Communications/Privacy

Fetch Headings.ExtraData
Below are groups and resources (books, articles, websites, etc.) related to this topic. Click on an item’s title to go its resource page with author, publisher, description/abstract and other details, a link to the full text if available, as well as links to related topics in the Subject Index. You can also browse the Title, Author, Subject, Chronological, Dewey, LoC, and Format indexes, or use the Search box.
Particularly recommended items are flagged with a red logo:

Connexions Library

The Great SIM Heist: How Spies Stole the Keys to the Encryption Castle
Scahill, Jeremy; Begley, Josh
Article
2015
American and British spies hacked into the internal computer network of the largest manufacturer of SIM cards in the world, stealing encryption keys used to protect the privacy of cellphone communicat...
How to Leak to The Intercept
Lee, Micah
Article
2015
Leaking can serve the public interest, fueling revelatory and important journalism. Here are instructions for how to leak safely.
No Safe Harbor: How NSA Spying Undermined U.S. Tech and Europeans' Privacy
O'Brien, Danny
Article
2015
The spread of knowledge about the NSA's surveillance programs has shaken the trust of customers in U.S. Internet companies like Facebook, Google, and Apple: especially non-U.S. customers who have disc...
Secret 'BADASS' Intelligence Program Spied on Smartphones
Lee, Micah
Article
2015
British and Canadian spy agencies accumulated sensitive data on smartphone users, by piggybacking on ubiquitous software from advertising and analytics companies, according to a document obtained by N...
Why I'm Saying Goodbye to Apple, Google and Microsoft: I'm putting more trust in communities than corporations
Gillmor, Dan
Article
2015
Gillmor discusses how we are losing control over the technology tools that once promised equal opportunity in speech and innovation.
XKEYSCORE: NSA's Google for the World's Private Communications
Marquis-Boire, Morgan; Greenwald, Glenn; Lee, Micah
Article
2015
The NSA's XKEYSCORE program, first revealed by The Guardian, sweeps up countless people's Internet searches, emails, documents, usernames and passwords, and other private communications. XKEYSCORE is ...

Sources Library

Email privacy
Wikipedia article
2012
Email privacy is the broad topic dealing with issues of unauthorized access and inspection of electronic mail. This unauthorized access can happen while an email is in transit, as well as when it is s...
Human Rights Watch Sues DEA Over Bulk Collection of Americans' Telephone Records
Sources News Release
2015
EFF Lawsuit Challenges Drug Enforcement Administration Surveillance of International Call Records
Pakistan: Intelligence agency sought to tap all communications traffic, documents reveal
Rice, Mathew
2015
Every government seems to want to spy in Pakistan. The US National Security Agency (NSA) tapped the fibre optic cables landing in Karachi, among others, and used 55 million phone records harvested fro...
UN slams UK surveillance law, calls for privacy reforms in Canada, France and Macedonia
2015
In yet another blow to the UK's surveillance proponents, the UN Human Rights Committee has criticised the British legal regime governing the interception of communications, observing that it allows fo...
The use of encryption tools and the protection of anonymity online as safeguards for freedom of the press
Kaye, David
2015
David Kaye is the UN Special Rapporteur on the promotion and protection of the right to freedom of expression. In his latest report, he stressed that governments are obligated to protect encryption to...