Sources Experts & Spokespersons
News Releases
Alternatives to Body Scans Do Exist2010-01-09
Omar Ha-Redeye
If the technology exists to detect even greater hazards and protect privacy concerns, why wouldn't our government want to consider them?
Coalition Announces New ‘Do Not Track’ Standard for Web Browsing2015-08-09
Electronic Frontier Foundation
The Electronic Frontier Foundation (EFF), privacy company Disconnect and a coalition of Internet companies have announced a stronger “Do Not Track†(DNT) setting for Web browsing - a new policy st...
EFF Report Charts Companies on Next Frontier of User Privacy 2015-06-19
Electronic Frontier Foundation
Annual Survey Delves Deeper into Practices of Apple, Google, Twitter, and More
Free Speech Groups Issue New Guide to the International 'Necessary & Proportionate Principles'2014-06-02
Electronic Frontier Foundation
EFF and ARTICLE 19 Urges Governments to Preserve Fundamental Freedoms in the Age of Mass Surveillance
Sources welcomes Eugene Oscapella, Barrister and Solicitor/Oscapella and Associates2009-07-23
Eugene Oscapella, Barrister and Solicitor/Oscapella and Associates
Sources welcomes Eugene Oscapella, Barrister and Solicitor/Oscapella and Associates.
Sources welcomes OrangeWebsite2011-03-16
OrangeWebsite
Sources welcomes a new member: OrangeWebsite. OrangeWebsite is an Icelandic web hosting service provider. Most of our clients are foreign journalists, bloggers, leakers and publishers.
The Age of Accountability is Now: Are You Prepared? 2012-05-08
Marilyn Belleghem Consulting Inc.
Questions of accountability and building a reputation of integrity in personal and professional relationships.
Sources Select Resources
Big Brother's Getting BiggerSmith, Jack A.
Article
2012
Countercurrents
Government surveillance and attacks on the privacy of American citizens were bad enough under the Bush regime but they are getting even worse during the Obama years.
The Car of the Future Will Sell Your DataCoppola, Gabrielle; Welch, David
Article
2018
Bloomberg
As "smarter" vehicles provide storehouses of personal information, carmakers are building databases of consumer preferences that could be sold to outside vendors for marketing purposes, much like Goog...
Connexions Library: Human Rights and Civil Liberties FocusWebsite
Connexions Information Sharing Services
Selected articles, books, websites and other resources on civil liberties and human rights.
Corporate Coercion and the Drive to Eliminate Buying with CashNader, Ralph
Article
2018
Counterpunch
Consumer freedom and privacy are examined as coercive commercialism quickly moves toward a cashless economy, when all consumers are forced into corporate payment systems from credit/debit cards, mobil...
The Corporate State of SurveillanceOpting Out
Nader, Ralph
Article
2013
CounterPunch
America was founded on the ideals of personal liberty, freedom and democracy. Now mass spying, surveillance and the unending collection of personal data undermine civil liberties and our privacy right...
The dark side of the internetBeckett, Andy
Article
2009
Guardian
Search engines access only a very small fraction of the deep web, which is estimated to be five hundred times as big as the surface web.
Data Mining YouHow the Intelligence Community Is Creating a New American World
Engelhardt, Tom
Article
2012
TomDispatch.com
Joseph K., that icon of single-lettered anonymity from Franz Kafka’s novel The Trial, would undoubtedly have felt right at home in Washington.
Edward Snowden's Warning to CanadaSnowden, Edward
Article
2015
The Tyee
Whistleblower Edward Snowden talks about Bill C-51 and the weak oversight of Canada's intelligence agencies.
EFF Report Charts Companies on Next Frontier of User Privacy Sources News Release
Article
2015
Electronic Frontier Foundation
Annual Survey Delves Deeper into Practices of Apple, Google, Twitter, and More
Email privacyWikipedia article
Article
2012
Email privacy is the broad topic dealing with issues of unauthorized access and inspection of electronic mail. This unauthorized access can happen while an email is in transit, as well as when it is s...
The Face Off: Law Enforcement Use of Face Recognition TechnologyLynch, Jennifer
Article
2018
Electronic Frontier Foundation
Face recognition is poised to become one of the most pervasive surveillance technologies, and law enforcement's use of it is increasing rapidly. However, the adoption of face recognition technologies ...
Fifteen minutes of online anonymity Manach, Jean-Marc
Article
2013
We fight Censorship
Making sure that your communications and data are confidential is not easy. Jean-Marc Manach, a journalist specialized in digital privacy and security, has an interesting alternative – how to have 15 ...
For journalists, danger lurking in your emailO'Brien, Danny
Article
2012
Committee to Protect Journalists
Citizen Lab provided a disturbing look into the likely use of a commercial surveillance program, FinFisher, to remotely invade and control the computers of Bahraini activists. After the software insta...
Free Speech Groups Issue New Guide to the International 'Necessary & Proportionate Principles'Sources News Release
Article
2014
Electronic Frontier Foundation
EFF and ARTICLE 19 Urges Governments to Preserve Fundamental Freedoms in the Age of Mass Surveillance
Get your head out of the cloudsIf we allow our personal data to be stored in giant electornic centres, we deserve what we get
Harris, John
Article
2011
The Guardian
Appraising the risks to personal data held in cloud computing systems.
Google: don't expect privacy when sending to GmailRushe, Dominic
Article
2013
Guardian Weekly
People sending email to any of Google's 425 million Gmail users have no "reasonable expectation" that their communications are confidential, the internet giant has said in a court filing.
Google and the future of search: Amit Singhal and the Knowledge GraphAdams, Tim
Article
2013
The Observer
An interview with the current head of Google Search, discussing some of the thought processes behind the current functionality of 'search' and some of its possibilites for the future.
Google keeps tracking you even when you specifically tell it not to: Maps, Search won't take no for an answerMcCarthy, Kieren
Article
2018
The Register
Google has admitted that its option to "pause" the gathering of your location data doesn't apply to its Maps and Search apps – which will continue to track you even when you specifically choose to hal...
Google's upcoming Allo messaging app is 'dangerous', Edward Snowden claimsAltalebi, Lamees
Article
2016
Independent
Using Google's upcoming messaging app is "dangerous", according to Edward Snowden. In a tweet, the whistleblower advised against using Allo, the search giant’s latest app, saying: "Google's decision t...
How the US government secretly reads your emailBrooke, Heather
Article
2011
Guardian
Secret orders forcing Google and Sonic to release a WikiLeaks volunteer's email reveal the scale of US government snooping.
Improve your privacy and security on the Internet using Tor Article
2013
We fight Censorship
This user manual contains information about how to download Tor, how to use it, and what to do if Tor is unable to connect to the network
India's UID And The Fantasy Of Dataveillance Karunakaran , Binu
Article
2009
CounterCurrents
The perils of establishing nationwide identity systems have always been a hot topic of debate in countries that attach great value to privacy and human rights of its citizens. In India, there is not e...
IntelligentSearch.caWebsite
2017
Sources
A web portal featuring topics related to research and the Internet. The home page features a selection of recent and important articles. A search feature, subject index, and other research tools make ...
Is Your Printer Spying On You?Article
Electronic Frontier Foundation
Imagine that every time you printed a document it automatically included a secret code that could be used to identify the printer - and potentially the person who used it.
'I've Got Nothing to Hide' and Other Misunderstandings of PrivacySolove, Daniel J.
Article
2007
San Diego Law Review
According to the nothing to hide argument, there is no threat to privacy unless the government uncovers unlawful activity, in which case a person has no legitimate justification to claim that it remai...
Just because they hunt witches doesn't mean we haveMalik, Kenan
Article
2010
Goteborgs-Posten
The Big Brother defence of WikiLeaks is that if everyone had a camera upon them, society would be a better place. This is a view that fails to distinguish between the need to control those who possess...
Lessons of the Snowden RevelationsYou are the Target!
Lopez, Alfredo
Article
2013
CounterPunch
We in the Left have long worried about “police state tactics”. Now we have to confront the police state structure. It’s here and it can morph into a real police state with very little effort. Opposing...
Medical Privacy Under Threat in the Age of Big DataChideya, Farai
Article
2015
The Intercept
Medical privacy is a high-stakes game, in both human and financial terms, given the growing multibillion-dollar legal market for anonymized medical data. The threats to individuals seeking to protect ...
Met police using surveillance system to monitor mobile phonesGallagher, Ryan; Syal, Rejeev
Article
2011
Guardian
Civil liberties group raises concerns over Met police purchase of technology to track public handsets over a targeted area.
Metadata - your files talk for you Article
2013
We fight censorship
Few Internet users are aware that many file formats contain hidden data, or metadata. Text processing files or PDFs are likely to contain the name of the author, the date and time of the creation of t...
Microsoft handed the NSA access to encrypted messagesGreenwald, Glenn, et. al
Article
2013
Guardian Weeky
Microsoft has collaborated closely with US intelligence services to allow users' communications to be intercepted, including helping the National Security Agency to circumvent the company's own encryp...
Mistaking Omniscience for Omnipotence In a World Without Privacy, There Are No Exemptions for Our Spies
Engelhardt, Tom
Article
2013
TomDispatch.com
Given how similar they sound and how easy it is to imagine one leading to the other, confusing omniscience (having total knowledge) with omnipotence (having total power) is easy enough. It’s a reasona...
The New Police Surveillance StateThe Rising Price of Political Assembly
Rosen, David
Article
2012
CounterPunch
Police are increasingly being deployed to restrict if not prevent mass political actions, especially directed at the banks.
No Child Left Un-Mined? Student Privacy at Risk in the Age of Big DataChideya, Farai
Article
2015
The Intercept
Chideya discusses the implications of the compilation of big data trails containing information about children's performance in school.
No Safe Harbor: How NSA Spying Undermined U.S. Tech and Europeans' PrivacyO'Brien, Danny
Article
2015
Electronic Frontier Foundation
The spread of knowledge about the NSA's surveillance programs has shaken the trust of customers in U.S. Internet companies like Facebook, Google, and Apple: especially non-U.S. customers who have disc...
NSA and GCHQ target Tor network that protects anonymity of web usersBall, James; Schneier, Bruce; Greenwald, Glenn
Article
2013
Guardian Weekly
The National Security Agency has made repeated attempts to develop attacks against people using Tor, a popular tool designed to protect online anonymity, despite the fact the software is primarily fun...
The Obliteration of PrivacySnowden and the NSA
Kandutsch, Carl E
Article
2014
CounterPunch
It’s remarkable how little outrage Edward Snowden’s NSA revelations have provoked in the American public. One often heard response is something like, “Well, I don’t have anything to hide, so I don’t c...
On Locational Privacy, and How to Avoid Losing it Forever Blumberg, Andrew J.; Eckersley, Peter
Article
2009
Electronic Frontier foundation
Over the next decade, systems which create and store digital records of people's movements through public space will be woven inextricably into the fabric of everyday life. We are already starting to ...
The Other Police StatePrivate Cops vs. the Public Good
Rosen, David
Article
2013
CounterPunch
A revealing study on "Spooky Business: A New Report on Corporate Espionage Against Non-profits" written by Gary Ruskin confirms one’s worst suspicions about the ever-expanding two-headed U.S. security...
Other Voices: The Connexions Newsletter - December 5, 2015Ecosocialism, environment, and urban gardening
Diemer, Ulli (ed.)
Serial Publication (Periodical)
2015
Connexions
This issue of Other Voices covers a wide range of issues, from the climate crisis and the ecosocialist response, to terrorism and the struggle against religious fundamentalism, as well as items on urb...
Other Voices: The Connexions Newsletter - July 22, 2017Secrecy and Power
Diemer, Ulli (ed.)
Serial Publication (Periodical)
2017
Connexions
Secrecy is a weapon the powerful use against their enemies: us. This issue of Other Voices explores the relationship of secrecy and power.
A practical guide to protecting your identity and security when using mobile phones Article
2013
We fight Censorship
Many activists have been tracked via their mobile phones. Assess the risk for your own activities given the practices used in your country, how high-profile your work is, and what others in your commu...
Pragmatic AnonymityArticle
Create an account with an anonymization service. Tell everyone about that account, including the password. The account basically acts as a public mail drop, anyone can use it to send messages, with no...
Preparing for a Digital 9/11 Greenberg, Karen
Article
2012
TomDispatch
In recent years, in one of the more dangerous, if largely undiscussed, developments of our time, the Bush and then Obama administrations have launched the first state-planned war in cyber space. First...
Privacy for the other five billionDonovan, Kevin; Nyst, Carly
Article
2013
Aadhaar is but one example of the development sector's growing fascination with technologies for registering, identifying, and monitoring citizens
Privacy tapped outPrice, David
Article
2013
Le Monde diplomatique
For over a century, Americans and their judiciary fiercely fought any attempt by security agencies and law enforcement to listen in on private electronic communications. Now they’ve stopped fighting, ...
Protect Students from Corporate Data-Mining in the ClassroomNava, Victor
Article
2015
National Review
Across the political spectrum there is debate as to whether data should be collected about students.
The Puritanical Glee Over the Ashley Madison HackGreenwald, Glenn
Article
2015
The Intercept
High school students have long read The Scarlet Letter, the 1850 novel by Nathaniel Hawthorne set in a Puritanical Massachusetts town in the mid-17th century. As The Atlantic noted in 1886, "the punis...
Release of the Full TPP Text After Five Years of Secrecy Confirms Threats to Users' RightsMalcolm, Jeremy; Sutton, Maira
Article
2015
Electronic Frontier Foundation
Trade offices involved in negotiating the Trans-Pacific Partnership (TPP) agreement have finally released all 30 chapters of the trade deal today, a month after announcing the conclusion of the deal i...
Secrecy and PowerIntroduction to the July 22, 2017 issue of Other Voices
Diemer, Ulli
Article
2017
Connexions
It is one of the essential attributes of power that it insists on secrecy. Or, more precisely, those who wield power over others routinely claim that the details of what they do, and why they do it, a...
Sending encrypted emails using Thunderbird and PGP Article
2013
We fight censorship
There are easy ways to ensure your Internet activities remain confidential.
Six Tips to Protect Your Search Privacy Eckersley, Peter; Schoen, Seth; Bankston, Kevin; Slater, Derek
Article
2006
Electronic Frontier Foundation
Google, MSN Search, Yahoo!, AOL, and most other search engines collect and store records of your search queries. If these records are revealed to others, they can be embarrassing or even cause great h...
Spying by the NumbersHundreds of Thousands Subject to Government Surveillance and No Real Protection
Quigley, Bill
Article
2013
CounterPunch
Thanks to NSA whistleblower Edward Snowden many more people in the US and world-wide are learning about extensive US government surveillance and spying. There are publicly available numbers which sho...
The Stasi could only dream of such dataBritain, the birthplace of liberalism, has become the database state
Ash, Timothy Garton
Article
2008
Guardian Weekly
As technology increases the flow of stored data about individual actions, assurances of the "right to informational self-determination" must be hard won from governments. Government surveillance of ci...
Stop replacing London's phone boxes with corporate surveillanceNew connected kiosks are replacing London's payphones. Every time you use them, you're allowing Google, BT and Primesight to track you
Atkin, Ross
Article
2018
Wired
Concerns over privacy in London, UK, as Google, BT and Primesight provide free wifi and phone charging in exchange for allowing the consortium to identify users and track their movements through the c...
Surveillance Self-DefenseWebsite
2018
Electronic Fronteri Foundation
Modern technology has given those in power new abilities to eavesdrop and collect data on innocent people. Surveillance Self-Defense is EFF's guide to defending yourself and your friends from surveill...
Tails: The amnesic Incognito Live System Article
2013
We fight censorship
Tails is an operating system like Windows or Mac OS, but one specially designed to preserve your anonymity and privacy.
Think the Left Won the Culture War? Think AgaindeBoer, Fredrik
Article
2015
Observer
With the recent AshleyMadison leak and Gawker.com's notorious naming and shaming of an obscure, married publishing executive, deBoer questions who really won in this culture war.
Thirteen Ways Government Tracks UsQuigley, Bill
Article
2012
Countercurrents
Privacy is eroding fast as technology offers government increasing ways to track and spy on citizens. Here are thirteen examples of how some of the biggest government agencies and programs track peopl...
Tor is for EveryoneWhy You Should Use Tor
Quintin, Cooper
Article
2014
Electronic Frontier Foundation
EFF recently kicked off their second Tor Challenge, an initiative to strengthen the Tor network for online anonymity and improve one of the best free privacy tools in existence. This is great news, bu...
Uber Plans to Track Users Should Not Be Allowed, Says Privacy GroupChatterjee, Pratap
Article
2015
Corp Watch
A formal complaint has been filed against Uber, the car ride company, by the Electronic Privacy Information Center (EPIC), a non-profit advocacy group. The NGO says Uber plans to use their smart phone...
UN slams UK surveillance law, calls for privacy reforms in Canada, France and MacedoniaArticle
2015
Privacy International
In yet another blow to the UK's surveillance proponents, the UN Human Rights Committee has criticised the British legal regime governing the interception of communications, observing that it allows fo...
Unmasking the Five-Eyed monster, a global and secret intelligence-sharing regimeArticle
2013
IFEX
Privacy International is proud to announce our new project, Eyes Wide Open, which aims to pry open the Five Eyes arrangement and bring it under the rule of law.
Virtual Private Network (VPN) Article
2013
We fight Censorship
This technology allows the creation of an Internet tunnel (a virtual link) between two physical networks in different locations in a way that is transparent for users.
Vodafone Reveals Existence of Secret Wires that Allow State SurveillanceGarside, Juliette
Article
2014
The Guardian
Wires allow agencies to listen to or record live conversations, in what privacy campaigners are calling a 'nightmare scenario'.
Will the government's counter-extremist programme criminalise dissent?Kundnani, Arun
Article
2015
Spinwatch
From 1 July, a broad range of public bodies - from nursery schools to optometrists - will be legally obliged to participate in the U.S. government’s Prevent policy to identify would-be extremists. Und...
You selling to me?Krol, Ariane; Nantel, Jacques
Article
2013
Le Monde diplomatique
Individually targeted online marketing, based on unwittingly supplied consumer information and monitoring of online activities, is replacing conventional advertising media.
Sources Bookshelf
The City in HistoryIts Origins, Its Transformations, and Its Prospects
Mumford, Lewis
Book
1961
Beginning with an interpretation of the origin and nature of the city, Mumford follows the city's development from Egypt and Mesopotamia through Greece, Rome, and the Middle Ages to the modern world.
The No-Nonsense Guide to Global MediaSteven, Peter
Book
2004
Peter Steven aims to make readers realize the power and influence of dominant media but, at the same time, also understand that they are not "omnipotent" and that there are alternative forms available...
Open MarriageA New Life Style for Couples
O'Neill, Nena & George
Book
1972
The authors propose open marriage as a way to help couples realize that there can be both relatedness and freedom in marriage, and that freedom, with the growth and responsibility it entails, can be t...
PrivacyA Manifesto
Sofsky, Wolfgang
Book
2008
Sofsky attributes loss of privacy not only to technology and fear but also our indifference.
Someone's Watching You! From Micropchips in your Underwear to Satellites Monitoring Your Every Move, Find Out Who's Tracking You and What You Can Do about It
Lee, Forest
Book
2011
An expose and explanation of the little-known secret surveillance programs run by both the public and private sectors, including practical steps on how to keep your private life private.
Spying on DemocracyGovernment Surveillance, Corporate Power, and Public Resistance
Boghosian, Heidi
Book
2013
Heidi Boghosian documents the disturbing increase in surveillance of ordinary citizens and the danger it poses to our privacy, our civil liberties, and to the future of democracy itself.
The WatchersThe Rise of America's Surveillance State
Harris, Shane
Book
2010
An exploration of how and why the American government increasingly spies on its own citizens.