|
Communications Security
Fetch Headings.ExtraData
Below are groups and resources (books, articles, websites, etc.) related to this topic. Click on an item’s title to go its resource page with author, publisher, description/abstract and other details, a link to the full text if available, as well as links to related topics in the Subject Index. You can also browse the Title, Author, Subject, Chronological, Dewey, LoC, and Format indexes, or use the Search box. Connexions LibraryThe Great SIM Heist: How Spies Stole the Keys to the Encryption Castle Scahill, Jeremy; Begley, Josh Article 2015 American and British spies hacked into the internal computer network of the largest manufacturer of SIM cards in the world, stealing encryption keys used to protect the privacy of cellphone communicat... How to Leak to The Intercept Lee, Micah Article 2015 Leaking can serve the public interest, fueling revelatory and important journalism. Here are instructions for how to leak safely. Sources LibraryCSE monitors millions of Canadian emails to government Hildebrandt, Amber; Seglins, Dave; Pereira, Michael 2015 Canada's electronic spy agency collects millions of emails from Canadians and stores them for "days to months" while trying to filter out malware and other attacks on government computer networks. |