|
Invasion of Privacy
Fetch Headings.ExtraData
Below are groups and resources (books, articles, websites, etc.) related to this topic. Click on an item’s title to go its resource page with author, publisher, description/abstract and other details, a link to the full text if available, as well as links to related topics in the Subject Index. You can also browse the Title, Author, Subject, Chronological, Dewey, LoC, and Format indexes, or use the Search box. Connexions LibraryEavesdropping on the Planet: The Inalienable Right to Snoop? Blum, William Article 2013 Like a mammoth vacuum cleaner in the sky, the National Security Agency (NSA) sucks it all up: home phone, office phone, cellular phone, email, fax, telex … satellite transmissions, fiber-optic communi... If U.S. Mass Media Were State-Controlled, Would They Look Any Different?: Snowden Coverage Cohen, Jeff Article 2013 The Edward Snowden leaks have revealed a U.S. corporate media system at war with independent journalism. Many of the same outlets that missed the Wall Street meltdown and cheer-led the Iraq invasion h... The No-Nonsense Guide to Global Media Steven, Peter Book 2004 Peter Steven aims to make readers realize the power and influence of dominant media but, at the same time, also understand that they are not "omnipotent" and that there are alternative forms available... Revealed: How DOJ Gagged Google over Surveillance of WikiLeaks Volunteer Gallagher, Ryan Article 2015 The Obama administration fought a legal battle against Google to secretly obtain the email records of a security researcher and journalist associated with WikiLeaks. Spies Hacked Computers Thanks to Sweeping Secret Warrants, Aggressively Stretching U.K. Law Fishman, Andrew; Greenwald, Glenn Article 2015 British spies have received government permission to intensively study software programs for ways to infiltrate and take control of computers. The GCHQ spy agency was vulnerable to legal action for th... |