Privacy & Telecommunications

Fetch Headings.ExtraData
Below are groups and resources (books, articles, websites, etc.) related to this topic. Click on an item’s title to go its resource page with author, publisher, description/abstract and other details, a link to the full text if available, as well as links to related topics in the Subject Index. You can also browse the Title, Author, Subject, Chronological, Dewey, LoC, and Format indexes, or use the Search box.
Particularly recommended items are flagged with a red logo:

Connexions Library

Capitalist Surveillance State: Everyone's a Target: Threatening Reporters, Spying on Public
Article
2013
There is an inherent tendency for the state, which governs on behalf of a minuscule, ruthless class of obscenely wealthy exploiters, to attempt to amass ever greater power to control the population be...
Die Globale Teleueberwachung des 21. Jahrhunderts
Article
Es entsteht zur Zeit eine globale Teleuberwachung, die sich von allen ethischen oder diplomatischen Voreingenomenheiten freimacht.
Internet Companies: Confusing Consumers for Profit
Cordozo, Nate
Article
2015
In the age of information, companies are hungry for your data. They want it - even if it means resorting to trickery.
Location Tracking: A Pervasive Problem in Modern Technology
Schoen, Seth
Article
2013
NSA is tracking people around the Internet and the physical world. These newly-revealed techniques hijacked personal information that was being transmitted for some commercial purpose, converting it i...
NSA, GCHQ mapping "political alignment" of cellphone users: New report reveals
London, Eric
Article
2014
New information made public by Edward Snowden reveals that the governments of the United States and United Kingdom are trawling data from cellphone “apps” to accumulate dossiers on the “political alig...
NSA and GCHQ target Tor network that protects anonymity of web users
Ball, James; Schneier, Bruce; Greenwald, Glenn
Article
2013
The National Security Agency has made repeated attempts to develop attacks against people using Tor, a popular tool designed to protect online anonymity, despite the fact the software is primarily fun...
Profiled: From Radio to Porn, British Spies Track Web Users' Online Identities
Gallagher, Ryan
Article
2015
Amid a renewed push from the U.K. government for more surveillance powers, more than two dozen documents being disclosed by The Intercept reveal for the first time several major strands of GCHQ’s (Gov...
Spying by the Numbers: Hundreds of Thousands Subject to Government Surveillance and No Real Protection
Quigley, Bill
Article
2013
Thanks to NSA whistleblower Edward Snowden many more people in the US and world-wide are learning about extensive US government surveillance and spying. There are publicly available numbers which sho...
Three Leaks, Three Weeks, and What We've Learned About the US Government's Other Spying Authority: Executive Order 12333
Jaycox, Mark M.
Article
2013
The National Security Agency has been siphoning off data from the links between Yahoo and Google data centers, which include the fiber optic connections between company servers at various points aroun...
Vodafone Reveals Existence of Secret Wires that Allow State Surveillance
Garside, Juliette
Article
2014
Wires allow agencies to listen to or record live conversations, in what privacy campaigners are calling a 'nightmare scenario'.

Connexions Directory of Groups & Websites

Public Interest Advocacy Centre
PIAC, a national non-profit organization, provides legal representation and research on issues that involve utilities, government programs and important public services. PIAC works on behalf of ordina...

Sources Library

Beyond Implementation: Policy Considerations for Secure Messengers
Cardozo, Nate
2018
The importance of secure Messenger tools goes beyond just reliable technology, it must be developed and have its infrastructure maintained by a trustworthy group with a history of responsible stewards...
Email privacy
Wikipedia article
2012
Email privacy is the broad topic dealing with issues of unauthorized access and inspection of electronic mail. This unauthorized access can happen while an email is in transit, as well as when it is s...
For journalists, danger lurking in your email
O'Brien, Danny
2012
Citizen Lab provided a disturbing look into the likely use of a commercial surveillance program, FinFisher, to remotely invade and control the computers of Bahraini activists. After the software insta...
Human Rights Watch Sues DEA Over Bulk Collection of Americans' Telephone Records
Sources News Release
2015
EFF Lawsuit Challenges Drug Enforcement Administration Surveillance of International Call Records
Met police using surveillance system to monitor mobile phones
Gallagher, Ryan; Syal, Rejeev
2011
Civil liberties group raises concerns over Met police purchase of technology to track public handsets over a targeted area.
The Peruvian "Stalker Law" Will Be Reviewed By Congress, We Can Still Stop It
Bogado, David; Rodriguez, Katitza
2015
Bogado and Rodriguez discuss the new decree in Peru known as "Ley Acosadora", or "the Stalker Law", allows warrantless access to Peruvians' location data and creates a new power for the government to ...
Reporters Without Borders and Torservers.net, partners against online surveillance and censorship
Sources News Release
2014
Reporters Without Borders and Torservers.net have joined forces to create and maintain 250 additional relays for the Tor network.
Stop replacing London's phone boxes with corporate surveillance
New connected kiosks are replacing London's payphones. Every time you use them, you're allowing Google, BT and Primesight to track you
Atkin, Ross
2018
Concerns over privacy in London, UK, as Google, BT and Primesight provide free wifi and phone charging in exchange for allowing the consortium to identify users and track their movements through the c...

From the Connexions Archives

IntelligentSearch.ca
Website
2017
A web portal featuring topics related to research and the Internet. The home page features a selection of recent and important articles. A search feature, subject index, and other research tools make ...