|
Privacy & Telecommunications
Fetch Headings.ExtraData
Below are groups and resources (books, articles, websites, etc.) related to this topic. Click on an item’s title to go its resource page with author, publisher, description/abstract and other details, a link to the full text if available, as well as links to related topics in the Subject Index. You can also browse the Title, Author, Subject, Chronological, Dewey, LoC, and Format indexes, or use the Search box. Results10 Connexions Library1 Connexions Directory of Groups & Websites 8 Sources Library 1 From the Connexions Archives Connexions LibraryCapitalist Surveillance State: Everyone's a Target: Threatening Reporters, Spying on Public Article 2013 There is an inherent tendency for the state, which governs on behalf of a minuscule, ruthless class of obscenely wealthy exploiters, to attempt to amass ever greater power to control the population be... Die Globale Teleueberwachung des 21. Jahrhunderts Article Es entsteht zur Zeit eine globale Teleuberwachung, die sich von allen ethischen oder diplomatischen Voreingenomenheiten freimacht. Internet Companies: Confusing Consumers for Profit Cordozo, Nate Article 2015 In the age of information, companies are hungry for your data. They want it - even if it means resorting to trickery. Location Tracking: A Pervasive Problem in Modern Technology Schoen, Seth Article 2013 NSA is tracking people around the Internet and the physical world. These newly-revealed techniques hijacked personal information that was being transmitted for some commercial purpose, converting it i... NSA, GCHQ mapping "political alignment" of cellphone users: New report reveals London, Eric Article 2014 New information made public by Edward Snowden reveals that the governments of the United States and United Kingdom are trawling data from cellphone “apps” to accumulate dossiers on the “political alig... NSA and GCHQ target Tor network that protects anonymity of web users Ball, James; Schneier, Bruce; Greenwald, Glenn Article 2013 The National Security Agency has made repeated attempts to develop attacks against people using Tor, a popular tool designed to protect online anonymity, despite the fact the software is primarily fun... Profiled: From Radio to Porn, British Spies Track Web Users' Online Identities Gallagher, Ryan Article 2015 Amid a renewed push from the U.K. government for more surveillance powers, more than two dozen documents being disclosed by The Intercept reveal for the first time several major strands of GCHQ’s (Gov... Spying by the Numbers: Hundreds of Thousands Subject to Government Surveillance and No Real Protection Quigley, Bill Article 2013 Thanks to NSA whistleblower Edward Snowden many more people in the US and world-wide are learning about extensive US government surveillance and spying. There are publicly available numbers which sho... Three Leaks, Three Weeks, and What We've Learned About the US Government's Other Spying Authority: Executive Order 12333 Jaycox, Mark M. Article 2013 The National Security Agency has been siphoning off data from the links between Yahoo and Google data centers, which include the fiber optic connections between company servers at various points aroun... Vodafone Reveals Existence of Secret Wires that Allow State Surveillance Garside, Juliette Article 2014 Wires allow agencies to listen to or record live conversations, in what privacy campaigners are calling a 'nightmare scenario'. Connexions Directory of Groups & WebsitesPublic Interest Advocacy Centre PIAC, a national non-profit organization, provides legal representation and research on issues that involve utilities, government programs and important public services. PIAC works on behalf of ordina... Sources LibraryBeyond Implementation: Policy Considerations for Secure Messengers Cardozo, Nate 2018 The importance of secure Messenger tools goes beyond just reliable technology, it must be developed and have its infrastructure maintained by a trustworthy group with a history of responsible stewards... Email privacy Wikipedia article 2012 Email privacy is the broad topic dealing with issues of unauthorized access and inspection of electronic mail. This unauthorized access can happen while an email is in transit, as well as when it is s... For journalists, danger lurking in your email O'Brien, Danny 2012 Citizen Lab provided a disturbing look into the likely use of a commercial surveillance program, FinFisher, to remotely invade and control the computers of Bahraini activists. After the software insta... Human Rights Watch Sues DEA Over Bulk Collection of Americans' Telephone Records Sources News Release 2015 EFF Lawsuit Challenges Drug Enforcement Administration Surveillance of International Call Records Met police using surveillance system to monitor mobile phones Gallagher, Ryan; Syal, Rejeev 2011 Civil liberties group raises concerns over Met police purchase of technology to track public handsets over a targeted area. The Peruvian "Stalker Law" Will Be Reviewed By Congress, We Can Still Stop It Bogado, David; Rodriguez, Katitza 2015 Bogado and Rodriguez discuss the new decree in Peru known as "Ley Acosadora", or "the Stalker Law", allows warrantless access to Peruvians' location data and creates a new power for the government to ... Reporters Without Borders and Torservers.net, partners against online surveillance and censorship Sources News Release 2014 Reporters Without Borders and Torservers.net have joined forces to create and maintain 250 additional relays for the Tor network. Stop replacing London's phone boxes with corporate surveillance New connected kiosks are replacing London's payphones. Every time you use them, you're allowing Google, BT and Primesight to track you Atkin, Ross 2018 Concerns over privacy in London, UK, as Google, BT and Primesight provide free wifi and phone charging in exchange for allowing the consortium to identify users and track their movements through the c... From the Connexions ArchivesIntelligentSearch.ca Website 2017 A web portal featuring topics related to research and the Internet. The home page features a selection of recent and important articles. A search feature, subject index, and other research tools make ... |