Electronic Surveillance

Fetch Headings.ExtraData
Below are groups and resources (books, articles, websites, etc.) related to this topic. Click on an item’s title to go its resource page with author, publisher, description/abstract and other details, a link to the full text if available, as well as links to related topics in the Subject Index. You can also browse the Title, Author, Subject, Chronological, Dewey, LoC, and Format indexes, or use the Search box.
Particularly recommended items are flagged with a red logo:

Connexions Library

Complaints filed against telecom companies for their role in UK mass surveillance programme
Privacy International
Article
2013
On 5 November 2013, Privacy International filed formal complaints with the Organisation for Economic Cooperation and Development (OECD) in the UK against some of the world's leading telecommunication ...
The Computers are Listening: How the NSA Converts Spoken Words Into Searchable Text
Froomkin,Dan
Article
2015
Top-secret documents from the archive of Edward Snowden show the National Security Agency can now automatically recognize the content within phone calls by creating rough transcripts and phonetic repr...
Connexions Library: Human Rights and Civil Liberties Focus
Website
Selected articles, books, websites and other resources on civil liberties and human rights.
Fake cell phone 'towers' may be spying on Americans' calls, texts
Munoz, Eduardo
Article
2014
More than a dozen 'fake cell phone towers' could be secretly hijacking Americans' mobile devices in order to listen in on phone calls or snoop on text messages, a security-focused cell phone company c...
FBI director wants access to encrypt Apple, Google users' data, demands law 'fix'
Article
2014
The FBI director has slammed Apple and Google for offering their customers encryption technology that protects users’ privacy. "Deeply concerned" James Comey wants to push on Congress to "fix" laws to...
The FBI Director's Evidence Against Encryption Is Pathetic
Froomkin, Dan; Vargas-Cooper, Natasha
Article
2014
FBI Director James Comey gave a speech Thursday about how cell-phone encryption could lead law enforcement to a “very dark place” where it “misses out” on crucial evidence to nail criminals. To make h...
The Great SIM Heist: How Spies Stole the Keys to the Encryption Castle
Scahill, Jeremy; Begley, Josh
Article
2015
American and British spies hacked into the internal computer network of the largest manufacturer of SIM cards in the world, stealing encryption keys used to protect the privacy of cellphone communicat...
Inside NSA, Officials Privately Criticize 'Collect It All' Surveillance
Maass, Peter
Article
2015
As Members of Congress struggle to agree on which surveillance programs to re-authorize before the Patriot Act expires, they might consider the unusual advice of an intelligence analyst at the Nationa...
The Intercept
Website
A platform to report on the documents previously provided by NSA whistleblower Edward Snowden, with a long-term mission is to produce fearless, adversarial journalism across a wide range of issues.
'I've Got Nothing to Hide' and Other Misunderstandings of Privacy
Solove, Daniel J.
Article
2007
According to the nothing to hide argument, there is no threat to privacy unless the government uncovers unlawful activity, in which case a person has no legitimate justification to claim that it remai...
The Logic behind Mass Spying: Empire and Cyber Imperialism
Petras, James
Article
2013
Revelations about the long-term global, intrusive spying by the US National Security Agency (NSA) and other allied intelligence apparatuses have provoked widespread protests and indignation and threat...
Mass Surveillance is Driven by the Private Sector: The Lesson of Hacking Team's Malware
Blunden, Bill
Article
2015
A report published by Privacy International as well as an article posted by Vice Motherboard clearly show that both the DEA and the United States Army have long-standing relationships with Hacking Tea...
No Safe Harbor: How NSA Spying Undermined U.S. Tech and Europeans' Privacy
O'Brien, Danny
Article
2015
The spread of knowledge about the NSA's surveillance programs has shaken the trust of customers in U.S. Internet companies like Facebook, Google, and Apple: especially non-U.S. customers who have disc...
NSA, GCHQ mapping "political alignment" of cellphone users: New report reveals
London, Eric
Article
2014
New information made public by Edward Snowden reveals that the governments of the United States and United Kingdom are trawling data from cellphone “apps” to accumulate dossiers on the “political alig...
The NSA's Invasion of Google and Yahoo Servers: Your Email is Likely Being Monitored
Lopez, Alfredo
Article
2013
The American National Security Agency (NSA) has been intercepting information coming in and out of Google and Yahoo servers over non-public, internal network fibre optic lines. In December, 2012 alone...
NSA's Path to Totalitarianism: Ever-Shrinking Democracy in America
Pollack, Norman
Article
2013
The American National Security Agency (NSA) appears as a “rogue” organization, extremism in the putative service of liberty. Or better, call it, stripped of all cosmetics, the unerring mark of a Polic...
The NSA's Spying Operation on Mexico: Systematic Eavesdropping on the Government
Carlsen, Laura
Article
2013
The American NSA has been systematically eavesdropping on the Mexican government for years. Three major programs constitute a massive espionage operation against Mexico.
Orwell's Triumph: How Novels Tell the Truth of Surveillance
Frank, Sam
Article
2015
Novels may be the best medium for describing a distopian world in which everyone is under constant surveillance.
Other Voices: The Connexions Newsletter - December 5, 2015: Ecosocialism, environment, and urban gardening
Diemer, Ulli (ed.)
Serial Publication (Periodical)
2015
This issue of Other Voices covers a wide range of issues, from the climate crisis and the ecosocialist response, to terrorism and the struggle against religious fundamentalism, as well as items on urb...
Profiled: From Radio to Porn, British Spies Track Web Users' Online Identities
Gallagher, Ryan
Article
2015
Amid a renewed push from the U.K. government for more surveillance powers, more than two dozen documents being disclosed by The Intercept reveal for the first time several major strands of GCHQ’s (Gov...
Protect Yourself from Electronic Spying with Surveillance Self-Defense: Sources News Release
Article
2014
The Electronic Frontier Foundation (EFF) has launched its updated "Surveillance Self-Defense" report, a comprehensive how-to guide to protecting yourself from electronic spying for Internet users all ...
Reflections on a whistleblower: Two years after Snowden
Tzabiras, Marianna
Article
2015
Two years after Snowden, the international state of surveillance and the ranks of whistleblowers both continue to grow.
Secret 'BADASS' Intelligence Program Spied on Smartphones
Lee, Micah
Article
2015
British and Canadian spy agencies accumulated sensitive data on smartphone users, by piggybacking on ubiquitous software from advertising and analytics companies, according to a document obtained by N...
Selling your Secrets: The Invisible World of Software Backdoors and Bounty Hunters
Chatterjee, Pratap
Article
2014
The documents released by whistleblower Edward Snowden reveal that the world of NSA mass surveillance involves close partnerships with a series of companies most of us have never heard of that design ...
6 Ideas For Those Needing Defensive Technology to Protect Free Speech from Authoritarian Regimes: 4 Ways the Rest of Us Can Help
Eckersley, Peter
Article
2009
The Internet remains one of the most powerful means ever created to give voice to repressed people around the world. Unfortunately, new technologies have also given authoritarian regimes new means to ...
Spooky Business: A New Report on Corporate Espionage Against Non-profits: Sources News Release
Article
2013
Giant corporations are employing highly unethical or illegal tools of espionage against nonprofit organizations with near impunity, according to a new report by Essential Information.
The Terrifying World of Electronic Monitoring: From Drone Strikes to Martha Stewart
Kilgore, James
Article
2013
Electronic monitoring is about tracking and marking. The GPS technology that is trending in electronic monitors tracks people’s every movement with the purpose of marking them for punishment if they d...
The Threat of the Tag
Morris, Fanella
Article
Tracking anklets for convicts are not a good way to alleviate prison overcrowding.
Three Leaks, Three Weeks, and What We've Learned About the US Government's Other Spying Authority: Executive Order 12333
Jaycox, Mark M.
Article
2013
The National Security Agency has been siphoning off data from the links between Yahoo and Google data centers, which include the fiber optic connections between company servers at various points aroun...
Uncivil Obedience: The Tactics and Tales of a Democratic Agitator
Borovoy, A. Alan
Book
1991
How to push for social change without breaking the law.
Why I'm Saying Goodbye to Apple, Google and Microsoft: I'm putting more trust in communities than corporations
Gillmor, Dan
Article
2015
Gillmor discusses how we are losing control over the technology tools that once promised equal opportunity in speech and innovation.
Work and New Technologies: Other Perspectives (Volume 3)
DeBresson, Chris; Lowe Benston, Margaret; Vorst, Jesse
Book
1987
Essays covering health hazards, labour concerns, and issues of deskilling related to new technologies in the workplace.

Sources Library

Companies that cooperate with dictatorships must be sanctioned
Sources News Release
2011
Reporters Without Borders condemns the criminal cooperation that exists between many western companies, especially those operating in the new technology area, and authoritarian regimes.
CSE monitors millions of Canadian emails to government
Hildebrandt, Amber; Seglins, Dave; Pereira, Michael
2015
Canada's electronic spy agency collects millions of emails from Canadians and stores them for "days to months" while trying to filter out malware and other attacks on government computer networks.
EFF Demands Release of More Secret Surveillance Court Rulings
Sources News Release
2014
In a continuing campaign to uncover the government's secret interpretations of the surveillance laws underlying the National Security Agency (NSA)'s spying programs, the Electronic Frontier Foundation...
Email privacy
Wikipedia article
2012
Email privacy is the broad topic dealing with issues of unauthorized access and inspection of electronic mail. This unauthorized access can happen while an email is in transit, as well as when it is s...
I, spy: Edward Snowden in exile
Rusbridger, Alan; MacAskill, Ewen
2014
The Guardian interviews Edward Snowden, the former NSA contractor who leaked thousands of classified documents to media outlets. Snowden shares his views on the events that have occured since his exil...
Is Your Printer Spying On You?
Imagine that every time you printed a document it automatically included a secret code that could be used to identify the printer - and potentially the person who used it.
Journalists Welcome European Call to Review Anti-Terrorism Laws
Sources News Release
2009
Ministers of the human rights network of the Council of Europe have called on their governments to review anti-terrorism laws in the face of strong criticism from journalists that some laws are in pra...
New Documents and Reports Confirm AT&T and NSA's Longstanding Surveillance Partnership
Rumold, Mark
2015
Reports today in the New York Times and ProPublica confirm what EFF's Jewel v. NSA lawsuit has claimed since 2008 -- that the NSA and AT&T have collaborated to build a domestic surveillance infrastruc...
Revealed: how Whisper app tracks ‘anonymous’ users
Lewis, Paul; Rushe, Dominic
2014
The company behind Whisper, the social media app that promises users anonymity and claims to be “the safest place on the internet”, is tracking the location of its users, including some who have speci...