"Venezuela leads Latin America with the largest number of imprisoned journalists and extreme government-led media censorship. Our in-depth interviews with 25 Venezuelan journalists reveal that assisting journalists to combat government control are social media and technology platforms like WhatsApp,
...
Facebook and Twitter, which, in Venezuela, have moved beyond their ability to share and mobilise, and have become tactical media, the media of crisis criticism and opposition." (Abstract)
more
"[...] in 2011, a group of more than 100 Havana residents decided to unify their hyperlocal networks into a larger structure. The Havana “street network” (or SNET) would soon become one of the largest such community networks in the world. At its peak, user estimates hovered around 100,000 IP add
...
resses. Isolated from the internet and beyond the government’s control, young Cubans set their own terms on forums, social media platforms, and local websites. During the network’s decade-long golden era, it offered a rare example of citizen and community exchange in a country where the state carefully controls communication, until the state finally took it over. To many users, SNET’s amateur, volunteer intranet provided a better service than the network the Cuban government ultimately replaced it with [...]" (https://restofworld.org)
more
"Drawing on cases from across the continent, contributors explore the form and nature of social media and government censorship, often via antisocial media laws, or less overt tactics such as state cybersurveillance, spyware attacks on social media activists, or the artful deployment of the rhetoric
...
of "fake news" as a smokescreen to muzzle critical voices. The book also reflects on the Chinese influence in African governments’ clampdown on social media and the role of Israeli NSO Group Technologies, as well as the tactics and technologies which activists and users are deploying to resist or circumvent social media censorship." (Publisher description)
more
"With contributions from scholars across the continent, Digital Citizenship in Africa illustrates how citizens have been using VPNs, encryption, and privacy-protecting browsers to resist limits on their rights to privacy and political speech. This book dramatically expands our understanding of the v
...
ast and growing arsenal of tech tools, tactics, and techniques now being deployed by repressive governments to limit the ability of citizens to safely and openly express opposition to government and corporate actions. AI-enabled surveillance, covertly deployed disinformation, and internet shutdowns are documented in ten countries, concluding with recommendations on how to curb government and corporate power, and how to re-invigorate digital citizenship across Africa." (Publisher description)
more
"The most promising strategies to help citizens circumvent internet shutdowns do not involve deploying satellite internet devices or floating balloons. Instead, simpler solutions, such as encouraging citizens to download anticensorship apps or software ahead of time, are much more useful. But they d
...
o not work well without advance organizational and logistical preparation. This requires engaging local civil society organizations and holding awareness campaigns to encourage mass adoption before a shutdown initiates. Such efforts are also more likely to succeed if technologies are free, easy to use, and redundant, so that citizens can communicate and access information regardless of context or network restrictions in place. Tech companies also have a role to play in ensuring that citizens can access circumvention solutions that are privacy-preserving and secure. Effective strategies will also incorporate nontechnical adaptations, such as tapping into a diaspora network to import unlocked SIM cards, connecting with sympathetic telecoms officials to circumvent connectivity restrictions, or even using human messengers to smuggle out footage. Finally, enhanced transparency and documentation about shutdowns can also be useful. Telecoms and internet platforms, for example, can institutionalize disclosure and reporting on shutdowns, placing a greater burden on states to justify specific network disruptions." (Conclusion, page 29)
more
"In this paper, we outline each of the various technical mechanisms for implementing a shutdown, and the options for mitigating each type. Our hope is that technologists and civil society groups working to end shutdowns will find this a useful technical resource to understand, prepare for, circumven
...
t, and help document deliberate network disruptions." (Introduction)
more
"Surveillance of journalists has become a very topical and controversial issue that now requires attention at a number of levels – the level of the state, CSOs, and journalism organisations themselves. The systematic and arbitrary harvesting of journalists’ information, tracking and targeting of
...
journalists is on the increase especially in the SADC region where some regimes seek to retain control of the media and stifle divergent views and suffocate opponents. In countries such as Zambia, Zimbabwe, Namibia and Malawi, there is deep-rooted fear that enacted cyber laws are already being used for surveillance purposes. For instance, South Africa uses the RICA Act to regulate the interception of communication and Zimbabwe has the Interception of Communications Act while Zambia deploys the Electronic Communications and Transactions Act of 2009. Thus, anecdotal evidence in Southern Africa shows that governments in the region are increasingly resorting to digital tools for surveillance and this is a serious cause for concern. At least three Southern African countries; Botswana, Zambia, and Zimbabwe have acquired sophisticated tools developed by an Israeli company, Circles, which they use to monitor the behavior of their citizens online. This calls for journalists, their organisations and other media- support institutions to act in ways that protect journalists from surveillance, be it by state or non-state agency. There is need, therefore, to come up with a toolkit of strategies that journalists in Southern Africa can make use of in quotidian news gathering and reporting practices." (Introduction)
more
"This report examines the widespread use of encrypted messaging apps (EMAs) in developing countries and emerging democracies has prompted news outlets in these regions to experiment with them as mechanisms for distributing the news. From news products designed specifically for sharing via EMAs to pr
...
ivate channels used to circumvent restrictions in repressive media environments, media outlets are testing how best to use these apps to reach audiences even in the face of technical challenges, resource demands, and sometimes, political pressure. The document concludes that a) news outlets are turning to EMAs to reach new audiences and to bypass state censorship in authoritarian contexts; b) many newsrooms are experimenting with monetizing EMA content, however, it is still too early to tell whether EMAs can provide a reliable revenue stream; c) platform dependency is a big issue when it comes to using EMAs for news-policy changes can have a big impact on how news outlets interact with their audiences." (Publisher description)
more
"China's 'Great Firewall' has evolved into the most sophisticated system of online censorship in the world. As the Chinese internet grows and online businesses thrive, speech is controlled, dissent quashed, and attempts to organise outside the official Communist Party are quickly stamped out. Update
...
d throughout and available in paperback for the first time, The Great Firewall of China draws on James Griffiths' unprecedented access to the Great Firewall and the politicians, tech leaders, dissidents and hackers whose lives revolve around it. New chapters cover the suppression of information about the first outbreak of COVID-19 in Wuhan, disinformation campaigns in response to the exposure of the persecution of Uyghur communities in Xinjiang and the crackdown against the Umbrella movement in Hong Kong." (Publisher description)
more
"The OPTIMA workflow is a compilation of new and existing resources, guides, methodologies, and more to assist individuals and activists before, during and after an Internet shutdown. The following repository is organized into four categories:
ADVOCACY RESOURCES. Designing effective advocacy campaig
...
ns around Internet shutdowns can be challenging. This section provides guidance and examples to support you in building impactful messaging and getting the word out even during a crisis.
CIRCUMVENTION RESOURCES. Understanding how to continue your work and maintain communications can be a daunting task. This section outlines some of the tools that you can use, and guides to help you determine which is best for your specific needs.
LITIGATION RESOURCES. Sometimes the most effective way to challenge or prevent a shutdown is to do so through the courts. This section includes resources, strategies, and legal landscape reviews to help you build and argue strong litigation.
NETWORK MEASUREMENT RESOURCES. A key element to fighting against shutdowns is understanding when and how they happen in your country. Network Measurement is a critical tool to reinforce advocacy with data." (Publisher description)
more
"Since the 1 February coup d’état in Myanmar, the online space has become a parallel battlefield on which the country’s military and its opponents try to rally supporters, share information and control the narrative around events unfolding in the country. This virtual struggle has been vitally
...
important to both sides. The scale of popular anger at the military, the regime’s lack of technological capacity and the policies of social media companies have made it difficult for the military, known as the Tatmadaw, to gain the upper hand. At first, the junta resorted to temporary internet cuts and filtering websites, but when these had little impact, it moved to broader shutdowns, leaving the vast majority of people in Myanmar disconnected. It appears to have no viable long-term strategy for controlling online space, and prolonged internet outages are likely while it struggles to consolidate power. Foreign governments and technology companies should endeavour to keep what is left of Myanmar’s internet as open and its users as safe as possible, while restricting sales of equipment and software that the military could use to oppress opponents." (Executive summary)
more
"Between 2016 and 2021, 68 shutdowns have been documented in 29 African countries. This demonstrates that government-mandated internet disruptions are an established norm in the region, despite very little scientific or social evidence demonstrating their effectiveness. A number of pointers and fact
...
ors signal the likelihood of an internet shutdown occurring. These include jurisdictions with authoritarian regimes, the duration of a president’s term in office, facilitating laws and policies, protests, national exams, and the election season. In practice, shutdowns are typically ordered by the executive arm of government and implemented by private actors, namely telecom operators and internet service providers (ISPs). Six primary methods are used to implement full and partial shutdowns, including throttling, IP blocking, mobile data shutoffs, domain name system (DNS) interference, server name identification blocking, and deep packet inspection (DPI)." (Executive summary)
more
"Spyware is increasingly used by governments around the world to silence independent media. The use of spyware poses safety risks to journalists and their sources, encourages self-censorship, and creates new financial and operational strains for news outlets. Media advocates, news outlets, and polic
...
ymakers must articulate the irreparable harm spyware poses to independent media in order to develop a robust response." (Key findings)
more
"This report examines how use of newer and emergent technologies affects nonviolent action campaigns. It identifies two significant related challenges and presents evidence of these dynamics at work in two digital autocracies, China and Russia." (About the report)
"En redes públicas, de trabajo o proveedores en algunos países bloquean determinados sitios web con propósitos asociados a la censura de ideas o información. Los bloqueos procuran restringir el acceso. Los sitios web siguen activos y mantienen la información que pretenden censurar." (Introducci
...
ón)
more
"Circumvention tools designed to bypass online censorship such as simple web proxies, virtual private network service, and so on are frequently used in countries whose governments impose heavy Internet censorship. Around 18 million Internet users in China are currently using those tools to bypass th
...
e Great Firewall and access unblocked online content. In a pioneering empirical investigation of unblocked information seeking in China's censored online environment, the present study systematically examines a wide range of macro-social and micro-individual factors which affect the use of circumvention tools to bypass Internet censorship under the guidance of the interactive communication technology adoption model. The results reveal that, with the exception of social trust, macro-social factors have only a modest influence on the use of circumvention tools. In contrast, micro-individual-level variables-including perceived technology fluidity, gratifications, and selected demographic variables-play a much larger role in our multivariate model. Theoretical and practical implications are discussed." (Abstract)
more
"This survey was designed to measure how journalists around the world take advantage of technology to enhance their security. The results suggest that there is a general lack of awareness about the power that digital tools have to improve a journalist’s protection. There are scores of organization
...
s of journalists, technologists, and activists developing tools for physical or digital protection or training reporters and editors on how to use them. But there can never be enough education about the risks that journalists face and the security measures they can take, especially when it seems that the press is under attack more frequently and in more aggressive ways than before." (Page 12)
more