|
Electronic Eavesdropping
Fetch Headings.ExtraData
Below are groups and resources (books, articles, websites, etc.) related to this topic. Click on an item’s title to go its resource page with author, publisher, description/abstract and other details, a link to the full text if available, as well as links to related topics in the Subject Index. You can also browse the Title, Author, Subject, Chronological, Dewey, LoC, and Format indexes, or use the Search box. Connexions LibraryThe Intercept Website A platform to report on the documents previously provided by NSA whistleblower Edward Snowden, with a long-term mission is to produce fearless, adversarial journalism across a wide range of issues. 'I've Got Nothing to Hide' and Other Misunderstandings of Privacy Solove, Daniel J. Article 2007 According to the nothing to hide argument, there is no threat to privacy unless the government uncovers unlawful activity, in which case a person has no legitimate justification to claim that it remai... The Logic behind Mass Spying: Empire and Cyber Imperialism Petras, James Article 2013 Revelations about the long-term global, intrusive spying by the US National Security Agency (NSA) and other allied intelligence apparatuses have provoked widespread protests and indignation and threat... The NSA's Spying Operation on Mexico: Systematic Eavesdropping on the Government Carlsen, Laura Article 2013 The American NSA has been systematically eavesdropping on the Mexican government for years. Three major programs constitute a massive espionage operation against Mexico. Protect Yourself from Electronic Spying with Surveillance Self-Defense: Sources News Release Article 2014 The Electronic Frontier Foundation (EFF) has launched its updated "Surveillance Self-Defense" report, a comprehensive how-to guide to protecting yourself from electronic spying for Internet users all ... 6 Ideas For Those Needing Defensive Technology to Protect Free Speech from Authoritarian Regimes: 4 Ways the Rest of Us Can Help Eckersley, Peter Article 2009 The Internet remains one of the most powerful means ever created to give voice to repressed people around the world. Unfortunately, new technologies have also given authoritarian regimes new means to ... Sources LibraryEmail privacy Wikipedia article 2012 Email privacy is the broad topic dealing with issues of unauthorized access and inspection of electronic mail. This unauthorized access can happen while an email is in transit, as well as when it is s... How the Government Secretly Demanded the IP Address of Every Visitor to Political News Site Indymedia.us 2009 Secrecy surrounds law enforcement's communications surveillance practices like a dense fog. Particularly shrouded in secrecy are government demands issued under 18 U.S.C. ยง 2703 of the Stored Communic... How the US government secretly reads your email Brooke, Heather 2011 Secret orders forcing Google and Sonic to release a WikiLeaks volunteer's email reveal the scale of US government snooping. Is Your Printer Spying On You? Imagine that every time you printed a document it automatically included a secret code that could be used to identify the printer - and potentially the person who used it. |