Electronic Eavesdropping

Fetch Headings.ExtraData
Below are groups and resources (books, articles, websites, etc.) related to this topic. Click on an item’s title to go its resource page with author, publisher, description/abstract and other details, a link to the full text if available, as well as links to related topics in the Subject Index. You can also browse the Title, Author, Subject, Chronological, Dewey, LoC, and Format indexes, or use the Search box.
Particularly recommended items are flagged with a red logo:

Connexions Library

The Intercept
Website
A platform to report on the documents previously provided by NSA whistleblower Edward Snowden, with a long-term mission is to produce fearless, adversarial journalism across a wide range of issues.
'I've Got Nothing to Hide' and Other Misunderstandings of Privacy
Solove, Daniel J.
Article
2007
According to the nothing to hide argument, there is no threat to privacy unless the government uncovers unlawful activity, in which case a person has no legitimate justification to claim that it remai...
The Logic behind Mass Spying: Empire and Cyber Imperialism
Petras, James
Article
2013
Revelations about the long-term global, intrusive spying by the US National Security Agency (NSA) and other allied intelligence apparatuses have provoked widespread protests and indignation and threat...
The NSA's Spying Operation on Mexico: Systematic Eavesdropping on the Government
Carlsen, Laura
Article
2013
The American NSA has been systematically eavesdropping on the Mexican government for years. Three major programs constitute a massive espionage operation against Mexico.
Protect Yourself from Electronic Spying with Surveillance Self-Defense: Sources News Release
Article
2014
The Electronic Frontier Foundation (EFF) has launched its updated "Surveillance Self-Defense" report, a comprehensive how-to guide to protecting yourself from electronic spying for Internet users all ...
6 Ideas For Those Needing Defensive Technology to Protect Free Speech from Authoritarian Regimes: 4 Ways the Rest of Us Can Help
Eckersley, Peter
Article
2009
The Internet remains one of the most powerful means ever created to give voice to repressed people around the world. Unfortunately, new technologies have also given authoritarian regimes new means to ...

Sources Library

Email privacy
Wikipedia article
2012
Email privacy is the broad topic dealing with issues of unauthorized access and inspection of electronic mail. This unauthorized access can happen while an email is in transit, as well as when it is s...
How the Government Secretly Demanded the IP Address of Every Visitor to Political News Site Indymedia.us
2009
Secrecy surrounds law enforcement's communications surveillance practices like a dense fog. Particularly shrouded in secrecy are government demands issued under 18 U.S.C. ยง 2703 of the Stored Communic...
How the US government secretly reads your email
Brooke, Heather
2011
Secret orders forcing Google and Sonic to release a WikiLeaks volunteer's email reveal the scale of US government snooping.
Is Your Printer Spying On You?
Imagine that every time you printed a document it automatically included a secret code that could be used to identify the printer - and potentially the person who used it.