Connexions Durchsuchen



Connexions Archiv

Artikel, Bücher, Dokumente, Zeitschriften, Audio-Visuelle Medien


Titelindex

Autorenindex

Fachgebiete Index

Chronologischer Index

Format Index

Dewey-System Index

Library of Congress Classes


Connexions Verzeichnis
von Verbänden & Nichtstaatlichen Organisationen

Fachgebiete Index

Verbände Index

Ausgesuchte Artikel nach
Fachgebiete

Spenden oder Ehrenamtliche Mitarbeit

Ihre Spenden machen unsere Arbeit möglich. Bitte spenden Sie noch heute

Ehrenamtliche Mitarbeit und Praktika

Donate to Connexions
Search engine optimization

Elektronische šberwachung
Das Connexions Archiv

Um weitere Informationen Anzuzeigen, wie Herausgeber, Erscheinungsdatum, Identifikationsnummer, usw. anzuzeigen, klicken Sie auf einen Titel. Für die meisten Einträge ist eine Inhaltsangabe vorhanden und zusätzlich ein Link, wenn der vollständige Text Online zur Verfügung steht. Einige Einträge enthalten ebenfalls Links zu verwandten Fachgebieten und Einträge im Themenindex. Besonders empfehlenswerte Titel sind mit dem roten Connexions Logo gekennzeichnet.

  1. Chatter: Dispatches From the Secret World of Global Eavesdropping
    Resource Type: Book
    First Published: 2005
  2. Complaints filed against telecom companies for their role in UK mass surveillance programme
    Resource Type: Article
    First Published: 2013
    On 5 November 2013, Privacy International filed formal complaints with the Organisation for Economic Cooperation and Development (OECD) in the UK against some of the world's leading telecommunication companies, for providing assistance to British spy agency GCHQ in the mass interception of internet and telephone traffic passing through undersea fibre optic cables.
  3. The Computers are Listening
    How the NSA Converts Spoken Words Into Searchable Text

    Resource Type: Article
    First Published: 2015
    Top-secret documents from the archive of Edward Snowden show the National Security Agency can now automatically recognize the content within phone calls by creating rough transcripts and phonetic representations that can be easily searched and stored.
  4. Connexions Library: Human Rights and Civil Liberties Focus 
    Resource Type: Website
    Selected articles, books, websites and other resources on civil liberties and human rights.
  5. Fake cell phone 'towers' may be spying on Americans’ calls, texts
    Resource Type: Article
    First Published: 2014
    More than a dozen 'fake cell phone towers' could be secretly hijacking Americans' mobile devices in order to listen in on phone calls or snoop on text messages, a security-focused cell phone company claims. It is not clear who controls the devices.
  6. The FBI Can Bypass Encryption
    Why Cyber Security is a Magic Act

    Resource Type: Article
    First Published: 2014
  7. FBI director wants access to encrypt Apple, Google users' data, demands law 'fix'
    Resource Type: Article
    First Published: 2014
    The FBI director has slammed Apple and Google for offering their customers encryption technology that protects users’ privacy. "Deeply concerned" James Comey wants to push on Congress to "fix" laws to ensure police can still access private data.
  8. The FBI Director’s Evidence Against Encryption Is Pathetic
    Resource Type: Article
    First Published: 2014
    FBI Director James Comey gave a speech Thursday about how cell-phone encryption could lead law enforcement to a “very dark place” where it “misses out” on crucial evidence to nail criminals. To make his case, he cited four real-life examples — examples that would be laughable if they weren’t so tragic.
  9. The Great SIM Heist: How Spies Stole the Keys to the Encryption Castle
    Resource Type: Article
    First Published: 2015
    American and British spies hacked into the internal computer network of the largest manufacturer of SIM cards in the world, stealing encryption keys used to protect the privacy of cellphone communications across the globe, according to top-secret documents provided by National Security Agency whistleblower Edward Snowden.
  10. Inside NSA, Officials Privately Criticize 'Collect It All' Surveillance
    Resource Type: Article
    First Published: 2015
    As Members of Congress struggle to agree on which surveillance programs to re-authorize before the Patriot Act expires, they might consider the unusual advice of an intelligence analyst at the National Security Agency who warned about the danger of collecting too much data.
  11. The Intercept
    Resource Type: Website
    A platform to report on the documents previously provided by NSA whistleblower Edward Snowden, with a long-term mission is to produce fearless, adversarial journalism across a wide range of issues.
  12. 'I've Got Nothing to Hide' and Other Misunderstandings of Privacy
    Resource Type: Article
    First Published: 2007
    According to the nothing to hide argument, there is no threat to privacy unless the government uncovers unlawful activity, in which case a person has no legitimate justification to claim that it remain private.
  13. The Logic behind Mass Spying: Empire and Cyber Imperialism
    Resource Type: Article
    First Published: 2013
    Revelations about the long-term global, intrusive spying by the US National Security Agency (NSA) and other allied intelligence apparatuses have provoked widespread protests and indignation and threatened ties between erstwhile imperial allies.
  14. Mass Surveillance is Driven by the Private Sector
    The Lesson of Hacking Team’s Malware

    Resource Type: Article
    First Published: 2015
    A report published by Privacy International as well as an article posted by Vice Motherboard clearly show that both the DEA and the United States Army have long-standing relationships with Hacking Team, an Italian company that’s notorious for selling malware to any number of unsavory characters.
  15. No Safe Harbor: How NSA Spying Undermined U.S. Tech and Europeans' Privacy
    Resource Type: Article
    First Published: 2015
    The spread of knowledge about the NSA's surveillance programs has shaken the trust of customers in U.S. Internet companies like Facebook, Google, and Apple: especially non-U.S. customers who have discovered how weak the legal protections over their data is under U.S. law.
  16. NSA, GCHQ mapping “political alignment” of cellphone users
    New report reveals

    Resource Type: Article
    First Published: 2014
    New information made public by Edward Snowden reveals that the governments of the United States and United Kingdom are trawling data from cellphone “apps” to accumulate dossiers on the “political alignments” of millions of smartphone users worldwide.
  17. The NSA's Invasion of Google and Yahoo Servers
    Your Email is Likely Being Monitored

    Resource Type: Article
    First Published: 2013
    The American National Security Agency (NSA) has been intercepting information coming in and out of Google and Yahoo servers over non-public, internal network fibre optic lines. In December, 2012 alone, the program (revealingly called “MUSCULAR”) processed 181,280,466 Google and Yahoo records that included email, searches, videos and photos.
  18. NSA's Path to Totalitarianism
    Ever-Shrinking Democracy in America

    Resource Type: Article
    First Published: 2013
    The American National Security Agency (NSA) appears as a “rogue” organization, extremism in the putative service of liberty. Or better, call it, stripped of all cosmetics, the unerring mark of a Police State, itself become identical with Fortress America, the National-Security State.
  19. The NSA's Spying Operation on Mexico
    Systematic Eavesdropping on the Government

    Resource Type: Article
    First Published: 2013
    The American NSA has been systematically eavesdropping on the Mexican government for years. Three major programs constitute a massive espionage operation against Mexico.
  20. Orwell's Triumph: How Novels Tell the Truth of Surveillance
    Resource Type: Article
    First Published: 2015
    Novels may be the best medium for describing a distopian world in which everyone is under constant surveillance.
  21. Other Voices: The Connexions Newsletter - December 5, 2015
    Resource Type: Serial Publication (Periodical)
    First Published: 2015
    This issue of Other Voices covers a wide range of issues, from the climate crisis and the ecosocialist response, to terrorism and the struggle against religious fundamentalism, as well as items on urban gardening, the destruction of olive trees, and how the police are able to use Google's timeline feature to track you every move, now and years into the past.
  22. Profiled
    From Radio to Porn, British Spies Track Web Users’ Online Identities

    Resource Type: Article
    First Published: 2015
    Amid a renewed push from the U.K. government for more surveillance powers, more than two dozen documents being disclosed by The Intercept reveal for the first time several major strands of GCHQ’s (Government Communications Headquarters) existing electronic eavesdropping capabilities.
  23. Protect Yourself from Electronic Spying with Surveillance Self-Defense
    Sources News Release

    Resource Type: Article
    First Published: 2014
    The Electronic Frontier Foundation (EFF) has launched its updated "Surveillance Self-Defense" report, a comprehensive how-to guide to protecting yourself from electronic spying for Internet users all over the world.
  24. Reflections on a whistleblower: Two years after Snowden
    Resource Type: Article
    First Published: 2015
    Two years after Snowden, the international state of surveillance and the ranks of whistleblowers both continue to grow.
  25. Secret 'BADASS' Intelligence Program Spied on Smartphones
    Resource Type: Article
    First Published: 2015
    British and Canadian spy agencies accumulated sensitive data on smartphone users, by piggybacking on ubiquitous software from advertising and analytics companies, according to a document obtained by NSA whistleblower Edward Snowden.The document outlines a secret program run by the intelligence agencies called BADASS.
  26. Selling your Secrets
    The Invisible World of Software Backdoors and Bounty Hunters

    Resource Type: Article
    First Published: 2014
    The documents released by whistleblower Edward Snowden reveal that the world of NSA mass surveillance involves close partnerships with a series of companies most of us have never heard of that design or probe the software we all take for granted to help keep our digital lives humming along.
  27. 6 Ideas For Those Needing Defensive Technology to Protect Free Speech from Authoritarian Regimes
    4 Ways the Rest of Us Can Help

    Resource Type: Article
    First Published: 2009   Published: 2010
    The Internet remains one of the most powerful means ever created to give voice to repressed people around the world. Unfortunately, new technologies have also given authoritarian regimes new means to identify and retaliate against those who speak out despite censorship and surveillance.
  28. Spooky Business: A New Report on Corporate Espionage Against Non-profits
    Sources News Release

    Resource Type: Article
    First Published: 2013
    Giant corporations are employing highly unethical or illegal tools of espionage against nonprofit organizations with near impunity, according to a new report by Essential Information.
  29. The Terrifying World of Electronic Monitoring
    From Drone Strikes to Martha Stewart

    Resource Type: Article
    First Published: 2013
    Electronic monitoring is about tracking and marking. The GPS technology that is trending in electronic monitors tracks people’s every movement with the purpose of marking them for punishment if they deviate from the program
  30. The Threat of the Tag
    Resource Type: Article
    Tracking anklets for convicts are not a good way to alleviate prison overcrowding.
  31. Three Leaks, Three Weeks, and What We've Learned About the US Government's Other Spying Authority: Executive Order 12333
    Resource Type: Article
    First Published: 2013
    The National Security Agency has been siphoning off data from the links between Yahoo and Google data centers, which include the fiber optic connections between company servers at various points around the world. While the user may have an encrypted connection to the website, the internal data flows were not encrypted and allowed the NSA to obtain millions of records each month, including both metadata and content like audio, video and text.
  32. Uncivil Obedience
    The Tactics and Tales of a Democratic Agitator

    Resource Type: Book
    First Published: 1991
    How to push for social change without breaking the law.
  33. Why I'm Saying Goodbye to Apple, Google and Microsoft
    I'm putting more trust in communities than corporations

    Resource Type: Article
    First Published: 2015
    Gillmor discusses how we are losing control over the technology tools that once promised equal opportunity in speech and innovation.
  34. Work and New Technologies
    Other Perspectives (Volume 3)

    Resource Type: Book
    First Published: 1987
    Essays covering health hazards, labour concerns, and issues of deskilling related to new technologies in the workplace.

    Connexions Information Sharing Services

Connexions Archiv

Ein Katalog mit mehr als 7000 Büchern, Artikeln, Filmen, Zeitschriften, Webseiten und anderen Quellen.
Sortiert nach Autor, Titel, Format, Fachgebiet, Dewey-System Nummer, Library of Congress Systematik, Erscheinungsjahr.
Connexions Verzeichnis Verbände und nichstaatliche Organisationen die sich mit sozialen und ökologischen Themen beschäftigen — A-Z Index oder Fachgebiete Index.
Für Fachleute und Medienvertreter, besuchen Sie auch das Sources Verzeichnis und den umfangreichen Sources Fachgebiete Index.
Links Ausgesuchte Internet-Quellen mit Informationen über Alternativen.
Kalender Veranstaltungen in ganz Kanada. Siehe auch: Sources Kalender and Pressemeldungen.
Öffentlichkeitsarbeit und Medien Quellen, Publikationen und Artikel die Ihnen helfen die Aufmerksamkeit der Medien zu bekommen und das Bewusstsein für Ihr Anliegen zu schärfen. Außerdem: Verzeichnis von Namen & Nummern aus der kanadischen Medienwelt, ein Verzeichnis von Namen & Nummern aus dem kanadischen Parlament, und Adressenlisten.
Spenden Connexions freut sich über Ihre Unterstützung. Ihre Spenden machen unsere Arbeit möglich. Ehrenamtliche Mitarbeiter sind stets Willkommen.
Mission Connexions ist gedacht für die Unterstützung von Personen und Gruppen, die sich für Freiheit und Soziale Gerechtigkeit einsetzen. Unser anliegen ist es die Aufzeichnungen vom wirken von Menschen und deren Kampf gegen Unterdrückung und für gesellschaftlichen Wandel zur Verfügung zu stellen. Wir glauben daran, dass je mehr wir über die Konflikte, Siege und Niederlagen der Vergangenheit und über diejenigen die daran Teilgenommen haben wissen, desto besser sind wir dazu in der Lage eine neue Welt zu gestallten. Connexions verfügt sowohl über einen Bestand an Büchern und Dokumenten und ist außerdem bemüht das bereits bestehende digitale Archiv an Dokumenten weiter auszubauen. Wir arbeiten daran einen weiten Themenbereich abzudecken, der eine Vielzahl von unterschiedlichen Ansichten und Herangehensweisen für Gesellschaftlichen Wandel umfasst, alles mit dem Grundsätzlichen anliegen der Unterstützung der Demokratie, Bürgerrechte, freie Meinungsäußerung, Menschenrechen, Säkularität, Gleichheit, wirtschaftlichen Gerechtigkeit, ökologisches Verantwortungsbewusstsein und dem erschaffen und dem erhalt von Gemeinschaft. Wir sind International orientiert, allerdings haben wir als kanadisches Projekt eine besonders große Auswahl an kanadischen Dokumenten und Informationen über kanadische Organisationen.