background preloader

Security and communications

Facebook Twitter

Human Rights Bulletin System. Security Best Practices - Ushahidi - Confluence. For Bloggers at Risk: Creating a Contingency Plan. In 2011, we have witnessed the incredible power of bloggers and social media users capturing the world’s attention through their activism.

For Bloggers at Risk: Creating a Contingency Plan

At the same time, regimes appear to be quickening the pace of their cat-and-mouse game with netizens, cracking down on speech through the use of surveillance, censorship, and the persecution and detention of bloggers. The increasingly the tech-savvy Syrian regime has been reported to demand login credentials from detainees, for example, while the use of torture in some of the region’s prisons continues.Aware of the threats to their safety, bloggers often devise contingency plans in the event they are detained. Syrian blogger Razan Ghazzawi was on her way to a conference in Jordan several weeks ago when she was arrested (she has since been released). In a premeditated effort to protect her contacts, she shared her passwords with trusted friends outside the country with instructions to change them in the event of an arrest.

Protecting Your Security Online. Facebook Privacy Dwarfed By Google: Infographic. Safely and Securely Producing Media. Training Guides Safely and Securely Producing Media ENGLISH (9MB) (9MB) العربية This guide is a collection of our best practices and suggestions we’ve made to our colleagues over the last five years.

Safely and Securely Producing Media

It is intended for people who may have tried to shoot one or two videos, but find themselves at a loss on how to improve their work. We split up the process of shooting high quality video into three sections, Plan your Story, Record Your Story, and Share Your Story. I’d like to thank Jesse Hambley and Ashley Low for their involvement as graphic designers on this project. We’ve had some great feedback from partners, colleagues and collaborators around the world already. ONO - Survival in the digital age. New: Three Reports on Circumvention Tool Usage, International Bloggers, and Internet Control. August 18, 2011 The Berkman Center is pleased to release three new publications as part of our circumvention project.

New: Three Reports on Circumvention Tool Usage, International Bloggers, and Internet Control

Over the past two years, the Center has carried out a number of research activities designed to improve our understanding of the knowledge, usage, and effectiveness of circumvention tools as a means to promote access to information online in repressive online environments. In addition to earlier papers on circumvention tool usage and the circumvention landscape, this research has resulted in three new publications: The Evolving Landscape of Internet Control by Hal Roberts, Ethan Zuckerman, Rob Faris, Jillian York, and John Palfrey This paper summarizes the results of the studies we have undertaken in order to better understand the control of the Internet in less open societies.

We are grateful for the participation of Global Voices Online and for the work of those who translated our blogger survey into more than a dozen languages. How To Remain Connected If Your Internet Gets Shut Off.

Mobile Security

Surveillance Self-Defense International. Published July 2009; revised June 2010. 6 Ideas For Those Needing Defensive Technology to Protect Free Speech from Authoritarian Regimes and 4 Ways the Rest of Us Can Help Peter Eckersley, Introduction: The Internet remains one of the most powerful means ever created to give voice to repressed people around the world.

Surveillance Self-Defense International

Unfortunately, new technologies have also given authoritarian regimes new means to identify and retaliate against those who speak out despite censorship and surveillance. Below are six basic ideas for those attempting to speak without falling victim to authoritarian surveillance and censorship, and four ideas for the rest of us who want to help support them. I. 1. Tor Bridges are a more discreet way to connect to the Tor network.

If you use Tor and live in a country with a strong tradition of Internet censorship, your government might suddenly start blocking connections to the public Tor network. II. Human Rights Video, Privacy and Visual Anonymity in the Facebook Age : Video For Change. The successful nationwide organizing and subsequent protests in Egypt to oust the 30-year regime of President Hosni Mubarak have in part been facilitated by Facebook.

Human Rights Video, Privacy and Visual Anonymity in the Facebook Age : Video For Change

But as media and technology commentators and human rights activists alike are noting, using Facebook for activism is fraught with risks. Facebook’s insistence that its users use their ‘real identity’ when signing up – and deleting accounts and groups that do no comply – makes it difficult for human rights activists needing to work anonymously or pseudonymously. And it makes it easier for governments to track not only individuals but also their networks. The risks that affect activists using Facebook have their counterparts in video too. At the same time as the use of video has become more widespread in human rights work, the risks associated with shooting and circulating video, whether by professional human rights advocates or citizen activists, have become equally apparent. 1. 2. 3. About « Crabgrass. Current Status Crabgrass currently consists of a solid suite of group collaboration tools, such as private wikis, task lists, file repository, and decision making tools.

We are currently working on a large user interface overhaul, better social networking tools, blogs, and event calendars, as well as better support for collaboration and decision making among independent groups. Crabgrass is written in Ruby using the Ruby on Rails framework.