"Commonly held truths surrounding privacy and data protection may negatively impact the design of effective policy and regulatory solutions. Debunking the privacy paradox in the context of public intersections with data subjects helps to highlight how individualized privacy self-management strategie
...
s are problematic as the sole (or chief) model for data protection. Identity projects, given the high level personal identifiable data required, are an important vulnerability context for considering new solutions on collective rights and protections." (Page 1)
more
"Specifically, the review focuses on the means, barriers, and associated cybersecurity and privacy concerns that refugees face around connectivity. This includes but is not limited to mobile connectivity and social media, particularly in displacement contexts. While these subjects may at times inter
...
sect with parallel conversations on digital identity or biometrics, the latter are not the focus of this chapter. UNHCR provides support and international protection to forcibly displaced persons, including refugees, returnees, stateless people, the internally displaced and asylum-seekers. This report will reference ‘refugees’ and this can be read broadly to encompass refugees and other persons of concern, unless explicity stated otherwise. This literature review is divided into different sub-themes. An annex also provides a brief overview of who are the main actors writing about connectivity in humanitarian contexts, and with what angles and / or interests." (Introduction)
more
"Drawing on Reese’s hierarchy of influences model, this study investigates the extent to which safety risks and digital surveillance result in journalists’ self-censorship in Pakistan. This study also explores the key areas of journalists’ self-censorship in the country and how it affects thei
...
r right to freedom of expression. To achieve these objectives, the study uses the quantitative method of survey and the qualitative method of in-depth interviews. The study uses relative frequency statistics and thematic analysis to analyse the survey and interview data respectively. This study reveals that journalists’ self-censorship is related to diverse safety risks (especially physical, financial, legal, topic-specific and public risks) and to digital surveillance by the government, military and its intelligence agencies. This study also highlights that most of the Pakistani journalists are not trained for digitally safe and encrypted communication, which indicates a pressing need for journalists’ education in order to avoid any foreseeable digital and other types of risks." (Abstract)
more
"Violence against Mexican journalists has received significant attention from scholars at home and abroad during the last decade. However, though a diversity of issues have been consistently studied, there is one topic that is still largely neglected: the implications of technology for news workers
...
security and their journalistic practice. Drawing on a set of semi-structured interviews with 93 journalists working in 23 of the most dangerous Mexican subnational entities, the aim of this article is to fill that gap. Empirical evidence from all over the country points to a nearly unanimous perception of digital technologies as being a “double-edged knife.” This is because electronic devices and social media may be used as a tool for developing better reporting practices, but also as a weapon against journalists, through – for instance – online harassment or espionage." (Abstract)
more
"This chapter examines the perceptions of Nigerian journalists towards the Nigerian Press Council Bill 2018 and the governments’ online surveillance. The study employs survey and interview methods: 217 Nigerian media practitioners selected from print and online media responded to the questionnaire
...
while ten key informants were interviewed. The findings revealed that a majority of the respondents are concerned about the government’s effort in suppressing freedom of expression. They believe that personal interest rather than national interest constitutes the basis for the government’s online surveillance and the proposed new Press Council Bill, which a majority believe will gag the press and restrict freedom of expression in Nigeria. A majority of the respondents also consider the government’s online surveillance an impediment to their professional duties and a violation of their privacy. Hence, they believe that it is not unlikely that their digital presence has been tracked and monitored by government security agencies. As a result, respondents have resorted to avoiding certain topics considered critical of government while also avoiding activities on social media that may be considered controversial or suspicious. Hence, respondents believe protecting the anonymity of their sources and disguising their digital footprints are the needed safety precautions." (Abstract)
more
"Open-source intelligence gathering and analysis (OSINT) techniques are no longer predominantly the remit of private investigators and journalists. An estimated 80-90% of data analysed by intelligence agencies is also now derived from publicly available material. Additionally, the massive expansion
...
of the internet and, in particular, social media platforms, have made OSINT increasingly accessible to civilians who simply want to trawl the Web for information on a specific individual, organisation or product. In May 2018, the European Union’s General Data Protection Regulation (GDPR) was implemented in the UK through the new Data Protection Act, intended to secure personal data against unjustified collection, storage and exploitation. This document presents a preliminary literature review of work related to the GDPR and OSINT, which was collated as the basis for an as-yet-unpublished study evaluating the effects of the GDPR on OSINT capabilities in the UK. The literature reviewed is separated into the following six sections:‘What is OSINT?’,‘What are the risks and benefits of OSINT?’,‘What is the rationale for data protection legislation?’,‘What are the current legislative frameworks in the UK and Europe?’,‘What is the potential impact of the GDPR on OSINT?’, and ‘Have the views of civilian and commercial stakeholders been sought and why is this important?’. As OSINT tools and techniques are accessible to anyone, they have the unique capacity for being used to hold power to account. It is therefore important that new data protection legislation does not impede civilian OSINT capabilities." (Abstract)
more
"Open-source intelligence (OSINT) gathering and analysis techniques are used by investigators from a variety of fields, owing to their accessibility and exceptional capacity for corroboration. It has previously been argued that proposed data protection legislation can chill the free press, but there
...
have been no studies assessing the effect of such reforms on more general OSINT capabilities. European Union’s General Data Protection Regulation (GDPR) was implemented in the UK through the 2018 Data Protection Act (DPA) to protect personal data against exploitation. This study surveyed 16 OSINT gathering and analysis practitioners across public and private sectors to determine firstly, what, if any impact the implementation of the GDPR/DPA have had on their ability to successfully operate as OSINT analysts and secondly, if they have noticed any subsequent changes in UK public perception around issues of the surveillance state and digital privacy. I argue that this initial survey shows that the GDPR is merely a first step in establishing societal expectations and regulations around digital privacy. While some changes to OSINT practice have been reported, to date few substantive changes to OSINT methods or analysis resulted or seemed poised to take effect, one year after the advent of the GDPR/DPA." (Abstract)
more
"Journalists have long been the targets of both physical and cyber-attacks from well-resourced adversaries. Internet of Things (IoT) devices are arguably a new avenue of threat towards journalists through both targeted and generalised cyber-physical exploitation. This study comprises three parts: Fi
...
rst, we interviewed 11 journalists and surveyed 5 further journalists, to determine the extent to which journalists perceive threats through the IoT, particularly via consumer IoT devices. Second, we surveyed 34 cyber security experts to establish if and how lay-people can combat IoT threats. Third, we compared these findings to assess journalists' knowledge of threats, and whether their protective mechanisms would be effective against experts' depictions and predictions of IoT threats. Our results indicate that journalists generally are unaware of IoT-related risks and are not adequately protecting themselves; this considers cases where they possess IoT devices, or where they enter IoT-enabled environments (e.g., at work or home). Expert recommendations spanned both immediate and long-term mitigation methods, including practical actions that are technical and socio-political in nature. However, all proposed individual mitigation methods are likely to be short-term solutions, with 26 of 34 (76.5%) of cyber security experts responding that within the next five years it will not be possible for the public to opt-out of interaction with the IoT." (Abstract)
more
"In the middle of a global pandemic, as a wave of anti-racism activism sweeps the nation, conditions are rife for a spike in online hate and harassment. Tens of thousands have taken to the streets to protest police brutality while millions more socially distance at home, anxious and isolated, with e
...
yes glued to phones and computer screens. In this climate of extreme uncertainty and unease, the tensions playing out IRL are sure to reverberate and escalate in the digital realm. We’ve already seen a rise in online attacks against scientists, public health experts, Asians, and Asian Americans, and we will no doubt see increased abuse targeting activists, journalists of color, and anyone commenting or reporting on the protests." (Abstract)
more
"How does data visibility affect vulnerable communities that face uncertainty over occupational rights? Or in other words, can data justice be realized in settings of acute resource injustice? These are the overarching questions that our case study interrogates by opening up the black box of the com
...
munity in the volatile and fast-transforming context of occupation rights on the peri-urban frontier. We examine the unfolding of data and information processes through the lens of enumeration and community mapping exercises conducted in a low-income neighbourhood or basti located in the fast-transforming peri-urban fringe of Hyderabad, India. We argue that the realization of data justice is mediated by ‘information politics’, i.e., the ways in which informational resources, as well as the risks and rewards associated with them, are distributed across individual actors and identity groups within the community. In so doing, our case study underlines the importance of a structural understanding of data justice and also suggests directions for embedding justice in data processes." (Abstract)
more
"This report aims to increase the prioritization of child online safety among all the key stakeholders and decision-makers from governments, the private sector, civil society, NGOs, and academia. Its recommendations are actionable and represent a call to collective action. They are based on the know
...
ledge and expertise of major expert groups that have a long-standing commitment and experience in fighting various forms of violence against children online." (Forward, page 7)
more
"helpdesk.rsf.org is a resource for journalists who want to inform and train themselves about digital security. Media production today can be threatened online in various ways, such as surveillance of communication, blocking of content, or defamation of journalists over social media. Reporters Witho
...
ut Borders supports journalists all over the world in their fight for freedom of expression, both through our work on the ground as well as with this website. We provide guides for digital security concepts, give recommendations about tools and their uses, offer an interactive formula to practice individualized threat modeling, and conduct regular online webinars about digital security. Although we try to be as clear as possible and to update the website constantly, we have to indicate that the use of certain tools is always at the own risk of the individual. If want to reach out to us, please reach out to us via E-Mail." (About the project)
more