"Journalists have long been the targets of both physical and cyber-attacks from well-resourced adversaries. Internet of Things (IoT) devices are arguably a new avenue of threat towards journalists through both targeted and generalised cyber-physical exploitation. This study comprises three parts: Fi
...
rst, we interviewed 11 journalists and surveyed 5 further journalists, to determine the extent to which journalists perceive threats through the IoT, particularly via consumer IoT devices. Second, we surveyed 34 cyber security experts to establish if and how lay-people can combat IoT threats. Third, we compared these findings to assess journalists' knowledge of threats, and whether their protective mechanisms would be effective against experts' depictions and predictions of IoT threats. Our results indicate that journalists generally are unaware of IoT-related risks and are not adequately protecting themselves; this considers cases where they possess IoT devices, or where they enter IoT-enabled environments (e.g., at work or home). Expert recommendations spanned both immediate and long-term mitigation methods, including practical actions that are technical and socio-political in nature. However, all proposed individual mitigation methods are likely to be short-term solutions, with 26 of 34 (76.5%) of cyber security experts responding that within the next five years it will not be possible for the public to opt-out of interaction with the IoT." (Abstract)
more
"Como se podrá observar en cada una de las páginas del texto, en realidad las tecnologías están diseñadas para incrementar los mecanismos de penetración del capitalismo y otras formas de dominación en cada una de las esferas de nuestras vidas. En este sentido, es menester observar las relacio
...
nes sociales bajo las cuales se construyen y desarrollan, sus fines y su capacidad de asombrarnos ante las posibilidades que nos ofrecen. Sólo un análisis crítico de estas contradicciones nos puede permitir transformarlas para convertirlas en herramientas que, no sólo rompan estas formas de dominación y fetichización, sino que coadyuven a la realización de los objetivos, sueños y deseos que las propias personas, colectivos, organizaciones o comunidades han decidido autónomamente llevar a cabo. La comunicación y sus tecnologías, como es señalado por las propias experiencias de comunicación y es bien acogido en las líneas de este texto, no se ven como fines en sí mismas. A diferencia de lo que ocurre en los medios de comunicación masiva o en las grandes empresas de telecomunicaciones en donde se piensa en productos o contenidos para vender o hacer propaganda. En las experiencias de comunicación como las que se recogen en el libro, la comunicación es vista a partir del proceso social en el que se construye de manera colectiva un determinado mensaje. En este proceso es en donde reside la importancia de estas experiencias; no se trata del mensaje o el producto final en sí mismo, sino en la capacidad y el diálogo que se genera en todo el proceso. Las tecnologías son sólo herramientas que se necesitan analizar críticamente y transformar para que se logren los objetivos que las mismas comunidades, organizaciones o colectivos se propongan." (Prólogo, página 9-10)
more
"In 2021, the international community has the chance to radically reform global digital governance. The aim should be to guarantee a global, open, free, stable and secure Internet while promoting responsible State behaviour in cyberspace. Mapping the two strands of this policy – improving models f
...
or cooperation on the collective development of Internet governance, and implementing the cyber norms already adopted – is a matter for the United Nations (UN). A reformed architecture for digital cooperation has the potential to make Internet governance more inclusive and effective, while new mechanisms can help to advance the currently divided debate on cyber norms and enhance the predictability of State behaviour in cyberspace." (Page 1)
more
"The Institut für Auslandsbeziehungen (ifa) supports civil society actors worldwide in their advocacy for democracy and peace, encourages dialogue within civil society and contributes to the protection of minorities and persons at risk. With the fellowships of the CrossCulture Programme (CCP), ifa
...
supports the interlacing of German and foreign civil society actors from the cultural, educational, scientific, artistic and medial sectors from more than 40 partner countries. The goals for the participating fellows and organisations are to broaden and deepen their expertise, share and acquire intercultural skills, learn from each other and impart their own knowledge. »Digital Civil Society« is one of the focal topics of the programme which is treated within the scope of CCP Fellowships and thematic workshops. In 2019, CCP fellows, alumni and experts came together in a workshop to exchange ideas, share practices and seek solutions in the fields of digital inclusion and digital security. This publication is the product of this global cross-cultural cooperation and collects personal commentaries, best-practice examples and recommendations for action." (Back cover)
more
"[...] se identificaron rápidamente las principales temáticas a incluir en el libro. Estas son: acceso a Internet y derechos humanos online, populismo y desinformación, privacidad, ciberseguridad, big data y datos abiertos, teleeducación, teletrabajo, cooperación digital y transformación digit
...
al de las empresas. El libro tiene como propósito mostrar cómo Internet, en tiempos de la COVID-19, desde diversas áreas, le ha servido a la humanidad, pero en particular a nuestra región, que, con una perspectiva latinoamericana, ha sabido tomar como referencia experiencias globales. Además, su objetivo es presentar los nuevos retos y riesgos que han surgido, a fin de demostrar cómo estos pueden atenderse coordinadamente entre los diversos actores comprometidos para minimizar su impacto." (Introducción, página 19)
more
"There is no “one size fits all” approach to digital contact tracing technologies (DCTT). Technology design should not be static, but it should be capable of evolving depending upon local conditions, new evidence, and changing preferences and priorities. Technology companies alone should not con
...
trol the terms, conditions, or capabilities of DCTT, nor should they presume to know what is acceptable to members of the public. DCTT should be designed to have a base set of features that protect privacy, with layers of additional capabilities that users may choose to activate. An initial default should be that user location data are not shared, but users should be provided with easy mechanisms and prompts to allow for opting-in to this capability, with encouragement to the public if it is shown to be critical to achieving public health goals. Data collected through DCTT should be made available to public health professionals and to researchers in de-identified form to support population-level epidemiologic analyses." (Summary, page 2)
more
"This publication is a compilation of 19 articles by African researchers, academics, journalists and human and digital rights activists on the impact of the COVID-19 pandemic on digital rights in Africa. The articles were commissioned by the African Declaration on Internet Rights and Freedoms (AfDec
...
) Coalition as part of its project on “Securing human rights online in Africa through a strong and active ‘African Declaration on Internet Rights and Freedoms’ network”. The AfDec Coalition is a pan-African initiative which promotes human rights standards and principles of openness in internet policy formulation and implementation on the continent, guided by the 13 principles established in the African Declaration on Internet Rights and Freedoms. At the time that the papers were commissioned, in June 2020, African states had either invoked existing policies or adopted new policies for prevention of spread, containment and treatment of the virus that had an impact on the enjoyment of digital rights. For example, most governments employed the use of contact tracing applications to track and trace citizens’ movements and put in place measures criminalising free speech when it contained false information about the pandemic. These two examples had the potential to be abused, particularly the latter, which was used to silence journalists and government critics. The pandemic also moved most citizens’ communication, education, work, trade and access to basic services from physical interactions to primilary online interactions. However, the continent is still largely made up of informal economies, has a low internet penetration rate of 28.2% (far below the global average of around 53%), and has seen an increase in reports of digital rights violations resulting from repressive cyberlaws, making the efforts to address the pandemic inadequate and inequitable. These articles offer reflective analyses on government efforts to curb the COVID-19 pandemic from the perspective of the AfDec principles, with a focus on a number of the principles including privacy and personal data protection, gender equality, freedom of expression, internet access and affordability, and the right to development and access to knowledge." (Introduction)
more
"This document is a compilation of the outcomes of the research component of a small project entitled “Putting cybersecurity on the rights track” that the Association for Progressive Communications (APC) implemented during the course of 2019 with the participation of APC members." (About this pr
...
oject, page 4)
more
"Understanding and improving the science behind the algorithms that run our lives is quickly becoming one of the most pressing issues of this century. Traditional solutions, such as laws, regulations and watchdog groups, have proven woefully inadequate, at best. Derived from the cutting-edge of scie
...
ntific research, The Ethical Algorithm offers a new approach: a set of principled solutions based on the emerging and exciting science of socially aware algorithm design. Weaving together the science behind algorithm design with stories of citizens, lawyers, scientists, and activists experiencing the trial-and-error of research in real-time, Michael Kearns and Aaron Roth present a strikingly original way forward, showing how we can begin to work together to protect people from the unintended impacts of algorithms—and, sometimes, protect the science that could save us from ourselves." (Publisher description)
more
"Open-source intelligence gathering and analysis (OSINT) techniques are no longer predominantly the remit of private investigators and journalists. An estimated 80-90% of data analysed by intelligence agencies is also now derived from publicly available material. Additionally, the massive expansion
...
of the internet and, in particular, social media platforms, have made OSINT increasingly accessible to civilians who simply want to trawl the Web for information on a specific individual, organisation or product. In May 2018, the European Union’s General Data Protection Regulation (GDPR) was implemented in the UK through the new Data Protection Act, intended to secure personal data against unjustified collection, storage and exploitation. This document presents a preliminary literature review of work related to the GDPR and OSINT, which was collated as the basis for an as-yet-unpublished study evaluating the effects of the GDPR on OSINT capabilities in the UK. The literature reviewed is separated into the following six sections:‘What is OSINT?’,‘What are the risks and benefits of OSINT?’,‘What is the rationale for data protection legislation?’,‘What are the current legislative frameworks in the UK and Europe?’,‘What is the potential impact of the GDPR on OSINT?’, and ‘Have the views of civilian and commercial stakeholders been sought and why is this important?’. As OSINT tools and techniques are accessible to anyone, they have the unique capacity for being used to hold power to account. It is therefore important that new data protection legislation does not impede civilian OSINT capabilities." (Abstract)
more
"Commonly held truths surrounding privacy and data protection may negatively impact the design of effective policy and regulatory solutions. Debunking the privacy paradox in the context of public intersections with data subjects helps to highlight how individualized privacy self-management strategie
...
s are problematic as the sole (or chief) model for data protection. Identity projects, given the high level personal identifiable data required, are an important vulnerability context for considering new solutions on collective rights and protections." (Page 1)
more
"This Digital Citizenship Toolkit (DCT) is an attempt to introduce key concepts related to digital citizenship while taking into account the local socio-economic realities, technology adoption patterns, societal actions and other considerations. For young people, in particular, the demarcation betwe
...
en online and offline is completely blurred. Therefore, in this book we do not separate the online from offline. Instead we consider it as part of a continuum, encouraging respectful and responsible behaviour in all spaces and environments. The Toolkit is presented as seven inter-linked modules. Each module starts with a brief overview, and clarification of key terms. It is followed by an exploration of the key topics coming under the module’s theme. One or more case studies are offered to illustrate some of the concepts, and wherever possible we have compiled examples and experiences from Sri Lanka." (About this digital citizenship toolkit)
more
"Open-source intelligence (OSINT) gathering and analysis techniques are used by investigators from a variety of fields, owing to their accessibility and exceptional capacity for corroboration. It has previously been argued that proposed data protection legislation can chill the free press, but there
...
have been no studies assessing the effect of such reforms on more general OSINT capabilities. European Union’s General Data Protection Regulation (GDPR) was implemented in the UK through the 2018 Data Protection Act (DPA) to protect personal data against exploitation. This study surveyed 16 OSINT gathering and analysis practitioners across public and private sectors to determine firstly, what, if any impact the implementation of the GDPR/DPA have had on their ability to successfully operate as OSINT analysts and secondly, if they have noticed any subsequent changes in UK public perception around issues of the surveillance state and digital privacy. I argue that this initial survey shows that the GDPR is merely a first step in establishing societal expectations and regulations around digital privacy. While some changes to OSINT practice have been reported, to date few substantive changes to OSINT methods or analysis resulted or seemed poised to take effect, one year after the advent of the GDPR/DPA." (Abstract)
more