Difference between revisions of "Library"

From United States Pirate Party
Jump to: navigation, search
(Articles: +12)
(Articles: +6)
Line 207: Line 207:
 
* [http://www.aclu.org/blog/national-security/does-surveillance-affect-us-even-when-we-cant-confirm-were-being-watched Does Surveillance Affect Us Even When We Can’t Confirm We’re Being Watched? Lessons From Behind the Iron Curtain] - ACLU (Jay Stanley)
 
* [http://www.aclu.org/blog/national-security/does-surveillance-affect-us-even-when-we-cant-confirm-were-being-watched Does Surveillance Affect Us Even When We Can’t Confirm We’re Being Watched? Lessons From Behind the Iron Curtain] - ACLU (Jay Stanley)
 
* [http://www.slate.com/blogs/future_tense/2014/01/17/nsa_surveillance_reform_every_scary_weird_thing_we_know_the_agency_can_do.html Every Scary, Weird Thing We Know the NSA Can Do] - The Brian Lehrer Show
 
* [http://www.slate.com/blogs/future_tense/2014/01/17/nsa_surveillance_reform_every_scary_weird_thing_we_know_the_agency_can_do.html Every Scary, Weird Thing We Know the NSA Can Do] - The Brian Lehrer Show
 +
* [http://arstechnica.com/tech-policy/2014/09/fbi-facial-recognition-system-at-full-operational-capability/ FBI facial recognition system at “full operational capability”] - ArsTechnica (David Kravits)
 
* [http://news.cnet.com/2100-1029_3-6140191.html FBI taps cell phone mic as eavesdropping tool] - c|net (Declan McCullagh and Anne Broache)
 
* [http://news.cnet.com/2100-1029_3-6140191.html FBI taps cell phone mic as eavesdropping tool] - c|net (Declan McCullagh and Anne Broache)
 
* [http://news.cnet.com/8301-13578_3-57595529-38/feds-tell-web-firms-to-turn-over-user-account-passwords/ Feds tell Web firms to turn over user account passwords] - c|net (Declan McCullagh)
 
* [http://news.cnet.com/8301-13578_3-57595529-38/feds-tell-web-firms-to-turn-over-user-account-passwords/ Feds tell Web firms to turn over user account passwords] - c|net (Declan McCullagh)
Line 215: Line 216:
 
* [http://www.aclu.org/blog/immigrants-rights-technology-and-liberty-womens-rights/e-verify-effective-depends-how-you-look Is E-verify Effective? Depends on How You Look at It] - ACLU (Chris Calabrese)
 
* [http://www.aclu.org/blog/immigrants-rights-technology-and-liberty-womens-rights/e-verify-effective-depends-how-you-look Is E-verify Effective? Depends on How You Look at It] - ACLU (Chris Calabrese)
 
* [http://www.forbes.com/sites/erikkain/2011/12/13/is-the-fbi-using-carrier-iq-for-domestic-surveillance/ Is the FBI Using Carrier IQ for Domestic Surveillance] - Forbes (E.D. Kain)
 
* [http://www.forbes.com/sites/erikkain/2011/12/13/is-the-fbi-using-carrier-iq-for-domestic-surveillance/ Is the FBI Using Carrier IQ for Domestic Surveillance] - Forbes (E.D. Kain)
 +
* [https://www.eff.org/issues/know-your-rights Know Your Rights] - EFF (Hanni Fakhoury and Nadia Kayyali)
 
* [http://privacysos.org/node/1454 Massachusetts legislature advances key electronic privacy proposal] - PrivacySOS.org (sosadmin)
 
* [http://privacysos.org/node/1454 Massachusetts legislature advances key electronic privacy proposal] - PrivacySOS.org (sosadmin)
 
* [http://www.wired.com/threatlevel/2012/07/massive-phone-surveillance/ Mobile-Phone Surveillance by Police Targets Millions Annually] - Wired (David Kravets)
 
* [http://www.wired.com/threatlevel/2012/07/massive-phone-surveillance/ Mobile-Phone Surveillance by Police Targets Millions Annually] - Wired (David Kravets)
 +
* [https://www.aclu.org/blog/national-security/new-documents-shed-light-one-nsas-most-powerful-tools New Documents Shed Light on One of the NSA's Most Powerful Tools] - ACLU (Alex Abdo)
 
* [http://www.theguardian.com/world/2013/aug/01/new-york-police-terrorism-pressure-cooker New York woman visited by police after researching pressure cookers online] - The Guardian (Adam Gabbatt)
 
* [http://www.theguardian.com/world/2013/aug/01/new-york-police-terrorism-pressure-cooker New York woman visited by police after researching pressure cookers online] - The Guardian (Adam Gabbatt)
 
* [http://www.guardian.co.uk/world/2013/jun/06/us-tech-giants-nsa-data NSA taps in to internet giants' systems to mine user data, secret files reveal] - The Guardian (Glenn Greenwald and Ewen MacAskill)
 
* [http://www.guardian.co.uk/world/2013/jun/06/us-tech-giants-nsa-data NSA taps in to internet giants' systems to mine user data, secret files reveal] - The Guardian (Glenn Greenwald and Ewen MacAskill)
Line 229: Line 232:
 
* [http://www.washingtonpost.com/world/national-security/secret-nsa-documents-show-campaign-against-tor-encrypted-network/2013/10/04/610f08b6-2d05-11e3-8ade-a1f23cda135e_story.html Secret NSA documents show campaign against Tor encrypted network] - Washington Post (Barton Gellman, Craig Timberg and Steven Rich)
 
* [http://www.washingtonpost.com/world/national-security/secret-nsa-documents-show-campaign-against-tor-encrypted-network/2013/10/04/610f08b6-2d05-11e3-8ade-a1f23cda135e_story.html Secret NSA documents show campaign against Tor encrypted network] - Washington Post (Barton Gellman, Craig Timberg and Steven Rich)
 
* [http://blog.ted.com/2013/07/17/security-experts-on-the-nsas-real-problems/ Security experts Bruce Schneier and Mikko Hypponen on the NSA, PRISM and why we should be worried] - TEDtalks (Thu-Huong Ha)
 
* [http://blog.ted.com/2013/07/17/security-experts-on-the-nsas-real-problems/ Security experts Bruce Schneier and Mikko Hypponen on the NSA, PRISM and why we should be worried] - TEDtalks (Thu-Huong Ha)
 +
* [https://firstlook.org/theintercept/2014/10/30/hacking-team/ Secret Manuals Show the Spyware Sold to Despots and Cops Worldwide] - The Intercept (Cora Currier and Morgan Marquis-Boire)
 
* [http://rt.com/usa/tech-companies-wiretap-fines-552/ Spy, or pay up: FBI-backed bill would fine US firms for refusing wiretaps] - RT
 
* [http://rt.com/usa/tech-companies-wiretap-fines-552/ Spy, or pay up: FBI-backed bill would fine US firms for refusing wiretaps] - RT
 
* [https://www.eff.org/deeplinks/2012/10/stingrays-biggest-unknown-technological-threat-cell-phone-privacy Stingrays: The Biggest Technological Threat to Cell Phone Privacy You Don't Know About] - EFF (Hanni Fakhoury and Trevor Timm)
 
* [https://www.eff.org/deeplinks/2012/10/stingrays-biggest-unknown-technological-threat-cell-phone-privacy Stingrays: The Biggest Technological Threat to Cell Phone Privacy You Don't Know About] - EFF (Hanni Fakhoury and Trevor Timm)
Line 242: Line 246:
 
* [https://www.aclu.org/time-rein-surveillance-state-0 Time to Rein in the Surveillance State] - ACLU
 
* [https://www.aclu.org/time-rein-surveillance-state-0 Time to Rein in the Surveillance State] - ACLU
 
* [https://rt.com/usa/news/trapwire-abraxas-cubic-surveillance-251/ TrapWire tied to anti-Occupy Internet-spy program] - RT
 
* [https://rt.com/usa/news/trapwire-abraxas-cubic-surveillance-251/ TrapWire tied to anti-Occupy Internet-spy program] - RT
 +
* [http://torrentfreak.com/tribler-makes-bittorrent-client-anonymous-built-tor-network-140902 Tribler Makes Bittorrent Anonymous with Built-in TOR Network] - TorrentFreak (Ernesto)
 
* [http://news.cnet.com/8301-13578_3-57537559-38/u.n-calls-for-anti-terror-internet-surveillance/ U.N. calls for 'anti-terror' Internet surveillance] - CNET (Declan McCullagh)
 
* [http://news.cnet.com/8301-13578_3-57537559-38/u.n-calls-for-anti-terror-internet-surveillance/ U.N. calls for 'anti-terror' Internet surveillance] - CNET (Declan McCullagh)
 
* [http://www.reuters.com/article/2013/08/05/us-dea-sod-idUSBRE97409R20130805 U.S. directs agents to cover up program used to investigate Americans] - Reuters (John Shiffman and Kristina Cooke)
 
* [http://www.reuters.com/article/2013/08/05/us-dea-sod-idUSBRE97409R20130805 U.S. directs agents to cover up program used to investigate Americans] - Reuters (John Shiffman and Kristina Cooke)
Line 250: Line 255:
 
* [http://radicalreference.info/content/we-are-all-suspects-guide-people-navigating-expanded-powers-surveillance-21st-century We Are All Suspects: A Guide for People Navigating the Expanded Powers of Surveillance in the 21st Century] - Radical Reference (MRM)
 
* [http://radicalreference.info/content/we-are-all-suspects-guide-people-navigating-expanded-powers-surveillance-21st-century We Are All Suspects: A Guide for People Navigating the Expanded Powers of Surveillance in the 21st Century] - Radical Reference (MRM)
 
* [http://lifehacker.com/we-need-to-re-think-how-we-fight-for-privacy-1582572323 We Need to Re-Think How We Fight for Privacy] - Life Hacker (Alan Henry)
 
* [http://lifehacker.com/we-need-to-re-think-how-we-fight-for-privacy-1582572323 We Need to Re-Think How We Fight for Privacy] - Life Hacker (Alan Henry)
 +
* [https://news.vice.com/article/what-default-phone-encryption-really-means-for-law-enforcement What Default Phone Encryption Really Means For Law Enforcement] - Vice News (Cindy Cohn, Jeremy Gillula, and Seth Schoen)
 
* [http://www.theatlantic.com/technology/archive/2013/12/what-you-need-to-know-about-the-third-party-doctrine/282721/ What You Need to Know about the Third-Party Doctrine] - The Atlantic (John Villasenor)
 
* [http://www.theatlantic.com/technology/archive/2013/12/what-you-need-to-know-about-the-third-party-doctrine/282721/ What You Need to Know about the Third-Party Doctrine] - The Atlantic (John Villasenor)
 
* [http://www.federalnewsradio.com/241/3026867/White-House-draft-cyber-order-promotes-voluntary-critical-infrastructure-protections White House draft cyber order promotes voluntary critical infrastructure protections] - FederalNewsRadio.com (Jason Miller)
 
* [http://www.federalnewsradio.com/241/3026867/White-House-draft-cyber-order-promotes-voluntary-critical-infrastructure-protections White House draft cyber order promotes voluntary critical infrastructure protections] - FederalNewsRadio.com (Jason Miller)

Revision as of 10:12, 2 December 2014

Back to United States


Welcome to the library of the Pirate Party. Where applicable, either PDF versions will be provided or the link to those works given. For works where it is not legal for us to give out PDFs, we will provide ISBN numbers for those items. Titles are always being added so check back.

Creative Commons, Public Domain, Public License Images, Literature, Music, Software, and Video

Education

Digital Social Learning Communities

Free Learning

List of 700 Free Online Courses

  • edX - Free Online courses from MIT, Harvard, and Berkley. Certification for completion offered for some courses.
  • Youtube EDU - Educational Youtube videos.
  • open.michigan

Government

Open Source

Hardware

Software

Open Source Alternative

Privacy Tools

List

  • Reset the Net: Privacy Pack - A pack of many privacy apps
  • Tails - DVD or USB key that forces the computer you're on to send internet traffic through TOR
  • TOR - Prevents traffic analysis of your internet usage
  • OpenNIC - Alternative DNS that is uncensored
  • Bitcoin - P2P digital currency with no central authority
  • Bittorrent Sync - Decentralized and encrypted file sharing
  • Bittorrent Chat - Decentralized and encrypted communications
  • RiseUp - Invite-only secure and private email accounts
  • GNUnet - Secure Anonymous Peer-to-Peer Networking
  • Vole.cc - Decentralized Social Media
  • Darkmail - Fully encrypted email

Web Search

  • DuckDuckGo - Anonymous, unlogged web searches
  • Seeks Project - Open decentralized platform for collaborative search
  • StartPage - Private, unlogged web searches
  • YaCy - Decentralized web search

Browsers

Tools and settings for different browsers

Browser Add-ons
  • HTTPS Everywhere - If a site supports https, this forces your communications to use SSL encryption

Email Clients

  • Claws Mail - Lightweight email application with GPG support
  • Evolution - Free email and calendar application with GPG support
  • IceDove - Free version of Mozilla Thunderbird *requires GPG plug-in
  • KMail - KDE email client with GPG support
  • Thunderbird - Open source email application *requires GPG plug-in

Our Publications

Articles

Books

Intellectual Property (Copyright, Patent, and Trademark)

Articles

Books


Videos

Privacy

Articles

Books

Videos

Transparency and Accountability

Articles

How the Border Patrol is running amok and making a mockery of the rule of law.] - Politico (James Lyall)

Books

Videos

Reference

Court Cases

Legislation

Philosophy

Reports, Statistics, and Studies

Other