|
Privacy
Fetch Headings.ExtraData
Below are groups and resources (books, articles, websites, etc.) related to this topic. Click on an item’s title to go its resource page with author, publisher, description/abstract and other details, a link to the full text if available, as well as links to related topics in the Subject Index. You can also browse the Title, Author, Subject, Chronological, Dewey, LoC, and Format indexes, or use the Search box. Results70 Connexions Library1 Connexions Directory of Groups & Websites 2 Sources Experts & Spokespersons 27 Sources Library 2 From the Connexions Archives Connexions LibraryBig Brother's Getting Bigger Smith, Jack A. Article 2012 Government surveillance and attacks on the privacy of American citizens were bad enough under the Bush regime but they are getting even worse during the Obama years. Connexions: Volume 4, Number 1 - February 1979 - National Security/Securite Nationale Serial Publication (Periodical) 1979 Connexions: Volume 5, Number 1 - January 1980 - Literacy/Alphabetisation Serial Publication (Periodical) 1980 Connexions: Volume 9, Number 2 - Summer 1984 - Rights and Liberties - A Digest of Resources & Groups for Social Serial Publication (Periodical) 1984 Connexions Annual Resource and Reading List Article 1989 A short and selective list of resources on issues addressed in the Connexions Annual, such as environment, education, peace, interntional development, women's issues, urban issues, housing, human rig... Connexions Digest: Issue 54 - February 1992- A Social Change Sourcebook Serial Publication (Periodical) 1992 Connexions Library: Human Rights and Civil Liberties Focus Website Selected articles, books, websites and other resources on civil liberties and human rights. Continuous Excursions: Politics and Personal Life Colman, Marshall Book 1982 Colman looks at the idea that 'the personal is political'. He looks at personal life in pre-capitalist societies, the nature of politics and social relations, patriarchy and sexual relations, intimacy... Corporate Coercion and the Drive to Eliminate Buying with Cash Nader, Ralph Article 2018 Consumer freedom and privacy are examined as coercive commercialism quickly moves toward a cashless economy, when all consumers are forced into corporate payment systems from credit/debit cards, mobil... The Corporate State of Surveillance: Opting Out Nader, Ralph Article 2013 America was founded on the ideals of personal liberty, freedom and democracy. Now mass spying, surveillance and the unending collection of personal data undermine civil liberties and our privacy right... Data Mining You: How the Intelligence Community Is Creating a New American World Engelhardt, Tom Article 2012 Joseph K., that icon of single-lettered anonymity from Franz Kafka’s novel The Trial, would undoubtedly have felt right at home in Washington. Edward Snowden's Warning to Canada Snowden, Edward Article 2015 Whistleblower Edward Snowden talks about Bill C-51 and the weak oversight of Canada's intelligence agencies. The End of Privacy: How Total Surveillance Is Becoming a Reality Whitaker, Reg Book 1999 Whitaker argues that we live in a surveillance society; in order to get rewards and privileges, we have to give up our personal privacy to the government and corporations. The Face Off: Law Enforcement Use of Face Recognition Technology Lynch, Jennifer Article 2018 Face recognition is poised to become one of the most pervasive surveillance technologies, and law enforcement's use of it is increasing rapidly. However, the adoption of face recognition technologies ... Fifteen minutes of online anonymity Manach, Jean-Marc Article 2013 Making sure that your communications and data are confidential is not easy. Jean-Marc Manach, a journalist specialized in digital privacy and security, has an interesting alternative – how to have 15 ... For Owners of Amazon’s Ring Security Cameras, Strangers May Have Been Watching Too Sam Biddle Article 2019 Amazon's Ring security cameras have a history of lax, sloppy oversight when it comes to deciding who has access to some of the most precious, intimate data belonging to any person: a live, high-defini... Four Trends That Scare the Hell Out of Me Wilson, Robert Anton Article 1989 To paraphrase H.G. Wells, modern history has become a race between education and miseducation. There are very few people around who really don't know anything, but there are multitudes who know many t... Die Globale Teleueberwachung des 21. Jahrhunderts Article Es entsteht zur Zeit eine globale Teleuberwachung, die sich von allen ethischen oder diplomatischen Voreingenomenheiten freimacht. Google keeps tracking you even when you specifically tell it not to: Maps, Search won't take no for an answer McCarthy, Kieren Article 2018 Google has admitted that its option to "pause" the gathering of your location data doesn't apply to its Maps and Search apps – which will continue to track you even when you specifically choose to hal... Improve your privacy and security on the Internet using Tor Article 2013 This user manual contains information about how to download Tor, how to use it, and what to do if Tor is unable to connect to the network India's UID And The Fantasy Of Dataveillance Karunakaran , Binu Article 2009 The perils of establishing nationwide identity systems have always been a hot topic of debate in countries that attach great value to privacy and human rights of its citizens. In India, there is not e... 'I've Got Nothing to Hide' and Other Misunderstandings of Privacy Solove, Daniel J. Article 2007 According to the nothing to hide argument, there is no threat to privacy unless the government uncovers unlawful activity, in which case a person has no legitimate justification to claim that it remai... Just because they hunt witches doesn't mean we have Malik, Kenan Article 2010 The Big Brother defence of WikiLeaks is that if everyone had a camera upon them, society would be a better place. This is a view that fails to distinguish between the need to control those who possess... Lessons of the Snowden Revelations: You are the Target! Lopez, Alfredo Article 2013 We in the Left have long worried about “police state tactics”. Now we have to confront the police state structure. It’s here and it can morph into a real police state with very little effort. Opposing... Medical Privacy Under Threat in the Age of Big Data Chideya, Farai Article 2015 Medical privacy is a high-stakes game, in both human and financial terms, given the growing multibillion-dollar legal market for anonymized medical data. The threats to individuals seeking to protect ... Metadata - your files talk for you Article 2013 Few Internet users are aware that many file formats contain hidden data, or metadata. Text processing files or PDFs are likely to contain the name of the author, the date and time of the creation of t... Mistaking Omniscience for Omnipotence : In a World Without Privacy, There Are No Exemptions for Our Spies Engelhardt, Tom Article 2013 Given how similar they sound and how easy it is to imagine one leading to the other, confusing omniscience (having total knowledge) with omnipotence (having total power) is easy enough. It’s a reasona... A More Perfect Union: Why Straight America Must Stand Up for Gay Rights Mohr, Richard D. Book Mohr uses lively examples and historical cases to explore both private and public issues affecting the gay and lesbian community. The Naked Society Packard, Vance Book 1964 An expose of the forces which are increasingly depriving Americans of their right to privacy. The New Police Surveillance State: The Rising Price of Political Assembly Rosen, David Article 2012 Police are increasingly being deployed to restrict if not prevent mass political actions, especially directed at the banks. No Child Left Un-Mined? Student Privacy at Risk in the Age of Big Data Chideya, Farai Article 2015 Chideya discusses the implications of the compilation of big data trails containing information about children's performance in school. The No-Nonsense Guide to Global Media Steven, Peter Book 2004 Peter Steven aims to make readers realize the power and influence of dominant media but, at the same time, also understand that they are not "omnipotent" and that there are alternative forms available... No Safe Harbor: How NSA Spying Undermined U.S. Tech and Europeans' Privacy O'Brien, Danny Article 2015 The spread of knowledge about the NSA's surveillance programs has shaken the trust of customers in U.S. Internet companies like Facebook, Google, and Apple: especially non-U.S. customers who have disc... 'Not a Good Answer': Privacy Advocates Reject Democratic Proposal for 'Technological Wall' With Expanded Border Surveillance: 'More surveillance' has become the default answer to far too many difficult policy questions Conley, Julia Article 2019 Digital rights advocates called on Democratic lawmakers to expand their fight against the wall into a fight for all human and constitutional rights-instead of suggesting alternative "border security" ... NSA and GCHQ target Tor network that protects anonymity of web users Ball, James; Schneier, Bruce; Greenwald, Glenn Article 2013 The National Security Agency has made repeated attempts to develop attacks against people using Tor, a popular tool designed to protect online anonymity, despite the fact the software is primarily fun... The Obliteration of Privacy: Snowden and the NSA Kandutsch, Carl E Article 2014 It’s remarkable how little outrage Edward Snowden’s NSA revelations have provoked in the American public. One often heard response is something like, “Well, I don’t have anything to hide, so I don’t c... On Locational Privacy, and How to Avoid Losing it Forever Blumberg, Andrew J.; Eckersley, Peter Article 2009 Over the next decade, systems which create and store digital records of people's movements through public space will be woven inextricably into the fabric of everyday life. We are already starting to ... Online Rights for Online Workers - Privacy at Work Website Deals with workers' right to privacy in the face of online surveillance by employers. Open Marriage: A New Life Style for Couples O'Neill, Nena & George Book 1972 The authors propose open marriage as a way to help couples realize that there can be both relatedness and freedom in marriage, and that freedom, with the growth and responsibility it entails, can be t... OptOut Website Steve Gibson's campaign against Internet spyware used by companies to extract information from Internet users' computers without their knowledge or consent. The Other Police State: Private Cops vs. the Public Good Rosen, David Article 2013 A revealing study on "Spooky Business: A New Report on Corporate Espionage Against Non-profits" written by Gary Ruskin confirms one’s worst suspicions about the ever-expanding two-headed U.S. security... Other Voices: The Connexions Newsletter - December 5, 2015: Ecosocialism, environment, and urban gardening Diemer, Ulli (ed.) Serial Publication (Periodical) 2015 This issue of Other Voices covers a wide range of issues, from the climate crisis and the ecosocialist response, to terrorism and the struggle against religious fundamentalism, as well as items on urb... Other Voices: The Connexions Newsletter - July 22, 2017: Secrecy and Power Diemer, Ulli (ed.) Serial Publication (Periodical) 2017 Secrecy is a weapon the powerful use against their enemies: us. This issue of Other Voices explores the relationship of secrecy and power. A practical guide to protecting your identity and security when using mobile phones Article 2013 Many activists have been tracked via their mobile phones. Assess the risk for your own activities given the practices used in your country, how high-profile your work is, and what others in your commu... Preparing for a Digital 9/11 Greenberg, Karen Article 2012 In recent years, in one of the more dangerous, if largely undiscussed, developments of our time, the Bush and then Obama administrations have launched the first state-planned war in cyber space. First... Privacy For Sale: How Computerization Has Made Everyone's Private Life an Open Secret Rothfeder, Jeffrey Book 1992 Privacy for the other five billion Donovan, Kevin; Nyst, Carly Article 2013 Aadhaar is but one example of the development sector's growing fascination with technologies for registering, identifying, and monitoring citizens Privacy tapped out Price, David Article 2013 For over a century, Americans and their judiciary fiercely fought any attempt by security agencies and law enforcement to listen in on private electronic communications. Now they’ve stopped fighting, ... The Puritanical Glee Over the Ashley Madison Hack Greenwald, Glenn Article 2015 High school students have long read The Scarlet Letter, the 1850 novel by Nathaniel Hawthorne set in a Puritanical Massachusetts town in the mid-17th century. As The Atlantic noted in 1886, "the punis... Release of the Full TPP Text After Five Years of Secrecy Confirms Threats to Users' Rights Malcolm, Jeremy; Sutton, Maira Article 2015 Trade offices involved in negotiating the Trans-Pacific Partnership (TPP) agreement have finally released all 30 chapters of the trade deal today, a month after announcing the conclusion of the deal i... Sending encrypted emails using Thunderbird and PGP Article 2013 There are easy ways to ensure your Internet activities remain confidential. Six Tips to Protect Your Search Privacy Eckersley, Peter; Schoen, Seth; Bankston, Kevin; Slater, Derek Article 2006 Google, MSN Search, Yahoo!, AOL, and most other search engines collect and store records of your search queries. If these records are revealed to others, they can be embarrassing or even cause great h... The Soft Cage: Surveillance in America from Slavery to the War on Terror Parenti, Christian; Rossetti, Chip (eds.) Book 2004 Parenti explores the history of American surveillance from colonial times to the present. What this historical evidence clearly reveals is a continuum of the culture of surveillance. The weakest, most... Someone's Watching You! : From Micropchips in your Underwear to Satellites Monitoring Your Every Move, Find Out Who's Tracking You and What You Can Do about It Lee, Forest Book 2011 An expose and explanation of the little-known secret surveillance programs run by both the public and private sectors, including practical steps on how to keep your private life private. Spying by the Numbers: Hundreds of Thousands Subject to Government Surveillance and No Real Protection Quigley, Bill Article 2013 Thanks to NSA whistleblower Edward Snowden many more people in the US and world-wide are learning about extensive US government surveillance and spying. There are publicly available numbers which sho... Spying on Democracy: Government Surveillance, Corporate Power, and Public Resistance Boghosian, Heidi Book 2013 Heidi Boghosian documents the disturbing increase in surveillance of ordinary citizens and the danger it poses to our privacy, our civil liberties, and to the future of democracy itself. Surveillance Self-Defense Website 2018 Modern technology has given those in power new abilities to eavesdrop and collect data on innocent people. Surveillance Self-Defense is EFF's guide to defending yourself and your friends from surveill... Tails: The amnesic Incognito Live System Article 2013 Tails is an operating system like Windows or Mac OS, but one specially designed to preserve your anonymity and privacy. Think the Left Won the Culture War? Think Again deBoer, Fredrik Article 2015 With the recent AshleyMadison leak and Gawker.com's notorious naming and shaming of an obscure, married publishing executive, deBoer questions who really won in this culture war. Thirteen Ways Government Tracks Us Quigley, Bill Article 2012 Privacy is eroding fast as technology offers government increasing ways to track and spy on citizens. Here are thirteen examples of how some of the biggest government agencies and programs track peopl... Uber Plans to Track Users Should Not Be Allowed, Says Privacy Group Chatterjee, Pratap Article 2015 A formal complaint has been filed against Uber, the car ride company, by the Electronic Privacy Information Center (EPIC), a non-profit advocacy group. The NGO says Uber plans to use their smart phone... Virtual Private Network (VPN) Article 2013 This technology allows the creation of an Internet tunnel (a virtual link) between two physical networks in different locations in a way that is transparent for users. Vodafone Reveals Existence of Secret Wires that Allow State Surveillance Garside, Juliette Article 2014 Wires allow agencies to listen to or record live conversations, in what privacy campaigners are calling a 'nightmare scenario'. The Watchers: The Rise of America's Surveillance State Harris, Shane Book 2010 An exploration of how and why the American government increasingly spies on its own citizens. We need to think about Toilets: New Internationalist August 2008 - #414 Serial Publication (Periodical) 2008 A look at the history and facts about toilets. A look at sanitation and employment opportunities surrounding toilets. Connexions Directory of Groups & WebsitesConnexions Information Sharing Services Connexions provides information and services for advocacy groups, voluntary and non-profit organizations, and individuals, who are working for social and economic justice, environmental responsibility... Sources Experts & SpokespersonsSources LibraryThe Car of the Future Will Sell Your Data Coppola, Gabrielle; Welch, David 2018 As "smarter" vehicles provide storehouses of personal information, carmakers are building databases of consumer preferences that could be sold to outside vendors for marketing purposes, much like Goog... The City in History Its Origins, Its Transformations, and Its Prospects Mumford, Lewis 1961 Beginning with an interpretation of the origin and nature of the city, Mumford follows the city's development from Egypt and Mesopotamia through Greece, Rome, and the Middle Ages to the modern world. The dark side of the internet Beckett, Andy 2009 Search engines access only a very small fraction of the deep web, which is estimated to be five hundred times as big as the surface web. EFF Report Charts Companies on Next Frontier of User Privacy Sources News Release 2015 Annual Survey Delves Deeper into Practices of Apple, Google, Twitter, and More Email privacy Wikipedia article 2012 Email privacy is the broad topic dealing with issues of unauthorized access and inspection of electronic mail. This unauthorized access can happen while an email is in transit, as well as when it is s... For journalists, danger lurking in your email O'Brien, Danny 2012 Citizen Lab provided a disturbing look into the likely use of a commercial surveillance program, FinFisher, to remotely invade and control the computers of Bahraini activists. After the software insta... Free Speech Groups Issue New Guide to the International 'Necessary & Proportionate Principles' Sources News Release 2014 EFF and ARTICLE 19 Urges Governments to Preserve Fundamental Freedoms in the Age of Mass Surveillance Get your head out of the clouds If we allow our personal data to be stored in giant electornic centres, we deserve what we get Harris, John 2011 Appraising the risks to personal data held in cloud computing systems. Google: don't expect privacy when sending to Gmail Rushe, Dominic 2013 People sending email to any of Google's 425 million Gmail users have no "reasonable expectation" that their communications are confidential, the internet giant has said in a court filing. Google and the future of search: Amit Singhal and the Knowledge Graph Adams, Tim 2013 An interview with the current head of Google Search, discussing some of the thought processes behind the current functionality of 'search' and some of its possibilites for the future. Google's upcoming Allo messaging app is 'dangerous', Edward Snowden claims Altalebi, Lamees 2016 Using Google's upcoming messaging app is "dangerous", according to Edward Snowden. In a tweet, the whistleblower advised against using Allo, the search giant’s latest app, saying: "Google's decision t... How the US government secretly reads your email Brooke, Heather 2011 Secret orders forcing Google and Sonic to release a WikiLeaks volunteer's email reveal the scale of US government snooping. Is Your Printer Spying On You? Imagine that every time you printed a document it automatically included a secret code that could be used to identify the printer - and potentially the person who used it. Met police using surveillance system to monitor mobile phones Gallagher, Ryan; Syal, Rejeev 2011 Civil liberties group raises concerns over Met police purchase of technology to track public handsets over a targeted area. Microsoft handed the NSA access to encrypted messages Greenwald, Glenn, et. al 2013 Microsoft has collaborated closely with US intelligence services to allow users' communications to be intercepted, including helping the National Security Agency to circumvent the company's own encryp... Pragmatic Anonymity Create an account with an anonymization service. Tell everyone about that account, including the password. The account basically acts as a public mail drop, anyone can use it to send messages, with no... Privacy A Manifesto Sofsky, Wolfgang 2008 Sofsky attributes loss of privacy not only to technology and fear but also our indifference. Protect Students from Corporate Data-Mining in the Classroom Nava, Victor 2015 Across the political spectrum there is debate as to whether data should be collected about students.
Secrecy and Power Introduction to the July 22, 2017 issue of Other Voices Diemer, Ulli 2017 It is one of the essential attributes of power that it insists on secrecy. Or, more precisely, those who wield power over others routinely claim that the details of what they do, and why they do it, a... The Stasi could only dream of such data Britain, the birthplace of liberalism, has become the database state Ash, Timothy Garton 2008 As technology increases the flow of stored data about individual actions, assurances of the "right to informational self-determination" must be hard won from governments. Government surveillance of ci... Stop replacing London's phone boxes with corporate surveillance New connected kiosks are replacing London's payphones. Every time you use them, you're allowing Google, BT and Primesight to track you Atkin, Ross 2018 Concerns over privacy in London, UK, as Google, BT and Primesight provide free wifi and phone charging in exchange for allowing the consortium to identify users and track their movements through the c... Tor is for Everyone Why You Should Use Tor Quintin, Cooper 2014 EFF recently kicked off their second Tor Challenge, an initiative to strengthen the Tor network for online anonymity and improve one of the best free privacy tools in existence. This is great news, bu... UN slams UK surveillance law, calls for privacy reforms in Canada, France and Macedonia 2015 In yet another blow to the UK's surveillance proponents, the UN Human Rights Committee has criticised the British legal regime governing the interception of communications, observing that it allows fo... Unmasking the Five-Eyed monster, a global and secret intelligence-sharing regime 2013 Privacy International is proud to announce our new project, Eyes Wide Open, which aims to pry open the Five Eyes arrangement and bring it under the rule of law. Will the government's counter-extremist programme criminalise dissent? Kundnani, Arun 2015 From 1 July, a broad range of public bodies - from nursery schools to optometrists - will be legally obliged to participate in the U.S. government’s Prevent policy to identify would-be extremists. Und... You selling to me? Krol, Ariane; Nantel, Jacques 2013 Individually targeted online marketing, based on unwittingly supplied consumer information and monitoring of online activities, is replacing conventional advertising media. From the Connexions ArchivesIntelligentSearch.ca Website 2017 A web portal featuring topics related to research and the Internet. The home page features a selection of recent and important articles. A search feature, subject index, and other research tools make ... Privacy Journal Smith, Robert Ellis Serial Publication (Periodical) 1978 A monthly newsletter that is, "...filled with American and Canadian news about the confidentiality of personal information." It describes, "...record-keeping in government and business, new invasions ... |