Internet Security

Fetch Headings.ExtraData
Below are groups and resources (books, articles, websites, etc.) related to this topic. Click on an item’s title to go its resource page with author, publisher, description/abstract and other details, a link to the full text if available, as well as links to related topics in the Subject Index. You can also browse the Title, Author, Subject, Chronological, Dewey, LoC, and Format indexes, or use the Search box.
Particularly recommended items are flagged with a red logo:

Connexions Library

'Beijing's bitch': Beijing & Microsoft
Putting profits ahead of human rights.
GCHQ and European spy agencies worked together on mass surveillance
Borger, Julian
Edward Snowden papers unmask close technical cooperation and loose alliance between British, German, French, Spanish and Swedish spy agencies.
Online Survival Kit
This Online Survival Kit offers practical tools, advice and techniques that teach you how to circumvent censorship and to secure yo communications and data. This handbook will gradually be unveiled ov...
Steve Gibson's campaign against Internet spyware used by companies to extract information from Internet users' computers without their knowledge or consent.
Preparing for a Digital 9/11
Greenberg, Karen
In recent years, in one of the more dangerous, if largely undiscussed, developments of our time, the Bush and then Obama administrations have launched the first state-planned war in cyber space. First...
6 Ideas For Those Needing Defensive Technology to Protect Free Speech from Authoritarian Regimes: 4 Ways the Rest of Us Can Help
Eckersley, Peter
The Internet remains one of the most powerful means ever created to give voice to repressed people around the world. Unfortunately, new technologies have also given authoritarian regimes new means to ...
Technical resources about Internet communication, legal issues, etc., from a non-profit perspective.
Surveillance Self-Defense
Modern technology has given those in power new abilities to eavesdrop and collect data on innocent people. Surveillance Self-Defense is EFF's guide to defending yourself and your friends from surveill...

Sources Experts & Spokespersons

Sources Library

Companies that cooperate with dictatorships must be sanctioned
Sources News Release
Reporters Without Borders condemns the criminal cooperation that exists between many western companies, especially those operating in the new technology area, and authoritarian regimes.
Cyber-security workshop held successfully, despite police harassment
Reporters Without Borders
Reporters Without Borders (RSF) condemns repeated attempts by local police to harass and interrupt a digital security workshop that RSF and Defend the Defenders (DTD), a Vietnamese human rights group,...
EU: Enact Controls on Digital Weapons Trade
Unregulated Export of Powerful Surveillance Tools Threatens Internet Freedom. Reporters Without Borders and Human Rights Watch call on the European Union to enact new controls on Internet surveillance...
How can you protect yourself from online snooping?
Sources News Release
Reporters Without Borders has published an Online Survival Kit on its website that has tools and practical advice that will allow you to protect your communications and data.
The hubris of investigators
Buttar, Shahid
A now-vacated hearing over whether to require Apple to undermine the security of its users prompted an ongoing controversy over government access to encrypted devices. While the court in San Bernardin...
NSA surveillance may cause breakup of internet, warn experts
Taylor, Matthew; Hopkins, Nick; Kiss, Jemima
Internet specialists highlight moves by Brazil, Germany and India towards creating separate networks in order to block spying.