background preloader

Security and communications

Facebook Twitter

Human Rights Bulletin System. Security Best Practices - Ushahidi - Confluence. Page Not Found The page you were trying to reach could not be found: it may have been renamed or moved to another space, or the name you requested may be incomplete.

Security Best Practices - Ushahidi - Confluence

For Bloggers at Risk: Creating a Contingency Plan. In 2011, we have witnessed the incredible power of bloggers and social media users capturing the world’s attention through their activism.

For Bloggers at Risk: Creating a Contingency Plan

At the same time, regimes appear to be quickening the pace of their cat-and-mouse game with netizens, cracking down on speech through the use of surveillance, censorship, and the persecution and detention of bloggers. The increasingly the tech-savvy Syrian regime has been reported to demand login credentials from detainees, for example, while the use of torture in some of the region’s prisons continues.Aware of the threats to their safety, bloggers often devise contingency plans in the event they are detained. Syrian blogger Razan Ghazzawi was on her way to a conference in Jordan several weeks ago when she was arrested (she has since been released). In a premeditated effort to protect her contacts, she shared her passwords with trusted friends outside the country with instructions to change them in the event of an arrest. Protecting Your Security Online. Mobilizing for Global Digital Freedom Protecting Your Security Online Click on the online readers below to explore "A Practical Guide to Protecting Your Identity and Security Online and When Using Mobile Phones" in a variety of languages.

Protecting Your Security Online

You can also download the file in each language by clicking the files below each language. *The Russian language version of Access Now’s internet security guide "A Practical Guide to Protecting Your Identity and Security Online and When Using Mobile Phones" was translated by the National Democratic Institute for International Affairs ( in cooperation with Alexey Sidorenko, editor for Global Voices ( ^The Vietnamese language version of the guide was translated by the blog "No Firewall" which can be found at

Facebook Privacy Dwarfed By Google: Infographic. Safely and Securely Producing Media. Training Guides Safely and Securely Producing Media ENGLISH (9MB) (9MB) العربية This guide is a collection of our best practices and suggestions we’ve made to our colleagues over the last five years.

Safely and Securely Producing Media

It is intended for people who may have tried to shoot one or two videos, but find themselves at a loss on how to improve their work. We split up the process of shooting high quality video into three sections, Plan your Story, Record Your Story, and Share Your Story. ONO - Survival in the digital age. New: Three Reports on Circumvention Tool Usage, International Bloggers, and Internet Control. August 18, 2011 The Berkman Center is pleased to release three new publications as part of our circumvention project.

New: Three Reports on Circumvention Tool Usage, International Bloggers, and Internet Control

Over the past two years, the Center has carried out a number of research activities designed to improve our understanding of the knowledge, usage, and effectiveness of circumvention tools as a means to promote access to information online in repressive online environments. In addition to earlier papers on circumvention tool usage and the circumvention landscape, this research has resulted in three new publications: The Evolving Landscape of Internet Control by Hal Roberts, Ethan Zuckerman, Rob Faris, Jillian York, and John Palfrey This paper summarizes the results of the studies we have undertaken in order to better understand the control of the Internet in less open societies. How To Remain Connected If Your Internet Gets Shut Off.

Mobile Security

Surveillance Self-Defense International. Published July 2009; revised June 2010. 6 Ideas For Those Needing Defensive Technology to Protect Free Speech from Authoritarian Regimes and 4 Ways the Rest of Us Can Help Peter Eckersley, Introduction: The Internet remains one of the most powerful means ever created to give voice to repressed people around the world.

Surveillance Self-Defense International

Unfortunately, new technologies have also given authoritarian regimes new means to identify and retaliate against those who speak out despite censorship and surveillance. Human Rights Video, Privacy and Visual Anonymity in the Facebook Age : Video For Change. Protester’s placard thanking youth of Egypt and Facebook (via Twitter user @richardengelnbc, and now widely re-posted online) The successful nationwide organizing and subsequent protests in Egypt to oust the 30-year regime of President Hosni Mubarak have in part been facilitated by Facebook.

Human Rights Video, Privacy and Visual Anonymity in the Facebook Age : Video For Change

But as media and technology commentators and human rights activists alike are noting, using Facebook for activism is fraught with risks. Facebook’s insistence that its users use their ‘real identity’ when signing up – and deleting accounts and groups that do no comply – makes it difficult for human rights activists needing to work anonymously or pseudonymously. And it makes it easier for governments to track not only individuals but also their networks. About « Crabgrass. Current Status Crabgrass currently consists of a solid suite of group collaboration tools, such as private wikis, task lists, file repository, and decision making tools. We are currently working on a large user interface overhaul, better social networking tools, blogs, and event calendars, as well as better support for collaboration and decision making among independent groups.

Crabgrass is written in Ruby using the Ruby on Rails framework.