Privacy

Fetch Headings.ExtraData
Below are groups and resources (books, articles, websites, etc.) related to this topic. Click on an item’s title to go its resource page with author, publisher, description/abstract and other details, a link to the full text if available, as well as links to related topics in the Subject Index. You can also browse the Title, Author, Subject, Chronological, Dewey, LoC, and Format indexes, or use the Search box.
Particularly recommended items are flagged with a red logo:

Connexions Library

Big Brother's Getting Bigger
Smith, Jack A.
Article
2012
Government surveillance and attacks on the privacy of American citizens were bad enough under the Bush regime but they are getting even worse during the Obama years.
Connexions: Volume 7, Number 1 - March 1982
Serial Publication (Periodical)
1982
Connexions Annual Resource and Reading List
Article
1989
A short and selective list of resources on issues addressed in the Connexions Annual, such as environment, education, peace, interntional development, women's issues, urban issues, housing, human rig...
Connexions Library: Human Rights and Civil Liberties Focus
Website
Selected articles, books, websites and other resources on civil liberties and human rights.
Continuous Excursions: Politics and Personal Life
Colman, Marshall
Book
1982
Colman looks at the idea that 'the personal is political'. He looks at personal life in pre-capitalist societies, the nature of politics and social relations, patriarchy and sexual relations, intimacy...
Corporate Coercion and the Drive to Eliminate Buying with Cash
Nader, Ralph
Article
2018
Consumer freedom and privacy are examined as coercive commercialism quickly moves toward a cashless economy, when all consumers are forced into corporate payment systems from credit/debit cards, mobil...
The Corporate State of Surveillance: Opting Out
Nader, Ralph
Article
2013
America was founded on the ideals of personal liberty, freedom and democracy. Now mass spying, surveillance and the unending collection of personal data undermine civil liberties and our privacy right...
Data Mining You: How the Intelligence Community Is Creating a New American World
Engelhardt, Tom
Article
2012
Joseph K., that icon of single-lettered anonymity from Franz Kafka’s novel The Trial, would undoubtedly have felt right at home in Washington.
Edward Snowden's Warning to Canada
Snowden, Edward
Article
2015
Whistleblower Edward Snowden talks about Bill C-51 and the weak oversight of Canada's intelligence agencies.
The End of Privacy: How Total Surveillance Is Becoming a Reality
Whitaker, Reg
Book
1999
Whitaker argues that we live in a surveillance society; in order to get rewards and privileges, we have to give up our personal privacy to the government and corporations.
The Face Off: Law Enforcement Use of Face Recognition Technology
Lynch, Jennifer
Article
2018
Face recognition is poised to become one of the most pervasive surveillance technologies, and law enforcement's use of it is increasing rapidly. However, the adoption of face recognition technologies ...
Fifteen minutes of online anonymity
Manach, Jean-Marc
Article
2013
Making sure that your communications and data are confidential is not easy. Jean-Marc Manach, a journalist specialized in digital privacy and security, has an interesting alternative – how to have 15 ...
For Owners of Amazon’s Ring Security Cameras, Strangers May Have Been Watching Too
Sam Biddle
Article
2019
Amazon's Ring security cameras have a history of lax, sloppy oversight when it comes to deciding who has access to some of the most precious, intimate data belonging to any person: a live, high-defini...
Four Trends That Scare the Hell Out of Me
Wilson, Robert Anton
Article
1989
To paraphrase H.G. Wells, modern history has become a race between education and miseducation. There are very few people around who really don't know anything, but there are multitudes who know many t...
Die Globale Teleueberwachung des 21. Jahrhunderts
Article
Es entsteht zur Zeit eine globale Teleuberwachung, die sich von allen ethischen oder diplomatischen Voreingenomenheiten freimacht.
Google keeps tracking you even when you specifically tell it not to: Maps, Search won't take no for an answer
McCarthy, Kieren
Article
2018
Google has admitted that its option to "pause" the gathering of your location data doesn't apply to its Maps and Search apps – which will continue to track you even when you specifically choose to hal...
Improve your privacy and security on the Internet using Tor
Article
2013
This user manual contains information about how to download Tor, how to use it, and what to do if Tor is unable to connect to the network
India's UID And The Fantasy Of Dataveillance
Karunakaran , Binu
Article
2009
The perils of establishing nationwide identity systems have always been a hot topic of debate in countries that attach great value to privacy and human rights of its citizens. In India, there is not e...
'I've Got Nothing to Hide' and Other Misunderstandings of Privacy
Solove, Daniel J.
Article
2007
According to the nothing to hide argument, there is no threat to privacy unless the government uncovers unlawful activity, in which case a person has no legitimate justification to claim that it remai...
Just because they hunt witches doesn't mean we have
Malik, Kenan
Article
2010
The Big Brother defence of WikiLeaks is that if everyone had a camera upon them, society would be a better place. This is a view that fails to distinguish between the need to control those who possess...
Lessons of the Snowden Revelations: You are the Target!
Lopez, Alfredo
Article
2013
We in the Left have long worried about “police state tactics”. Now we have to confront the police state structure. It’s here and it can morph into a real police state with very little effort. Opposing...
Medical Privacy Under Threat in the Age of Big Data
Chideya, Farai
Article
2015
Medical privacy is a high-stakes game, in both human and financial terms, given the growing multibillion-dollar legal market for anonymized medical data. The threats to individuals seeking to protect ...
Metadata - your files talk for you
Article
2013
Few Internet users are aware that many file formats contain hidden data, or metadata. Text processing files or PDFs are likely to contain the name of the author, the date and time of the creation of t...
Mistaking Omniscience for Omnipotence : In a World Without Privacy, There Are No Exemptions for Our Spies
Engelhardt, Tom
Article
2013
Given how similar they sound and how easy it is to imagine one leading to the other, confusing omniscience (having total knowledge) with omnipotence (having total power) is easy enough. It’s a reasona...
A More Perfect Union: Why Straight America Must Stand Up for Gay Rights
Mohr, Richard D.
Book
Mohr uses lively examples and historical cases to explore both private and public issues affecting the gay and lesbian community.
The Naked Society
Packard, Vance
Book
1964
An expose of the forces which are increasingly depriving Americans of their right to privacy.
The New Police Surveillance State: The Rising Price of Political Assembly
Rosen, David
Article
2012
Police are increasingly being deployed to restrict if not prevent mass political actions, especially directed at the banks.
No Child Left Un-Mined? Student Privacy at Risk in the Age of Big Data
Chideya, Farai
Article
2015
Chideya discusses the implications of the compilation of big data trails containing information about children's performance in school.
The No-Nonsense Guide to Global Media
Steven, Peter
Book
2004
Peter Steven aims to make readers realize the power and influence of dominant media but, at the same time, also understand that they are not "omnipotent" and that there are alternative forms available...
No Safe Harbor: How NSA Spying Undermined U.S. Tech and Europeans' Privacy
O'Brien, Danny
Article
2015
The spread of knowledge about the NSA's surveillance programs has shaken the trust of customers in U.S. Internet companies like Facebook, Google, and Apple: especially non-U.S. customers who have disc...
'Not a Good Answer': Privacy Advocates Reject Democratic Proposal for 'Technological Wall' With Expanded Border Surveillance: 'More surveillance' has become the default answer to far too many difficult policy questions
Conley, Julia
Article
2019
Digital rights advocates called on Democratic lawmakers to expand their fight against the wall into a fight for all human and constitutional rights-instead of suggesting alternative "border security" ...
NSA and GCHQ target Tor network that protects anonymity of web users
Ball, James; Schneier, Bruce; Greenwald, Glenn
Article
2013
The National Security Agency has made repeated attempts to develop attacks against people using Tor, a popular tool designed to protect online anonymity, despite the fact the software is primarily fun...
The Obliteration of Privacy: Snowden and the NSA
Kandutsch, Carl E
Article
2014
It’s remarkable how little outrage Edward Snowden’s NSA revelations have provoked in the American public. One often heard response is something like, “Well, I don’t have anything to hide, so I don’t c...
On Locational Privacy, and How to Avoid Losing it Forever
Blumberg, Andrew J.; Eckersley, Peter
Article
2009
Over the next decade, systems which create and store digital records of people's movements through public space will be woven inextricably into the fabric of everyday life. We are already starting to ...
Online Rights for Online Workers - Privacy at Work
Website
Deals with workers' right to privacy in the face of online surveillance by employers.
Open Marriage: A New Life Style for Couples
O'Neill, Nena & George
Book
1972
The authors propose open marriage as a way to help couples realize that there can be both relatedness and freedom in marriage, and that freedom, with the growth and responsibility it entails, can be t...
OptOut
Website
Steve Gibson's campaign against Internet spyware used by companies to extract information from Internet users' computers without their knowledge or consent.
The Other Police State: Private Cops vs. the Public Good
Rosen, David
Article
2013
A revealing study on "Spooky Business: A New Report on Corporate Espionage Against Non-profits" written by Gary Ruskin confirms one’s worst suspicions about the ever-expanding two-headed U.S. security...
Other Voices: The Connexions Newsletter - December 5, 2015: Ecosocialism, environment, and urban gardening
Diemer, Ulli (ed.)
Serial Publication (Periodical)
2015
This issue of Other Voices covers a wide range of issues, from the climate crisis and the ecosocialist response, to terrorism and the struggle against religious fundamentalism, as well as items on urb...
Other Voices: The Connexions Newsletter - July 22, 2017: Secrecy and Power
Diemer, Ulli (ed.)
Serial Publication (Periodical)
2017
Secrecy is a weapon the powerful use against their enemies: us. This issue of Other Voices explores the relationship of secrecy and power.
A practical guide to protecting your identity and security when using mobile phones
Article
2013
Many activists have been tracked via their mobile phones. Assess the risk for your own activities given the practices used in your country, how high-profile your work is, and what others in your commu...
Preparing for a Digital 9/11
Greenberg, Karen
Article
2012
In recent years, in one of the more dangerous, if largely undiscussed, developments of our time, the Bush and then Obama administrations have launched the first state-planned war in cyber space. First...
Privacy for the other five billion
Donovan, Kevin; Nyst, Carly
Article
2013
Aadhaar is but one example of the development sector's growing fascination with technologies for registering, identifying, and monitoring citizens
Privacy tapped out
Price, David
Article
2013
For over a century, Americans and their judiciary fiercely fought any attempt by security agencies and law enforcement to listen in on private electronic communications. Now they’ve stopped fighting, ...
The Puritanical Glee Over the Ashley Madison Hack
Greenwald, Glenn
Article
2015
High school students have long read The Scarlet Letter, the 1850 novel by Nathaniel Hawthorne set in a Puritanical Massachusetts town in the mid-17th century. As The Atlantic noted in 1886, "the punis...
Release of the Full TPP Text After Five Years of Secrecy Confirms Threats to Users' Rights
Malcolm, Jeremy; Sutton, Maira
Article
2015
Trade offices involved in negotiating the Trans-Pacific Partnership (TPP) agreement have finally released all 30 chapters of the trade deal today, a month after announcing the conclusion of the deal i...
Sending encrypted emails using Thunderbird and PGP
Article
2013
There are easy ways to ensure your Internet activities remain confidential.
Six Tips to Protect Your Search Privacy
Eckersley, Peter; Schoen, Seth; Bankston, Kevin; Slater, Derek
Article
2006
Google, MSN Search, Yahoo!, AOL, and most other search engines collect and store records of your search queries. If these records are revealed to others, they can be embarrassing or even cause great h...
The Soft Cage: Surveillance in America from Slavery to the War on Terror
Parenti, Christian; Rossetti, Chip (eds.)
Book
2004
Parenti explores the history of American surveillance from colonial times to the present. What this historical evidence clearly reveals is a continuum of the culture of surveillance. The weakest, most...
Someone's Watching You! : From Micropchips in your Underwear to Satellites Monitoring Your Every Move, Find Out Who's Tracking You and What You Can Do about It
Lee, Forest
Book
2011
An expose and explanation of the little-known secret surveillance programs run by both the public and private sectors, including practical steps on how to keep your private life private.
Spying by the Numbers: Hundreds of Thousands Subject to Government Surveillance and No Real Protection
Quigley, Bill
Article
2013
Thanks to NSA whistleblower Edward Snowden many more people in the US and world-wide are learning about extensive US government surveillance and spying. There are publicly available numbers which sho...
Spying on Democracy: Government Surveillance, Corporate Power, and Public Resistance
Boghosian, Heidi
Book
2013
Heidi Boghosian documents the disturbing increase in surveillance of ordinary citizens and the danger it poses to our privacy, our civil liberties, and to the future of democracy itself.
Surveillance Self-Defense
Website
2018
Modern technology has given those in power new abilities to eavesdrop and collect data on innocent people. Surveillance Self-Defense is EFF's guide to defending yourself and your friends from surveill...
Tails: The amnesic Incognito Live System
Article
2013
Tails is an operating system like Windows or Mac OS, but one specially designed to preserve your anonymity and privacy.
Think the Left Won the Culture War? Think Again
deBoer, Fredrik
Article
2015
With the recent AshleyMadison leak and Gawker.com's notorious naming and shaming of an obscure, married publishing executive, deBoer questions who really won in this culture war.
Thirteen Ways Government Tracks Us
Quigley, Bill
Article
2012
Privacy is eroding fast as technology offers government increasing ways to track and spy on citizens. Here are thirteen examples of how some of the biggest government agencies and programs track peopl...
Uber Plans to Track Users Should Not Be Allowed, Says Privacy Group
Chatterjee, Pratap
Article
2015
A formal complaint has been filed against Uber, the car ride company, by the Electronic Privacy Information Center (EPIC), a non-profit advocacy group. The NGO says Uber plans to use their smart phone...
Virtual Private Network (VPN)
Article
2013
This technology allows the creation of an Internet tunnel (a virtual link) between two physical networks in different locations in a way that is transparent for users.
Vodafone Reveals Existence of Secret Wires that Allow State Surveillance
Garside, Juliette
Article
2014
Wires allow agencies to listen to or record live conversations, in what privacy campaigners are calling a 'nightmare scenario'.
Wanted: A Hackers' Charter
Goldstein, Emmanuel
Article
The Watchers: The Rise of America's Surveillance State
Harris, Shane
Book
2010
An exploration of how and why the American government increasingly spies on its own citizens.
We need to think about Toilets: New Internationalist August 2008 - #414
Serial Publication (Periodical)
2008
A look at the history and facts about toilets. A look at sanitation and employment opportunities surrounding toilets.
Who Knows: Safegurding Your Privacy in a Networked World
Cavourkian, Ann and Tapscott, Don
Book
1995

Connexions Directory of Groups & Websites

Connexions Information Sharing Services
Connexions provides information and services for advocacy groups, voluntary and non-profit organizations, and individuals, who are working for social and economic justice, environmental responsibility...

Sources Experts & Spokespersons

Sources Library

The Car of the Future Will Sell Your Data
Coppola, Gabrielle; Welch, David
2018
As "smarter" vehicles provide storehouses of personal information, carmakers are building databases of consumer preferences that could be sold to outside vendors for marketing purposes, much like Goog...
The City in History
Its Origins, Its Transformations, and Its Prospects
Mumford, Lewis
1961
Beginning with an interpretation of the origin and nature of the city, Mumford follows the city's development from Egypt and Mesopotamia through Greece, Rome, and the Middle Ages to the modern world.
The dark side of the internet
Beckett, Andy
2009
Search engines access only a very small fraction of the deep web, which is estimated to be five hundred times as big as the surface web.
EFF Report Charts Companies on Next Frontier of User Privacy
Sources News Release
2015
Annual Survey Delves Deeper into Practices of Apple, Google, Twitter, and More
Email privacy
Wikipedia article
2012
Email privacy is the broad topic dealing with issues of unauthorized access and inspection of electronic mail. This unauthorized access can happen while an email is in transit, as well as when it is s...
For journalists, danger lurking in your email
O'Brien, Danny
2012
Citizen Lab provided a disturbing look into the likely use of a commercial surveillance program, FinFisher, to remotely invade and control the computers of Bahraini activists. After the software insta...
Free Speech Groups Issue New Guide to the International 'Necessary & Proportionate Principles'
Sources News Release
2014
EFF and ARTICLE 19 Urges Governments to Preserve Fundamental Freedoms in the Age of Mass Surveillance
Get your head out of the clouds
If we allow our personal data to be stored in giant electornic centres, we deserve what we get
Harris, John
2011
Appraising the risks to personal data held in cloud computing systems.
Google: don't expect privacy when sending to Gmail
Rushe, Dominic
2013
People sending email to any of Google's 425 million Gmail users have no "reasonable expectation" that their communications are confidential, the internet giant has said in a court filing.
Google and the future of search: Amit Singhal and the Knowledge Graph
Adams, Tim
2013
An interview with the current head of Google Search, discussing some of the thought processes behind the current functionality of 'search' and some of its possibilites for the future.
Google's upcoming Allo messaging app is 'dangerous', Edward Snowden claims
Altalebi, Lamees
2016
Using Google's upcoming messaging app is "dangerous", according to Edward Snowden. In a tweet, the whistleblower advised against using Allo, the search giant’s latest app, saying: "Google's decision t...
How the US government secretly reads your email
Brooke, Heather
2011
Secret orders forcing Google and Sonic to release a WikiLeaks volunteer's email reveal the scale of US government snooping.
Is Your Printer Spying On You?
Imagine that every time you printed a document it automatically included a secret code that could be used to identify the printer - and potentially the person who used it.
Met police using surveillance system to monitor mobile phones
Gallagher, Ryan; Syal, Rejeev
2011
Civil liberties group raises concerns over Met police purchase of technology to track public handsets over a targeted area.
Microsoft handed the NSA access to encrypted messages
Greenwald, Glenn, et. al
2013
Microsoft has collaborated closely with US intelligence services to allow users' communications to be intercepted, including helping the National Security Agency to circumvent the company's own encryp...
Pragmatic Anonymity
Create an account with an anonymization service. Tell everyone about that account, including the password. The account basically acts as a public mail drop, anyone can use it to send messages, with no...
Privacy
A Manifesto
Sofsky, Wolfgang
2008
Sofsky attributes loss of privacy not only to technology and fear but also our indifference.
Protect Students from Corporate Data-Mining in the Classroom
Nava, Victor
2015
Across the political spectrum there is debate as to whether data should be collected about students.
Secrecy and Power
Introduction to the July 22, 2017 issue of Other Voices
Diemer, Ulli
2017
It is one of the essential attributes of power that it insists on secrecy. Or, more precisely, those who wield power over others routinely claim that the details of what they do, and why they do it, a...
The Stasi could only dream of such data
Britain, the birthplace of liberalism, has become the database state
Ash, Timothy Garton
2008
As technology increases the flow of stored data about individual actions, assurances of the "right to informational self-determination" must be hard won from governments. Government surveillance of ci...
Stop replacing London's phone boxes with corporate surveillance
New connected kiosks are replacing London's payphones. Every time you use them, you're allowing Google, BT and Primesight to track you
Atkin, Ross
2018
Concerns over privacy in London, UK, as Google, BT and Primesight provide free wifi and phone charging in exchange for allowing the consortium to identify users and track their movements through the c...
Tor is for Everyone
Why You Should Use Tor
Quintin, Cooper
2014
EFF recently kicked off their second Tor Challenge, an initiative to strengthen the Tor network for online anonymity and improve one of the best free privacy tools in existence. This is great news, bu...
UN slams UK surveillance law, calls for privacy reforms in Canada, France and Macedonia
2015
In yet another blow to the UK's surveillance proponents, the UN Human Rights Committee has criticised the British legal regime governing the interception of communications, observing that it allows fo...
Unmasking the Five-Eyed monster, a global and secret intelligence-sharing regime
2013
Privacy International is proud to announce our new project, Eyes Wide Open, which aims to pry open the Five Eyes arrangement and bring it under the rule of law.
Will the government's counter-extremist programme criminalise dissent?
Kundnani, Arun
2015
From 1 July, a broad range of public bodies - from nursery schools to optometrists - will be legally obliged to participate in the U.S. government’s Prevent policy to identify would-be extremists. Und...
You selling to me?
Krol, Ariane; Nantel, Jacques
2013
Individually targeted online marketing, based on unwittingly supplied consumer information and monitoring of online activities, is replacing conventional advertising media.

From the Connexions Archives

IntelligentSearch.ca
Website
2017
A web portal featuring topics related to research and the Internet. The home page features a selection of recent and important articles. A search feature, subject index, and other research tools make ...
Privacy Journal
Smith, Robert Ellis
Serial Publication (Periodical)
1978
A monthly newsletter that is, "...filled with American and Canadian news about the confidentiality of personal information." It describes, "...record-keeping in government and business, new invasions ...