"The present paper sheds light on the current trends of cyber capacity building and its implications in Africa and beyond as well as on its actor landscape. It argues that Germany and Europe should strategically engage more with African countries in terms of cyber capacity building to avoid that the
...
se countries slide into the camp of 'digital authoritarianism' and help them to embrace the benefits of digitalized economy flanked by proper cyber security." (Executive summary, page 4)
more
"This paper discusses whether data trusts are feasible structures in an African context, concluding that there are significant limitations to a straight import of trust models developed elsewhere. It goes on to outline specific considerations that should be prioritised in the development of bottom u
...
p and collective models of data governance on the continent, whether adopting a formal trust structure or not. This is done through a brief overview of data trusts and looking at data rights in Africa with particular focus on South Africa's data protection law. The paper then delves into the contentions of a Global South and Global North approach by highlighting the limitations of data trusts in an African context. It argues that the development of data trusts could still offer critical benefits especially when informed by African values and historical contexts. Making use of international instruments (Banjul Charter), principles (CARE) and values (Ubuntu), the paper emphasises the importance of collective decision-making relating to data and concludes with recommendations on collective and participatory governance, women's empowerment and capacity-building, to highlight how the alignment of data trusts to African contexts could help balance historical power differentials in the digital age." (Page 2)
more
"This Open Access book examines the ambivalences of data power. Firstly, the ambivalences between global infrastructures and local invisibilities challenge the grand narrative of the ephemeral nature of a global data infrastructure. They make visible local working and living conditions, and the reso
...
urces and arrangements required to operate and run them. Secondly, the book examines ambivalences between the state and data justice. It considers data justice in relation to state surveillance and data capitalism, and reflects on the ambivalences between an “entrepreneurial state” and a “welfare state”. Thirdly, the authors discuss ambivalences of everyday practices and collective action, in which civil society groups, communities, and movements try to position the interests of people against the “big players” in the tech industry." (Publisher description)
more
"This report provides an in-depth overview of the current state and trends of data protection regulation of seven North African countries – namely Algeria, Egypt, Mauritania, Morocco, Libya, Sudan, and Tunisia. The st udy tackles regulatory approaches, key principles, and selected instruments. Fro
...
m the outset, the analysis was limited to a textual analysis of the respective data protection laws, including constitutional law (i.e., the “law in the books”). In detail, the study engages with the development and status of regional and sub-regional data protection frameworks in Africa. Political as well as international influences on the development (or the lack of) of data protection laws in North Africa were considered. In addition, for countries with a comprehensive data protection laws (i.e. Algeria, Egypt, Mauritania, Morocco, and Tunisia), the comparative assessment also looked into the scope of alignment and of divergence with the EU General Data Protection Regulation (GDPR)." (Back cover)
more
"El presente ensayo que usted tiene entre sus manos trata sobre las consideraciones y desafíos entorno a la agenda de la privacidad y protección de datos personales en las redes sociales digitales. El autor hace mención reiteradamente sobre las implicaciones que tiene en el ámbito legal; pero si
...
empre poniendo en el centro la discusión sobre los usuarios de las redes sociales, lo que implica hacer efectivas las medidas necesarias para proteger la privacidad, así como el uso apropiado y proporcional de sus datos personales, los cuales, no pueden quedarse en el vacio, apelando a su vez por el uso racional y proporcional de los datos en los medios digitales." (Presentación, página 9)
more
"The report is the output of a RSE-funded project on how journalists in Scotland undertake their work in the digital age from the point of view of cyber security and surveillance impacts. This research interviewed ten journalists from Scotland, from various beats, locations, and employment backgroun
...
ds (including freelance, editorial, broadcast, etc.) during July and August 2022. Interviewees were asked about their perceptions of cyber security threats, surveillance, and their knowledge of cyber security. They were also asked about other related issues that affected their work, including defamation, harassment, and data protection." (Abstract)
more
"What we lacked was a set of simple instructions that could help navigate the workflows and procedures of a digital security helpline, while focusing on the specific demand of offering a service to groups that are often underfunded, understaffed, non-hierarchical and exposed to disproportionate thre
...
ats and the consequent risk of post-traumatic stress disorder among their staff or volunteers. In publishing this guide we aim to fill this gap, enabling smaller organisations and grassroots groups to set up a team to respond to the digital safety needs of the people they work and fight with. It can be read by techies who want to organise and join forces to help their movement, but also by managers and organisers, who can follow the steps outlined in the initial chapters to start planning the creation of a digital security help desk for civil society and then look for people with a technical background to staff their help desk during the implementation phase." (Introduction, page 10)
more
"The intention of this Brief is to support sports organizations – clubs and associations at both the grassroots and professional levels – to better protect children online. It aims to help:
– Develop a dedicated child online protection strategy and policy, which can be integrated into existin
...
g child protection frameworks or guidelines and into child-friendly statements.
– Develop specific procedures and codes of conduct to promote safe online practices for children, young people and staff (e.g. for the use of videoconferencing platforms, social networks and Wi-Fi services).
– Define a protection focal point to receive reports and complaints from victims of online violence and establish mechanisms to respond effectively, linking victims to the appropriate support and referral services.
– Provide capacity building for children, coaches, parents, educators and staff, and support efforts towards the development of their digital skills." (Page 2)
more
"This guide looks at how our mobile devices could leak data about our locations and what we could do to protect ourselves against it. It’s designed for most Central European journalists’ threat models and only looks at how our mobile devices could give up precise location data on us. It doesn’
...
t look at some of the other ways your location can be tracked, such as through payments, CCTV cameras, or images you post online, and doesn’t cover coarse location data (for example, how your IP address might reveal which country or city you’re in)." (Page 1)
more
"The consumer Internet of Things (IoT) is a fast-growing area of technology, increasingly embedded in the public and private spheres, including both in and on bodies. There are various security concerns and academic investigations into potential risks of this expansion, but none yet specifically add
...
ressing the implications to journalists and the democratic pillar of press freedom. Not only are risks to this community not yet assessed, but IoT threats generally are not communicated without technical jargon, making them inaccessible to non-experts. Given the importance of a free press, mapping IoT devices and, crucially, communicating associated risk in ways understandable and actionable to journalists themselves, is key.
Journalists and the press are particularly at-risk from IoT devices that may feature in the environments with which they must regularly interact because of the fundamental imperative of source confidentiality. Previous research demonstrated that members of the press are largely unaware of the ways in which the IoT can threaten their work and wellbeing. The networked capabilities of IoT devices increases the ease with which well-resourced threat actors can target journalists who routinely handle confidential information and are already at risk around the world from a variety of non-IoT threats. This paper therefore presents a novel categorisation of both ambient and wearable consumer IoT devices according to the environments in which journalists are most likely to interact with them. It draws on related academic work classifying devices for technical audiences to create a system that is accessible to journalists and their sources. Its goal is to make members of the media aware of the prevalence of these technologies and which of the devices’ capabilities may increase their individual risk. Useful risk assessments cannot be undertaken without an accurate understanding of where threats may be encountered. By systematically outlining risks in numerous environments, this taxonomy can be easily incorporated into existing security training materials and risk assessments for journalists. This paper presents a novel taxonomy to codify and organise IoT present in different environments, with examples of how journalists and their work could be impacted, both passively (i.e. via surveillance) or actively (i.e. via information theft). It also discusses how different environments that may contain IoT devices are often under the control of actors whom journalists cannot easily influence, nor protect themselves against. Especially as these devices continue to proliferate, journalistic risk from IoT devices in surrounding environments are growing. It is therefore important to address the contemporary and emerging risks to journalism that are associated with connected devices. This paper enables journalists and readers to not only visualise and conceptualise how IoT devices in different environments may create risks, its user-focused language and organisation also empower journalists to begin to use this taxonomy for awareness, mitigation, and protective purposes." (Abstract)
more
"The OECD Policy Framework on Digital Security helps policy makers understand the economic and social dimension of cybersecurity, raises their awareness about the OECD approach to digital security policy, and encourages them to make use of OECD digital security recommendations to develop better poli
...
cies. The Framework provides a helpful narrative based upon OECD digital security recommendations and identifies linkages with other policy areas addressed through existing OECD standards and tools." (Foreword, page 3)
more
"The Citizen Lab and Access Now have conducted a joint investigation into Pegasus hacking in El Salvador in collaboration with Frontline Defenders, SocialTIC, and Fundación Acceso. We confirmed 35 cases of journalists and members of civil society whose phones were successfully infected with NSO’s
...
Pegasus spyware between July 2020 and November 2021. We shared a sample of forensic data with Amnesty International’s Security Lab which independently confirms the findings. Targets included journalists at El Faro, GatoEncerrado, La Prensa Gráfica, Revista Digital Disruptiva, Diario El Mundo, El Diario de Hoy, and two independent journalists. Civil society targets included Fundación DTJ, Cristosal, and another NGO. The hacking took place while the organizations were reporting on sensitive issues involving the administration of President Bukele, such as a scandal involving the government’s negotiation of a “pact” with the MS-13 gang for a reduction in violence and electoral support. While evidence linking a particular infection to a particular Pegasus customer is often unavailable, in this case we identified a Pegasus customer operating almost exclusively in El Salvador since at least November 2019 that we call TOROGOZ, and have connected this operator to an infection attempt against El Faro." (Key findings)
more
"In dieser Open-Access-Publikation stellen Katharina Kärgel und Frederic Vobbe anhand sieben typischer Fallbeispiele Handlungsempfehlungen für einen adäquaten Umgang mit mediatisierter sexualisierter Gewalt dar. Die Empfehlungen sind das Ergebnis des vom Bundesministerium für Bildung und Forschu
...
ng geförderten Projekts „HUMAN“. Sie wurden empirisch unter Beteiligung von Betroffenen sowie Expert*innen der Bereiche Recht, Psychologie, Pädagogik und Soziale Arbeit entwickelt. Sie umfassen jeweils Fallreflexionen sowie konkrete Handlungsansätze. Digitale Medien sind Instrument und Kontext sexualisierter Gewalt gegen Kinder und Jugendliche. Sie müssen bei Übergriffen durch zuvor fremde wie nahestehende Personen stets mitbedacht werden. Ihr Einsatz verstetigt die Belastungen Betroffener und führt zu einer hohen Komplexität von Interventionen." (Verlagsbeschreibung)
more