Home Title Index Topic Index Sources Directory News Releases Sources Calendar RSS Sources Select News RSS Feed

Internet Security
AlterLinks Topic Index

  1. Applied Cryptography
    Protocols, Algorithms, and Source Code in C (Second Edition)

    Resource Type: Book
    Published: 1995
    Data security expert, Schneier, provides information on the protocols and algorithms used to implement a variety of impenetrable encryptions.
  2. 'Beijing's bitch'
    Beijing & Microsoft

    Resource Type: Article
    Published: 2005
    Putting profits ahead of human rights.
  3. Companies that cooperate with dictatorships must be sanctioned
    Sources News Release

    Resource Type: Article
    Published: 2011
    Reporters Without Borders condemns the criminal cooperation that exists between many western companies, especially those operating in the new technology area, and authoritarian regimes.
  4. Cyber-security workshop held successfully, despite police harassment
    Resource Type: Article
    Published: 2015
    Reporters Without Borders (RSF) condemns repeated attempts by local police to harass and interrupt a digital security workshop that RSF and Defend the Defenders (DTD), a Vietnamese human rights group, successfully organized for 23 Vietnamese rights activists near Hanoi last weekend.
  5. easyDNS Technologies Inc.
    Media Profile in Sources

    Resource Type: Organization
  6. EU: Enact Controls on Digital Weapons Trade
    Resource Type: Article
    Published: 2012
    Unregulated Export of Powerful Surveillance Tools Threatens Internet Freedom. Reporters Without Borders and Human Rights Watch call on the European Union to enact new controls on Internet surveillance and censorship technologies. Repressive governments use these technologies to enable human rights violation.
  7. The FBI Can Bypass Encryption
    Why Cyber Security is a Magic Act

    Resource Type: Article
    Published: 2014
  8. GCHQ and European spy agencies worked together on mass surveillance
    Resource Type: Article
    Published: 2013
    Edward Snowden papers unmask close technical cooperation and loose alliance between British, German, French, Spanish and Swedish spy agencies.
  9. How can you protect yourself from online snooping?
    Sources News Release

    Resource Type: Article
    Published: 2013
    Reporters Without Borders has published an Online Survival Kit on its WefightCensorship.org website that has tools and practical advice that will allow you to protect your communications and data.
  10. The hubris of investigators
    Resource Type: Article
    Published: 2016
    A now-vacated hearing over whether to require Apple to undermine the security of its users prompted an ongoing controversy over government access to encrypted devices. While the court in San Bernardino may never rule on the flood of arguments supporting Apple's defense of user security, observers-- especially members of Congress-- should pay close attention to a few themes that have emerged in the public debate.
  11. NSA surveillance may cause breakup of internet, warn experts
    Resource Type: Article
    Published: 2013
    Internet specialists highlight moves by Brazil, Germany and India towards creating separate networks in order to block spying.
  12. Online Survival Kit
    Resource Type: Article
    Published: 2013
    This Online Survival Kit offers practical tools, advice and techniques that teach you how to circumvent censorship and to secure yo communications and data. This handbook will gradually be unveiled over the coming months in order to provide everyone with the means to resist censors, governments or interests groups that want to courntrol news and information and gag dissenting voices. The Reporters Without Borders Digital Survival Kit is available in French, English, Arabic, Russian et Chinese. Published under the Creative Commons licence, its content is meant to be used freely and circulated widely.
  13. Preparing for a Digital 9/11
    Resource Type: Article
    Published: 2012
    In recent years, in one of the more dangerous, if largely undiscussed, developments of our time, the Bush and then Obama administrations have launched the first state-planned war in cyber space. First, there were the "Olympic Games," then the Stuxnet virus, then Flame, and now it turns out that other sophisticated malware programs have evidently followed.
  14. 6 Ideas For Those Needing Defensive Technology to Protect Free Speech from Authoritarian Regimes
    4 Ways the Rest of Us Can Help

    Resource Type: Article
    Published: 2010
    The Internet remains one of the most powerful means ever created to give voice to repressed people around the world. Unfortunately, new technologies have also given authoritarian regimes new means to identify and retaliate against those who speak out despite censorship and surveillance.
  15. Sources welcomes OrangeWebsite
    Sources News Release

    Resource Type: Article
    Published: 2011
    Sources welcomes a new member: OrangeWebsite. OrangeWebsite is an Icelandic web hosting service provider. Most of our clients are foreign journalists, bloggers, leakers and publishers.
  16. Surveillance Self-Defense
    Resource Type: Website
    Published: 2018
    Modern technology has given those in power new abilities to eavesdrop and collect data on innocent people. Surveillance Self-Defense is EFF's guide to defending yourself and your friends from surveillance by using secure technology and developing careful practices.

Experts on Internet Security in the Sources Directory

  1. Wikileaks

Sources-journalists use the sources website to find you


AlterLinks


© 2019. The information provided is copyright and may not be reproduced in any form or by any means (whether electronic, mechanical or photographic), or stored in an electronic retrieval system, without written permission of the publisher. The content may not be resold, republished, or redistributed. Indexing and search applications by Ulli Diemer and Chris DeFreitas.