Digital Citizenship and Surveillance Society
UK State-Media-Citizen Relations after the Snowden Leaks
 
Skip to content
  • Home
  • Project News
  • About
    • DCSS Project
    • Contact us
    • Project Team
  • Events
    • Final Workshop
    • Surveillance and Citizenship Conference
  • Digital Citizenship
  • Research
    • Civil Society
    • Media
    • Policy
      • Actors
        • GCHQ
        • Independent Reviewer of Terrorism Legislation
        • Intelligence and Security Committee
        • Intelligence Services Commissioner
        • Interception of Communications Commissioner
        • Investigatory Powers Tribunal
        • Law enforcement bodies
        • Special Envoy on Intelligence and Data Sharing
      • Laws/Rules
        • Counter Terrorism and Security Act 2015
        • Data Retention and Investigatory Powers Act 2014
        • Digital Rights Ireland ruling, 2014
        • European Convention on Human Rights
        • Human Rights Act 1998
        • Intelligence Services Act 1994
        • Ruling: Davis and Others vs The Secretary of State for the Home Department
        • Ruling: IPT rulings in Liberty v Others cases
        • Telecommunications Act 1984
        • Wireless Telegraphy Act 2006
      • Powers
        • Access to communications data
        • Breaking into computer systems
        • Decryption
        • Interception of telecommunications
        • Intrusive and targeted surveillance
    • Technology
      • Surveillance Programmes
        • ANT Catalogue
        • BULLRUN
        • FASCIA
        • KARMA POLICE
        • MARINA
        • MUSCULAR
        • OPTIC NERVE
        • PRISM
        • QUANTUM THEORY
        • SKYNET
        • SQUEAKY DOLPHIN
        • TEMPORA
        • XKEYSCORE
      • Counter-Surveillance
      • Glossary
      • Technology Visualisations
  • Resources
    • How to Guides
    • Other Projects
    • Related Reports
    • Web Resources

Tag: Web Resources

Equation: The Death Star of Malware Galaxy

Description: “The Equation group is a highly sophisticated threat actor that has been engaged in multiple CNE (computer network exploitation) operations dating back to 2001, and perhaps as early as 1996. The Equation group uses multiple malware platforms, some of which surpass the well-known “Regin” threat in complexity and sophistication. The…

Continue reading

18th February 2015 18th February 2015Resources Web Resources

The NSA Files – From the Guardian

Description: All of the Guardian’s Snowden revelation coverage collected into one place. Web link Publisher: The Guardian

Continue reading

28th January 2015 28th January 2015Resources Web Resources

NSA Primary Sources

Description: A list of NSA/GCHQ documents. Web link Publisher: Electronic Frontier Foundation

Continue reading

28th January 2015 28th January 2015Resources Web Resources
12
CU small
This project is hosted at Cardiff University and funded by the ESRC
esrc small
Powered by Tempera & WordPress.