"This Global Information Society Watch tracks the state of communications surveillance in 57 countries across the world – countries as diverse as Hungary, India, Argentina, The Gambia, Lebanon and the United Kingdom. Each country report approaches the issue from a different perspective. Some analy
...
se legal frameworks that allow surveillance, others the role of businesses in collecting data (including marketing data on children), the potential of biometrics to violate rights, or the privacy challenges when implementing a centralised universal health system. The perspectives from long-time internet activists on surveillance are also recorded. Using the 13 International Principles on the Application of Human Rights to Communications Surveillance as a starting point, eight thematic reports frame the key issues at stake. These include discussions on what we mean by digital surveillance, the implications for a human rights agenda on surveillance, the “Five Eyes” inter-government surveillance network led by the US, cyber security, and the role of intermediaries." (GIS website)
more
"El objetivo de este documento es examinar el marco legal y jurisprudencial colombiano sobre vigilancia de comunicaciones, a la luz de las capacidades tecnológicas de hoy. Dicho a manera de hipótesis, el propósito es mostrar cómo la regulación y la jurisprudencia en materia de inteligencia no s
...
e ocupan de interpretar los esquemas de vigilancia actuales para mantener vigentes los derechos que resultan afectados. Para desarrollar este objetivo, abordamos algunos puntos –escogidos con cierto nivel de arbitrariedad– de la Ley de Inteligencia: interceptación de comunicaciones, monitoreo del espectro electromagnético y acceso a datos de usuarios. Este último tema, que tomado de manera independiente merecería un estudio aparte, se desarrolla como complemento de los dos primeros. El documento está divido de la siguiente forma: el primer capítulo explica, desde el punto de vista técnico, cuáles son las tecnologías para comunicarnos y cuáles existen para vigilarnos. El segundo capítulo desarrolla el marco legal sobre vigilancia de las comunicaciones. El tercero ofrece un panorama general comparado frente a la interceptación de las comunicaciones en particular. Finalmente, el cuarto capítulo analiza lo hasta allí planteado para ofrecer algunas conclusiones." (Introducción, página 10-11)
more
"This report evaluates the risks and vulnerabilities of mobile phone services and apps in 12 specified countries: the Republic of Azerbaijan, the Republic of Belarus, the People’s Republic of China, the Arab Republic of Egypt, the Islamic Republic of Iran, Libya, the Sultanate of Oman, the Kingdom
...
of Saudi Arabia, the Syrian Arab Republic, the Tunisian Republic, the Republic of Uzbekistan, and the Socialist Republic of Vietnam. Rather than focus on a single innovation, this study analyzes multiple mobile technologies – including operating systems, applications and mobile protocols – to determine their capacity to protect security and privacy and to combat censorship and surveillance. Throughout this study the protection of mobile phone users was of paramount importance." (Executive summary)
more
"Internet censorship and surveillance becomes more sophisticated. The first-generation controls like China's "Great Firewall" are being replaced by techniques that include strategically timed distributed denial-of-service (DDoS) attacks, targeted malware, take-down notices and stringent terms-of-usa
...
ge policies. Their aim is to shape and limit the national information environment. This publication reports on these new trends and their implications for the global internet commons. In addition, it offers 32 detailed country profiles on internet surveillance from the Commonwealth of Independent States, the Middle East and North Africa, Asia and Europe." (CAMECO Update 2-2010)
more
"The Handbook of Internet Crime gathers together the leading scholars in the field to explore issues and debates surrounding internet-related crime, deviance, policing, law and regulation in the 21st century. The Handbook reflects the range and depth of cybercrime research and scholarship, combining
...
contributions from many of those who have established and developed cyber research over the past 25 years and who continue to shape it in its current phase, with more recent entrants to the field who are building on this tradition and breaking new ground. Contributions reflect both the global nature of cybercrime problems, and the international span of scholarship addressing its challenges." (Publisher description)
more
"This book takes the mystery out of ICT policy and makes it easier to understand. Key issues are presented and explained clearly and concisely, and a basis is provided for further investigation. Many concrete examples are given of recent events or debates, which the reader can explore further if so
...
inclined. Having read it, you will be able to identify the main actors and issues in the field. If you wish to find out more about ICT policy, you will know where to look for the information, beginning with the extensive bibliography and list of organisations active in the field. In short, this book aims to build the capacity of interested persons to understand the issues around policy on ICT development and regulation, to grasp the policy process, and to become involved in it. It is a beginner’s handbook, which can help readers navigate their way through the varied terrain of ICT policy. It is not a map but a compass." (Introduction, page 5)
more