Privacy Rights

Fetch Headings.ExtraData
Below are groups and resources (books, articles, websites, etc.) related to this topic. Click on an item’s title to go its resource page with author, publisher, description/abstract and other details, a link to the full text if available, as well as links to related topics in the Subject Index. You can also browse the Title, Author, Subject, Chronological, Dewey, LoC, and Format indexes, or use the Search box.
Particularly recommended items are flagged with a red logo:

Connexions Library

The Absurd Consequences of a "Right to Privacy"
Knapp, Thomas
Article
2017
British MP David Davis’s text messages poking fun at the appearance of a female colleague make him the latest whipping boy for those determined to root out sexism and misogyny in public life, the Dail...
Capitalist Surveillance State: Everyone's a Target: Threatening Reporters, Spying on Public
Article
2013
There is an inherent tendency for the state, which governs on behalf of a minuscule, ruthless class of obscenely wealthy exploiters, to attempt to amass ever greater power to control the population be...
Connexions Library: Human Rights and Civil Liberties Focus
Website
Selected articles, books, websites and other resources on civil liberties and human rights.
Corporate Coercion and the Drive to Eliminate Buying with Cash
Nader, Ralph
Article
2018
Consumer freedom and privacy are examined as coercive commercialism quickly moves toward a cashless economy, when all consumers are forced into corporate payment systems from credit/debit cards, mobil...
Eavesdropping on the Planet: The Inalienable Right to Snoop?
Blum, William
Article
2013
Like a mammoth vacuum cleaner in the sky, the National Security Agency (NSA) sucks it all up: home phone, office phone, cellular phone, email, fax, telex … satellite transmissions, fiber-optic communi...
Edward Snowden's Warning to Canada
Snowden, Edward
Article
2015
Whistleblower Edward Snowden talks about Bill C-51 and the weak oversight of Canada's intelligence agencies.
Eyes Wide Open
Article
2013
The recent revelations, made possible by NSA-whistleblower Edward Snowden, of the reach and scope of global surveillance practices have prompted a fundamental reexamination of the role of intelligence...
The FBI's secret biometrics database they don't want you to see
Article
2016
The Federal Bureau of Investigation (FBI) wants to prevent information about its creepy biometric database, which contains fingerprint, face, iris, and voice scans of millions of Americans, from getti...
Genetic Testing of Citizens Is a Backdoor into Total Population Surveillance by Governments and Companies
Wallace, Helen
Article
2014
The new Chief Executive of the National Health Service (NHS) in England, Simon Stevens, was recently reported arguing that the NHS must be transformed to make people’s personal genetic information the...
If U.S. Mass Media Were State-Controlled, Would They Look Any Different?: Snowden Coverage
Cohen, Jeff
Article
2013
The Edward Snowden leaks have revealed a U.S. corporate media system at war with independent journalism. Many of the same outlets that missed the Wall Street meltdown and cheer-led the Iraq invasion h...
The Institutionalization of Tyranny: When Victory Has Nothing to do With Justice
Roberts, Paul Craig
Article
2013
Republicans and conservative Americans are still fighting Big Government in its welfare state form. Apparently, they have never heard of the militarized police state form of Big Government, or, if the...
The Intercept
Website
A platform to report on the documents previously provided by NSA whistleblower Edward Snowden, with a long-term mission is to produce fearless, adversarial journalism across a wide range of issues.
Internet Companies: Confusing Consumers for Profit
Cordozo, Nate
Article
2015
In the age of information, companies are hungry for your data. They want it - even if it means resorting to trickery.
'I've Got Nothing to Hide' and Other Misunderstandings of Privacy
Solove, Daniel J.
Article
2007
According to the nothing to hide argument, there is no threat to privacy unless the government uncovers unlawful activity, in which case a person has no legitimate justification to claim that it remai...
Lessons of the Snowden Revelations: You are the Target!
Lopez, Alfredo
Article
2013
We in the Left have long worried about “police state tactics”. Now we have to confront the police state structure. It’s here and it can morph into a real police state with very little effort. Opposing...
No Child Left Un-Mined? Student Privacy at Risk in the Age of Big Data
Chideya, Farai
Article
2015
Chideya discusses the implications of the compilation of big data trails containing information about children's performance in school.
No Safe Harbor: How NSA Spying Undermined U.S. Tech and Europeans' Privacy
O'Brien, Danny
Article
2015
The spread of knowledge about the NSA's surveillance programs has shaken the trust of customers in U.S. Internet companies like Facebook, Google, and Apple: especially non-U.S. customers who have disc...
NSA, GCHQ mapping "political alignment" of cellphone users: New report reveals
London, Eric
Article
2014
New information made public by Edward Snowden reveals that the governments of the United States and United Kingdom are trawling data from cellphone “apps” to accumulate dossiers on the “political alig...
The NSA Has Effectively Destroyed Internet Privacy: Snowden's Latest
Lopez, Alfredo
Article
2013
Whistle-blower Edward Snowden prove that the NSA, working with its British counterpart the Government Communications Headquarters has conducted an intentional and largely sucessful campaign to destroy...
The NSA's Invasion of Google and Yahoo Servers: Your Email is Likely Being Monitored
Lopez, Alfredo
Article
2013
The American National Security Agency (NSA) has been intercepting information coming in and out of Google and Yahoo servers over non-public, internal network fibre optic lines. In December, 2012 alone...
The Obliteration of Privacy: Snowden and the NSA
Kandutsch, Carl E
Article
2014
It’s remarkable how little outrage Edward Snowden’s NSA revelations have provoked in the American public. One often heard response is something like, “Well, I don’t have anything to hide, so I don’t c...
On Locational Privacy, and How to Avoid Losing it Forever
Blumberg, Andrew J.; Eckersley, Peter
Article
2009
Over the next decade, systems which create and store digital records of people's movements through public space will be woven inextricably into the fabric of everyday life. We are already starting to ...
Other Voices: The Connexions Newsletter - July 22, 2017: Secrecy and Power
Diemer, Ulli (ed.)
Serial Publication (Periodical)
2017
Secrecy is a weapon the powerful use against their enemies: us. This issue of Other Voices explores the relationship of secrecy and power.
Police Go on Fishing Expedition, Search the Home of Seattle Privacy Activists Who Maintain Tor Network
Herz, Ansel
Article
2016
Seattle police descended on the Queen Anne condo of two outspoken privacy activists with a search warrant early this morning, leaving them shaken and upset. Jan Bultmann and David Robinson, a married ...
Preparing for a Digital 9/11
Greenberg, Karen
Article
2012
In recent years, in one of the more dangerous, if largely undiscussed, developments of our time, the Bush and then Obama administrations have launched the first state-planned war in cyber space. First...
Privacy tapped out
Price, David
Article
2013
For over a century, Americans and their judiciary fiercely fought any attempt by security agencies and law enforcement to listen in on private electronic communications. Now they’ve stopped fighting, ...
Revealed: How DOJ Gagged Google over Surveillance of WikiLeaks Volunteer
Gallagher, Ryan
Article
2015
The Obama administration fought a legal battle against Google to secretly obtain the email records of a security researcher and journalist associated with WikiLeaks.
The Soft Cage: Surveillance in America from Slavery to the War on Terror
Parenti, Christian; Rossetti, Chip (eds.)
Book
2004
Parenti explores the history of American surveillance from colonial times to the present. What this historical evidence clearly reveals is a continuum of the culture of surveillance. The weakest, most...
Spies Hacked Computers Thanks to Sweeping Secret Warrants, Aggressively Stretching U.K. Law
Fishman, Andrew; Greenwald, Glenn
Article
2015
British spies have received government permission to intensively study software programs for ways to infiltrate and take control of computers. The GCHQ spy agency was vulnerable to legal action for th...
Spying by the Numbers: Hundreds of Thousands Subject to Government Surveillance and No Real Protection
Quigley, Bill
Article
2013
Thanks to NSA whistleblower Edward Snowden many more people in the US and world-wide are learning about extensive US government surveillance and spying. There are publicly available numbers which sho...
Surveillance USA: NSA and the PRISM Project
Kampmark, Binoy
Article
2013
The government is merrily going about its business of keeping tabs on you in virtually every conceivable way.
Think the Left Won the Culture War? Think Again
deBoer, Fredrik
Article
2015
With the recent AshleyMadison leak and Gawker.com's notorious naming and shaming of an obscure, married publishing executive, deBoer questions who really won in this culture war.
Thousands Join Legal Fight Against UK Surveillance — And You Can, Too
Gallagher, Ryan
Article
2015
Thousands of people are signing up to join an unprecedented legal campaign against the United Kingdom’s leading electronic surveillance agency.
Three Leaks, Three Weeks, and What We've Learned About the US Government's Other Spying Authority: Executive Order 12333
Jaycox, Mark M.
Article
2013
The National Security Agency has been siphoning off data from the links between Yahoo and Google data centers, which include the fiber optic connections between company servers at various points aroun...
Uber Plans to Track Users Should Not Be Allowed, Says Privacy Group
Chatterjee, Pratap
Article
2015
A formal complaint has been filed against Uber, the car ride company, by the Electronic Privacy Information Center (EPIC), a non-profit advocacy group. The NGO says Uber plans to use their smart phone...
U.N. Report Asserts Encryption as a Human Right in the Digital Age
Froomkin, Dan
Article
2015
Encryption is not the refuge of scoundrels, as Obama administration law-enforcement officials loudly proclaim – it is an essential tool needed to protect the right of freedom of opinion and expression...
Le Viol du Courier/Violation of the Mail
Article
The League on Human Rights presents arguments against the legality and acceptability of Bill C-26. This bill, introduced to Parliament in February 1978, aims to authorize the opening of first-class ma...

Connexions Directory of Groups & Websites

Connexions Archive & Library
The Connexions Archive & Library is Toronto-based project dedicated to keeping alive the rich history of grassroots movements for social justice. Connexions preserves 'alternative' histories that r...

Sources Experts & Spokespersons

Sources Library

Australia: Journalists' sources under threat with data retention regime
Sources News Release
2015
The International Federation of Journalists (IFJ) joins its affiliate the Media, Entertainment & Arts Alliance (MEAA) in condemning the commencement of new data retention laws in Australia.
The Devil Is In the Details: How Patients' Mental Health Data Is At Risk
Chideya, Farai
2015
It seems like "Patient doctor confidentiality" doesn’t apply to other doctors. Overly diligent doctors are free to snoop around in the psychiatric medical records of their patients. As if that weren't...
Email privacy
Wikipedia article
2012
Email privacy is the broad topic dealing with issues of unauthorized access and inspection of electronic mail. This unauthorized access can happen while an email is in transit, as well as when it is s...
Free Speech Groups Issue New Guide to the International 'Necessary & Proportionate Principles'
Sources News Release
2014
EFF and ARTICLE 19 Urges Governments to Preserve Fundamental Freedoms in the Age of Mass Surveillance
Get your head out of the clouds
If we allow our personal data to be stored in giant electornic centres, we deserve what we get
Harris, John
2011
Appraising the risks to personal data held in cloud computing systems.
Hillary Clinton on the Sanctity of Protecting Classified Information
Greenwald, Glenn
2015
It turns out that at least two of the emails which traversed Hillary Clinton’s personal email account and server were "top secret," according to the inspector general for the Intelligence Community. T...
Journalists Welcome European Call to Review Anti-Terrorism Laws
Sources News Release
2009
Ministers of the human rights network of the Council of Europe have called on their governments to review anti-terrorism laws in the face of strong criticism from journalists that some laws are in pra...
Obama defiant over NSA revelations ahead of summit with Chinese premier
Ackerman, Spencer; Roberts, Dan
2013
President says oversight of NSA surveillance programme should be left to Congress in comments criticising media 'hype.'
The Peruvian "Stalker Law" Will Be Reviewed By Congress, We Can Still Stop It
Bogado, David; Rodriguez, Katitza
2015
Bogado and Rodriguez discuss the new decree in Peru known as "Ley Acosadora", or "the Stalker Law", allows warrantless access to Peruvians' location data and creates a new power for the government to ...
Protecting the Choice to Speak Anonymously Is Key to Fighting Online Harassment
Sources News Release
2016
EFF Urges Department of Education to Uphold First Amendment Rights in University Anti-Harassment Policies
Raleigh police are asking Google to provide user data for all people near crime scenes
2018
Police in Raleigh, North Carolina, have presented Google with warrants to obtain data from mobile phones from not just specific suspects who were in a crime scene area, but from the mobile phones of a...
Reporters Without Borders and Torservers.net, partners against online surveillance and censorship
Sources News Release
2014
Reporters Without Borders and Torservers.net have joined forces to create and maintain 250 additional relays for the Tor network.
San Diego's Facial Recognition Program Shows Why We Need Records on Police Use of Mobile Biometric Technology
Maass, David
2015
The New York Times has a story out on how San Diego police use mobile facial recognition devices in the field, including potentially on non-consenting residents who aren't suspected of a crime. One ac...
Software that tracks people on social media created by defence firm
Gallagher, Ryan
2013
Raytheon's Riot program mines social network data like a 'Google for spies', drawing ire from civil rights groups.
The Stasi could only dream of such data
Britain, the birthplace of liberalism, has become the database state
Ash, Timothy Garton
2008
As technology increases the flow of stored data about individual actions, assurances of the "right to informational self-determination" must be hard won from governments. Government surveillance of ci...
UN slams UK surveillance law, calls for privacy reforms in Canada, France and Macedonia
2015
In yet another blow to the UK's surveillance proponents, the UN Human Rights Committee has criticised the British legal regime governing the interception of communications, observing that it allows fo...
The use of encryption tools and the protection of anonymity online as safeguards for freedom of the press
Kaye, David
2015
David Kaye is the UN Special Rapporteur on the promotion and protection of the right to freedom of expression. In his latest report, he stressed that governments are obligated to protect encryption to...

From the Connexions Archives

IntelligentSearch.ca
Website
2017
A web portal featuring topics related to research and the Internet. The home page features a selection of recent and important articles. A search feature, subject index, and other research tools make ...
Privacy Journal
Smith, Robert Ellis
Serial Publication (Periodical)
1978
A monthly newsletter that is, "...filled with American and Canadian news about the confidentiality of personal information." It describes, "...record-keeping in government and business, new invasions ...