"Gewerkschaften und Datenschützer fürchten um die Pressefreiheit: Immer neue Gesetze erschweren die vertrauliche Kommunikation per Internet und Telefon. Besonders stark betroffen sind Berufsgruppen, die bislang nur in Sonderfällen ausgespäht werden durften: Journalisten, Juristen und Ärzte. Doc
...
h es ist möglich, die Kontrollen zu umgehen - ganz legal und ohne großen technischen Aufwand! Journalisten können auch weiterhin diskret Informanten kontaktieren. Oder Anwälte ihre Mandanten. Oder Ärzte ihre Patienten. Das Buch verrät, welche Techniken es gibt. Schritt für Schritt wird der Umgang mit Programmen gezeigt, die die Kommunikation anonymisieren, von der E-Mail über den Chat bis zur Internet-Telefonie. Der Leser erfährt, wie er Spuren auf Computern oder im World Wide Web verwischt. An praktischen Alltagsbeispielen wird gezeigt, welche Methode wann angewendet werden sollte. Dabei Setzt das Buch keine besonderen Computerkenntnisse voraus: Wer Surfen, Mailen und Office-Programme benutzen kann, bringt genug Wissen mit, um sich anonym im Internet zu bewegen. Das Buch behandelt außerdem zwei Spezialthemen: Wie kann man beim Telefonieren mit dem Handy seine Identität verschleiern? Und: Wie umgeht man die Zensur in Diktaturen? Das Buch eignet sich deshalb auch besonders für Auslandskorrespondenten und für Mitarbeiter von Hilfsorganisationen." (Verlagsbeschreibung)
more
"1. Aus dem nationalen Verfassungsrecht ist ein Recht auf Verschlüsselung ableitbar.
2. Aus dem europäischen Verfassungsrecht ist ein Recht auf Verschlüsselung ableitbar.
3. Ein Recht auf Verschlüsselung ergibt sich zwar nicht als solches aus den nationalen und europäischen verfassungsrechtlich
...
en Gewährleistungen. Es kann aber aus der Zusammenschau verschiedener Grundrechte abgeleitet werden. Relevant sind die Grundrechtspositionen, die die digitale Datenverarbeitung und -übermittlung zum Gegenstand haben [...]
4. Bei einer Ableitung eines Rechts auf Verschlüsselung aus verschiedenen verfassungsrechtlichen Gewährleistungen auf nationaler und europäischer Ebene ergibt sich im chronologischen Kommunikationsablauf ein nahezu lückenloser Grundrechtsschutz [...]
5. Ein Recht auf Verschlüsselung besteht aus einer aktiven sowie aus einer passiven Dimension. Damit ist es nicht nur Abwehrrecht gegenüber staatlichem Handeln umfasst, sondern kann für den Staat auch (weit gefasste) Handlungspflichten auslösen, um der Umsetzung von Datenverschlüsselung als Methode zur Ausübung effektiven Grundrechtsschutzes gerecht zu werden." (Executive summary)
more
"This report examines the widespread use of encrypted messaging apps (EMAs) in developing countries and emerging democracies has prompted news outlets in these regions to experiment with them as mechanisms for distributing the news. From news products designed specifically for sharing via EMAs to pr
...
ivate channels used to circumvent restrictions in repressive media environments, media outlets are testing how best to use these apps to reach audiences even in the face of technical challenges, resource demands, and sometimes, political pressure. The document concludes that a) news outlets are turning to EMAs to reach new audiences and to bypass state censorship in authoritarian contexts; b) many newsrooms are experimenting with monetizing EMA content, however, it is still too early to tell whether EMAs can provide a reliable revenue stream; c) platform dependency is a big issue when it comes to using EMAs for news-policy changes can have a big impact on how news outlets interact with their audiences." (Publisher description)
more
"There is no question that we must address the issues of child safety, disinformation, national security, and criminal activity in the digital age. However, even if the stated end goal for mandating encryption backdoors is legitimate, the means must be necessary and proportionate. Deliberately intro
...
ducing security weaknesses in encrypted systems fails this test. Weakening encryption will create more dangers than it will prevent. Further, there is no evidence base for claiming that breaking encryption will achieve the desired outcomes. At best, exceptional access to encrypted content will only serve as a short-term or partial solution for law enforcement. As we have explained in this brief, encryption is a vital tool for the protection of human rights, democracy, cybersecurity, and the economy. The right to privacy and the right to freedom of expression are basic human rights, and in today’s digital world, we cannot meaningfully separate these rights from the need for secure online communication channels that are free from undue surveillance. Encryption is a crucial building block for a secure technological infrastructure, and governments should promote its use, not repeatedly seek to undermine it." (Conclusion, page 16)
more
"helpdesk.rsf.org is a resource for journalists who want to inform and train themselves about digital security. Media production today can be threatened online in various ways, such as surveillance of communication, blocking of content, or defamation of journalists over social media. Reporters Witho
...
ut Borders supports journalists all over the world in their fight for freedom of expression, both through our work on the ground as well as with this website. We provide guides for digital security concepts, give recommendations about tools and their uses, offer an interactive formula to practice individualized threat modeling, and conduct regular online webinars about digital security. Although we try to be as clear as possible and to update the website constantly, we have to indicate that the use of certain tools is always at the own risk of the individual. If want to reach out to us, please reach out to us via E-Mail." (About the project)
more
"Encryption is a hot topic in the current global discussion on Internet governance. This research delves into the subject, to outline a global overview of the various means of encryption, their availability and their potential applications in the media and communications landscape. The research expl
...
ains how the deployment of encryption is affected by different areas of law and policy, and it offers detailed case studies of encryption in selected jurisdictions. It analyzes in-depth the role of encryption in the media and communications landscape, and the impact on different services, entities and end users. Built on this exploration and analysis, the research provides recommendations on encryption policy that are useful for various stakeholders. These include signaling the need to counter the lack of gender sensitivity in the current debate, and also highlighting ideas for enhancing “encryption literacy." (Back cover)
more
"Este manual está dividido en cuatro partes que pueden leerse en cualquier orden. El lector no requiere conocimientos especiales, aunque tener unas nociones básicas del funcionamiento del ordenador y de Internet le ayudaría. Los capítulos que contienen información de carácter más técnico est
...
án marcados “Para los techies”. La primera sección se dedica a comprender sus necesidades y vulnerabilidades de seguridad, con un enfoque no técnico al entorno digital. Le ofrece un método para identificar las amenazas que plantean situaciones concretas y, de este modo, ayudarlo a decidir las estrategias más adecuadas a la hora de aplicar las soluciones de privacidad y seguridad. En la segunda sección se enumeran diferentes elementos relativos a la seguridad en los ordenadores e Internet. Se presentan al lector las operaciones informáticas y la infraestructura de Internet. Se explican en de forma detallada métodos de asegurar los datos, esquivar la censura cibernética y protegerse contra ataques maliciosos. La tercera sección es un resumen de la legislación mundial para restringir y seguir el flujo de información y las comunicaciones. En ella se muestra la tendencia a la baja causada por el aumento de las restricciones a los derechos a la libertad de expresión, la privacidad y la comunicación en muchos países. Se presentan casos de defensores de los derechos humanos que actualmente se encuentran en prisión o perseguidos por su trabajo a través de Internet, como ejemplos de la forma que tienen algunos gobiernos de hacer cumplir estas leyes. En la cuarta sección se ofrece a los defensores de los derechos humanos y sus organizaciones posibles escenarios para abordar los problemas de inseguridad electrónica y garantizar la continuación de su trabajo. Los escenarios se refieren a los conceptos presentados en el manual y las soluciones se basan en acciones viables." (Página 3)
more
"This manual is divided into four parts which can be read in any order. The reader does not require any special expertise, although some basic knowledge of computer and Internet operations would come handy. The chapters, containing information of a more technical nature, are marked ‘For Techies’
...
. The First Section is about understanding your security needs and vulnerabilities. It describes a non-technical approach to the digital environment. A method of mapping the threats, posed by a particular situation, is off e red to help you decide on the strategies for implementing privacy and security solutions. The Second Section lists various elements of computer and Internet security. It introduces the reader to computer operations and Internet infrastructure. Methods of securing data, bypassing Internet censorship and protecting yourself against malicious attacks are explained in detail. The Third Section is a summary of worldwide legislation to restrict and monitor information flow and communications. It shows the downward trend, caused by the growth of restrictions to the rights to freedom of expression, privacy and communication, in many countries. Cases of human rights defenders currently in prison or persecuted because of their work through the Internet are presented as examples of the ways some governments enforce these pieces of legislation. The Fourth Section drafts possible scenarios for human rights defenders and their organisations of dealing with problems of electronic insecurity and ensuring continuation of their work. The scenarios relate to the concepts presented throughout the book and solutions are based on realisable actions." (Page 3)
more