6,124 research outputs found

    Syrian Refugees and the Digital Passage to Europe: Smartphone Infrastructures and Affordances

    Get PDF
    This research examines the role of smartphones in refugees’ journeys. It traces the risks and possibilities afforded by smartphones for facilitating information, communication, and migration flows in the digital passage to Europe. For the Syrian and Iraqi refugee respondents in this France-based qualitative study, smartphones are lifelines, as important as water and food. They afford the planning, navigation, and documentation of journeys, enabling regular contact with family, friends, smugglers, and those who help them. However, refugees are simultaneously exposed to new forms of exploitation and surveillance with smartphones as migrations are financialised by smugglers and criminalized by European policies, and the digital passage is dependent on a contingent range of sociotechnical and material assemblages. Through an infrastructural lens, we capture the dialectical dynamics of opportunity and vulnerability, and the forms of resilience and solidarity, that arise as forced migration and digital connectivity coincide

    The Evolving Landscape of Internet Control

    Get PDF
    Over the past two years, we have undertaken several studies at the Berkman Center designed to better understand the control of the Internet in less open societies. During the years we've been engaged in this research, we have seen many incidents that have highlighted the continuing role of the Internet as a battleground for political control, including partial or total Internet shutdowns in China, Iran, Egypt, Libya, and Syria; many hundreds of documented DDoS, hacking, and other cyber attacks against political sites; continued growth in the number of countries that filter the Internet; and dozens of well documented cases of on- and offline persecution of online dissidents. The energy dedicated to these battles for control of the Internet on both the government and dissident sides indicated, if nothing else, that both sides think that the Internet is a critical space for political action. In this paper, we offer an overview of our research in the context of these changes in the methods used to control online speech, and some thoughts on the challenges to online speech in the immediate future

    Application of Steganography for Anonymity through the Internet

    Full text link
    In this paper, a novel steganographic scheme based on chaotic iterations is proposed. This research work takes place into the information hiding security framework. The applications for anonymity and privacy through the Internet are regarded too. To guarantee such an anonymity, it should be possible to set up a secret communication channel into a web page, being both secure and robust. To achieve this goal, we propose an information hiding scheme being stego-secure, which is the highest level of security in a well defined and studied category of attacks called "watermark-only attack". This category of attacks is the best context to study steganography-based anonymity through the Internet. The steganalysis of our steganographic process is also studied in order to show it security in a real test framework.Comment: 14 page

    Think Tank Review Issue 66 April 2019

    Get PDF

    Democracy and Digital Authoritarianism: An Assessment of the EU’s External Engagement in the Promotion and Protection of Internet Freedom. College of Europe EU Diplomacy Paper 01/2020

    Get PDF
    The past decade has seen a gradual global increase in digital authoritarianism. Internet shutdowns, online censorship, mass surveillance and violations of privacy rights have all become more frequent in parts of the world where citizens are not guaranteed sufficient digital rights. The task of defending, promoting and protecting internet freedom is becoming increasingly relevant for the European Union (EU) − for internal digital and cybersecurity policies as well as for the EU’s external promotion of democracy and human rights. Whilst much has been written about the various internal policies which establish and protect internet freedom within the European Union and its member states, the EU’s external engagement in this field remains critically under-researched. To what extent does the EU engage externally in the promotion and protection of internet freedom? This paper answers this question by covering a wide variety of policy fields including human rights and democracy promotion, digital policy, enlargement and neighbourhood policy, development cooperation and trade policy. Whereas the EU faces a limited opportunity to shape global norms with regard to internet freedom or to change the course of digitally authoritarian states, it has demonstrated several strengths which deserve not to be overlooked. These include, for example, the externalisation of internal data protection and policies and the provision of direct support and protection for civil society. Despite facing significant obstacles, the promotion and protection of internet freedom has become an important area of the EU’s external action which is only set to become more relevant in the coming years

    Understanding the Internet as a Human Right

    Get PDF
    Around the world, fundamental human rights have undergone a dramatic conceptual shift as a result of the spread of the Internet. The right to freedom of expression, once largely limited to printing, has exploded in a digital world that provides users with an unprecedented megaphone to broadcast their views. The right to political participation and the right to free assembly have similarly been reborn in an age of instant communication, allowing activists to mobilise hundreds of thousands of followers with a single email, text or tweet. Although these are the most notable examples, the Internet has also had a transformative impact on several other recognised human rights, including the right to education, to healthcare and to work. The Internet’s role in the enabling and delivery of human rights has led some to claim that access to the Internet itself should be considered a human right, an idea that has deep implications for both international law and domestic legal frameworks. If, indeed, access to the Internet is a human right, it adds an additional dimension to regulatory issues, since overly restrictive laws that compromise access or damage the vitality or utility of the Internet become more than just bad policy. In some cases, they may constitute violations of international human rights standards. This Paper discusses the Internet’s recognition as a human right and the implications that spring from this recognition in domestic and international law

    A Game of Code: Challenges of Cyberspace as a Domain of Warfare

    Get PDF
    The military capabilities that the world witnesses in modern day armed conflicts are a sort of science fiction brought to life. Most of the techniques in cyber warfare were never thought possible, let alone anticipated in times past especially during the framing of key International Humanitarian Law (IHL) instruments. This paper analyses the challenges that cyber warfare poses to state responsibility. The analysis also discusses how the anonymity of parties in cyber warfare presents challenges to the application of existing law. The rationale for this study is the fact that cyberspace as a domain of warfare is still in its early days despite the many ambiguities and puzzles it has sparked in various circles of discussion. The study relies on literature reviews and case studies to make its salient points. Ultimately, the study argues that cyber warfare is subject to IHL; however, it breeds new possibilities that may require greater adherence to consistent legal review of weapons and greater willingness of the international community to apply IHL to this domain of warfare

    Using crowdsourced geospatial data to aid in nuclear proliferation monitoring

    Get PDF
    In 2014, a Defense Science Board Task Force was convened in order to assess and explore new technologies that would aid in nuclear proliferation monitoring. One of their recommendations was for the director of National Intelligence to explore ways that crowdsourced geospatial imagery technologies could aid existing governmental efforts. Our research builds directly on this recommendation and provides feedback on some of the most successful examples of crowdsourced geospatial data (CGD). As of 2016, Special Operations Command (SOCOM) has assumed the new role of becoming the primary U.S. agency responsible for counter-proliferation. Historically, this institution has always been reliant upon other organizations for the execution of its myriad of mission sets. SOCOM's unique ability to build relationships makes it particularly suited to the task of harnessing CGD technologies and employing them in the capacity that our research recommends. Furthermore, CGD is a low cost, high impact tool that is already being employed by commercial companies and non-profit groups around the world. By employing CGD, a wider whole-of-government effort can be created that provides a long term, cohesive engagement plan for facilitating a multi-faceted nuclear proliferation monitoring process.http://archive.org/details/usingcrowdsource1094551570Major, United States ArmyMajor, United States ArmyApproved for public release; distribution is unlimited
    • …
    corecore