Invasion of Privacy
Below are groups and resources (books, articles, websites, etc.) related to this topic. Click on an item’s title to go its resource page with author, publisher, description/abstract and other details, a link to the full text if available, as well as links to related topics in the Subject Index. You can also browse the Title, Author, Subject, Chronological, Dewey, LoC, and Format indexes, or use the Search box.
Results5 Connexions Library
Eavesdropping on the Planet: The Inalienable Right to Snoop?
Like a mammoth vacuum cleaner in the sky, the National Security Agency (NSA) sucks it all up: home phone, office phone, cellular phone, email, fax, telex … satellite transmissions, fiber-optic communi...
If U.S. Mass Media Were State-Controlled, Would They Look Any Different?: Snowden Coverage
The Edward Snowden leaks have revealed a U.S. corporate media system at war with independent journalism. Many of the same outlets that missed the Wall Street meltdown and cheer-led the Iraq invasion h...
The No-Nonsense Guide to Global Media
Peter Steven aims to make readers realize the power and influence of dominant media but, at the same time, also understand that they are not "omnipotent" and that there are alternative forms available...
Revealed: How DOJ Gagged Google over Surveillance of WikiLeaks Volunteer
The Obama administration fought a legal battle against Google to secretly obtain the email records of a security researcher and journalist associated with WikiLeaks.
Spies Hacked Computers Thanks to Sweeping Secret Warrants, Aggressively Stretching U.K. Law
Fishman, Andrew; Greenwald, Glenn
British spies have received government permission to intensively study software programs for ways to infiltrate and take control of computers. The GCHQ spy agency was vulnerable to legal action for th...