"This publication identifies at least 12 digital threats, including illegal or arbitrary digital surveillance, location tracking, and software and hardware exploits without the knowledge of the target. Further examples that are considered are: phishing, fake domain attacks, Man-in-the-Middle (MitM)
...
attacks, and Denial of Service (DoS) [...] In examining cases worldwide, this publication serves as a resource for a range of actors. In a nutshell, it surveys the evolving threats, and assesses preventive, protective and pre-emptive measures. It shows that digital security for journalism encompasses, but also goes beyond, the technical dimension. This publication also gives an overview of actors and initiatives working to address digital safety, as well as identifying gaps in knowledge that call for awareness-raising." (UNESCO website)
more
"The aim of this report is not to question the value of supporting Internet freedom in closed societies such as Iran. Rather, the intent is to provide a picture of how difficult it is to achieve progress in such countries. In times of tightening budgets for media development work, it is worth consid
...
ering where best to place one’s bets. While trying to improve access to the Internet for Iranians is a worthy goal in terms of foreign policy and human rights, it is less clear whether such efforts have had much immediate impact in improving Iran’s media landscape, or in convincing the senior leadership that Internet freedom is indeed a worthy pursuit. Looking forward, more work needs to be done to understand what kind of aid policies and approaches are most effective in societies such as Iran. Many donors would like to support the groups that are struggling to maintain open Internet access, and the immediate goal of helping Internet activists preserve some modicum of Internet freedom is clearly a worthy endeavor. The longer term goal will likely require not only preserving as many freedoms as possible now, but also a broader, more integrated program of support to the media sector that includes a combination of technical assistance and engagement with both civil society and the intelligentsia. Until such a wide engagement is possible, the outlook for freedom in Iran will likely remain gloomy." (Conclusion)
more
"While Internet access to certain sites is blocked in some parts of the world, these restrictions are often circumvented using proxies outside the censored region. Often these proxies are blocked as soon as they are discovered. In this paper we propose a browser-based proxy creation system that gene
...
rates a large number of short-lived proxies. Clients using the system seamlessly hop from one proxy to the next as these browserbased proxies appear and disappear. We discuss a number of technical challenges that had to be overcome for this system to work and report on its performance and security. We show that browser-based short-lived proxies provide adequate bandwidth for video delivery and argue that blocking them can be challenging." (Abstract)
more
"Internet censorship poses a large and growing challenge to online freedom of expression around the world. Censorship circumvention tools are critical to bypass restrictions on the internet and thereby to protect free expression online. Circumvention tools are primarily designed to bypass internet f
...
iltering. Therefore, the core principle behind these technologies is to find alternative paths for data packets. These alternative paths use one or more collaborative servers in order to bypass the network of blocking mechanisms. This document provides a comparison among different circumvention tools, both in terms of their technical merits, as well as how users of these tools describe their experience with them. The countries included in this report are Azerbaijan, Burma, China and Iran." (Executive summary, page 9)
more
"Eine Serie von Fallstudien – unter anderem zur Funktion von Blogs und Microblogs als „bottom- up journalism“ und zu Aktivitätsfeldern des chinesischen „hacktivism“ – verdeutlicht, welches Potenzial politischer Mobilisierung auch im chinesischen Kontext in der internetbasierten Kommunik
...
ation liegt. Becker dokumentiert eine beachtliche Kreativität und Optionsvielfalt in der Umgehung staatlicher Zensurmaßnahmen. Die kommunikativen und technischen Aspekte des verbreiteten Ausweichverhaltens werden vom Autor systematisch aufgeschlüsselt. Die immer aufwändigeren Gegenmaßnahmen, die staatliche Sicherheitsorgane gegen politisch unliebsame Formen des Internet-Aktivismus ergreifen, bleiben in ihrer Effektivität begrenzt. Technische Ausweichmöglichkeiten und fortschreitende gesellschaftliche Liberalisierung werden eine staatliche Kontrolle des Internet auf Dauer unmöglich machen. Der politische Liberalisierungsdruck wird sich durch massenhafte Internetnutzung weiter verstärken – auch wenn dies nur mit Verzögerung zu Veränderungen im „analogen“ politischen System und keinesfalls zwangsläufig zu einer Demokratisierung nach westlichen Vorstellungen führen wird." (Sebastian Heilmann: Geleitwort, Seite 19)
more
"Blogs are more or less controllable for those who want to keep them under surveillance. Governments that are most up to do date with new technology use the most sophisticated filtering or blocking techniques, preventing them from appearing on the Web at all. But bloggers don't just sit back and let
...
it happen. The essential question becomes how to blog in complete safety. With a normal IP address, a blogger can be tracked down and arrested. Anonymity allows them to keep their freedom.
In countries where censorship holds sway, blogs are sometimes the only source of news. During the events in Burma in the autumn of 2007, pitting monks and the people against the military junta, bloggers were the main source of news for foreign journalists. Their video footage made it possible to gauge the scale of the protests and what demonstrators' demands were. For more than two months, marches were held in the streets, then a massive crackdown was launched against opponents that only the Burmese were able to show, so hard did it become for the few foreign journalists who managed to enter the country to get back out with their footage. And bloggers could not get the footage out without getting round online censorship imposed by the government. This handbook seeks to help every blogger to fill in the "black holes" In news. The second part is devoted to techniques which can thwart filtering technology." (Page 4-5)
more
"This guide is meant to introduce non-technical users to Internet censorship circumvention technologies, and help them choose which of them best suits their circumstances and needs." (Page 5)