Rechercher avec Connexions



Bibliothèque Connexions

Articles, livres, documents, périodiques, multi-média

Library Catalogue

Index des Titres

Index des noms d'Auteurs

Index par Objet

Index de Chronologique

Index de Format

Index de Dewey

Index de la Biblioteque du Congrès


Connexions Directory
of Associations & NGOs

Index par Objet

Index par Associations

Selected Articles by
Subject Area

Donate or Volunteer

Votre soutien rend possible notre travail. – Merci de faire un don aujourd’hui.

Volunteer Opportunities and Internships

Droits … la vie priv‚e
La Bibliotheque Connexions (Editon francais)

Clicking on the title of an item takes you to the bibliographic reference for the resource, which will typically also contain an abstract, a link to the full text if it is available online, and links to related topics in the subject index. Particularly recommended items have a red Connexions logo beside the title.

Search engine optimization
Donate to Connexions
  1. The Absurd Consequences of a "Right to Privacy"
    Resource Type: Article
    First Published: 2017
    British MP David Davis’s text messages poking fun at the appearance of a female colleague make him the latest whipping boy for those determined to root out sexism and misogyny in public life, the Daily Mail reports. Curiously, they also make him the latest poster boy for exponents of an expansive "right to privacy."
  2. Capitalist Surveillance State: Everyone's a Target
    Threatening Reporters, Spying on Public

    Resource Type: Article
    First Published: 2013
    There is an inherent tendency for the state, which governs on behalf of a minuscule, ruthless class of obscenely wealthy exploiters, to attempt to amass ever greater power to control the population because it hates and fears the working people.
  3. Connexions
    Volume 4, Number 1 - February 1979 - National Security/Securite Nationale

    Resource Type: Serial Publication (Periodical)
    First Published: 1979
  4. Connexions
    Volume 5, Number 1 - January 1980 - Literacy/Alphabetisation

    Resource Type: Serial Publication (Periodical)
    First Published: 1980
  5. Connexions
    Volume 9, Number 2 - Summer 1984 - Rights and Liberties - A Digest of Resources & Groups for Social

    Resource Type: Serial Publication (Periodical)
    First Published: 1984
  6. Connexions Digest
    Issue 54 - February 1992- A Social Change Sourcebook

    Resource Type: Serial Publication (Periodical)
    First Published: 1992
  7. Connexions Library: Human Rights and Civil Liberties Focus 
    Resource Type: Website
    Selected articles, books, websites and other resources on civil liberties and human rights.
  8. Corporate Coercion and the Drive to Eliminate Buying with Cash
    Resource Type: Article
    First Published: 2018
    Consumer freedom and privacy are examined as coercive commercialism quickly moves toward a cashless economy, when all consumers are forced into corporate payment systems from credit/debit cards, mobile phones and perhaps even through facial recognition technology.
  9. Eavesdropping on the Planet
    The Inalienable Right to Snoop?

    Resource Type: Article
    First Published: 2013
    Like a mammoth vacuum cleaner in the sky, the National Security Agency (NSA) sucks it all up: home phone, office phone, cellular phone, email, fax, telex … satellite transmissions, fiber-optic communications traffic, microwave links … voice, text, images … captured by satellites continuously orbiting the earth, then processed by high-powered computers … if it runs on electromagnetic energy, NSA is there, with high high tech. Twenty-four hours a day. Perhaps billions of messages sucked up each day. No one escapes. Not presidents, prime ministers, the UN Secretary-General, the pope, the Queen of England, embassies, transnational corporation CEOs, friend, foe, your Aunt Lena …
  10. Edward Snowden's Warning to Canada
    Resource Type: Article
    First Published: 2015
    Whistleblower Edward Snowden talks about Bill C-51 and the weak oversight of Canada's intelligence agencies.
  11. Eyes Wide Open
    Resource Type: Article
    First Published: 2013
    The recent revelations, made possible by NSA-whistleblower Edward Snowden, of the reach and scope of global surveillance practices have prompted a fundamental reexamination of the role of intelligence services in conducting coordinated cross-border surveillance.
  12. The FBI's secret biometrics database they don't want you to see
    Resource Type: Article
    First Published: 2016
    The Federal Bureau of Investigation (FBI) wants to prevent information about its creepy biometric database, which contains fingerprint, face, iris, and voice scans of millions of Americans, from getting out to the public. The Department of Justice has come up with a proposal to exempt the biometric database from public disclosure. It states that the Next Generation Identification System (NGI) should not be subject to the Privacy Act, which requires federal agencies to give people access to records that have been collected concerning them, "allowing them to verify and correct them if needed."
  13. Genetic Testing of Citizens Is a Backdoor into Total Population Surveillance by Governments and Companies
    Resource Type: Article
    First Published: 2014
    The new Chief Executive of the National Health Service (NHS) in England, Simon Stevens, was recently reported arguing that the NHS must be transformed to make people’s personal genetic information the basis of their treatments.
  14. Google's 'Smart City of Surveillance' Faces New Resistance in Toronto
    Resource Type: Article
    First Published: 2018
    A plan to develop 12 acres of the valuable waterfront just southeast of downtown Toronto
    by the government agency Waterfront Toronto and Sidewalk Labs, owned by Google’s parent company Alphabet Inc. has sparked concerns about privacy and lack of public consultation. A recent slew of resignations from its board has made these concerns increasingly urgent and public.
  15. If U.S. Mass Media Were State-Controlled, Would They Look Any Different?
    Snowden Coverage

    Resource Type: Article
    First Published: 2013
    The Edward Snowden leaks have revealed a U.S. corporate media system at war with independent journalism. Many of the same outlets that missed the Wall Street meltdown and cheer-led the Iraq invasion have come to resemble state-controlled media outlets in their near-total identification with the government.
  16. The Institutionalization of Tyranny
    When Victory Has Nothing to do With Justice

    Resource Type: Article
    First Published: 2013
    Republicans and conservative Americans are still fighting Big Government in its welfare state form. Apparently, they have never heard of the militarized police state form of Big Government, or, if they have, they are comfortable with it and have no objection.
  17. IntelligentSearch.ca
    Resource Type: Website
    First Published: 2017
    A web portal featuring topics related to research and the Internet. The home page features a selection of recent and important articles. A search feature, subject index, and other research tools make it possible to find additional resources and information.
  18. The Intercept
    Resource Type: Website
    A platform to report on the documents previously provided by NSA whistleblower Edward Snowden, with a long-term mission is to produce fearless, adversarial journalism across a wide range of issues.
  19. Internet Companies: Confusing Consumers for Profit
    Resource Type: Article
    First Published: 2015
    In the age of information, companies are hungry for your data. They want it - even if it means resorting to trickery.
  20. 'I've Got Nothing to Hide' and Other Misunderstandings of Privacy
    Resource Type: Article
    First Published: 2007
    According to the nothing to hide argument, there is no threat to privacy unless the government uncovers unlawful activity, in which case a person has no legitimate justification to claim that it remain private.
  21. Lessons of the Snowden Revelations
    You are the Target!

    Resource Type: Article
    First Published: 2013
    We in the Left have long worried about “police state tactics”. Now we have to confront the police state structure. It’s here and it can morph into a real police state with very little effort. Opposing and dismantling it should now be among our top priorities.
  22. No Child Left Un-Mined? Student Privacy at Risk in the Age of Big Data
    Resource Type: Article
    First Published: 2015
    Chideya discusses the implications of the compilation of big data trails containing information about children's performance in school.
  23. No Safe Harbor: How NSA Spying Undermined U.S. Tech and Europeans' Privacy
    Resource Type: Article
    First Published: 2015
    The spread of knowledge about the NSA's surveillance programs has shaken the trust of customers in U.S. Internet companies like Facebook, Google, and Apple: especially non-U.S. customers who have discovered how weak the legal protections over their data is under U.S. law.
  24. NSA, GCHQ mapping "political alignment" of cellphone users
    New report reveals

    Resource Type: Article
    First Published: 2014
    New information made public by Edward Snowden reveals that the governments of the United States and United Kingdom are trawling data from cellphone “apps” to accumulate dossiers on the “political alignments” of millions of smartphone users worldwide.
  25. The NSA Has Effectively Destroyed Internet Privacy
    Snowden's Latest

    Resource Type: Article
    First Published: 2013
    Whistle-blower Edward Snowden prove that the NSA, working with its British counterpart the Government Communications Headquarters has conducted an intentional and largely sucessful campaign to destroy all privacy on the Internet.
  26. The NSA's Invasion of Google and Yahoo Servers
    Your Email is Likely Being Monitored

    Resource Type: Article
    First Published: 2013
    The American National Security Agency (NSA) has been intercepting information coming in and out of Google and Yahoo servers over non-public, internal network fibre optic lines. In December, 2012 alone, the program (revealingly called “MUSCULAR”) processed 181,280,466 Google and Yahoo records that included email, searches, videos and photos.
  27. The Obliteration of Privacy
    Snowden and the NSA

    Resource Type: Article
    First Published: 2014
    It’s remarkable how little outrage Edward Snowden’s NSA revelations have provoked in the American public. One often heard response is something like, “Well, I don’t have anything to hide, so I don’t care if the government is listening to what I say. And if they catch some terrorists, so much the better.”
  28. On Locational Privacy, and How to Avoid Losing it Forever
    Resource Type: Article
    First Published: 2009
    Over the next decade, systems which create and store digital records of people's movements through public space will be woven inextricably into the fabric of everyday life. We are already starting to see such systems now, and there will be many more in the near future.
  29. Other Voices: The Connexions Newsletter - July 22, 2017
    Secrecy and Power

    Resource Type: Serial Publication (Periodical)
    First Published: 2017
    Secrecy is a weapon the powerful use against their enemies: us. This issue of Other Voices explores the relationship of secrecy and power.
  30. Police Go on Fishing Expedition, Search the Home of Seattle Privacy Activists Who Maintain Tor Network
    Resource Type: Article
    First Published: 2016
    Seattle police descended on the Queen Anne condo of two outspoken privacy activists with a search warrant early this morning, leaving them shaken and upset. Jan Bultmann and David Robinson, a married couple and co-founders of the Seattle Privacy Coalition, said they were awakened at 6:15 a.m. by a team of six detectives from the SPD knocking on the door. Bultmann said were made to sit outside as the officers, who had a search warrant, examined their equipment.
  31. Preparing for a Digital 9/11
    Resource Type: Article
    First Published: 2012
    In recent years, in one of the more dangerous, if largely undiscussed, developments of our time, the Bush and then Obama administrations have launched the first state-planned war in cyber space. First, there were the "Olympic Games," then the Stuxnet virus, then Flame, and now it turns out that other sophisticated malware programs have evidently followed.
  32. Privacy For Sale
    How Computerization Has Made Everyone's Private Life an Open Secret

    Resource Type: Book
    First Published: 1992
  33. Privacy Journal
    Resource Type: Serial Publication (Periodical)
    First Published: 1978
    A monthly newsletter that is, "...filled with American and Canadian news about the confidentiality of personal information." It describes, "...record-keeping in government and business, new invasions of privacy, new legislation, and (alerts) citizens to ways they can protect their personal privacy."
  34. Privacy tapped out
    Resource Type: Article
    First Published: 2013
    For over a century, Americans and their judiciary fiercely fought any attempt by security agencies and law enforcement to listen in on private electronic communications. Now they’ve stopped fighting, and the surveillance is out of control.
  35. Revealed: How DOJ Gagged Google over Surveillance of WikiLeaks Volunteer
    Resource Type: Article
    First Published: 2015
    The Obama administration fought a legal battle against Google to secretly obtain the email records of a security researcher and journalist associated with WikiLeaks.
  36. The Soft Cage
    Surveillance in America from Slavery to the War on Terror

    Resource Type: Book
    First Published: 2004
    Parenti explores the history of American surveillance from colonial times to the present. What this historical evidence clearly reveals is a continuum of the culture of surveillance. The weakest, most disenfranchised and most alienated groups are subjected first, and then the surveillance regime slowly spreads toward the mainstream.
  37. Spies Hacked Computers Thanks to Sweeping Secret Warrants, Aggressively Stretching U.K. Law
    Resource Type: Article
    First Published: 2015
    British spies have received government permission to intensively study software programs for ways to infiltrate and take control of computers. The GCHQ spy agency was vulnerable to legal action for the hacking efforts, known as "reverse engineering," since such activity could have violated copyright law. But GCHQ sought and obtained a legally questionable warrant from the Foreign Secretary in an attempt to immunize itself from legal liability.
  38. Spying by the Numbers
    Hundreds of Thousands Subject to Government Surveillance and No Real Protection

    Resource Type: Article
    First Published: 2013
    Thanks to NSA whistleblower Edward Snowden many more people in the US and world-wide are learning about extensive US government surveillance and spying. There are publicly available numbers which show the reality of these problems are bigger than most think and most of this spying is happening with little or no judicial oversight.
  39. Surveillance USA
    NSA and the PRISM Project

    Resource Type: Article
    First Published: 2013
    The government is merrily going about its business of keeping tabs on you in virtually every conceivable way.
  40. Think the Left Won the Culture War? Think Again
    Resource Type: Article
    First Published: 2015
    With the recent AshleyMadison leak and Gawker.com's notorious naming and shaming of an obscure, married publishing executive, deBoer questions who really won in this culture war.
  41. Thousands Join Legal Fight Against UK Surveillance — And You Can, Too
    Resource Type: Article
    First Published: 2015
    Thousands of people are signing up to join an unprecedented legal campaign against the United Kingdom’s leading electronic surveillance agency.
  42. Three Leaks, Three Weeks, and What We've Learned About the US Government's Other Spying Authority: Executive Order 12333
    Resource Type: Article
    First Published: 2013
    The National Security Agency has been siphoning off data from the links between Yahoo and Google data centers, which include the fiber optic connections between company servers at various points around the world. While the user may have an encrypted connection to the website, the internal data flows were not encrypted and allowed the NSA to obtain millions of records each month, including both metadata and content like audio, video and text.
  43. Uber Plans to Track Users Should Not Be Allowed, Says Privacy Group
    Resource Type: Article
    First Published: 2015
    A formal complaint has been filed against Uber, the car ride company, by the Electronic Privacy Information Center (EPIC), a non-profit advocacy group. The NGO says Uber plans to use their smart phone app to access user's locations at all times, and to send advertisements to user's contact lists.
  44. U.N. Report Asserts Encryption as a Human Right in the Digital Age
    Resource Type: Article
    First Published: 2015
    Encryption is not the refuge of scoundrels, as Obama administration law-enforcement officials loudly proclaim – it is an essential tool needed to protect the right of freedom of opinion and expression in the digital age, a new United Nations report concludes.
  45. Le Viol du Courier/Violation of the Mail
    Resource Type: Article
    The League on Human Rights presents arguments against the legality and acceptability of Bill C-26. This bill, introduced to Parliament in February 1978, aims to authorize the opening of first-class mail.

Experts on Droits … la vie priv‚e in the Sources Directory

  1. Article 19

    Connexions Information Sharing Services

Connexions Library

Catalogue of more than 7,000 books, articles, films, periodicals, websites and other resources.
Indexed by Author, Title, Format, Subject, Dewey number, Library of Congress classification, Year of Publication.
Connexions Directory Associations and NGOs dealing with social and environmental issues — A-Z Index or Subject Index.
For experts and media spokespersons also see the Sources directory and the comprehensive Sources Subject Index.
Links Selected Internet resources featuring information about alternatives.
Calendar Events from across Canada. Also see: Sources Calendar and news releases.
Publicity and Media Resources, publications and articles to help you get publicity and raise awareness. Plus Media Names & Numbers Canadian media directory, the Parliamentary Names & Numbers Canadian government directory, and mailing lists.
Donations Connexions welcomes your support. Your donations make our work possible. Volunteers always welcome.
Mission Connexions exists to support individuals and groups working for freedom and social justice. We work to maintain and make available a record of the theory and practice of people struggling against oppression and for social change. We believe that the more we know about the struggles, victories, and defeats of the past, and about those who took part in them, the better equipped we will be to bring a new world into being. Connexions maintains a physical archive of books and documents, and is engaged in an ongoing project to build and expand an indexed digital archive of documents. We try to feature a wide variety of resources reflecting a diversity of viewpoints and approaches to social change within our overall mandate of support for democracy, civil liberties, freedom of expression, universal human rights, secularism, equality, economic justice, environmental responsibility, and the creation and preservation of community. We are internationalist in our orientation, but as a Canadian-based project we feature an especially extensive collection of Canadian documents and profiles of Canadian activist organizations.