveillance programmePrivacy International
Article
2013
IFEX
On 5 November 2013, Privacy International filed formal complaints with the Organisation for Economic Cooperation and Development (OECD) in the UK against some of the world's leading telecommunication ...
The dark side of the internetBeckett, Andy
Article
2009
Guardian
Search engines access only a very small fraction of the deep web, which is estimated to be five hundred times as big as the surface web.
EFF Report Charts Companies on Next Frontier of User Privacy Sources News Release
Article
2015
Electronic Frontier Foundation
Annual Survey Delves Deeper into Practices of Apple, Google, Twitter, and More
Email privacyWikipedia article
Article
2012
Email privacy is the broad topic dealing with issues of unauthorized access and inspection of electronic mail. This unauthorized access can happen while an email is in transit, as well as when it is s...
EU: Enact Controls on Digital Weapons Trade Article
2012
Unregulated Export of Powerful Surveillance Tools Threatens Internet Freedom. Reporters Without Borders and Human Rights Watch call on the European Union to enact new controls on Internet surveillance...
The FBI Can Bypass EncryptionWhy Cyber Security is a Magic Act
Blunden, Bill
Article
2014
CounterPunch
Fifteen minutes of online anonymity Manach, Jean-Marc
Article
2013
We fight Censorship
Making sure that your communications and data are confidential is not easy. Jean-Marc Manach, a journalist specialized in digital privacy and security, has an interesting alternative – how to have 15 ...
For journalists, danger lurking in your emailO'Brien, Danny
Article
2012
Committee to Protect Journalists
Citizen Lab provided a disturbing look into the likely use of a commercial surveillance program, FinFisher, to remotely invade and control the computers of Bahraini activists. After the software insta...
GCHQ and European spy agencies worked together on mass surveillanceBorger, Julian
Article
2013
Guardian Weekly
Edward Snowden papers unmask close technical cooperation and loose alliance between British, German, French, Spanish and Swedish spy agencies.
Google Deceptively Tracks Students' Internet Browsing, EFF Says in FTC Complaint Sources News Release
Article
2015
Electronic Frontier Foundation
EFF Launches 'Spying on Students' Campaign to Raise Awareness About Privacy Risks of School Technology Tools
Google doesn't want you to limit its ability to follow you around the internetArticle
2014
Theguardian
Behind our screens, tech companies are racing to extract a price for what we read and watch on the web: our personal information.
Google: don't expect privacy when sending to GmailRushe, Dominic
Article
2013
Guardian Weekly
People sending email to any of Google's 425 million Gmail users have no "reasonable expectation" that their communications are confidential, the internet giant has said in a court filing.
'Hostile to privacy': Snowden urges internet users to get rid of DropboxArticle
2014
RT
Edward Snowden has identified Dropbox and other services as 'hostile to privacy." He urges web users to abandon unencrypted communication and adjust privacy settings to prevent governments from spying...
How can you protect yourself from online snooping?Sources News Release
Article
2013
Reporters without Borders
Reporters Without Borders has published an Online Survival Kit on its WefightCensorship.org website that has tools and practical advice that will allow you to protect your communications and data.
How to Leak to The InterceptLee, Micah
Article
2015
The Intercept
Leaking can serve the public interest, fueling revelatory and important journalism. Here are instructions for how to leak safely.
Improve your privacy and security on the Internet using Tor Article
2013
We fight Censorship
This user manual contains information about how to download Tor, how to use it, and what to do if Tor is unable to connect to the network
Information OverloadDriving a Stake Through the National Security State
Lindorff, Dave
Article
2012
CounterPunch
Here’s an idea. Let’s all start salting all of our conversations and our written communications with a selection of those 300 key words. If every liberty-loving person in America virus were to do thi...
IntelligentSearch.caWebsite
2017
Sources
A web portal featuring topics related to research and the Internet. The home page features a selection of recent and important articles. A search feature, subject index, and other research tools make ...
'I've Got Nothing to Hide' and Other Misunderstandings of PrivacySolove, Daniel J.
Article
2007
San Diego Law Review
According to the nothing to hide argument, there is no threat to privacy unless the government uncovers unlawful activity, in which case a person has no legitimate justification to claim that it remai...
Journalist Security GuideCovering the news in a dangerous and changing world
Smyth, Frank
Article
2012
Committee to Protect Journalists
This guide details what journalists need to know in a new and changing world. It is aimed at local and international journalists of varied levels of experience.
Journalists Welcome European Call to Review Anti-Terrorism LawsSources News Release
Article
2009
International Federation of Journalists
Ministers of the human rights network of the Council of Europe have called on their governments to review anti-terrorism laws in the face of strong criticism from journalists that some laws are in pra...
Lessons of the Snowden RevelationsYou are the Target!
Lopez, Alfredo
Article
2013
CounterPunch
We in the Left have long worried about “police state tactics”. Now we have to confront the police state structure. It’s here and it can morph into a real police state with very little effort. Opposing...
Metadata - your files talk for you Article
2013
We fight censorship
Few Internet users are aware that many file formats contain hidden data, or metadata. Text processing files or PDFs are likely to contain the name of the author, the date and time of the creation of t...
NSA and GCHQ target Tor network that protects anonymity of web usersBall, James; Schneier, Bruce; Greenwald, Glenn
Article
2013
Guardian Weekly
The National Security Agency has made repeated attempts to develop attacks against people using Tor, a popular tool designed to protect online anonymity, despite the fact the software is primarily fun...
The NSA Has Effectively Destroyed Internet PrivacySnowden's Latest
Lopez, Alfredo
Article
2013
Counter Punch
Whistle-blower Edward Snowden prove that the NSA, working with its British counterpart the Government Communications Headquarters has conducted an intentional and largely sucessful campaign to destroy...
NSA surveillance may cause breakup of internet, warn expertsTaylor, Matthew; Hopkins, Nick; Kiss, Jemima
Article
2013
Internet specialists highlight moves by Brazil, Germany and India towards creating separate networks in order to block spying.
The NSA's Invasion of Google and Yahoo ServersYour Email is Likely Being Monitored
Lopez, Alfredo
Article
2013
CounterPunch
The American National Security Agency (NSA) has been intercepting information coming in and out of Google and Yahoo servers over non-public, internal network fibre optic lines. In December, 2012 alone...
Online Ad Company Adopts New 'Do Not Track' Standard for Web Browsing Sources News Release
Article
2015
Electronic Frontier Foundation
Adzerk Joins Coalition Delivering Stronger Privacy and a Way Forward in the Ad Blocking Impasse
Online Survival KitArticle
2013
Reporters Without Borders
This Online Survival Kit offers practical tools, advice and techniques that teach you how to circumvent censorship and to secure yo communications and data. This handbook will gradually be unveiled ov...
An Online Tracking Device That’s Virtually Impossible to BlockAngwin, Julia
Article
2014
Canadian Progressive
A new kind of tracking tool, canvas fingerprinting, is being used to follow visitors to thousands of top websites, from WhiteHouse.gov to YouPorn.
Other Voices: The Connexions Newsletter - March 26, 2015Sustainability, ecology, and agriculture
Diemer, Ulli (editor); Khan, Tahmid (production)
Serial Publication (Periodical)
2015
Connexions
This issue features a number of items related to sustainability, ecology, and agriculture, including Vandana Shiva's article "Small is the New Big," the Council of Canadians' new report on water issue...
Preparing for a Digital 9/11 Greenberg, Karen
Article
2012
TomDispatch
In recent years, in one of the more dangerous, if largely undiscussed, developments of our time, the Bush and then Obama administrations have launched the first state-planned war in cyber space. First...
Privacy for the other five billionDonovan, Kevin; Nyst, Carly
Article
2013
Aadhaar is but one example of the development sector's growing fascination with technologies for registering, identifying, and monitoring citizens
ProfiledFrom Radio to Porn, British Spies Track Web Users' Online Identities
Gallagher, Ryan
Article
2015
The Intercept
Amid a renewed push from the U.K. government for more surveillance powers, more than two dozen documents being disclosed by The Intercept reveal for the first time several major strands of GCHQ’s (Gov...
Protect your freedom and privacy; join us in creating an Internet that's safer from surveillanceRogoff, Zak
Article
2013
Free Software Foundation
In order to defang surveillance programs like PRISM, we need to stop using centralized systems and come together to build an Internet that's decentralized, trustworthy, and free "as in freedom."
Protect Yourself from Electronic Spying with Surveillance Self-DefenseSources News Release
Article
2014
Electronic Frontier Foundation
The Electronic Frontier Foundation (EFF) has launched its updated "Surveillance Self-Defense" report, a comprehensive how-to guide to protecting yourself from electronic spying for Internet users all ...
Recommendations on the right to be forgottena Quadrature du Net and Reporters Without Borders
Article
2014
On the problems for the protection of freedom of expression and the right to information posed by the right to be removed from search engine results and, more broadly, the right to be forgotten. Priva...
Revealed: how Whisper app tracks ‘anonymous’ users Lewis, Paul; Rushe, Dominic
Article
2014
The Guardian
The company behind Whisper, the social media app that promises users anonymity and claims to be “the safest place on the internet”, is tracking the location of its users, including some who have speci...
6 Ideas For Those Needing Defensive Technology to Protect Free Speech from Authoritarian Regimes4 Ways the Rest of Us Can Help
Eckersley, Peter
Article
2009
Electronic Frontier Foundation
The Internet remains one of the most powerful means ever created to give voice to repressed people around the world. Unfortunately, new technologies have also given authoritarian regimes new means to ...
Six Tips to Protect Your Search Privacy Eckersley, Peter; Schoen, Seth; Bankston, Kevin; Slater, Derek
Article
2006
Electronic Frontier Foundation
Google, MSN Search, Yahoo!, AOL, and most other search engines collect and store records of your search queries. If these records are revealed to others, they can be embarrassing or even cause great h...
Software Meant to Fight Crime Is Used to Spy on DissidentsPerlroth, Nicole
Article
2012
New York Times
Morgan Marquis-Boire works as a Google engineer and Bill Marczak is earning a Ph.D. in computer science. But this summer, the two men have been moonlighting as detectives, chasing an elusive surveilla...
Spying by the NumbersHundreds of Thousands Subject to Government Surveillance and No Real Protection
Quigley, Bill
Article
2013
CounterPunch
Thanks to NSA whistleblower Edward Snowden many more people in the US and world-wide are learning about extensive US government surveillance and spying. There are publicly available numbers which sho...
Stop Sneaky Online Tracking with EFF's Privacy BadgerSources News Release
Article
2014
Electronic Frontier Foundation
Electronic Frontier Foundation (EFF) has released a beta version of Privacy Badger, a browser extension for Firefox and Chrome that detects and blocks online advertising and other embedded content tha...
Surveillance Self-DefenseWebsite
2018
Electronic Fronteri Foundation
Modern technology has given those in power new abilities to eavesdrop and collect data on innocent people. Surveillance Self-Defense is EFF's guide to defending yourself and your friends from surveill...
Ten Steps You Can Take Right Now Against Internet SurveillanceO'Brien, Danny
Article
2013
Electronic Frontier Foundation
One of the trends we've seen is how, as the word of the NSA's spying has spread, more and more ordinary people want to know how (or if) they can defend themselves from surveillance online. With a few ...
Test Your Online Privacy Protection with EFF's Panopticlick Sources News Release
Article
2015
Electronic Frontier Foundation
The Electronic Frontier Foundation launched new online tracker-testing in its Panopticlick tool today, helping you analyze the privacy protections in your Web browser. New Feature Analyzes Your Web Br...
Tor (anonymity network)Wikipedia article
Article
Tor is free software for enabling anonymous communication. The name is an acronym derived from the original software project name The Onion Router. Tor directs Internet traffic through a free, worldwi...
Tor is for EveryoneWhy You Should Use Tor
Quintin, Cooper
Article
2014
Electronic Frontier Foundation
EFF recently kicked off their second Tor Challenge, an initiative to strengthen the Tor network for online anonymity and improve one of the best free privacy tools in existence. This is great news, bu...
The use of encryption tools and the protection of anonymity online as safeguards for freedom of the pressKaye, David
Unclassified
2015
International Press Institute
David Kaye is the UN Special Rapporteur on the promotion and protection of the right to freedom of expression. In his latest report, he stressed that governments are obligated to protect encryption to...
Who does that server really serve?Stallman, Richard
Article
2010
Free Software Foundation
On the Internet, proprietary software isn't the only way to lose your freedom. Service as a Software Substitute, or SaaSS, is another way to let someone else have power over your computing.
Who's the true enemy of internet freedom - China, Russia, or the US? Morozov, Evgeny
Article
2015
The Guardian
Beijing and Moscow are rightly chastised for restricting their citizens' online access – but it's the US that is now even more aggressive in asserting its digital sovereignty.
Why I'm Saying Goodbye to Apple, Google and MicrosoftI'm putting more trust in communities than corporations
Gillmor, Dan
Article
2015
Backchannel
Gillmor discusses how we are losing control over the technology tools that once promised equal opportunity in speech and innovation.
You selling to me?Krol, Ariane; Nantel, Jacques
Article
2013
Le Monde diplomatique
Individually targeted online marketing, based on unwittingly supplied consumer information and monitoring of online activities, is replacing conventional advertising media.
Sources Bookshelf
Ours to Hack and To OwnThe Rise of Platform Cooperativism, A New Vision For the Future Of Work and A Fairer Internet
Scholz, Trebor; Schneider, Nathan
Book
2016
The activists who have put together Ours to Hack and to Own argue for a new kind of online economy: platform cooperativism, which combines the rich heritage of cooperatives with the promise of 21st-ce...