|
Sources Experts & SpokespersonsNews ReleasesAn Open Letter to the Members of the Wassenaar Arrangement2014-12-04 Reporters without Borders As members of the Coalition Against Unlawful Surveillance Exports (CAUSE), Reporters Without Borders, Amnesty International, Digitale Gesellschaft, the International Federation for Human Rights (FIDH)... Companies that cooperate with dictatorships must be sanctioned2011-09-06 Reporters without Borders Reporters Without Borders condemns the criminal cooperation that exists between many western companies, especially those operating in the new technology area, and authoritarian regimes. Draconian cyber security bill could lead to Internet surveillance and censorship2012-04-12 Reporters without Borders Reporters Without Borders is deeply concerned with the Cyber Intelligence Sharing and Protection Act of 2011 (CISPA), the cyber security bill now before the US Congress. Sources Select ResourcesBringing the Battlefield to the BorderThe Wild World of Border Security and Boundary Building in Arizona Miller, Todd Article 2012 CounterPunch The U.S.-Mexican border has not only become Ground Zero for every experiment in immigration enforcement and drug interdiction, but also the incubator, testing site, showcase, and staging ground for ev... The Car of the Future Will Sell Your DataCoppola, Gabrielle; Welch, David Article 2018 Bloomberg As "smarter" vehicles provide storehouses of personal information, carmakers are building databases of consumer preferences that could be sold to outside vendors for marketing purposes, much like Goog... Companies that cooperate with dictatorships must be sanctionedSources News Release Article 2011 Reporters without Borders Reporters Without Borders condemns the criminal cooperation that exists between many western companies, especially those operating in the new technology area, and authoritarian regimes. The Computers are ListeningHow the NSA Converts Spoken Words Into Searchable Text Froomkin,Dan Article 2015 The Intercept Top-secret documents from the archive of Edward Snowden show the National Security Agency can now automatically recognize the content within phone calls by creating rough transcripts and phonetic repr... Eavesdropping on the PlanetThe Inalienable Right to Snoop? Blum, William Article 2013 CounterPunch Like a mammoth vacuum cleaner in the sky, the National Security Agency (NSA) sucks it all up: home phone, office phone, cellular phone, email, fax, telex … satellite transmissions, fiber-optic communi... The Face Off: Law Enforcement Use of Face Recognition TechnologyLynch, Jennifer Article 2018 Electronic Frontier Foundation Face recognition is poised to become one of the most pervasive surveillance technologies, and law enforcement's use of it is increasing rapidly. However, the adoption of face recognition technologies ... Fake cell phone 'towers' may be spying on Americans' calls, textsMunoz, Eduardo Article 2014 RT More than a dozen 'fake cell phone towers' could be secretly hijacking Americans' mobile devices in order to listen in on phone calls or snoop on text messages, a security-focused cell phone company c... How California police are tracking your biometric data in the fieldAgencies are using mobile fingerprint scanners, tattoo and facial recognition software Brown, J Pat; Maass, Dave Article 2015 EFF and MuckRock EFF and MuckRock got together to reveal how state and local law enforcement agencies are using mobile biometric technology in the field by filing public records requests around the country. Thousands ... If U.S. Mass Media Were State-Controlled, Would They Look Any Different?Snowden Coverage Cohen, Jeff Article 2013 CounterPunch The Edward Snowden leaks have revealed a U.S. corporate media system at war with independent journalism. Many of the same outlets that missed the Wall Street meltdown and cheer-led the Iraq invasion h... Information OverloadDriving a Stake Through the National Security State Lindorff, Dave Article 2012 CounterPunch Here’s an idea. Let’s all start salting all of our conversations and our written communications with a selection of those 300 key words. If every liberty-loving person in America virus were to do thi... IntelligentSearch.caWebsite 2017 Sources A web portal featuring topics related to research and the Internet. The home page features a selection of recent and important articles. A search feature, subject index, and other research tools make ... Location Tracking: A Pervasive Problem in Modern TechnologySchoen, Seth Article 2013 Electronic Frontier Foundation NSA is tracking people around the Internet and the physical world. These newly-revealed techniques hijacked personal information that was being transmitted for some commercial purpose, converting it i... Met police using surveillance system to monitor mobile phonesGallagher, Ryan; Syal, Rejeev Article 2011 Guardian Civil liberties group raises concerns over Met police purchase of technology to track public handsets over a targeted area. NSA, GCHQ mapping "political alignment" of cellphone usersNew report reveals London, Eric Article 2014 World Socialist Web Site New information made public by Edward Snowden reveals that the governments of the United States and United Kingdom are trawling data from cellphone “apps” to accumulate dossiers on the “political alig... NSA's Path to TotalitarianismEver-Shrinking Democracy in America Pollack, Norman Article 2013 CounterPunch The American National Security Agency (NSA) appears as a “rogue” organization, extremism in the putative service of liberty. Or better, call it, stripped of all cosmetics, the unerring mark of a Polic... Obama defiant over NSA revelations ahead of summit with Chinese premierAckerman, Spencer; Roberts, Dan Article 2013 Guardian President says oversight of NSA surveillance programme should be left to Congress in comments criticising media 'hype.' On Locational Privacy, and How to Avoid Losing it Forever Blumberg, Andrew J.; Eckersley, Peter Article 2009 Electronic Frontier foundation Over the next decade, systems which create and store digital records of people's movements through public space will be woven inextricably into the fabric of everyday life. We are already starting to ... Radio Frequency ID Removes FreedomArticle 2006 Radio Frequency ID violates the Charter of Rights and Freedoms and is part of the stealthy forging of a police state. Raleigh police are asking Google to provide user data for all people near crime scenesArticle 2018 Police in Raleigh, North Carolina, have presented Google with warrants to obtain data from mobile phones from not just specific suspects who were in a crime scene area, but from the mobile phones of a... Real-Time Face Recognition Threatens to Turn Cops' Body Cameras Into Surveillance MachinesKofman, Ava Article 2017 The Intercept For years, the development of real-time face recognition has been hampered by poor video resolution, the angles of bodies in motion, and limited computing power. But as systems begin to transcend thes... Selling your SecretsThe Invisible World of Software Backdoors and Bounty Hunters Chatterjee, Pratap Article 2014 CorpWatch The documents released by whistleblower Edward Snowden reveal that the world of NSA mass surveillance involves close partnerships with a series of companies most of us have never heard of that design ... Software that tracks people on social media created by defence firmGallagher, Ryan Article 2013 Guardian Raytheon's Riot program mines social network data like a 'Google for spies', drawing ire from civil rights groups. The Stasi could only dream of such dataBritain, the birthplace of liberalism, has become the database state Ash, Timothy Garton Article 2008 Guardian Weekly As technology increases the flow of stored data about individual actions, assurances of the "right to informational self-determination" must be hard won from governments. Government surveillance of ci... Three Leaks, Three Weeks, and What We've Learned About the US Government's Other Spying Authority: Executive Order 12333Jaycox, Mark M. Article 2013 Electronic Frontier Foundation The National Security Agency has been siphoning off data from the links between Yahoo and Google data centers, which include the fiber optic connections between company servers at various points aroun... Vodafone Reveals Existence of Secret Wires that Allow State SurveillanceGarside, Juliette Article 2014 The Guardian Wires allow agencies to listen to or record live conversations, in what privacy campaigners are calling a 'nightmare scenario'.
|
|
Sources is an online portal and directory for journalists, writers, news editors, researchers. Use Sources to find experts, media contacts, spokespersons, scientists, lobbyists, officials, speakers, university professors, researchers, newsmakers, CEOs, executive directors, media relations contacts, spokespeople, talk show guests, PR representatives, Canadian sources, story ideas, research studies, databases, universities, colleges, associations, businesses, government, research institutions, lobby groups, non-government organizations (NGOs), in Canada and internationally.
© Sources 1977-2021. The information provided is copyright and may not be reproduced in any form or by any means (whether electronic, mechanical or photographic), or stored in an electronic retrieval system, without written permission of the publisher. The content may not be resold, republished, or redistributed. Indexing and search applications by Ulli Diemer and Chris DeFreitas.
|