background preloader

Tools and tactics for your digital security

Tools and tactics for your digital security

HelloCoolWorld.com : Welcome! Julian Assange on His New Book, When Google Met WikiLeaks Julian Assange, the 43-year-old founder and editor-in-chief of WikiLeaks, has been living in the Ecuadorian Embassy in London since June of 2012. He occupies a single room in the building, a couple hundred square feet of space cluttered with work and life. He avoids using email and tries to interact with his staff only in person. “I have to act like Osama bin Laden now,” he writes in his recently published book, When Google Met WikiLeaks (OR Books). The book chronicles the afternoon in 2011 when he was visited by four individuals: Eric Schmidt, executive chairman of Google; Jared Cohen, director of Google Ideas; Lisa Shields, vice president of the Council on Foreign Relations; and Scott Malcomson, the communications director for the International Crisis Group. Ecuador has granted Assange asylum, but the United Kingdom will not allow Assange, who is Australian, passage to South America. But there’s a difference between leadership and direction—coercive control over something.

Verification Handbook: homepage Free and Open Source Software Applications that are safe and useful for unionists, labour and social justice activists | NetwOrganisation N-1: N-1 is an online social network software. It has been developed by Indignados from Spain and elsewhere collectively. N-1 combines many of the below tools in it. Other important free and open source online networks are Diaspora, Rise Up, Drupal. Big Blue Button is an open source online software built originally for higher and long distance education purpose. Mumble is a free telecommunication software that is used by Occupy movement, Spanish Indignados/15M activists. Turtle is a free and open source anonymous peer-to-peer network project facilitating free speech and sharing information by combining encryption with peer-to-peer (P2P) technology. Webchat Free Node: Safe and secure instant chat rooms for activists who are sharing and working on collective projects and actions. Online collective document creation: Titan Pad / RiseUp Pad / Priate Pad WordPress is web software you can use to create a beautiful website or blog. Other usefull FOSS tools: Address Book Audio Tools Bulletin Board

Web Liberty and Privacy The fifth and sixth public meetings of Google’s advisory council met in Berlin and London recently, inviting experts and the public to discuss the outcome of the recent “right to be forgotten ruling” made by the European court of Justice. Adviser Luciano Floridi explains the consultations. One of the crucial questions of our age is who may legitimately exercise what power over which kind of information. This is also one of the thorny issues raised by the ruling of the European court of justice (ECJ) against Google on the so-called “right to be forgotten”. The question is complicated because one may interpret “who”, “what power” and “which information” in many ways and end up talking at cross-purposes. In terms of power, the last three are legal entities that do not generate the personal information or its links (the two relevant types of information under discussion) but can determine how the other entities manage both. The mess concerns the first three entities.

Follow the Money: a Digital Guide for Tracking Corruption The digital age has profoundly transformed the way people find and share information. The Internet is enabling collaboration between activists, hackers and journalists on an unprecedented scale. This has led to previously unimaginable possibilities in investigative reporting. People are newly empowered to uncover hidden information, expose corruption and bring the truth to light. Through a series of short films, Exposing the Invisible tells the personal stories of those working at the new frontiers of investigation. We explore their tools and methods and learn how they manage the risks of information activism. We hope that Exposing the Invisible will inspire a new generation of people committed to transparency and accountability. New movies will be uploaded to our website regularly. This project would not have been made possible without our sponsors and all the people who have contributed. If you watched the films, it would be great to know what you thought.

GPS bracelet uses social media to protect Civil Rights Activists The Civil Rights Defenders have issued their first batch of GPS bracelets that will alert the CRDs' headquarters, other nearby activists, and the entirety of the CRDs' social media following if the bracelet's owner is ever kidnapped. The first 5 bracelets were issued from April 2nd through April 5th during the Civil Rights Defenders' conference, Defenders' Days. The CRD plans on issuing 55 of these bracelets over the next year and a half. The bracelets are described as a personal alarm, and the product is called the "Natalia Project". It was named after Natalia Estemirova, a human rights defender who, in 2009, was murdered within 24 hours of being kidnapped. The GPS bracelet can be activated manually, or if an attacker forcefully removes it from the activist's wrist. The Civil Rights Defenders state that these bracelets could potentially alert hundreds of thousands of people instantly.

Assange: Google Is Not What It Seems In June 2011, Julian Assange received an unusual visitor: the chairman of Google, Eric Schmidt, arrived from America at Ellingham Hall, the country house in Norfolk, England where Assange was living under house arrest. For several hours the besieged leader of the world’s most famous insurgent publishing organization and the billionaire head of the world’s largest information empire locked horns. The two men debated the political problems faced by society, and the technological solutions engendered by the global network—from the Arab Spring to Bitcoin. They outlined radically opposing perspectives: for Assange, the liberating power of the Internet is based on its freedom and statelessness. Newsweek Magazine is Back In Print In this extract from When Google Met WikiLeaks Assange describes his encounter with Schmidt and how he came to conclude that it was far from an innocent exchange of views. I was intrigued that the mountain would come to Muhammad. Some time later Jared Cohen arrived.

How To Combat Online Surveillance | The Occupied Times - Iceweasel Download High Resolution Version In English | PDF | JPEG Em Português | PDF | JPEG Governments have transformed the internet into a surveillance platform, but they are not omnipotent. They’re limited by material resources as much as the rest of us. Includes all you’ll need to access the Tor Network. Makes it more difficult to trace Internet activity: Web browsing, online posts, instant messages and other communication forms. Many features to help you easily clean your computer, free-up space and maintain privacy. A live operating system. Comes with several built-in applications pre-configured with security in mind: web browser, instant messaging client, email client, office suite and more. AxCrypt / DiskCryptor / BitLocker / AES Crypt / Kruptos 2 / BestCrypt /CloudFogger Create virtual hard drives which encrypt any files you save onto them. Chat software that allows use of existing instant messaging accounts. A simple plugin for Pidgin. Free email software.

New Tactics in Human Rights Lone lawyer sues Obama, alleging illegality of surveillance programs Justice Department lawyers have asked a federal court in Pittsburgh to dismiss a sweeping lawsuit brought earlier this year by a local lawyer against President Barack Obama and other top intelligence officials. In a new motion to dismiss filed on Monday, the government told the court that the Pittsburgh lawyer, Elliott Schuchardt, lacked standing to make a claim that his rights under the Fourth Amendment have been violated as a result of multiple ongoing surveillance programs. Specifically, Schuchardt argued in his June 2014 complaint that both metadata and content of his Gmail, Facebook, and Dropbox accounts were compromised under the PRISM program as revealed in the documents leaked by former National Security Agency (NSA) contractor Edward Snowden. In an e-mail to Ars on Wednesday, Marcia Berman, a senior trial counsel who authored the motion to dismiss, said, "Per department policy, attorneys do not comment to the media on litigation." As Berman wrote in the motion to dismiss:

Zoetica Media - Communication Services for Nonprofits & Social Good Right to Online Privacy at Risk as Governments Engage in Mass Surveillance – Counter-terrorism Expert Human Wrongs Watch States must be transparent about the nature of their electronic mass surveillance programmes, an independent United Nations counter-terrorism expert said on 23 October 2014 as he warned about the impact such measures might have on individuals’ right to privacy. “States need to squarely confront the fact that mass surveillance programmes effectively do away with the right to online privacy altogether,” Ben Emmerson, Special Rapporteur on the promotion and protection of human rights while countering terrorism, told the General Assembly body dealing with cultural, social and humanitarian issues (Third Committee) during the presentation his latest report. “No” to the Analogy that “Sending an email is like sending a post-card” Emmerson has long emphasized the need for transparency and accountability in government intelligence gathering operations. “Individuals must have the right to seek an effective remedy for any alleged violation of their online privacy rights,” he said.

SocialButterfly

Related: