Security & Surveillance

Fetch Headings.ExtraData
Below are groups and resources (books, articles, websites, etc.) related to this topic. Click on an item’s title to go its resource page with author, publisher, description/abstract and other details, a link to the full text if available, as well as links to related topics in the Subject Index. You can also browse the Title, Author, Subject, Chronological, Dewey, LoC, and Format indexes, or use the Search box.
Particularly recommended items are flagged with a red logo:

Connexions Library

Bringing the Battlefield to the Border: The Wild World of Border Security and Boundary Building in Arizona
Miller, Todd
Article
2012
The U.S.-Mexican border has not only become Ground Zero for every experiment in immigration enforcement and drug interdiction, but also the incubator, testing site, showcase, and staging ground for ev...
Capitalist Surveillance State: Everyone's a Target: Threatening Reporters, Spying on Public
Article
2013
There is an inherent tendency for the state, which governs on behalf of a minuscule, ruthless class of obscenely wealthy exploiters, to attempt to amass ever greater power to control the population be...
Cointelpro: The FBI's Secret War on Political Freedom
Blackstock, Nelson
Book
1976
The first in-depth look at the covert and illegal FBI counterintelligence program - code-name COINTELPRO.
COINTELPRO: Connexipedia Article
Article
A series of covert, and often illegal, projects conducted by the United States Federal Bureau of Investigation (FBI) aimed at investigating and disrupting dissident political organizations within the ...
Eavesdropping on the Planet: The Inalienable Right to Snoop?
Blum, William
Article
2013
Like a mammoth vacuum cleaner in the sky, the National Security Agency (NSA) sucks it all up: home phone, office phone, cellular phone, email, fax, telex … satellite transmissions, fiber-optic communi...
If U.S. Mass Media Were State-Controlled, Would They Look Any Different?: Snowden Coverage
Cohen, Jeff
Article
2013
The Edward Snowden leaks have revealed a U.S. corporate media system at war with independent journalism. Many of the same outlets that missed the Wall Street meltdown and cheer-led the Iraq invasion h...
The Intercept
Website
A platform to report on the documents previously provided by NSA whistleblower Edward Snowden, with a long-term mission is to produce fearless, adversarial journalism across a wide range of issues.
Lessons of the Snowden Revelations: You are the Target!
Lopez, Alfredo
Article
2013
We in the Left have long worried about “police state tactics”. Now we have to confront the police state structure. It’s here and it can morph into a real police state with very little effort. Opposing...
Other Voices: The Connexions Newsletter - July 22, 2017: Secrecy and Power
Diemer, Ulli (ed.)
Serial Publication (Periodical)
2017
Secrecy is a weapon the powerful use against their enemies: us. This issue of Other Voices explores the relationship of secrecy and power.
The Police State is Real: It Has Happened Here
Roberts, Paul Craig
Article
2013
The Bush regime’s response to 9/11 and the Obama regime’s validation of this response have destroyed accountable democratic government in the United States. So much unaccountable power has been concen...
Spooky Business: Corporate Espionage Against Nonprofit Organizations
Ruskin, Gary
Article
2013
This report is an effort to document something about corporate espionage against nonprofit organizations. Law enforcement should prioritize investigating and prosecuting corporate espionage against no...
Spying by the Numbers: Hundreds of Thousands Subject to Government Surveillance and No Real Protection
Quigley, Bill
Article
2013
Thanks to NSA whistleblower Edward Snowden many more people in the US and world-wide are learning about extensive US government surveillance and spying. There are publicly available numbers which sho...
Strike!: The True History of Mass Insurgence from 1877 to the Present
Brecher, Jeremy
Book
1972
A history-from-below that brings to light strikes as authentic revolutionary movements against the establishments of state, capital, and trade unionism.
Terror Takeover: The monstrous march of the security state
New Internationalist November 2009 - #427
Serial Publication (Periodical)
2009
Has our panic over terrorism given permission for unchecked abuse? The fear of terrorism has been used to curtail our liberties and violate human rights.
Whose National Security?: Canadian State Surveillance and the Creation of Enemies
Kinsman, Gary; Buse, Dieter K.; Stedman, Mercedes
Article
2000
Examines RCMP monitoring of trade unionists, Left-wing political groups, students, gays and lesbians, feminists, consumers' associations, Black activists, First Nations people, and Quebec sovereignist...

Sources Experts & Spokespersons

Sources Library

Barrett Brown case: 11 of 12 counts dismissed
Sources News Release
2014
Reporters Without Borders greets with relief federal prosecutors' decision to drop nearly all criminal charges against Barrett Brown, a contributor to The Guardian and Vanity Fair.
Companies that cooperate with dictatorships must be sanctioned
Sources News Release
2011
Reporters Without Borders condemns the criminal cooperation that exists between many western companies, especially those operating in the new technology area, and authoritarian regimes.
How can you protect yourself from online snooping?
Sources News Release
2013
Reporters Without Borders has published an Online Survival Kit on its WefightCensorship.org website that has tools and practical advice that will allow you to protect your communications and data.
Obama defiant over NSA revelations ahead of summit with Chinese premier
Ackerman, Spencer; Roberts, Dan
2013
President says oversight of NSA surveillance programme should be left to Congress in comments criticising media 'hype.'

From the Connexions Archives

IntelligentSearch.ca
Website
2017
A web portal featuring topics related to research and the Internet. The home page features a selection of recent and important articles. A search feature, subject index, and other research tools make ...