Sources Directory     A to Z Index     Topic Index News Releases     RSS Sources Select News RSS Feed     Sources Calendar      

Privacy Protection: Experts and Sources
Sources Directory - Subject Index


Sources Experts & Spokespersons

News Releases

Coalition Announces New ‘Do Not Track’ Standard for Web Browsing
2015-08-09
Electronic Frontier Foundation
The Electronic Frontier Foundation (EFF), privacy company Disconnect and a coalition of Internet companies have announced a stronger “Do Not Track” (DNT) setting for Web browsing - a new policy st...
Cory Doctorow Rejoins EFF to Eradicate DRM Everywhere
2015-01-21
Electronic Frontier Foundation (EFF)
Leading digital rights champion and author Cory Doctorow has rejoined the Electronic Frontier Foundation (EFF) to battle the pervasive use of dangerous digital rights management (DRM) technologies tha...
EFF Launches IFightSurveillance.org and Counter-Surveillance Success Stories
2014-10-20
Electronic Frontier Foundation
Sites Highlight How Opponents of Mass Surveillance Around the World Lead by Example
EFF Report Charts Companies on Next Frontier of User Privacy
2015-06-19
Electronic Frontier Foundation
Annual Survey Delves Deeper into Practices of Apple, Google, Twitter, and More
Free Speech Groups Issue New Guide to the International 'Necessary & Proportionate Principles'
2014-06-02
Electronic Frontier Foundation
EFF and ARTICLE 19 Urges Governments to Preserve Fundamental Freedoms in the Age of Mass Surveillance
How can you protect yourself from online snooping?
2013-06-13
Reporters without Borders
Reporters Without Borders has published an Online Survival Kit on its WefightCensorship.org website that has tools and practical advice that will allow you to protect your communications and data.
PM Prorogues Politics Over National Security
2010-01-05
Omar Ha-Redeye
Ambiguity of Conservative MP's statements around body scanners could violate Canadian privacy law.
Privacy Badger 1.0 Blocks the Sneakiest Kinds of Online Tracking
2015-08-09
Electronic Frontier Foundation
The Electronic Frontier Foundation (EFF) today released Privacy Badger 1.0, a browser extension that blocks some of the sneakiest trackers that try to spy on your Web browsing habits.
Protect Yourself from Electronic Spying with Surveillance Self-Defense
2014-10-24
Electronic Frontier Foundation
The Electronic Frontier Foundation (EFF) has launched its updated "Surveillance Self-Defense" report, a comprehensive how-to guide to protecting yourself from electronic spying for Internet users all ...
Reporters Without Borders and Torservers.net, partners against online surveillance and censorship
2014-04-29
Reporters Without Borders
Reporters Without Borders and Torservers.net have joined forces to create and maintain 250 additional relays for the Tor network.
Sources welcomes Eugene Oscapella, Barrister and Solicitor/Oscapella and Associates
2009-07-23
Eugene Oscapella, Barrister and Solicitor/Oscapella and Associates
Sources welcomes Eugene Oscapella, Barrister and Solicitor/Oscapella and Associates.
Sources welcomes OrangeWebsite
2011-03-16
OrangeWebsite
Sources welcomes a new member: OrangeWebsite. OrangeWebsite is an Icelandic web hosting service provider. Most of our clients are foreign journalists, bloggers, leakers and publishers.
Test Your Online Privacy Protection with EFF's Panopticlick
2015-12-19
Electronic Frontier Foundation
The Electronic Frontier Foundation launched new online tracker-testing in its Panopticlick tool today, helping you analyze the privacy protections in your Web browser. New Feature Analyzes Your Web Br...

Sources Select Resources

Beyond Implementation: Policy Considerations for Secure Messengers
Cardozo, Nate
Article
2018
eff.org
The importance of secure Messenger tools goes beyond just reliable technology, it must be developed and have its infrastructure maintained by a trustworthy group with a history of responsible stewards...
The Corporate State of Surveillance
Opting Out
Nader, Ralph
Article
2013
CounterPunch
America was founded on the ideals of personal liberty, freedom and democracy. Now mass spying, surveillance and the unending collection of personal data undermine civil liberties and our privacy right...
Cory Doctorow Rejoins EFF to Eradicate DRM Everywhere
Sources News Release
Article
2015
Electronic Frontier Foundation (EFF)
Leading digital rights champion and author Cory Doctorow has rejoined the Electronic Frontier Foundation (EFF) to battle the pervasive use of dangerous digital rights management (DRM) technologies tha...
Defending Privacy at the U.S. Border: A Guide for Travelers Carrying Digital Devices
Article
2011
Electronic Frontier Foundation
Our lives are on our laptops – family photos, medical documents, banking information, details about what websites we visit, and so much more. Thanks to protections enshrined in the U.S. Constitution, ...
Edward Snowden's Warning to Canada
Snowden, Edward
Article
2015
The Tyee
Whistleblower Edward Snowden talks about Bill C-51 and the weak oversight of Canada's intelligence agencies.
EFF Launches IFightSurveillance.org and Counter-Surveillance Success Stories
Sources News Release
Article
2014
Electronic Frontier Foundation
Sites Highlight How Opponents of Mass Surveillance Around the World Lead by Example
EFF Report Charts Companies on Next Frontier of User Privacy
Sources News Release
Article
2015
Electronic Frontier Foundation
Annual Survey Delves Deeper into Practices of Apple, Google, Twitter, and More
Email privacy
Wikipedia article
Article
2012
Email privacy is the broad topic dealing with issues of unauthorized access and inspection of electronic mail. This unauthorized access can happen while an email is in transit, as well as when it is s...
Facebook and the Rise of Anti-Social Media
Urie, Rob
Article
2018
CounterPunch
For those who haven't thought about it, the internet is insidious because of the very capacity that Cambridge Analytica claims to be able to exploit: customization. Users have limited ability to confi...
Fifteen minutes of online anonymity
Manach, Jean-Marc
Article
2013
We fight Censorship
Making sure that your communications and data are confidential is not easy. Jean-Marc Manach, a journalist specialized in digital privacy and security, has an interesting alternative – how to have 15 ...
For journalists, danger lurking in your email
O'Brien, Danny
Article
2012
Committee to Protect Journalists
Citizen Lab provided a disturbing look into the likely use of a commercial surveillance program, FinFisher, to remotely invade and control the computers of Bahraini activists. After the software insta...
Free Speech Groups Issue New Guide to the International 'Necessary & Proportionate Principles'
Sources News Release
Article
2014
Electronic Frontier Foundation
EFF and ARTICLE 19 Urges Governments to Preserve Fundamental Freedoms in the Age of Mass Surveillance
Get your head out of the clouds
If we allow our personal data to be stored in giant electornic centres, we deserve what we get
Harris, John
Article
2011
The Guardian
Appraising the risks to personal data held in cloud computing systems.
HealthSources.ca
Website
2017
A web portal featuring information and resources about health, with articles, documents, books, websites, and experts and spokespersons. The home page features a selection of recent and important arti...
'Hostile to privacy': Snowden urges internet users to get rid of Dropbox
Article
2014
RT
Edward Snowden has identified Dropbox and other services as 'hostile to privacy." He urges web users to abandon unencrypted communication and adjust privacy settings to prevent governments from spying...
How can you protect yourself from online snooping?
Sources News Release
Article
2013
Reporters without Borders
Reporters Without Borders has published an Online Survival Kit on its WefightCensorship.org website that has tools and practical advice that will allow you to protect your communications and data.
How to Leak to The Intercept
Lee, Micah
Article
2015
The Intercept
Leaking can serve the public interest, fueling revelatory and important journalism. Here are instructions for how to leak safely.
Improve your privacy and security on the Internet using Tor
Article
2013
We fight Censorship
This user manual contains information about how to download Tor, how to use it, and what to do if Tor is unable to connect to the network
IntelligentSearch.ca
Website
2017
Sources
A web portal featuring topics related to research and the Internet. The home page features a selection of recent and important articles. A search feature, subject index, and other research tools make ...
'I've Got Nothing to Hide' and Other Misunderstandings of Privacy
Solove, Daniel J.
Article
2007
San Diego Law Review
According to the nothing to hide argument, there is no threat to privacy unless the government uncovers unlawful activity, in which case a person has no legitimate justification to claim that it remai...
Journalist Security Guide
Covering the news in a dangerous and changing world
Smyth, Frank
Article
2012
Committee to Protect Journalists
This guide details what journalists need to know in a new and changing world. It is aimed at local and international journalists of varied levels of experience.
Metadata - your files talk for you
Article
2013
We fight censorship
Few Internet users are aware that many file formats contain hidden data, or metadata. Text processing files or PDFs are likely to contain the name of the author, the date and time of the creation of t...
No Child Left Un-Mined? Student Privacy at Risk in the Age of Big Data
Chideya, Farai
Article
2015
The Intercept
Chideya discusses the implications of the compilation of big data trails containing information about children's performance in school.
The NSA Has Effectively Destroyed Internet Privacy
Snowden's Latest
Lopez, Alfredo
Article
2013
Counter Punch
Whistle-blower Edward Snowden prove that the NSA, working with its British counterpart the Government Communications Headquarters has conducted an intentional and largely sucessful campaign to destroy...
On Locational Privacy, and How to Avoid Losing it Forever
Blumberg, Andrew J.; Eckersley, Peter
Article
2009
Electronic Frontier foundation
Over the next decade, systems which create and store digital records of people's movements through public space will be woven inextricably into the fabric of everyday life. We are already starting to ...
Online Survival Kit
Article
2013
Reporters Without Borders
This Online Survival Kit offers practical tools, advice and techniques that teach you how to circumvent censorship and to secure yo communications and data. This handbook will gradually be unveiled ov...
Other Voices: The Connexions Newsletter - July 22, 2017
Secrecy and Power
Diemer, Ulli (ed.)
Serial Publication (Periodical)
2017
Connexions
Secrecy is a weapon the powerful use against their enemies: us. This issue of Other Voices explores the relationship of secrecy and power.
Other Voices: The Connexions Newsletter - April 21, 2018
Their Interent or Ours?
Diemer, Ulli (ed.)
Serial Publication (Periodical)
2018
Connexions
The Internet, which was at one time a free and open space for sharing information and ideas, has been privatized and twisted to serve the profit-making agenda of huge corporations, working hand-in-glo...
A practical guide to protecting your identity and security when using mobile phones
Article
2013
We fight Censorship
Many activists have been tracked via their mobile phones. Assess the risk for your own activities given the practices used in your country, how high-profile your work is, and what others in your commu...
Preparing for a Digital 9/11
Greenberg, Karen
Article
2012
TomDispatch
In recent years, in one of the more dangerous, if largely undiscussed, developments of our time, the Bush and then Obama administrations have launched the first state-planned war in cyber space. First...
Privacy for the other five billion
Donovan, Kevin; Nyst, Carly
Article
2013
Aadhaar is but one example of the development sector's growing fascination with technologies for registering, identifying, and monitoring citizens
Protect Students from Corporate Data-Mining in the Classroom
Nava, Victor
Article
2015
National Review
Across the political spectrum there is debate as to whether data should be collected about students.
Protect Yourself from Electronic Spying with Surveillance Self-Defense
Sources News Release
Article
2014
Electronic Frontier Foundation
The Electronic Frontier Foundation (EFF) has launched its updated "Surveillance Self-Defense" report, a comprehensive how-to guide to protecting yourself from electronic spying for Internet users all ...
Recommendations on the right to be forgotten
a Quadrature du Net and Reporters Without Borders
Article
2014
On the problems for the protection of freedom of expression and the right to information posed by the right to be removed from search engine results and, more broadly, the right to be forgotten. Priva...
Reporters Without Borders and Torservers.net, partners against online surveillance and censorship
Sources News Release
Article
2014
Reporters Without Borders
Reporters Without Borders and Torservers.net have joined forces to create and maintain 250 additional relays for the Tor network.
Sending encrypted emails using Thunderbird and PGP
Article
2013
We fight censorship
There are easy ways to ensure your Internet activities remain confidential.
Six Tips to Protect Your Search Privacy
Eckersley, Peter; Schoen, Seth; Bankston, Kevin; Slater, Derek
Article
2006
Electronic Frontier Foundation
Google, MSN Search, Yahoo!, AOL, and most other search engines collect and store records of your search queries. If these records are revealed to others, they can be embarrassing or even cause great h...
Software that tracks people on social media created by defence firm
Gallagher, Ryan
Article
2013
Guardian
Raytheon's Riot program mines social network data like a 'Google for spies', drawing ire from civil rights groups.
Spying by the Numbers
Hundreds of Thousands Subject to Government Surveillance and No Real Protection
Quigley, Bill
Article
2013
CounterPunch
Thanks to NSA whistleblower Edward Snowden many more people in the US and world-wide are learning about extensive US government surveillance and spying. There are publicly available numbers which sho...
Surveillance Self-Defense
Website
2018
Electronic Fronteri Foundation
Modern technology has given those in power new abilities to eavesdrop and collect data on innocent people. Surveillance Self-Defense is EFF's guide to defending yourself and your friends from surveill...
Tails - live operating system
theamnesicincognitolivesystem
Article
Tails is a live operating system, that you can start on almost any computer from a DVD, USB stick, or SD card. It aims at preserving your privacy and anonymity, and helps you to: * use the Internet a...
Tails: The amnesic Incognito Live System
Article
2013
We fight censorship
Tails is an operating system like Windows or Mac OS, but one specially designed to preserve your anonymity and privacy.
Test Your Online Privacy Protection with EFF's Panopticlick
Sources News Release
Article
2015
Electronic Frontier Foundation
The Electronic Frontier Foundation launched new online tracker-testing in its Panopticlick tool today, helping you analyze the privacy protections in your Web browser. New Feature Analyzes Your Web Br...
Tor is for Everyone
Why You Should Use Tor
Quintin, Cooper
Article
2014
Electronic Frontier Foundation
EFF recently kicked off their second Tor Challenge, an initiative to strengthen the Tor network for online anonymity and improve one of the best free privacy tools in existence. This is great news, bu...
UN slams UK surveillance law, calls for privacy reforms in Canada, France and Macedonia
Article
2015
Privacy International
In yet another blow to the UK's surveillance proponents, the UN Human Rights Committee has criticised the British legal regime governing the interception of communications, observing that it allows fo...
Virtual Private Network (VPN)
Article
2013
We fight Censorship
This technology allows the creation of an Internet tunnel (a virtual link) between two physical networks in different locations in a way that is transparent for users.
What Are Your Options Now For Secure Email?
Nosowitz, Dan
Article
2014
Popular Science
It's shockingly, disturbingly easy for the government to snoop on your emails. Here are your weapons in the fight for your email privacy.

Sources Bookshelf

Privacy
A Manifesto
Sofsky, Wolfgang
Book
2008
Sofsky attributes loss of privacy not only to technology and fear but also our indifference.
What publishers should do to implement data privacy protection
Article
2015
With advancing technology, increased cloud integration and general increased reliance on vulnerable networks, keeping information away from skilled 'hacktivists' and tech-savvy malicious misfits is be...


Sources is an online portal and directory for journalists, writers, news editors, researchers. Use Sources to find experts, media contacts, spokespersons, scientists, lobbyists, officials, speakers, university professors, researchers, newsmakers, CEOs, executive directors, media relations contacts, spokespeople, talk show guests, PR representatives, Canadian sources, story ideas, research studies, databases, universities, colleges, associations, businesses, government, research institutions, lobby groups, non-government organizations (NGOs), in Canada and internationally.
© Sources 1977-2021. The information provided is copyright and may not be reproduced in any form or by any means (whether electronic, mechanical or photographic), or stored in an electronic retrieval system, without written permission of the publisher. The content may not be resold, republished, or redistributed. Indexing and search applications by Ulli Diemer and Chris DeFreitas.