"Ranking Digital Rights’ inaugural Corporate Accountability Index evaluates 16 of the world’s most powerful Internet and telecommunications companies on their commitments, policies, and practices that affect users’ freedom of expression and privacy. By opening the door for greater corporate tr
...
ansparency and public scrutiny of business practices, the Index encourages companies to do a better job of respecting their users’ rights around the globe [...] Highlights: There are no “winners.” Even companies in the lead are falling short. Across the board, companies need to improve their disclosure of policies and practices that affect users’ freedom of expression and privacy, as well as their commitments to these human rights. Only six companies scored at least 50 percent of the total possible points. The highest score was only 65 percent." (Executive summary)
more
"This kit is a contribution from activists for activists to help us be more secure in our digital practices. It’s designed to help activists deal with the most common security issues that might jeopardise the integrity of our devices and communications. Any at-risk user who encounters security-rel
...
ated problems can use this kit to mitigate the immediate consequences and find guidance to address ongoing security issues. The kit is simply written for computer non-experts. Since security is complex and simple answers might not always be sufficient, this kit also provides links to more exhaustive resources for additional support. The work on this kit has been guided by APC’s many years of work in the area of digital security, particularly its work with human rights defenders, those who deal with digital dangers most frequently as a matter of course in their work." (APC website)
more
"The book first provides a historical reference, detailing the emergence of viruses, worms, malware, and other cyber threats that created the need for the cybersecurity field. It then discusses the vulnerabilities of our critical infrastructures, the broad arsenal of cyber attack tools, and the vari
...
ous engineering design issues involved in protecting our infrastructures. It goes on to cover cyber intelligence tactics, recent examples of cyber conflict and warfare, and the key issues in formulating a national strategy to defend against cyber warfare. The book also discusses how to assess and measure the cost of cybersecurity. It examines the many associated cost factors and presents the results of several important industry-based economic studies of security breaches that have occurred within many nations. The book concludes with a look at future trends in cybersecurity. It discusses the potential impact of industry-wide transformational changes, such as virtualization, social media, cloud computing, structured and unstructured data, big data, and data analytics." (Publisher description)
more
"Mit unserer digitalen Identität müssen wir pfleglich umgehen, denn sie wird immer wichtiger für uns und ist zunehmend Gefahren ausgesetzt. Dieser Ratgeber stellt einfache Maßnahmen vor, wie Sie sich gegen Phishing-Attacken und Virenangriffe wehren. Praktische Tipps zeigen, wie Sie Ihre persönl
...
ichen Daten vor Datenkraken schützen, die personenbezogene Informationen auswerten und weiterverkaufen. Und ein Thema, das – bisher noch weitgehend unbemerkt – immer wichtiger wird: Ein ausführlicher Leitfaden mit Anleitungen hilft, das eigene Onlineleben zu dokumentieren und den digitalen Nachlass zu regeln." (Verlagsbeschreibung)
more
"The six modules [...] are designed to help trainers integrate digital safety and online security topics into their media training. The modules do not assume that the trainer has special knowledge of the subject. While we wrote the toolkit with journalism trainers in mind, we believe that the module
...
s can also be used when training a wide range of media content producers (i.e., bloggers, citizen reporters, human rights activists who work with information, etc.) who use smartphones and the Internet to communicate." (Page 3)
more
"1. This guide is a tool for you, the Internet user, to learn about your human rights online, their possible limitations, and available remedies for such limitations. Human rights and fundamental freedoms apply equally offline and online. This principle includes respect for the rights and freedoms o
...
f other Internet users. The guide provides you with information about what rights and freedoms mean in practice in the context of the Internet, how they can be relied and acted upon, as well as how to access remedies. It is an evolving document, open to periodic updating. 2. This guide is based on the European Convention on Human Rights and other Council of Europe conventions and instruments that deal with various aspects of human rights protection. All Council of Europe member States have a duty to respect, protect and fulfil the rights and freedoms contained in the instruments that they have ratified. The guide is also inspired by the continuous interpretation of these rights and freedoms by the European Court of Human Rights and by other relevant legal instruments of the Council of Europe. 3. The guide does not establish new human rights and fundamental freedoms. It builds on existing human rights standards and enforcement mechanisms." (Introduction)
more
"The internet has enabled an unprecedented ability to monitor and track people and information flows as highlighted in the 2013 revelations by Edward Snowden about online surveillance carried out by the United States’ National Security Agency. The revelations have kicked off debates across the wor
...
ld about the correct balance between citizen privacy and national security in the context of the internet. In the face of this shifting landscape it is critical for human rights activists to understand how internet surveillance works, and what privacy and anonymity really mean in a digital world." (Back cover)
more
"Given the Internet’s potential for full-spectrum surveillance and information disruption, the marshaling of computer networks represents the next stage of cyberwar. Indeed, it is upon us already. The recent Stuxnet episode, in which Israel fed a malignant computer virus into Iran’s nuclear faci
...
lities, is one such example. Penetration into US government computer systems by Chinese hackers-presumably sponsored by the Chinese government-is another. Together, they point to a new era in the evolution of human conflict. In Cybersecurity: What Everyone Needs to Know, noted experts Peter W. Singer and Allan Friedman lay out how the revolution in military cybernetics occurred and explain where it is headed. They begin with an explanation of what cyberspace is before moving on to discussions of how it can be exploited and why it is so hard to defend. Throughout, they discuss the latest developments in military and security technology. Singer and Friedman close with a discussion of how people and governments can protect themselves." (Publisher description)
more
"This guide explains how the Data Protection Act (DPA) applies to journalism, advises on good practice, and clarifies the role of the Information Commissioner’s Office (ICO). It does not have any formal legal status and cannot set any new rules, but it will help those working in the media understa
...
nd and comply with existing law in this area." (About this guide, page 3)
more
"As part of its ongoing commitment to fighting online child sexual abuse content and, in particular, to helping its members realise the objectives of the Mobile Alliance Against Child Sexual Abuse Content, the GSMA has worked with INHOPE, Save the Children, ECPAT, IWF, Net Safe Latvia, Meldpunt, ICM
...
EC and Interpol to collate information which will help organisations build fully-functioning hotlines in countries where no such facility is currently in place. This information is presented in the document below." (Page 3)
more
"El objetivo de este documento es examinar el marco legal y jurisprudencial colombiano sobre vigilancia de comunicaciones, a la luz de las capacidades tecnológicas de hoy. Dicho a manera de hipótesis, el propósito es mostrar cómo la regulación y la jurisprudencia en materia de inteligencia no s
...
e ocupan de interpretar los esquemas de vigilancia actuales para mantener vigentes los derechos que resultan afectados. Para desarrollar este objetivo, abordamos algunos puntos –escogidos con cierto nivel de arbitrariedad– de la Ley de Inteligencia: interceptación de comunicaciones, monitoreo del espectro electromagnético y acceso a datos de usuarios. Este último tema, que tomado de manera independiente merecería un estudio aparte, se desarrolla como complemento de los dos primeros. El documento está divido de la siguiente forma: el primer capítulo explica, desde el punto de vista técnico, cuáles son las tecnologías para comunicarnos y cuáles existen para vigilarnos. El segundo capítulo desarrolla el marco legal sobre vigilancia de las comunicaciones. El tercero ofrece un panorama general comparado frente a la interceptación de las comunicaciones en particular. Finalmente, el cuarto capítulo analiza lo hasta allí planteado para ofrecer algunas conclusiones." (Introducción, página 10-11)
more
"Ein praktisches, verständliches und effizientes Schutzprogramm für alle, die sich in der digitalen Welt bewegen. Safe Surfer funktioniert wie ein Arbeitsbuch – alle Tipps lassen sich parallel zum Lesen umsetzen. Google, Facebook oder die NSA – wie können wir unsere Privatsphäre im digitalen
...
Zeitalter noch schützen? Diese Frage ist nicht nur in den Medien ein Thema, sondern betrifft uns alle. Denn jeder von uns kann Opfer eines digitalen Anschlags werden. Safe Surfer ist ein praktisches, effizientes Präventionsprogramm für den Nutzer mit IT-Grundkenntnissen. Mit zahlreichen Fallbeispielen und konkreten Ratschlägen für Laptop, Tablet und Smartphone rüsten Sie sich gegen unerlaubte Überwachung, Datenklau, Trickbetrug und Hackerangriffe" (Verlagsbeschreibung)
more
"[The publication] documents how Ethiopia’s government uses its control over the telecom system to restrict individuals’ rights. Based on over 100 interviews with victims of government abuses, former government officials, and former staff of telecom companies, the report describes the various me
...
thods used by Ethiopian authorities to monitor individuals and inhibit their activities online. Individuals with perceived or tenuous connections to opposition groups are arbitrarily arrested and interrogated based on their phone calls. Security agencies rarely acquire warrants, despite the legal requirement to obtain them in most circumstances. Government censors routinely block websites of opposition groups and independent media, while bloggers and social media users face harassment and the threat of arrest should they refuse to tone down their writings." (Back cover)
more
"Based on the case study of the cyber war between Russia and Georgia in August 2008, this paper is a theoretical deliberation in an attempt to illustrate connection between the Digital Divide and cyber security. Through a qualitative study of cyber warfare between the two countries, one on the devel
...
oped and one on the underdeveloped side of Digital Divide, it shows that disadvantaged states are subject to cyber insecurity. As a result, even though relatively low dependence of their vital systems on online networks supposedly makes them less vulnerable to cyber offensives, disruptions to communication infrastructures cause these states turn dysfunctional. To test the dependence of cyber security on Digital Divide, this paper also reviews other instances of coordinated cyber-attacks between countries, but in these cases, with both parties digitally advanced (Russia vs. Estonia, China vs. USA). These cases show that differences in states’ capabilities and available resources allowed them to withstand and relatively quickly repel cyber offensives without outside support and great harm. The general conclusion is that country’s position along Digital Divide translates into the level of that country’s cyber security, which serves as a litmus test for the level of its cyber power that, in turn, is indicative of the country’s strategic political standing among other states." (Abstract)
more
"Threats to online security have grown and evolved considerably in 2012. From the threats of cyberespionage and industrial espionage to the widespread, chronic problems of malware and phishing, we have seen constant innovation from malware authors. We have also seen an expansion of traditional threa
...
ts into new forums. In particular, social media and mobile devices have come under increasing attack in 2012, even as spam and phishing attacks via traditional routes have fallen. Online criminals are following users onto these new platforms." (Executive summary)
more
"This paper draws on interviews with digital security trainers and coordinators of digital security trainings of trainers (ToT)s whose end-goal is the support of human rights defenders, civil society, activists, and local media worldwide [...] Among its main findings, this paper notes the following
...
four gaps: a lack of sustained support for digital security trainers after they receive training at ToT events and return to their own training efforts; a lack of standardized frameworks for determining the effectiveness of digital security ToTs, a lack of standardized frameworks for trainers to conduct digital security training events around the world, pedagogical approaches drawing on extensive research and developments in the field of adult education are not significantly utilized in ToTs." (Executive summary)
more