Internet Privacy

Fetch Headings.ExtraData
Below are groups and resources (books, articles, websites, etc.) related to this topic. Click on an item’s title to go its resource page with author, publisher, description/abstract and other details, a link to the full text if available, as well as links to related topics in the Subject Index. You can also browse the Title, Author, Subject, Chronological, Dewey, LoC, and Format indexes, or use the Search box.
Particularly recommended items are flagged with a red logo:

Connexions Library

Adblockers and Innovative Ad Companies are Working Together to Build a More Privacy-Friendly Web
Eckersley,Peter; Toner,Alan
Article
2015
Eckersley and Toner talk more about the coalition between tracker and ad-blocker companies that will respect a 'Do Not Track' policy.
Capitalist Surveillance State: Everyone's a Target: Threatening Reporters, Spying on Public
Article
2013
There is an inherent tendency for the state, which governs on behalf of a minuscule, ruthless class of obscenely wealthy exploiters, to attempt to amass ever greater power to control the population be...
Caveat Surfer: Beware When Using Electronic Communication
Cowan, Kirsten
Article
2000
Points about electronic communication and online security.
Complaints filed against telecom companies for their role in UK mass surveillance programme
Privacy International
Article
2013
On 5 November 2013, Privacy International filed formal complaints with the Organisation for Economic Cooperation and Development (OECD) in the UK against some of the world's leading telecommunication ...
Fifteen minutes of online anonymity
Manach, Jean-Marc
Article
2013
Making sure that your communications and data are confidential is not easy. Jean-Marc Manach, a journalist specialized in digital privacy and security, has an interesting alternative – how to have 15 ...
GCHQ and European spy agencies worked together on mass surveillance
Borger, Julian
Article
2013
Edward Snowden papers unmask close technical cooperation and loose alliance between British, German, French, Spanish and Swedish spy agencies.
Google Deceptively Tracks Students' Internet Browsing, EFF Says in FTC Complaint : Sources News Release
Article
2015
EFF Launches 'Spying on Students' Campaign to Raise Awareness About Privacy Risks of School Technology Tools
Google doesn't want you to limit its ability to follow you around the internet
Article
2014
Behind our screens, tech companies are racing to extract a price for what we read and watch on the web: our personal information.
'Hostile to privacy': Snowden urges internet users to get rid of Dropbox
Article
2014
Edward Snowden has identified Dropbox and other services as 'hostile to privacy." He urges web users to abandon unencrypted communication and adjust privacy settings to prevent governments from spying...
How to Leak to The Intercept
Lee, Micah
Article
2015
Leaking can serve the public interest, fueling revelatory and important journalism. Here are instructions for how to leak safely.
Improve your privacy and security on the Internet using Tor
Article
2013
This user manual contains information about how to download Tor, how to use it, and what to do if Tor is unable to connect to the network
Information Overload: Driving a Stake Through the National Security State
Lindorff, Dave
Article
2012
Here’s an idea. Let’s all start salting all of our conversations and our written communications with a selection of those 300 key words. If every liberty-loving person in America virus were to do thi...
'I've Got Nothing to Hide' and Other Misunderstandings of Privacy
Solove, Daniel J.
Article
2007
According to the nothing to hide argument, there is no threat to privacy unless the government uncovers unlawful activity, in which case a person has no legitimate justification to claim that it remai...
Journalist Security Guide: Covering the news in a dangerous and changing world
Smyth, Frank
Article
2012
This guide details what journalists need to know in a new and changing world. It is aimed at local and international journalists of varied levels of experience.
Lessons of the Snowden Revelations: You are the Target!
Lopez, Alfredo
Article
2013
We in the Left have long worried about “police state tactics”. Now we have to confront the police state structure. It’s here and it can morph into a real police state with very little effort. Opposing...
Metadata - your files talk for you
Article
2013
Few Internet users are aware that many file formats contain hidden data, or metadata. Text processing files or PDFs are likely to contain the name of the author, the date and time of the creation of t...
NSA and GCHQ target Tor network that protects anonymity of web users
Ball, James; Schneier, Bruce; Greenwald, Glenn
Article
2013
The National Security Agency has made repeated attempts to develop attacks against people using Tor, a popular tool designed to protect online anonymity, despite the fact the software is primarily fun...
The NSA Has Effectively Destroyed Internet Privacy: Snowden's Latest
Lopez, Alfredo
Article
2013
Whistle-blower Edward Snowden prove that the NSA, working with its British counterpart the Government Communications Headquarters has conducted an intentional and largely sucessful campaign to destroy...
The NSA's Invasion of Google and Yahoo Servers: Your Email is Likely Being Monitored
Lopez, Alfredo
Article
2013
The American National Security Agency (NSA) has been intercepting information coming in and out of Google and Yahoo servers over non-public, internal network fibre optic lines. In December, 2012 alone...
Online Survival Kit
Article
2013
This Online Survival Kit offers practical tools, advice and techniques that teach you how to circumvent censorship and to secure yo communications and data. This handbook will gradually be unveiled ov...
An Online Tracking Device That’s Virtually Impossible to Block
Angwin, Julia
Article
2014
A new kind of tracking tool, canvas fingerprinting, is being used to follow visitors to thousands of top websites, from WhiteHouse.gov to YouPorn.
Other Voices: The Connexions Newsletter - March 26, 2015: Sustainability, ecology, and agriculture
Diemer, Ulli (editor); Khan, Tahmid (production)
Serial Publication (Periodical)
2015
This issue features a number of items related to sustainability, ecology, and agriculture, including Vandana Shiva's article "Small is the New Big," the Council of Canadians' new report on water issue...
Ours to Hack and To Own: The Rise of Platform Cooperativism, A New Vision For the Future Of Work and A Fairer Internet
Scholz, Trebor; Schneider, Nathan
Book
2016
The activists who have put together Ours to Hack and to Own argue for a new kind of online economy: platform cooperativism, which combines the rich heritage of cooperatives with the promise of 21st-ce...
Preparing for a Digital 9/11
Greenberg, Karen
Article
2012
In recent years, in one of the more dangerous, if largely undiscussed, developments of our time, the Bush and then Obama administrations have launched the first state-planned war in cyber space. First...
Privacy for the other five billion
Donovan, Kevin; Nyst, Carly
Article
2013
Aadhaar is but one example of the development sector's growing fascination with technologies for registering, identifying, and monitoring citizens
Profiled: From Radio to Porn, British Spies Track Web Users' Online Identities
Gallagher, Ryan
Article
2015
Amid a renewed push from the U.K. government for more surveillance powers, more than two dozen documents being disclosed by The Intercept reveal for the first time several major strands of GCHQ’s (Gov...
Protect your freedom and privacy; join us in creating an Internet that's safer from surveillance
Rogoff, Zak
Article
2013
In order to defang surveillance programs like PRISM, we need to stop using centralized systems and come together to build an Internet that's decentralized, trustworthy, and free "as in freedom."
Protect Yourself from Electronic Spying with Surveillance Self-Defense: Sources News Release
Article
2014
The Electronic Frontier Foundation (EFF) has launched its updated "Surveillance Self-Defense" report, a comprehensive how-to guide to protecting yourself from electronic spying for Internet users all ...
6 Ideas For Those Needing Defensive Technology to Protect Free Speech from Authoritarian Regimes: 4 Ways the Rest of Us Can Help
Eckersley, Peter
Article
2009
The Internet remains one of the most powerful means ever created to give voice to repressed people around the world. Unfortunately, new technologies have also given authoritarian regimes new means to ...
Six Tips to Protect Your Search Privacy
Eckersley, Peter; Schoen, Seth; Bankston, Kevin; Slater, Derek
Article
2006
Google, MSN Search, Yahoo!, AOL, and most other search engines collect and store records of your search queries. If these records are revealed to others, they can be embarrassing or even cause great h...
Spying by the Numbers: Hundreds of Thousands Subject to Government Surveillance and No Real Protection
Quigley, Bill
Article
2013
Thanks to NSA whistleblower Edward Snowden many more people in the US and world-wide are learning about extensive US government surveillance and spying. There are publicly available numbers which sho...
Surveillance Self-Defense
Website
2018
Modern technology has given those in power new abilities to eavesdrop and collect data on innocent people. Surveillance Self-Defense is EFF's guide to defending yourself and your friends from surveill...
Ten Steps You Can Take Right Now Against Internet Surveillance
O'Brien, Danny
Article
2013
One of the trends we've seen is how, as the word of the NSA's spying has spread, more and more ordinary people want to know how (or if) they can defend themselves from surveillance online. With a few ...
Who does that server really serve?
Stallman, Richard
Article
2010
On the Internet, proprietary software isn't the only way to lose your freedom. Service as a Software Substitute, or SaaSS, is another way to let someone else have power over your computing.
Why I'm Saying Goodbye to Apple, Google and Microsoft: I'm putting more trust in communities than corporations
Gillmor, Dan
Article
2015
Gillmor discusses how we are losing control over the technology tools that once promised equal opportunity in speech and innovation.

Sources Experts & Spokespersons

Sources Library

Authorities turn their sights on microblogging
Sources News Release
2010
Reporters Without Borders is concerned about a new crackdown in China on social-networking tools, especially microblogging services.
BitTorrent study finds most file-sharers are monitored
2012
Anyone using file-sharing service BitTorrent to download the latest film or music release is likely to be monitored, UK-based researchers suggest. A Birmingham University study indicates that a file-s...
Companies that cooperate with dictatorships must be sanctioned
Sources News Release
2011
Reporters Without Borders condemns the criminal cooperation that exists between many western companies, especially those operating in the new technology area, and authoritarian regimes.
The dark side of the internet
Beckett, Andy
2009
Search engines access only a very small fraction of the deep web, which is estimated to be five hundred times as big as the surface web.
EFF Report Charts Companies on Next Frontier of User Privacy
Sources News Release
2015
Annual Survey Delves Deeper into Practices of Apple, Google, Twitter, and More
Email privacy
Wikipedia article
2012
Email privacy is the broad topic dealing with issues of unauthorized access and inspection of electronic mail. This unauthorized access can happen while an email is in transit, as well as when it is s...
EU: Enact Controls on Digital Weapons Trade
2012
Unregulated Export of Powerful Surveillance Tools Threatens Internet Freedom. Reporters Without Borders and Human Rights Watch call on the European Union to enact new controls on Internet surveillance...
For journalists, danger lurking in your email
O'Brien, Danny
2012
Citizen Lab provided a disturbing look into the likely use of a commercial surveillance program, FinFisher, to remotely invade and control the computers of Bahraini activists. After the software insta...
Google: don't expect privacy when sending to Gmail
Rushe, Dominic
2013
People sending email to any of Google's 425 million Gmail users have no "reasonable expectation" that their communications are confidential, the internet giant has said in a court filing.
How can you protect yourself from online snooping?
Sources News Release
2013
Reporters Without Borders has published an Online Survival Kit on its WefightCensorship.org website that has tools and practical advice that will allow you to protect your communications and data.
Journalists Welcome European Call to Review Anti-Terrorism Laws
Sources News Release
2009
Ministers of the human rights network of the Council of Europe have called on their governments to review anti-terrorism laws in the face of strong criticism from journalists that some laws are in pra...
NSA surveillance may cause breakup of internet, warn experts
Taylor, Matthew; Hopkins, Nick; Kiss, Jemima
2013
Internet specialists highlight moves by Brazil, Germany and India towards creating separate networks in order to block spying.
Online Ad Company Adopts New 'Do Not Track' Standard for Web Browsing
Sources News Release
2015
Adzerk Joins Coalition Delivering Stronger Privacy and a Way Forward in the Ad Blocking Impasse
Recommendations on the right to be forgotten
a Quadrature du Net and Reporters Without Borders
2014
On the problems for the protection of freedom of expression and the right to information posed by the right to be removed from search engine results and, more broadly, the right to be forgotten. Priva...
Revealed: how Whisper app tracks ‘anonymous’ users
Lewis, Paul; Rushe, Dominic
2014
The company behind Whisper, the social media app that promises users anonymity and claims to be “the safest place on the internet”, is tracking the location of its users, including some who have speci...
Software Meant to Fight Crime Is Used to Spy on Dissidents
Perlroth, Nicole
2012
Morgan Marquis-Boire works as a Google engineer and Bill Marczak is earning a Ph.D. in computer science. But this summer, the two men have been moonlighting as detectives, chasing an elusive surveilla...
Stop Sneaky Online Tracking with EFF's Privacy Badger
Sources News Release
2014
Electronic Frontier Foundation (EFF) has released a beta version of Privacy Badger, a browser extension for Firefox and Chrome that detects and blocks online advertising and other embedded content tha...
Test Your Online Privacy Protection with EFF's Panopticlick
Sources News Release
2015
The Electronic Frontier Foundation launched new online tracker-testing in its Panopticlick tool today, helping you analyze the privacy protections in your Web browser. New Feature Analyzes Your Web Br...
Tor (anonymity network)
Wikipedia article
Tor is free software for enabling anonymous communication. The name is an acronym derived from the original software project name The Onion Router. Tor directs Internet traffic through a free, worldwi...
Tor is for Everyone
Why You Should Use Tor
Quintin, Cooper
2014
EFF recently kicked off their second Tor Challenge, an initiative to strengthen the Tor network for online anonymity and improve one of the best free privacy tools in existence. This is great news, bu...
The use of encryption tools and the protection of anonymity online as safeguards for freedom of the press
Kaye, David
2015
David Kaye is the UN Special Rapporteur on the promotion and protection of the right to freedom of expression. In his latest report, he stressed that governments are obligated to protect encryption to...
Who's the true enemy of internet freedom - China, Russia, or the US?
Morozov, Evgeny
2015
Beijing and Moscow are rightly chastised for restricting their citizens' online access – but it's the US that is now even more aggressive in asserting its digital sovereignty.
You selling to me?
Krol, Ariane; Nantel, Jacques
2013
Individually targeted online marketing, based on unwittingly supplied consumer information and monitoring of online activities, is replacing conventional advertising media.

From the Connexions Archives

IntelligentSearch.ca
Website
2017
A web portal featuring topics related to research and the Internet. The home page features a selection of recent and important articles. A search feature, subject index, and other research tools make ...