|
Communications/Privacy
Fetch Headings.ExtraData
Below are groups and resources (books, articles, websites, etc.) related to this topic. Click on an item’s title to go its resource page with author, publisher, description/abstract and other details, a link to the full text if available, as well as links to related topics in the Subject Index. You can also browse the Title, Author, Subject, Chronological, Dewey, LoC, and Format indexes, or use the Search box. Connexions LibraryThe Great SIM Heist: How Spies Stole the Keys to the Encryption Castle Scahill, Jeremy; Begley, Josh Article 2015 American and British spies hacked into the internal computer network of the largest manufacturer of SIM cards in the world, stealing encryption keys used to protect the privacy of cellphone communicat... How to Leak to The Intercept Lee, Micah Article 2015 Leaking can serve the public interest, fueling revelatory and important journalism. Here are instructions for how to leak safely. No Safe Harbor: How NSA Spying Undermined U.S. Tech and Europeans' Privacy O'Brien, Danny Article 2015 The spread of knowledge about the NSA's surveillance programs has shaken the trust of customers in U.S. Internet companies like Facebook, Google, and Apple: especially non-U.S. customers who have disc... Secret 'BADASS' Intelligence Program Spied on Smartphones Lee, Micah Article 2015 British and Canadian spy agencies accumulated sensitive data on smartphone users, by piggybacking on ubiquitous software from advertising and analytics companies, according to a document obtained by N... Why I'm Saying Goodbye to Apple, Google and Microsoft: I'm putting more trust in communities than corporations Gillmor, Dan Article 2015 Gillmor discusses how we are losing control over the technology tools that once promised equal opportunity in speech and innovation. XKEYSCORE: NSA's Google for the World's Private Communications Marquis-Boire, Morgan; Greenwald, Glenn; Lee, Micah Article 2015 The NSA's XKEYSCORE program, first revealed by The Guardian, sweeps up countless people's Internet searches, emails, documents, usernames and passwords, and other private communications. XKEYSCORE is ... Sources LibraryEmail privacy Wikipedia article 2012 Email privacy is the broad topic dealing with issues of unauthorized access and inspection of electronic mail. This unauthorized access can happen while an email is in transit, as well as when it is s... Human Rights Watch Sues DEA Over Bulk Collection of Americans' Telephone Records Sources News Release 2015 EFF Lawsuit Challenges Drug Enforcement Administration Surveillance of International Call Records Pakistan: Intelligence agency sought to tap all communications traffic, documents reveal Rice, Mathew 2015 Every government seems to want to spy in Pakistan. The US National Security Agency (NSA) tapped the fibre optic cables landing in Karachi, among others, and used 55 million phone records harvested fro... UN slams UK surveillance law, calls for privacy reforms in Canada, France and Macedonia 2015 In yet another blow to the UK's surveillance proponents, the UN Human Rights Committee has criticised the British legal regime governing the interception of communications, observing that it allows fo... The use of encryption tools and the protection of anonymity online as safeguards for freedom of the press Kaye, David 2015 David Kaye is the UN Special Rapporteur on the promotion and protection of the right to freedom of expression. In his latest report, he stressed that governments are obligated to protect encryption to... |