The Darknet and Online Anonymity

Description: “A very small proportion of websites use sophisticated anonymity systems, which allow their operators to conceal their identity if they wish to. This part of the web is commonly referred to as the darknet. The darknet helps citizens to protect their security and privacy and to circumvent censorship. It also facilitate organised crime, such as the billion dollar drug market known as Silk Road. This POSTnote discusses the challenge of preventing such crimes without compromising the other uses of anonymity technologies.”

Web link

Publisher: Parliamentary Office of Science and Technology

Public Perceptions of Privacy and Security in the Post-Snowden Era

Description: “Privacy evokes a constellation of concepts for Americans—some of them tied to traditional notions of civil liberties and some of them driven by concerns about the surveillance of digital communications and the coming era of “big data.” While Americans’ associations with the topic of privacy are varied, the majority of adults in a new survey by the Pew Research Center feel that their privacy is being challenged along such core dimensions as the security of their personal information and their ability to retain confidentiality.”

Report

Author(s): Pew Research Center

Home Affairs Committee Report on Counter-Terrorism: Oversight of the Intelligence Agencies

Description: “The oversight of the security and intelligence agencies has long been a matter of concern for this Committee. In reports in 1992 and again in 1997[161] we have recommended that the security service (which is nominally under the purview of the Home Secretary although its head reports directly to the Prime Minister) ought to be subject to scrutiny from the Home Affairs Committee. We have consistently been denied the opportunity to take evidence from senior officials who work in the national security structure and we are highly unimpressed that we had to summon the independent Intelligence Services Commissioner in order to take evidence from him. For information we have attached an analysis on the UK and US systems of oversight of the security and intelligence agencies which examines the plaudits and criticisms of each system (found at Annex B). We believe that the current oversight is not fit for purpose for several reasons which we set out below.”

Report

Author(s): Home Affairs Committee

EU Committee of Ministers Recommendation on a Guide to Human Rights for Internet Users

Description: “Council of Europe member States have the obligation to secure for everyone within their jurisdiction the human rights and fundamental freedoms enshrined in the European Convention on Human Rights (ETS No. 5, the Convention). This obligation is also valid in the context of Internet use. Other Council of Europe conventions and instruments, which deal with the protection of the right to freedom of expression, access to information, the right to freedom of assembly, protection from cybercrime and of the right to private life and to the protection of personal data, are also applicable.”

Web link

Publisher: Council of Europe

Top Level Communications

Description: “Here you can read about:
– Signals Intelligence (SIGINT),
– Communications Security (COMSEC),
– Information Classification,
and also about the equipment, from past and present, which make that civilian and military leaders can communicate in order to fulfill their duties.”

Web link

Publisher: Top Level Communications

ACLU NSA Archive

Description: “The ACLU long suspected that the NSA has gone far beyond its counterterrorism and foreign intelligence mandate, implementing a massive system to conduct bulk surveillance of millions of innocent Americans.” This is their archive of materials.

Web link

Publisher: ACLU