This document addresses the different risks faced in digital security. In particular, it focuses on the privacy and security issues faced by human rights defenders and how they can deal with them. It also discusses ways of preventing the erosion of universally guaranteed freedoms.
security and privacy
This e-primer introduces readers to the network concepts and architectures, and the major networking functions with free/open source software (FOSS). It also discusses network security functions with FOSS, including security best practices and to-do's. The e-primer ends with useful tips on network planning, design and development.
The Internet and the criminal behaviour it transforms (cybercrime) pose considerable challenges for order maintenance and law enforcement because Internet-related offending takes place within a global context while crime tends to be nationally defined. Policing cyber-crime is made all the more complex by the very nature of policing and security being networked and nodal and also because within this framework the public police play only a small part in the policing of the Internet.
Global Law and Global Challenges - Cyber Warfare: Law and Policy Proposals for U.S. and Global Governance
Cybersecurity is the newest and most unique national security issue of the twenty-first century. Cyber warfare uses computer technologies as defensive and offensive weapons in international relations. Until now, there has been no national debate within the United States over the concept of cyber warfare; neither its meaning nor the international laws that govern this concept have been discussed at any length, and nor have the domestic rules regarding it.
Few operational areas of every corporation present as much inherent risk or prove as difficult to govern as Information Technology ("IT"). One of the reasons for lack of governance has been the claim of not having sufficient knowledge to do so. However, recent years have brought a growing realization that not knowing is not an excuse.
This article seeks to explain the harms of government surveillance. Drawing on law, history, literature, and the work of scholars in the emerging interdisciplinary field of “surveillance studies,” the article offers an account of what those harms are and why they matter. The article moves beyond the vagueness of current theories of surveillance to articulate a more coherent understanding and a more workable approach. At the level of theory, the paper explains why and when surveillance is particularly dangerous and when it is not.
Over the last few years, consumers, corporations and governments have rushed to move their data to “the cloud,” adopting web-based applications and storage solutions provided by companies that include Amazon, Google, Microsoft and Yahoo. Cloud computing services provide consumers with vast amounts of cheap, redundant storage and allow them to instantly access their data from a web-connected computer anywhere in the world. Unfortunately the shift to cloud computing needlessly exposes users to privacy invasion and fraud by hackers.
From Facebook to Mug Shot: How the Dearth of Social Networking Privacy Rights Revolutionized Online Government Surveillance
This Article seeks to bring attention to the problem of Facebook privacy and rectify it. It examines Facebook‘s architecture, reveals the ways in which government agencies have investigated crimes on social networking sites, and analyzes how courts have interpreted the Fourth Amendment and the ECPA.
An End to Privacy Theater : Exposing and Discouraging Corporate Disclosure of User Data to the Government
This article focuses on the lack of information and on the policy changes necessary to create market pressure for companies to put their customers’ privacy first. The article outlines the numerous ways in which companies currently assist the government, often going out of their way to provide easy access to their customers’ private communications and documents.
This report is the seventh annual compilation of information on complaints received and referred by the Internet Crime Complaint Center (IC3) to law enforcement or regulatory agencies for action. The results in this report are intended to enhance our general knowledge about the scope and prevalence of Internet crime. The majority of reported perpetrators were from the United States. However, a significant number of perpetrators also were located in United Kingdom, Nigeria, Canada, Romania and Italy.