Sources Directory     A to Z Index     Topic Index News Releases     RSS Sources Select News RSS Feed     Sources Calendar      

Surveillance: Experts and Sources
Sources Directory - Subject Index


Sources Experts & Spokespersons

News Releases

An Open Letter to the Members of the Wassenaar Arrangement
2014-12-04
Reporters without Borders
As members of the Coalition Against Unlawful Surveillance Exports (CAUSE), Reporters Without Borders, Amnesty International, Digitale Gesellschaft, the International Federation for Human Rights (FIDH)...
Companies that cooperate with dictatorships must be sanctioned
2011-09-06
Reporters without Borders
Reporters Without Borders condemns the criminal cooperation that exists between many western companies, especially those operating in the new technology area, and authoritarian regimes.
Draconian cyber security bill could lead to Internet surveillance and censorship
2012-04-12
Reporters without Borders
Reporters Without Borders is deeply concerned with the Cyber Intelligence Sharing and Protection Act of 2011 (CISPA), the cyber security bill now before the US Congress.
EFF Calls Out DOJ for Failing to Provide Crucial Public Information in NSA Case
2014-01-19
Electronic Frontier Foundation
Latest Filing in Jewel v. NSA Demands Documents Government Is Trying to Conceal
EFF Demands Release of More Secret Surveillance Court Rulings
2014-05-09
Electronic Frontier Foundation
In a continuing campaign to uncover the government's secret interpretations of the surveillance laws underlying the National Security Agency (NSA)'s spying programs, the Electronic Frontier Foundation...
EFF Launches IFightSurveillance.org and Counter-Surveillance Success Stories
2014-10-20
Electronic Frontier Foundation
Sites Highlight How Opponents of Mass Surveillance Around the World Lead by Example
EFF Wins Battle Over Secret Legal Opinions on Government Spying
2015-02-02
The Electronic Frontier Foundation (EFF) has won its four-year Freedom of Information Act lawsuit over secret legal interpretations of a controversial section of the Patriot Act.
Electronic Frontier Foundation to Court: There's No Doubt the Government Destroyed NSA Spying Evidence
2014-06-02
Electronic Frontier Foundation
The Electronic Frontier Foundation (EFF) told a federal court today that there was no doubt that the government has destroyed years of evidence of NSA spying -- the government itself has admitted to i...
Free Speech Groups Issue New Guide to the International 'Necessary & Proportionate Principles'
2014-06-02
Electronic Frontier Foundation
EFF and ARTICLE 19 Urges Governments to Preserve Fundamental Freedoms in the Age of Mass Surveillance
How can you protect yourself from online snooping?
2013-06-13
Reporters without Borders
Reporters Without Borders has published an Online Survival Kit on its WefightCensorship.org website that has tools and practical advice that will allow you to protect your communications and data.
Huge Global Coalition Stands Against Unchecked Surveillance
2013-07-31
Electronic Frontier Foundation
More than 100 organizations from across the globe are taking a stand against unchecked communications surveillance, calling for the governments around the world to follow international human rights l...
Human rights organisations alarmed by bill that will give surveillance agencies dangerous new powers
2015-03-26
Reporters without Borders
Privacy International, Amnesty International, FIDH, the French League for Human Rights and Reporters Without Borders are alarmed by the expansive surveillance powers to be granted to surveillance agen...
Human Rights Watch Sues DEA Over Bulk Collection of Americans' Telephone Records
2015-04-10
Electronic Frontier Foundation
EFF Lawsuit Challenges Drug Enforcement Administration Surveillance of International Call Records
IFJ Condemns U.S. Justice Dept for Secretly Gathering Associated Press Records
2013-05-20
International Federation of Journalists
The International Federation of Journalists (IFJ) has joined its affiliate, the Newspaper Guild-CWA, in condemning the U.S. Justice Department for secretly gathering the phone records of Associated Pr...
Journalists Welcome European Call to Review Anti-Terrorism Laws
2009-06-01
International Federation of Journalists
Ministers of the human rights network of the Council of Europe have called on their governments to review anti-terrorism laws in the face of strong criticism from journalists that some laws are in pra...
New Behind-the-Scenes Video: Airship Flight Over the NSA Data Center
2014-08-09
Electronic Frontier Foundation
The Internet's Own Boy Director Brian Knappenberger Releases Short Doc as Senate Introduces New Reform Bill
New Street-Level Surveillance Project Tracks Spying Technologies Used by Local Law Enforcement
2015-08-09
Electronic Frontier Foundation
EFF Web Portal Provides In-Depth Resources About License Plate Readers, Biometric Collection, and Other High-Tech Surveillance Tools.
Reporters Without Borders and Torservers.net, partners against online surveillance and censorship
2014-04-29
Reporters Without Borders
Reporters Without Borders and Torservers.net have joined forces to create and maintain 250 additional relays for the Tor network.
Seizure of AP phone records condemned as 'grave violation'
2013-05-20
Reporters without Borders
Reporters Without Borders regards the US Department of Justice's seizure of the records of thousands of Associated Press phone calls as an "extremely grave violation of freedom of information."
Sources welcomes Eugene Oscapella, Barrister and Solicitor/Oscapella and Associates
2009-07-23
Eugene Oscapella, Barrister and Solicitor/Oscapella and Associates
Sources welcomes Eugene Oscapella, Barrister and Solicitor/Oscapella and Associates.
The Day We Fight Back Against Mass Surveillance: February 11, 2014
2014-01-28
Electronic Frontier Foundation
On February 11, on the Day We Fight Back, the world will demand an end to mass surveillance in every country, by every state, regardless of boundaries or politics.

Sources Select Resources

Australian government orders ASIO raids to suppress East Timor spying evidence
Head, Mike
Article
2013
World Socialist Web Site
The Abbott governmen ordered Australian Security Intelligence Organisation (ASIO) and Australian Federal Police (AFP) raids on the homes and offices of a lawyer and former intelligence agency whistleb...
Big Brother's Getting Bigger
Smith, Jack A.
Article
2012
Countercurrents
Government surveillance and attacks on the privacy of American citizens were bad enough under the Bush regime but they are getting even worse during the Obama years.
Big Oil's Chokehold on Canadian Democracy
Dobbin, Murray
Article
2014
CounterPunch
The fight against Big Oil corporatism may be the most important one you ever support.
The Big Secret That Makes the FBI's Anti-Encryption Campaign a Big Lie
McLaughlin, Jenna
Article
2015
The Intercept
McLaughlin discusses how hacking techniques and their increasing use are justified in a prevalent way by the American government.
BitTorrent study finds most file-sharers are monitored
Article
2012
BBC
Anyone using file-sharing service BitTorrent to download the latest film or music release is likely to be monitored, UK-based researchers suggest. A Birmingham University study indicates that a file-s...
The boss is spying
Lin, Htun
Article
2013
News & Letters
The data mining by large U.S. corporations gets less attention than U.S. government surveillance. It goes beyond the tracking of every mouse-click, purchase and "like" registered by every consumer on ...
Bringing the Battlefield to the Border
The Wild World of Border Security and Boundary Building in Arizona
Miller, Todd
Article
2012
CounterPunch
The U.S.-Mexican border has not only become Ground Zero for every experiment in immigration enforcement and drug interdiction, but also the incubator, testing site, showcase, and staging ground for ev...
Canada's Spy Groups Divulge Secret Intelligence to Energy Companies
Groves, Tim
Article
2012
The Dominion
Documents raise fears that info on environmentalists, indigenous groups and more shared with industry at biannual, secret-level, briefings.
Companies that cooperate with dictatorships must be sanctioned
Sources News Release
Article
2011
Reporters without Borders
Reporters Without Borders condemns the criminal cooperation that exists between many western companies, especially those operating in the new technology area, and authoritarian regimes.
The Computers are Listening
How the NSA Converts Spoken Words Into Searchable Text
Froomkin,Dan
Article
2015
The Intercept
Top-secret documents from the archive of Edward Snowden show the National Security Agency can now automatically recognize the content within phone calls by creating rough transcripts and phonetic repr...
Connexions Library: Human Rights and Civil Liberties Focus
Website
Connexions Information Sharing Services
Selected articles, books, websites and other resources on civil liberties and human rights.
Corporate Coercion and the Drive to Eliminate Buying with Cash
Nader, Ralph
Article
2018
Counterpunch
Consumer freedom and privacy are examined as coercive commercialism quickly moves toward a cashless economy, when all consumers are forced into corporate payment systems from credit/debit cards, mobil...
The Corporate State of Surveillance
Opting Out
Nader, Ralph
Article
2013
CounterPunch
America was founded on the ideals of personal liberty, freedom and democracy. Now mass spying, surveillance and the unending collection of personal data undermine civil liberties and our privacy right...
Corporations Spy on Nonprofits with Impunity
Dow Chemical vs. Greenpeace
Nader, Ralph
Article
2014
CounterPunch
Here's a dirty little secret you won't see in the daily papers: corporations conduct espionage against US nonprofit organizations without fear of being brought to justice.
CSE monitors millions of Canadian emails to government
Hildebrandt, Amber; Seglins, Dave; Pereira, Michael
Article
2015
CBC
Canada's electronic spy agency collects millions of emails from Canadians and stores them for "days to months" while trying to filter out malware and other attacks on government computer networks.
Data Mining You
How the Intelligence Community Is Creating a New American World
Engelhardt, Tom
Article
2012
TomDispatch.com
Joseph K., that icon of single-lettered anonymity from Franz Kafka’s novel The Trial, would undoubtedly have felt right at home in Washington.
Devices that track, spy on cellphones found at Montreal's Trudeau airport
Radio-Canada's Brigitte Bureau
Article
2017
CBC News
CBC Radio-Canada investigation already found electronic surveillance devices near Parliament Hill.
#DomesticExtremist trend mocks UK police surveillance of protesters
Article
2015
RT
Non-conformists across the UK are taking to social media to declare themselves #DomesticExtremists in a bid to raise awareness about secretive police powers.
Eavesdropping on the Planet
The Inalienable Right to Snoop?
Blum, William
Article
2013
CounterPunch
Like a mammoth vacuum cleaner in the sky, the National Security Agency (NSA) sucks it all up: home phone, office phone, cellular phone, email, fax, telex … satellite transmissions, fiber-optic communi...
Edward Snowden's Warning to Canada
Snowden, Edward
Article
2015
The Tyee
Whistleblower Edward Snowden talks about Bill C-51 and the weak oversight of Canada's intelligence agencies.
EFF Demands Release of More Secret Surveillance Court Rulings
Sources News Release
Article
2014
Electronic Frontier Foundation
In a continuing campaign to uncover the government's secret interpretations of the surveillance laws underlying the National Security Agency (NSA)'s spying programs, the Electronic Frontier Foundation...
EFF Launches IFightSurveillance.org and Counter-Surveillance Success Stories
Sources News Release
Article
2014
Electronic Frontier Foundation
Sites Highlight How Opponents of Mass Surveillance Around the World Lead by Example
Electronic Frontier Foundation to Court: There's No Doubt the Government Destroyed NSA Spying Evidence
Sources News Release
Article
2014
Electronic Frontier Foundation
The Electronic Frontier Foundation (EFF) told a federal court today that there was no doubt that the government has destroyed years of evidence of NSA spying -- the government itself has admitted to i...
Email privacy
Wikipedia article
Article
2012
Email privacy is the broad topic dealing with issues of unauthorized access and inspection of electronic mail. This unauthorized access can happen while an email is in transit, as well as when it is s...
Eyes Wide Open
Article
2013
Privacy International
The recent revelations, made possible by NSA-whistleblower Edward Snowden, of the reach and scope of global surveillance practices have prompted a fundamental reexamination of the role of intelligence...
Facebook and the Rise of Anti-Social Media
Urie, Rob
Article
2018
CounterPunch
For those who haven't thought about it, the internet is insidious because of the very capacity that Cambridge Analytica claims to be able to exploit: customization. Users have limited ability to confi...
Fake cell phone 'towers' may be spying on Americans' calls, texts
Munoz, Eduardo
Article
2014
RT
More than a dozen 'fake cell phone towers' could be secretly hijacking Americans' mobile devices in order to listen in on phone calls or snoop on text messages, a security-focused cell phone company c...
FBI Ignored Deadly Threat to Occupiers
US Intelligence Machine Instead Plotted with Bankers to Attack Protest Movement
Lindorff, Dave
Article
2012
CounterPunch
Dcuments show that the FBI and other intelligence and law enforcement agencies began a campaign of monitoring, spying and disrupting the Occupy Movement at least two months before the first occupation...
The FBI's secret biometrics database they don't want you to see
Article
2016
RT
The Federal Bureau of Investigation (FBI) wants to prevent information about its creepy biometric database, which contains fingerprint, face, iris, and voice scans of millions of Americans, from getti...
The FBI's Secret Rules
President Trump has inherited a vast domestic intelligence agency with extraordinary secret powers.
Currier, Cora; McLaughlin, Jenna; Aaronson, Trevor; Speri, Alice
Article
2017
The Intercept
A collection of articles exploring the contents and implications of a cache of internal FBI manuals, offering a rare window into the FBI’s quiet expansion since 9/11.
Fighting Secrecy and the National Security State
An Interview With Birgitta Jonsdottir, the Co-Producer of WikiLeaks's "Collateral Murder" Video
Bernstein, Dennis
Article
2013
Counter Punch
An interview with Iceland Member of Parliament Birgitta Jonsdottir of the Pirate Party on the status of the international struggle against government secrecy and surveillance.
For journalists, danger lurking in your email
O'Brien, Danny
Article
2012
Committee to Protect Journalists
Citizen Lab provided a disturbing look into the likely use of a commercial surveillance program, FinFisher, to remotely invade and control the computers of Bahraini activists. After the software insta...
Free Speech Groups Issue New Guide to the International 'Necessary & Proportionate Principles'
Sources News Release
Article
2014
Electronic Frontier Foundation
EFF and ARTICLE 19 Urges Governments to Preserve Fundamental Freedoms in the Age of Mass Surveillance
French surveillance law passes National Assembly, but it's not the last word
Marthoz, Jean-Paul
Article
2015
Comittee to Protect Journalists
After the Chalie Hebdo and Hyper Catcher killings, the French National Assembly authorized clandestine intelligence operations for mobile devices and the internet. While the french patriot act has alr...
GCHQ and European spy agencies worked together on mass surveillance
Borger, Julian
Article
2013
Guardian Weekly
Edward Snowden papers unmask close technical cooperation and loose alliance between British, German, French, Spanish and Swedish spy agencies.
Genetic Testing of Citizens Is a Backdoor into Total Population Surveillance by Governments and Companies
Wallace, Helen
Article
2014
Independent Science News
The new Chief Executive of the National Health Service (NHS) in England, Simon Stevens, was recently reported arguing that the NHS must be transformed to make people’s personal genetic information the...
Google keeps tracking you even when you specifically tell it not to: Maps, Search won't take no for an answer
McCarthy, Kieren
Article
2018
The Register
Google has admitted that its option to "pause" the gathering of your location data doesn't apply to its Maps and Search apps – which will continue to track you even when you specifically choose to hal...
Google voice search records and keeps conversations people have around their phones - but the files can be deleted
Griffin, Andrew
Article
2016
Indepedent
How google search can record and store conversations picked up by a phone's microphone, as well as how to prevent this and delete the stored files.
Google's new advertising program tracks offline line shoppers, violates privacy
Varlin, Josh
Article
2017
World Socialist Web Site
The privacy watchdog Electronic Privacy Information Center (EPIC) filed a formal complaint against Google alleging that the company's new advertising program violates consumer privacy.
Government Spying Aims to Silence Us
Spritzler, John
Article
2013
New Democracy World
What the ruling class is aiming at, with these occasional "leaks" about its spying on us, is not so much to collect information about us but rather to make us feel so totally spied upon that we will b...
GovernmentSources.ca
Website
A portal with information about government, Canadian and international, with articles, documents, books, websites, and experts and spokespersons. The home page features a selection of recent and impor...
Here come the thought police
Spratt, Michael; Moore, Chelsea
Article
2014
ipolitics.ca
Canadian Prime Minister Stephen Harper has declared his intention to fast-track legislation expanding CSIS and police powers of “surveillance, detention and arrest.”
How California police are tracking your biometric data in the field
Agencies are using mobile fingerprint scanners, tattoo and facial recognition software
Brown, J Pat; Maass, Dave
Article
2015
EFF and MuckRock
EFF and MuckRock got together to reveal how state and local law enforcement agencies are using mobile biometric technology in the field by filing public records requests around the country. Thousands ...
How can you protect yourself from online snooping?
Sources News Release
Article
2013
Reporters without Borders
Reporters Without Borders has published an Online Survival Kit on its WefightCensorship.org website that has tools and practical advice that will allow you to protect your communications and data.
How Drug Courier Profiles Begot Terrorism Watch Lists
The Drug War and the Fourth Amendment
Bovard, James
Article
2013
Counter Punch
More than a million names are now included on the catch-all terrorist watch list maintained by U.S. government agencies.
How the Government Secretly Demanded the IP Address of Every Visitor to Political News Site Indymedia.us
Article
2009
Electronic Frontier Foundation
Secrecy surrounds law enforcement's communications surveillance practices like a dense fog. Particularly shrouded in secrecy are government demands issued under 18 U.S.C. § 2703 of the Stored Communic...
How the US government secretly reads your email
Brooke, Heather
Article
2011
Guardian
Secret orders forcing Google and Sonic to release a WikiLeaks volunteer's email reveal the scale of US government snooping.
Huge Global Coalition Stands Against Unchecked Surveillance
Sources News Release
Article
2013
Electronic Frontier Foundation
More than 100 organizations from across the globe are taking a stand against unchecked communications surveillance, calling for the governments around the world to follow international human rights l...
Human rights organisations alarmed by bill that will give surveillance agencies dangerous new powers
Sources News Release
Article
2015
Reporters without Borders
Privacy International, Amnesty International, FIDH, the French League for Human Rights and Reporters Without Borders are alarmed by the expansive surveillance powers to be granted to surveillance agen...
Human Rights Watch Sues DEA Over Bulk Collection of Americans' Telephone Records
Sources News Release
Article
2015
Electronic Frontier Foundation
EFF Lawsuit Challenges Drug Enforcement Administration Surveillance of International Call Records
I, spy: Edward Snowden in exile
Rusbridger, Alan; MacAskill, Ewen
Article
2014
The Guardian
The Guardian interviews Edward Snowden, the former NSA contractor who leaked thousands of classified documents to media outlets. Snowden shares his views on the events that have occured since his exil...
If U.S. Mass Media Were State-Controlled, Would They Look Any Different?
Snowden Coverage
Cohen, Jeff
Article
2013
CounterPunch
The Edward Snowden leaks have revealed a U.S. corporate media system at war with independent journalism. Many of the same outlets that missed the Wall Street meltdown and cheer-led the Iraq invasion h...
IFJ Condemns U.S. Justice Dept for Secretly Gathering Associated Press Records
Sources News Release
Article
2013
International Federation of Journalists
The International Federation of Journalists (IFJ) has joined its affiliate, the Newspaper Guild-CWA, in condemning the U.S. Justice Department for secretly gathering the phone records of Associated Pr...
India's UID And The Fantasy Of Dataveillance
Karunakaran , Binu
Article
2009
CounterCurrents
The perils of establishing nationwide identity systems have always been a hot topic of debate in countries that attach great value to privacy and human rights of its citizens. In India, there is not e...
Information Overload
Driving a Stake Through the National Security State
Lindorff, Dave
Article
2012
CounterPunch
Here’s an idea. Let’s all start salting all of our conversations and our written communications with a selection of those 300 key words. If every liberty-loving person in America virus were to do thi...
Inside NSA, Officials Privately Criticize 'Collect It All' Surveillance
Maass, Peter
Article
2015
The Intercept
As Members of Congress struggle to agree on which surveillance programs to re-authorize before the Patriot Act expires, they might consider the unusual advice of an intelligence analyst at the Nationa...
IntelligentSearch.ca
Website
2017
Sources
A web portal featuring topics related to research and the Internet. The home page features a selection of recent and important articles. A search feature, subject index, and other research tools make ...
The Intercept
Website
A platform to report on the documents previously provided by NSA whistleblower Edward Snowden, with a long-term mission is to produce fearless, adversarial journalism across a wide range of issues.
Internet Companies: Confusing Consumers for Profit
Cordozo, Nate
Article
2015
Electronic Frontier Foundation
In the age of information, companies are hungry for your data. They want it - even if it means resorting to trickery.
Journalistic Malpractice at the Post and the Times
Rejecting the Offer of Evidence of US War Crimes
Lindorff, David
Article
2013
Counterpunch
Wikileaks source Bradley Manning is evidence that the USA’s two leading news organizations, the Washington Post and the New York Times, are not willing to report critically of the government.
Journalists Welcome European Call to Review Anti-Terrorism Laws
Sources News Release
Article
2009
International Federation of Journalists
Ministers of the human rights network of the Council of Europe have called on their governments to review anti-terrorism laws in the face of strong criticism from journalists that some laws are in pra...
Keystone Cops Sex Registry
Cain, Patrick
Article
1998
NOW
Washroom sex might show up on Ontario's new offender list, but real pedophiles will probably go free.
The Last Post Files: Fighting subversion or protecting the government from embarrassment?
Weinberg, Paul
Article
2013
J Source - The Canadian Jorunalism Project
The Last Post was one of the best alternative publications of the 1970s. While the small team of journalists was creating solid investigative journalism, the RCMP Security Service was keeping a close ...
Lessons of the Snowden Revelations
You are the Target!
Lopez, Alfredo
Article
2013
CounterPunch
We in the Left have long worried about “police state tactics”. Now we have to confront the police state structure. It’s here and it can morph into a real police state with very little effort. Opposing...
Location Tracking: A Pervasive Problem in Modern Technology
Schoen, Seth
Article
2013
Electronic Frontier Foundation
NSA is tracking people around the Internet and the physical world. These newly-revealed techniques hijacked personal information that was being transmitted for some commercial purpose, converting it i...
The Logic behind Mass Spying: Empire and Cyber Imperialism
Petras, James
Article
2013
Dissident Voice
Revelations about the long-term global, intrusive spying by the US National Security Agency (NSA) and other allied intelligence apparatuses have provoked widespread protests and indignation and threat...
Mass Incarceration for Profit
Dolinar, Brian; Kilgore, James
Article
2015
Against the Current
In the face of growing public criticism and improved technologies, companies like Securus search for new ways to remain competitive while marketing themselves as providers of a quality service that ke...
Mass Surveillance is Driven by the Private Sector
The Lesson of Hacking Team's Malware
Blunden, Bill
Article
2015
CounterPunch
A report published by Privacy International as well as an article posted by Vice Motherboard clearly show that both the DEA and the United States Army have long-standing relationships with Hacking Tea...
Met police using surveillance system to monitor mobile phones
Gallagher, Ryan; Syal, Rejeev
Article
2011
Guardian
Civil liberties group raises concerns over Met police purchase of technology to track public handsets over a targeted area.
Metadata Is More Intrusive Than Direct Listening Of Phone Calls Says Snowden
Countercurrents
Article
2014
Countercurrents
Government monitoring of “metadata” is more intrusive than directly listening to phone calls or reading emails.
Microsoft handed the NSA access to encrypted messages
Greenwald, Glenn, et. al
Article
2013
Guardian Weeky
Microsoft has collaborated closely with US intelligence services to allow users' communications to be intercepted, including helping the National Security Agency to circumvent the company's own encryp...
Mistaking Omniscience for Omnipotence
In a World Without Privacy, There Are No Exemptions for Our Spies
Engelhardt, Tom
Article
2013
TomDispatch.com
Given how similar they sound and how easy it is to imagine one leading to the other, confusing omniscience (having total knowledge) with omnipotence (having total power) is easy enough. It’s a reasona...
New Documents and Reports Confirm AT&T and NSA's Longstanding Surveillance Partnership
Rumold, Mark
Article
2015
Electronic Frontier Foundation
Reports today in the New York Times and ProPublica confirm what EFF's Jewel v. NSA lawsuit has claimed since 2008 -- that the NSA and AT&T have collaborated to build a domestic surveillance infrastruc...
The New Police Surveillance State
The Rising Price of Political Assembly
Rosen, David
Article
2012
CounterPunch
Police are increasingly being deployed to restrict if not prevent mass political actions, especially directed at the banks.
No News is Not Good News
Cops Taping Protesters & Journalists
Lindorff, Dave
Article
2010
CounterPunch
If cops photograph and videotape protesters and journalists, it's news if it happens in China, but when it happens in the U.S., as it routinely does, the media are silent.
No Safe Harbor: How NSA Spying Undermined U.S. Tech and Europeans' Privacy
O'Brien, Danny
Article
2015
Electronic Frontier Foundation
The spread of knowledge about the NSA's surveillance programs has shaken the trust of customers in U.S. Internet companies like Facebook, Google, and Apple: especially non-U.S. customers who have disc...
NSA and GCHQ target Tor network that protects anonymity of web users
Ball, James; Schneier, Bruce; Greenwald, Glenn
Article
2013
Guardian Weekly
The National Security Agency has made repeated attempts to develop attacks against people using Tor, a popular tool designed to protect online anonymity, despite the fact the software is primarily fun...
The NSA Has Effectively Destroyed Internet Privacy
Snowden's Latest
Lopez, Alfredo
Article
2013
Counter Punch
Whistle-blower Edward Snowden prove that the NSA, working with its British counterpart the Government Communications Headquarters has conducted an intentional and largely sucessful campaign to destroy...
NSA learning how to snoop on pacemakers
Article
2016
RT
The NSA is seeking new ways to satisfy its hunger for raw data by exploiting the so-called internet of things, an emerging network connecting objects such as vehicles, home appliances and biomedical d...
NSA surveillance may cause breakup of internet, warn experts
Taylor, Matthew; Hopkins, Nick; Kiss, Jemima
Article
2013
Internet specialists highlight moves by Brazil, Germany and India towards creating separate networks in order to block spying.
Obama defiant over NSA revelations ahead of summit with Chinese premier
Ackerman, Spencer; Roberts, Dan
Article
2013
Guardian
President says oversight of NSA surveillance programme should be left to Congress in comments criticising media 'hype.'
The Obliteration of Privacy
Snowden and the NSA
Kandutsch, Carl E
Article
2014
CounterPunch
It’s remarkable how little outrage Edward Snowden’s NSA revelations have provoked in the American public. One often heard response is something like, “Well, I don’t have anything to hide, so I don’t c...
Old New York Police Surveillance Is Found, Forcing Big Brother Out of Hiding
Goldstein, Joseph
Article
2016
The New York Times
From the mid-1950s to the early 1970s, police surveillance of political organizations in New York was extensive enough to require more than half a million index cards, simply to catalog and cross-refe...
On Locational Privacy, and How to Avoid Losing it Forever
Blumberg, Andrew J.; Eckersley, Peter
Article
2009
Electronic Frontier foundation
Over the next decade, systems which create and store digital records of people's movements through public space will be woven inextricably into the fabric of everyday life. We are already starting to ...
Online Survival Kit
Article
2013
Reporters Without Borders
This Online Survival Kit offers practical tools, advice and techniques that teach you how to circumvent censorship and to secure yo communications and data. This handbook will gradually be unveiled ov...
An Online Tracking Device That’s Virtually Impossible to Block
Angwin, Julia
Article
2014
Canadian Progressive
A new kind of tracking tool, canvas fingerprinting, is being used to follow visitors to thousands of top websites, from WhiteHouse.gov to YouPorn.
The Orwellian Re-Branding of 'Mass Surveillance' as Merely 'Bulk Collection'
Greenwald, Glenn
Article
2015
The Intercept
Just as the Bush administration and the U.S. media re-labelled "torture" with the Orwellian euphemism "enhanced interrogation techniques" to make it more palatable, the governments and media of the Fi...
Orwell's Triumph: How Novels Tell the Truth of Surveillance
Frank, Sam
Article
2015
The Intercept
Novels may be the best medium for describing a distopian world in which everyone is under constant surveillance.
The Other Police State
Private Cops vs. the Public Good
Rosen, David
Article
2013
CounterPunch
A revealing study on "Spooky Business: A New Report on Corporate Espionage Against Non-profits" written by Gary Ruskin confirms one’s worst suspicions about the ever-expanding two-headed U.S. security...
Other Voices: The Connexions Newsletter - July 17, 2014
Gaza
Diemer, Ulli (editor); Khan, Tahmid (production)
Serial Publication (Periodical)
2014
Connexions
Topic of the week is Gaza, which was under attack by Israel as this issue appeared. Articles on surveillance capitalism, the tactics and successes of the movement for same-sex marriage in the United S...
Other Voices: The Connexions Newsletter - September 4, 2014
Diemer, Ulli (editor); Khan, Tahmid (production)
Article
2014
Connexions
Information about the Connexions Alternative Media List and the Labor Film Archive. Articles on corporations spying on non-profits, workplace deaths, Monsanto and Ukraine, and liberal environmentalism...
Other Voices: The Connexions Newsletter - October 30, 2014
Refugees
Diemer, Ulli (editor); Khan, Tahmid (production)
Serial Publication (Periodical)
2014
Connexions
Topic of the week is Refugees. Featured articles look at migration, counter-surveillance resources, farmers in Ghana fighting to retain the freedom to save their own seeds, and rebuilding communities ...
Other Voices: The Connexions Newsletter - January 29, 2015
Land seizures and land take-overs
Diemer, Ulli (editor); Khan, Tahmid (production)
Serial Publication (Periodical)
2015
Connexions
This issue of Other Voices focuses on the issue of land seizures and land take-overs. Also included: Greece's solidarity movement, and the challenges and opportunities it faces after the election of a...
Other Voices: The Connexions Newsletter - February 26, 2015
Ukraine
Diemer, Ulli (editor); Khan, Tahmid (production)
Serial Publication (Periodical)
2015
Connexions
Ukraine is spotlighted in this issue of Other Voices, with several articles on the events of the past year, from the overthrow of the government, to the rise of the far right, the armed conflict in th...
Other Voices: The Connexions Newsletter - March 12, 2015
Organizing
Diemer, Ulli (editor); Khan, Tahmid (production)
Serial Publication (Periodical)
2015
Connexions
The focus of this issue is organizing. How can we challenge and overcome entrenched structures of economic and political power? Our own source of power is our latent ability to join together and work ...
Other Voices: The Connexions Newsletter - July 3, 2015
Greece and thd debt crisis
Diemer, Ulli (editor); Rickwood, Darien Yawching (production)
Serial Publication (Periodical)
2015
Connexions
Our spotlight this issue is on the debt crisis facing Greece. To understand the crisis, one has to look beyond the mainstream media to alternative sources of information. We've done that, with article...
Other Voices: The Connexions Newsletter - July 2, 2016
Brexit, Jeremy Corbyn, and Contempt for Democracy
Diemer, Ulli (ed.)
Article
2016
Connexions
Brexit, the British vote to leave the European Union, has thrown the political elites into turmoil and confusion. The referendum was supposed to be a safe political manoeuvre, a way to produce an appe...
Other Voices: The Connexions Newsletter - April 30, 2017
Affirming life, resisting war, reporting UFOs
Diemer, Ulli (ed.)
Serial Publication (Periodical)
2017
Connexions
What do we do when those in power recklessly put the future of the entire planet at risk with their acts of aggression and military provocations, while they ignore the growing disaster of climate chan...
Other Voices: The Connexions Newsletter - July 22, 2017
Secrecy and Power
Diemer, Ulli (ed.)
Serial Publication (Periodical)
2017
Connexions
Secrecy is a weapon the powerful use against their enemies: us. This issue of Other Voices explores the relationship of secrecy and power.
Pakistan: Intelligence agency sought to tap all communications traffic, documents reveal
Rice, Mathew
Article
2015
Privacy International
Every government seems to want to spy in Pakistan. The US National Security Agency (NSA) tapped the fibre optic cables landing in Karachi, among others, and used 55 million phone records harvested fro...
Police log 'domestic extremists' and keep database on activists
Forces survey and file details of peaceful protests and political activities
Lewis, Paul; Evans, Rob; Taylor, Matthew
Article
2009
The Guardian
'Domestic Extremists' are persons involved in political meetings and protests who are photographed and added to a national database by the UK police. This surveillance falls under the purview of "ter...
The Police State is Real
It Has Happened Here
Roberts, Paul Craig
Article
2013
CounterPunch
The Bush regime’s response to 9/11 and the Obama regime’s validation of this response have destroyed accountable democratic government in the United States. So much unaccountable power has been concen...
Police State: US Government-Funded Database Created to Track "Subversive Propaganda" Online
MacEgan, Matthew
Article
2014
Global Research
The creation of the Truthy database by Indiana University researchers has drawn sharp criticism from free-speech advocates and others concerned over government censorship of political expression.
Political activist Ken Stone takes CSIS to task for alleged harassment
Weinberg, Paul
Article
2015
rabble.ca
What is it like to be targeted by Canada's spy agency? Veteran anti-war and environmental activist Ken Stone knows firsthand and is willing to talk about it.
Preparing for a Digital 9/11
Greenberg, Karen
Article
2012
TomDispatch
In recent years, in one of the more dangerous, if largely undiscussed, developments of our time, the Bush and then Obama administrations have launched the first state-planned war in cyber space. First...
Profiled
From Radio to Porn, British Spies Track Web Users' Online Identities
Gallagher, Ryan
Article
2015
The Intercept
Amid a renewed push from the U.K. government for more surveillance powers, more than two dozen documents being disclosed by The Intercept reveal for the first time several major strands of GCHQ’s (Gov...
Radio Frequency ID Removes Freedom
Article
2006
Radio Frequency ID violates the Charter of Rights and Freedoms and is part of the stealthy forging of a police state.
Raleigh police are asking Google to provide user data for all people near crime scenes
Article
2018
Police in Raleigh, North Carolina, have presented Google with warrants to obtain data from mobile phones from not just specific suspects who were in a crime scene area, but from the mobile phones of a...
Real-Time Face Recognition Threatens to Turn Cops' Body Cameras Into Surveillance Machines
Kofman, Ava
Article
2017
The Intercept
For years, the development of real-time face recognition has been hampered by poor video resolution, the angles of bodies in motion, and limited computing power. But as systems begin to transcend thes...
Reflections on a whistleblower: Two years after Snowden
Tzabiras, Marianna
Article
2015
IFEX
Two years after Snowden, the international state of surveillance and the ranks of whistleblowers both continue to grow.
Reporters Without Borders and Torservers.net, partners against online surveillance and censorship
Sources News Release
Article
2014
Reporters Without Borders
Reporters Without Borders and Torservers.net have joined forces to create and maintain 250 additional relays for the Tor network.
The Return of COINTELPRO?
Time to Target the Real Terrorists
McNamara, Tom
Article
2013
CounterPunch
The FBI was using its offices and agents across the country as early as August 2011 to engage in a massive surveillance scheme against Occupy Wall Street. The documents show a government agency at its...
Revealed: How DOJ Gagged Google over Surveillance of WikiLeaks Volunteer
Gallagher, Ryan
Article
2015
The Intercept
The Obama administration fought a legal battle against Google to secretly obtain the email records of a security researcher and journalist associated with WikiLeaks.
San Diego's Facial Recognition Program Shows Why We Need Records on Police Use of Mobile Biometric Technology
Maass, David
Article
2015
Electronic Frontier Foundation
The New York Times has a story out on how San Diego police use mobile facial recognition devices in the field, including potentially on non-consenting residents who aren't suspected of a crime. One ac...
Seizure of AP phone records condemned as 'grave violation'
Sources News Release
Article
2013
Reporters without Borders
Reporters Without Borders regards the US Department of Justice's seizure of the records of thousands of Associated Press phone calls as an "extremely grave violation of freedom of information."
The Servility of the Satellites
The Snowden Affair and the Destruction of Effective Democracy in Europe
Johnstone, Diana
Article
2013
CounterPunch
Recent revelations confirm the completion of the transformation of the "Western democracies" into something else, an entity that as yet has no recognized name. The outrage against the Bolivian Preside...
Snowden leak: MI5 has gathered so much data it may actually be missing 'life-saving intelligence'
Article
2016
Al Jazeera
British spies may have missed potentially "life-saving intelligence" because their surveillance systems were sweeping up more data than could be analyzed, a leaked classified report reveals. The docum...
Snowden, Surveillance And The Secret State
Cromwell, David; Edwards, David
Article
2013
Media Lens
There is plenty to be said about living under a giant system of government surveillance. Just don't expect the corporate media to explore the full extent of what it really all means.
Snowden's NSA Leaks Catalogued In First Searchable Database Of The Surveillance Documents
Halleck, Thomas
Article
2015
International Business Times
Canadian journalists and researchers have teamed up to create the world's first fully-searchable index of the classified documents revealing NSA surveillance leaked by whistleblower Edward Snowden.
A Social History of Wiretaps
Memory's Half-Life
Price, David
Article
2013
Counter Punch
American’s century-long distrust of electronic surveillance is shifting to Americans accepting and internalizing new levels of state surveillance.
Software Meant to Fight Crime Is Used to Spy on Dissidents
Perlroth, Nicole
Article
2012
New York Times
Morgan Marquis-Boire works as a Google engineer and Bill Marczak is earning a Ph.D. in computer science. But this summer, the two men have been moonlighting as detectives, chasing an elusive surveilla...
Sources HotLink - June 30, 2016
Serial Publication (Periodical)
2016
Sources
Articles about the FBI and the information it gathers, Donald Trump and the media, and the role of pharmaceutical companies in suppressing information.
Spies Hacked Computers Thanks to Sweeping Secret Warrants, Aggressively Stretching U.K. Law
Fishman, Andrew; Greenwald, Glenn
Article
2015
The Intercept
British spies have received government permission to intensively study software programs for ways to infiltrate and take control of computers. The GCHQ spy agency was vulnerable to legal action for th...
The Spy Who Fired Me
The human costs of workplace monitoring
Kaplan, Esther
Article
2015
Harper's Magazine
Kaplan discusses the growing practice of employers monitoring the internet use of their employees.
Spying by the Numbers
Hundreds of Thousands Subject to Government Surveillance and No Real Protection
Quigley, Bill
Article
2013
CounterPunch
Thanks to NSA whistleblower Edward Snowden many more people in the US and world-wide are learning about extensive US government surveillance and spying. There are publicly available numbers which sho...
The Stasi could only dream of such data
Britain, the birthplace of liberalism, has become the database state
Ash, Timothy Garton
Article
2008
Guardian Weekly
As technology increases the flow of stored data about individual actions, assurances of the "right to informational self-determination" must be hard won from governments. Government surveillance of ci...
Surveillance and the Corporate State
Spying, Control and Murder Under the Imperial Presidency
Urie, Rob
Article
2013
Counter Punch
With all of the fear mongering the subject has received in recent decades, Americans have in fact had remarkably little to fear directly from ‘terrorism.’
Surveillance Capitalism
Monopoly-Finance Capital, the Military-Industrial Complex, and the Digital Age
Foster, John Bellamy; McChesney, Robert W.
Article
2014
Monthly Review
A massive corporate sales effort and military-industrial complex constituted the two main surplus-absorption mechanisms in the U.S. economy in the first quarter-century after the Second World War, fol...
Surveillance company Hacking Team's relationships with repressive regimes exposed
Privacy International
Article
2015
Privacy International
A 400 gigabyte trove of internal documents belonging to surveillance company Hacking Team has been released online. Hacking team sells intrusive hacking tools that have allegedly been used by some of ...
Surveillance firms spied on campaign groups for big companies, leak shows
Evans, Rob; Jones, Meirion
Article
2017
The Guardian
British Airways, the Royal Bank of Scotland and Porsche are among five large companies that have been identified as having paid corporate intelligence firms to monitor political groups that challenged...
Surveillance Self-Defense
Website
2018
Electronic Fronteri Foundation
Modern technology has given those in power new abilities to eavesdrop and collect data on innocent people. Surveillance Self-Defense is EFF's guide to defending yourself and your friends from surveill...
Surveillance USA
NSA and the PRISM Project
Kampmark, Binoy
Article
2013
CounterPunch
The government is merrily going about its business of keeping tabs on you in virtually every conceivable way.
Ten Steps You Can Take Right Now Against Internet Surveillance
O'Brien, Danny
Article
2013
Electronic Frontier Foundation
One of the trends we've seen is how, as the word of the NSA's spying has spread, more and more ordinary people want to know how (or if) they can defend themselves from surveillance online. With a few ...
The Terrifying World of Electronic Monitoring
From Drone Strikes to Martha Stewart
Kilgore, James
Article
2013
Counter Punch
Electronic monitoring is about tracking and marking. The GPS technology that is trending in electronic monitors tracks people’s every movement with the purpose of marking them for punishment if they d...
13 Things the Government is Trying to Keep Secret From You
Constitutional Black Out
Quigley, Bill
Article
2013
Counter Punch
The President and the Government are intentionally keeping massive amounts of information about surveillance secret.
Thirteen Ways Government Tracks Us
Quigley, Bill
Article
2012
Countercurrents
Privacy is eroding fast as technology offers government increasing ways to track and spy on citizens. Here are thirteen examples of how some of the biggest government agencies and programs track peopl...
Thousands Join Legal Fight Against UK Surveillance — And You Can, Too
Gallagher, Ryan
Article
2015
The Intercept
Thousands of people are signing up to join an unprecedented legal campaign against the United Kingdom’s leading electronic surveillance agency.
Top-Secret Document Reveals NSA Spied on Porn Habits as Part of Plan to Discredit 'Radicalizers'
Article
2013
Huffington Post
The National Security Agency has been gathering records of online sexual activity and evidence of visits to pornographic websites as part of a proposed plan to harm the reputations of those whom the a...
Two out of Three Investigative Journalists in US Believe They're Being Spied On
Lazare, Sarah
Article
2015
Common Dreams
In the wake of the NSA mass surveillance scandal, a vast majority of investigative journalists believe that the U.S. government is spying on them, and large numbers say that this belief impacts the wa...
Uber Plans to Track Users Should Not Be Allowed, Says Privacy Group
Chatterjee, Pratap
Article
2015
Corp Watch
A formal complaint has been filed against Uber, the car ride company, by the Electronic Privacy Information Center (EPIC), a non-profit advocacy group. The NGO says Uber plans to use their smart phone...
UN slams UK surveillance law, calls for privacy reforms in Canada, France and Macedonia
Article
2015
Privacy International
In yet another blow to the UK's surveillance proponents, the UN Human Rights Committee has criticised the British legal regime governing the interception of communications, observing that it allows fo...
Unmasking the Five-Eyed monster, a global and secret intelligence-sharing regime
Article
2013
IFEX
Privacy International is proud to announce our new project, Eyes Wide Open, which aims to pry open the Five Eyes arrangement and bring it under the rule of law.
Very Mention of Snowden's Name Makes Prosecutors Tremble
Froomkin, Dan
Article
2015
The Intercept
NSA whistleblower Edward Snowden has become such a powerful symbol of government overreach that federal prosecutors in a terror case in Chicago are asking the judge to forbid defense attorneys from ev...
Vodafone Reveals Existence of Secret Wires that Allow State Surveillance
Garside, Juliette
Article
2014
The Guardian
Wires allow agencies to listen to or record live conversations, in what privacy campaigners are calling a 'nightmare scenario'.
A Walking Tour of New York's Massive Surveillance Network
Currier, Cora
Article
2016
The Intercept
So it felt a bit risky to be climbing up a street pole on Wall Street to closely inspect a microwave radar sensor, or to be lingering under a police camera, pointing and gesturing at the wires and ant...
Who's the true enemy of internet freedom - China, Russia, or the US?
Morozov, Evgeny
Article
2015
The Guardian
Beijing and Moscow are rightly chastised for restricting their citizens' online access – but it's the US that is now even more aggressive in asserting its digital sovereignty.
Why Do We Expose Ourselves?
Taylor, Astra
Article
2016
The Intercept
Among critics of technological surveillance, there are two allusions so commonplace they have crossed into the realm of cliché. One, as you have probably already guessed, is George Orwell's Big Brothe...
Why you shouldn't trust Geek Squad ever again
The government reportedly pays Geek Squad technicians to dig through your PC
Patrizio, Andy
Article
2017
Network World
The Orange County Weekly reports that the company's repair technicians routinely search devices brought in for repair for files that could earn them $500 reward as FBI informants. That, ladies and gen...
WikiLeaks Vault 7 Reveals CIA Cyberwar and the Battleground of Democracy
Hayase, Nozomi
Article
2017
Dissident Voice
WikiLeaks dropped a bombshell on the U.S. Central Intelligence Agency. Code-named “Vault 7”, the whistleblowing site began releasing the largest publication of confidential documents that have come fr...
Will the government's counter-extremist programme criminalise dissent?
Kundnani, Arun
Article
2015
Spinwatch
From 1 July, a broad range of public bodies - from nursery schools to optometrists - will be legally obliged to participate in the U.S. government’s Prevent policy to identify would-be extremists. Und...
With Power of Social Media Growing, Police Now Monitoring and Criminalizing Online Speech
Greenwald, Glenn
Article
2015
The Intercept
Criminal cases for online political speech are now commonplace in the UK, notorious for its hostility to basic free speech and press rights. As The Independent's James Bloodworth reported last week, "...
XKEYSCORE: NSA's Google for the World's Private Communications
Marquis-Boire, Morgan; Greenwald, Glenn; Lee, Micah
Article
2015
The Intercept
The NSA's XKEYSCORE program, first revealed by The Guardian, sweeps up countless people's Internet searches, emails, documents, usernames and passwords, and other private communications. XKEYSCORE is ...

Sources Bookshelf

Bold Scientists
Dispatches from the Battle for Honest Science
Riordon, Michael
Book
2014
Accounts of scientists working in the public interest despite powerful opposition.
Covert Entry
Spies, Lies and Crimes Inside Canada's Secret Service
Mitrovica, Andrew
Book
2002
A glimpse into the inner workings of Canada's secret service.
No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State
Greenwald, Glenn
Book
2014
Glenn Greenwald recounts his 10-day trip to Honk Kong where he acquired the Snowden Files. Additionally, Greenwald discusses the NSA's unprecedented abuse of power, as well as the media's habitual avo...
Secret Service
Political Policing in Canada From the Fenians to Fortress America
Whitaker, Reg; Kealey, Gregory S.; Parnaby, Andrew
Book
2012
A history of political policing in Canada.
Someone's Watching You!
From Micropchips in your Underwear to Satellites Monitoring Your Every Move, Find Out Who's Tracking You and What You Can Do about It
Lee, Forest
Book
2011
An expose and explanation of the little-known secret surveillance programs run by both the public and private sectors, including practical steps on how to keep your private life private.
Spying on Democracy
Government Surveillance, Corporate Power, and Public Resistance
Boghosian, Heidi
Book
2013
Heidi Boghosian documents the disturbing increase in surveillance of ordinary citizens and the danger it poses to our privacy, our civil liberties, and to the future of democracy itself.
Surveillance in the Time of Insecurity
Monahan, Torin
Book
2010
Threats of terrorism, natural disaster, identity theft, job loss, illegal immigration, and even biblical apocalypse — all are perils that trigger alarm in people today. Although there may be a factual...
The Watchers
The Rise of America's Surveillance State
Harris, Shane
Book
2010
An exploration of how and why the American government increasingly spies on its own citizens.


Sources is an online portal and directory for journalists, writers, news editors, researchers. Use Sources to find experts, media contacts, spokespersons, scientists, lobbyists, officials, speakers, university professors, researchers, newsmakers, CEOs, executive directors, media relations contacts, spokespeople, talk show guests, PR representatives, Canadian sources, story ideas, research studies, databases, universities, colleges, associations, businesses, government, research institutions, lobby groups, non-government organizations (NGOs), in Canada and internationally.
© Sources 1977-2021. The information provided is copyright and may not be reproduced in any form or by any means (whether electronic, mechanical or photographic), or stored in an electronic retrieval system, without written permission of the publisher. The content may not be resold, republished, or redistributed. Indexing and search applications by Ulli Diemer and Chris DeFreitas.