Communications Security

Fetch Headings.ExtraData
Below are groups and resources (books, articles, websites, etc.) related to this topic. Click on an item’s title to go its resource page with author, publisher, description/abstract and other details, a link to the full text if available, as well as links to related topics in the Subject Index. You can also browse the Title, Author, Subject, Chronological, Dewey, LoC, and Format indexes, or use the Search box.
Particularly recommended items are flagged with a red logo:

Connexions Library

The Great SIM Heist: How Spies Stole the Keys to the Encryption Castle
Scahill, Jeremy; Begley, Josh
Article
2015
American and British spies hacked into the internal computer network of the largest manufacturer of SIM cards in the world, stealing encryption keys used to protect the privacy of cellphone communicat...
How to Leak to The Intercept
Lee, Micah
Article
2015
Leaking can serve the public interest, fueling revelatory and important journalism. Here are instructions for how to leak safely.

Sources Library

CSE monitors millions of Canadian emails to government
Hildebrandt, Amber; Seglins, Dave; Pereira, Michael
2015
Canada's electronic spy agency collects millions of emails from Canadians and stores them for "days to months" while trying to filter out malware and other attacks on government computer networks.