Results 41 to 50 of about 24,401 (224)

Before and After Snowden [PDF]

open access: yes, 2015
This editorial for the Surveillance and Security Intelligence After Snowden issue provides a very brief history of National Security Agency whistleblowers and investigations before Edward Snowden, and sets the current wave of NSA whistleblowing in the ...
Wood, DM, Wright, S
core  

Technology‐Enabled Surveillance as a Regime Characteristic: Re‐Authoritarianization in Central Asia

open access: yesSwiss Political Science Review, Volume 31, Issue 3, Page 377-388, September 2025.
Abstract Rapidly advancing information and communication technologies, along with the proliferation of artificial intelligence and closed‐circuit television, have profoundly reshaped state‐society relations worldwide. Initially celebrated for their democratizing potential, these technologies have, over the past two decades, ushered in a wave of ...
Josette Baer, Jasmin Dall'Agnola
wiley   +1 more source

Literacies for Surveillance: Social Network Sites and Background Investigations

open access: yesMedia and Communication, 2015
In September 2013, civilian contractor Aaron Alexis entered the Washington Navy Yard and murdered twelve people before being fatally shot by police. This incident, together with an incident three months earlier involving Edward Snowden, caused the U.S ...
Sarah Jackson Young
doaj   +1 more source

Despite Edward Snowden’s revelations, we are nowhere near Orwell’s vision of totalitarian dystopia envisioned in ‘1984’ [PDF]

open access: yes, 2013
This year has seen the staggering revelations of spying by the National Security Agency on targets both domestic and international. But do these programs now mean that we live in a surveillance society akin to that prophesized by George Orwell in his ...
Colls, Robert
core  

The tentacles of surveillance: Cephalopods and United States satellite intelligence

open access: yesJournal for the Anthropology of North America, Volume 28, Issue 1, Spring 2025.
Abstract This article examines the symbol placed on a US spy satellite, National Reconnaissance Office Launch–39 (NROL‐39). In 2013, NROL‐39 was launched into space, the payload vehicle and mission patch emblazoned with a gigantic octopus, its tentacles surrounding the globe, and the words “Nothing Is Beyond Our Reach” written below the globe.
Andrew Bickford
wiley   +1 more source

From multistakeholderism to digital sovereignty: Toward a new discursive order in internet governance?

open access: yesPolicy &Internet, Volume 16, Issue 4, Page 672-691, December 2024.
Abstract Since the early 2000s, the multistakeholder governance approach has been the reference model for transnational internet governance, reaching far beyond the original field of technical coordination and standard‐setting. But over the last decade many countries, including democracies supportive of multistakeholderism, have adopted measures to ...
Julia Pohle, Mauro Santaniello
wiley   +1 more source

NETmundial: only a landmark event if 'Digital Cold War' rhetoric abandoned

open access: yesInternet Policy Review, 2014
While internet privacy has been a central concern for quite a long time, the revelations by Edward Snowden about the US National Security Agency’s massive surveillance programme have highlighted the extent to which it is a core political issue.
Francesca Musiani, Julia Pohle
doaj   +1 more source

Ends and means: experts debate the democratic oversight of the UK’s intelligence services [PDF]

open access: yes, 2014
Revelations from Edward Snowden about the scope of intelligence activities in the UK have led to renewed attempts to enhance democratic oversight of the UK’s security services.
Bochel, Hugh   +8 more
core  

The Tension Between Privacy and Security [PDF]

open access: yes, 2016
A Review of President’s Review Group on Intelligence and Communications Technologies, Liberty and Security in a Changing World, 2013 and United Nations Office of the High Commissioner, Report of the Special Rapporteur on the Right to Privacy, Joseph A ...
De Baets, Antoon, Maret, Susan
core   +5 more sources

Surveillance and Critical Theory

open access: yesMedia and Communication, 2015
In this comment, the author reflects on surveillance from a critical theory approach, his involvement in surveillance research and projects, and the status of the study of surveillance.
Christian Fuchs
doaj   +1 more source

Home - About - Disclaimer - Privacy