"Mit unserer digitalen Identität müssen wir pfleglich umgehen, denn sie wird immer wichtiger für uns und ist zunehmend Gefahren ausgesetzt. Dieser Ratgeber stellt einfache Maßnahmen vor, wie Sie sich gegen Phishing-Attacken und Virenangriffe wehren. Praktische Tipps zeigen, wie Sie Ihre persönl
...
ichen Daten vor Datenkraken schützen, die personenbezogene Informationen auswerten und weiterverkaufen. Und ein Thema, das – bisher noch weitgehend unbemerkt – immer wichtiger wird: Ein ausführlicher Leitfaden mit Anleitungen hilft, das eigene Onlineleben zu dokumentieren und den digitalen Nachlass zu regeln." (Verlagsbeschreibung)
more
"Gewerkschaften und Datenschützer fürchten um die Pressefreiheit: Immer neue Gesetze erschweren die vertrauliche Kommunikation per Internet und Telefon. Besonders stark betroffen sind Berufsgruppen, die bislang nur in Sonderfällen ausgespäht werden durften: Journalisten, Juristen und Ärzte. Doc
...
h es ist möglich, die Kontrollen zu umgehen - ganz legal und ohne großen technischen Aufwand! Journalisten können auch weiterhin diskret Informanten kontaktieren. Oder Anwälte ihre Mandanten. Oder Ärzte ihre Patienten. Das Buch verrät, welche Techniken es gibt. Schritt für Schritt wird der Umgang mit Programmen gezeigt, die die Kommunikation anonymisieren, von der E-Mail über den Chat bis zur Internet-Telefonie. Der Leser erfährt, wie er Spuren auf Computern oder im World Wide Web verwischt. An praktischen Alltagsbeispielen wird gezeigt, welche Methode wann angewendet werden sollte. Dabei Setzt das Buch keine besonderen Computerkenntnisse voraus: Wer Surfen, Mailen und Office-Programme benutzen kann, bringt genug Wissen mit, um sich anonym im Internet zu bewegen. Das Buch behandelt außerdem zwei Spezialthemen: Wie kann man beim Telefonieren mit dem Handy seine Identität verschleiern? Und: Wie umgeht man die Zensur in Diktaturen? Das Buch eignet sich deshalb auch besonders für Auslandskorrespondenten und für Mitarbeiter von Hilfsorganisationen." (Verlagsbeschreibung)
more
"We discuss a successful intervention in the management of Internet infrastructure – a campaign which has achieved genuine traction against a cybercrime issue that has dogged the network engineering community for more than thirty years. Internet infrastructure is often characterised as beset by pe
...
rverse incentives which frustrate the achievement of common goods –establishing fixes to deep design issues with Internet architecture involves communal action at scale which is hard to manage in a decentralised, competitive, and marketized ecosystem of providers. While much scholarship has sought to establish the incentives frustrating action against cybercrime and identify possible ways to alter these, in this case we observe a community acting to short-circuit them entirely. We develop the concept of infrastructural capital to explain how key actors were able to relocate the issue of spoofing away from the commercial incentive structures of a decentralised ecosystem of competingproviders with little motivation to solve the issue and into the incentive structures of a far more densely networked and centralised professional community of network engineers. This extends previous work applying theory from infrastructure studies to cybercrime economies, developing a new account of how power can be asserted within infrastructure to achieve change, apparently against the grain of other long-standing incentives." (Abstract)
more
"Cybercrime has been on the rise since the 1990s, and so is the need for researchers and public administrations to better estimate its prevalence, incidence, distribution and nature. The limitations of police statistics as measures of crime are widely known and seem even more severe—in terms of th
...
e volume of unrecorded offenses—in the case of cybercrimes. The problem of under-recording may be even more acute for crimes suffered by organizations. From that perspective, victimization surveys with national representative samples are seen as the main alternative to obtain more valid and reliable estimates of cybercrime and cyberdeviance. Self-reported delinquency studies can provide information on juvenile cybercrime and cyberdeviance from the point of view of the offenders and, if accompanied by a victimization module, on the incidents suffered by the younger generations. Surveys also provide information on many other variables that are absent from police or court recorded crimes, related to the personal characteristics of individuals, their everyday activities, cybersecurity practices and so on, which allow identifying key risk factors and testing different theories of online crime and deviance. In addition, surveys conducted regularly can also be key to assessing temporal changes in overall criminal behavior. While we have seen a rapid increase in the number of crime surveys that include measures of cybercrime since the early 2010s, our scoping review has identified a series of practices that could be refined to better measure online victimization and offending, and to enable cross-national and temporal comparisons. Overall, it seems reasonable to state that cybercrime and cyberdeviance is measured less adequately than more traditional crime types. This might be in part due to the ever-changing nature of cyberspace." (Ways forward and conclusions, pages 65-66)
more
"Die Reichweite der Cybercrime-Branche hat einen neuen Höhepunkt erreicht. 72% aller Organisationen weltweit berichten vom steigenden Cyberrisiko. Der Schaden durch Cybercrime betrug 2024 allein in Deutschland 178,6 Mrd. Euro. Das sind 20% mehr als im Vorjahr. Cyberkriminelle hängen Organisatione
...
n bei der Nutzung von KI ab: 91 % der Sicherheitsbeauftragten weltweit erwarten in den nächsten drei Jahren einen deutlichen Anstieg KI-getriebener Angriffe. Und obwohl sich 96% der Sicherheitsexperten einig sind, dass es wichtig ist, KI-basierte Angriffe zu erkennen, schätzen nur 26 % ihre eigene Fähigkeit diesbezüglich als hoch ein. Angreifende nutzen jeden verfügbaren Kanal als mögliches Eintrittstor: 56% der Sicherheitsbeauftragten in der DACH-Region zufolge ist E-Mail immer noch der primäre Angriffskanal. 98% der Organisationen in Deutschland, Österreich und der Schweiz berichten von einem Anstieg bei Multi-Channel-Angriffen via E-Mail, Messaging-Apps, Social Media und Deepfake-Sprachanrufen.." (Executive Summary)
more
"Bringing together perspectives from academia and practice, this second edition Research Handbook provides fresh insights into debates surrounding digital technology and how to respect and protect human rights in an increasingly digital world. New and updated chapters cover the issues posed by the m
...
anagement of key internet resources, the governance of its architecture and the role of different stakeholders." (Publisher description)
more
"The surveillance of journalists, including using spyware technology, poses a fundamental threat to media freedom, the digital safety of journalists, and source protection within the European Union. The agreement on the European Media Freedom Act in December 2023 offers some further protections agai
...
nst the fast evolving threat to journalists and their sources. Those involved in pushing the deal over the line and ensuring the removal of explicit references to national security in exemptions deserve credit. Yet the full impact of the Article 4 provisions – as all other new rules in the EMFA – remains to be seen and effective implementation will be vital. Greece and Hungary offer the strongest examples of why strong enforcement will be needed. However, both countries have already demonstrated how overly broad and vague exemptions for national security have already been used to justify the otherwise unjustifiable surveillance of journalists." (Conclusion)
more
"Revelations from the 2021 “Pegasus Project” investigation into the use of spyware have confirmed long-held concerns about the proliferation of the technology as a surveillance solution to monitor the activities of journalists around the world. Spyware is a particularly malicious form of malware
...
that can potentially expose a target’s entire digital life, sometimes even leaving victims powerless to prevent an attack. As such, spyware appears to be the ultimate tool of oppression that can be used against journalists, and its proliferation is currently taking place with extremely limited transparency and according to "black box" dynamics. The aim of this paper is to shed light on how spyware technology can affect the work and security of journalists by analyzing what threats spyware poses to the practice of journalism. Qualitative and exploratory in nature, and theoretically grounded in surveillance studies and the growing body of literature on information security in journalism, the article is based on a series of qualitative interviews with technologists and reporters conducted to deepen the understanding of the threats posed by spyware and to provide an overview of potential resistance and neutralization practices that journalists can put in place, as well as their effectiveness. Overall, the article aims to contribute to the study of the impact of surveillance on journalism and its implications for press freedom." (Abstract)
more
"This chapter examines the digital surveillance and harassment experiences faced by female journalists in Zimbabwe in the 2023 pre-election period covering the year 2022 up to August 2023. The examination is based on interviews conducted with seven purposefully selected female reporters and editors
...
in Zimbabwe. It suggests that within our information-driven society, both personal data and physical bodies are subject to surveillance; for female journalists in particular, this surveillance materialises as instances of harassment occurring both online and offline, including within newsroom settings. Evidence shows that there is both the physical and psychological intimidation of female journalists and periods of political unrests are particularly unsettling. Female journalists are subject to unique forms of hostility absent in their male counterparts’ experiences. To cope the journalists, adopt various survival strategies, from cyber defence techniques and keeping a low online profile to outright evasion or extreme cases of leaving the country. The female journalists advocate for thorough protection measures, including legal reforms, strict penalties, and holding online platforms accountable. They emphasise the importance of mental health support, training, and guidance from media organizations, in addition to institutional and legislative action. The chapter employs a feminist perspective to highlight the importance of power dynamics in surveillance. Feminist politics within media call for women not only to be visible but also heard, which can only occur if they have representation in decision-making processes that shape news coverage and can write stories without fearing harassment. Drawing inspiration from the Panopticon theory of surveillance, this chapter explores the idea that individuals may be monitored without their awareness. With this framework in mind, three key questions are addressed: Did journalists experience any form of digital or physical surveillance? Were they subjected to any type of harassment stemming from such monitoring? And did they receive support from media organizations during these incidents?" (Abstract)
more
"This toolkit provides a comprehensive guide for Private Security Companies (PSCs) on navigating the complex landscape of Information and Communication Technologies (ICTs) and their impact on human rights. The toolkit is designed for a wide range of PSC stakeholders, including security professionals
...
, management, human rights officers, compliance teams, technology teams, and government and civil society groups. It consists of 12 interconnected but independent tools, each addressing a specific aspect of ICT use in the private security industry." (https://ict4peace.org)
more