Digital Security and Privacy for Human Rights Defenders

1.1 Security and Insecurity

Computers and the Internet are all about information seeking, storage and exchange. Hence, the topic of security in the digital realm relates to the security of information. We need to operate in a climate where our information is not stolen, damaged, compromised or restricted. The Internet, in theory, provides everyone with an equal opportunity to access and disseminate information. Yet, as many incidents have shown, this is not always the case. Governments and corporations realise the importance and value of controlling information flows, and of being able to decide when to restrict them. The security of information is further complicated by malicious individuals creating computer viruses and hacking into computer systems, often with no other motive than causing damage.

Confusion is enhanced by the abundance of software, hardware and electronic devices designed to make the storage and exchange of information easier. An average computer today contains millions of lines of complex code and hundreds of components which could malfunction and damage the system at any time. Users have to immerse themselves in concepts and technology that seem to be far removed from the real world. The security of your computer falls first and foremost upon your shoulders and requires some comprehension of how its systems actually work.

The race to reap profits from the Internet has resulted in the appearance of numerous financial services and agencies. You can now book a flight, buy a book, transfer money, play poker, do shopping and advertise on the Internet. We have increased our capacity for getting more things done more quickly, yet we have also created a myriad of new information flows, and with them – new concepts of insecurity we do not yet know how to deal with. Marketing companies are building profiles of users on the Internet hoping to turn your browsing experience into a constant shopping trip. Personal information, col- lected by Internet service proivders, governments and corporations, is then sold to data mining companies, whose aim is to accumulate as much detail as possible about your private life and habits. This information is then used in surveys, product development or national security updates.

It may appear that chaos has come to rule our digital world. Nothing is certain and everything is possible. Most of us just want to get on with writing our document or sending an email, without considering the outcomes of insecurity. Unfortunately, this is not possible in the digital environment. To be a confident player in this new age of information highways and emerging technologies, you need to be fully aware of your potential and your weaknesses. You must have the knowledge and skills to survive and develop with the changing trends.

Methods and trends of surveillance, censorship and electronic attack

echelon in UK
ECHELON intercept station at Menwith Hill, England.
Source: www.greaterthings.com
The right to privacy is a contentious issue in the modern world. Does anyone have the right to access our private information? In the aftermath of the 9/11 attacks in the USA, most governments seem to think they should have ability to monitor and access our digital communications. Many countries have implemented legislation and introduced the technology that increased their power of surveillance to previously unseen levels. The ECHELON project, for instance, is a global surveillance system, able to record and process telephone, Internet and satellite communications.

In May 2001, the European Parliament's Temporary Committee on the Echelon Interception System (established in July 2000) issued a report concluding that "the existence of a global system for intercepting communications . . . is no longer in doubt." According to the committee, the Echelon system (reportedly run by the United States in cooperation with Britain, Canada, Australia and New Zealand) was set up at the beginning of the Cold War for intelligence gathering and has developed into a network of intercept stations around the world. Its primary purpose, according to the report, is to intercept private and commercial communications, not military intelligence.1

The right to freedom of expression and information has also been attacked and suppressed on the Internet. The ability to access infor- mation from any Internet connection point on Earth, regardless of where this information is stored, has resulted in many governments - not ready or willing to provide this type of freedom to their citizens - scrambling to restrict such free access. Huge resources have been poured into developing country-specific filtering systems to block the Internet information, deemed inappropriate or damaging to the local country's laws and 'national morale'.

In China, a system known as the "Great Firewall" routes all international connections through proxy servers at official gateways, where the Ministry for Public Security (MPS) officials identify individual users and content, define rights, and carefully monitor network traffic into and out of the country. At a 2001 security industry conference, the govern- ment of China announced an ambitious successor project known as "Golden Shield." Rather than relying solely on a national Intranet, separated from the global Internet by a massive firewall, China will now build surveillance intelligence into the network, allowing it to "see," "hear" and "think." Content-filtration will shift from the national level to millions of digital information and communications devices in public places and people's homes. The technology behind Golden Shield is incredibly complex and is based on research undertaken largely by Western technology firms, including Nortel Networks, Sun Microsystems, Cisco and others.2

These filters undermine our ability to take advantage of the Internet and to cross geographical boundaries in our quest for learning and communication. They are also in breach of several articles in the Universal Declaration of Human Rights (UDHR) guaranteeing every person rights to privacy and free expression. Significantly, these systems were developed only after the growth and potential of the Internet as the global information exchange was noticed. They were not part of the original idea behind the development of the Internet.

Surveillance and monitoring techniques have passed from the hands of intelligence personnel to the hardware and software systems, operated by private companies and government agencies. Phone bugging and letter opening has been superseded by the technology that allows monitoring of everyone and everything at once. The popularity of the Internet and its integration into our daily life has made that possible. Previously, someone considered dangerous to national security was spied upon. Now, we are all under suspicion as a result of the surveillance and filtering systems our governments install on the Internet. The technology does not often differentiate between users as it waits for certain keywords to appear in our email and Internet searches, and when triggered, alerts surveillance teams or blocks our communications.

The debate about controlling the Internet and information flows for the purposes of countering terrorism is outside the boundaries of this manual. It has to be said, however, that such practices have reduced freedom of expression, association and privacy all over the world, in direct contravention of the UDHR. Governments have installed systems to monitor their citizens on the scale far beyond the measures to fight terrorism. Information on human rights, free- doms of the media, religion, sexual orientation, thought and political move- ments, to name just a few, has been made inaccessible to many.

...“The Uzbekistan government has reportedly ordered the country’s internet service providers (ISPs) to block the website www.neweurasia.net, which hosts a network of weblogs covering Central Asia and the Caucasus. The government’s decision to block all national access to www.neweurasia.net is believed to be the first censoring of a weblog in Central Asia...”3

Cyber-attacks and real life examples of cyber-warfare have increased the scope of vulnerabilities faced by organisations who operate websites and rely on Internet services. Digital attacks on Estonian financial and educational Internet infrastructures in 2007 and during the 2008 conflict between Russia and Georgia demonstrated the need to defend digital frontiers of a state or insti- tution. Websites of human rights organisations are made inaccessible by organ- ised Distributed Denial of Service (DDOS) attacks, defacement of content and deletion of data.

Specific threats faced by human rights defenders

Human rights defenders often become targets of surveillance and censorship in their own country. Their right to freedom of expression is often monitored, censored and repressed. Often they are facing heavy penalties for continuing their work. The digital world has been both a blessing and a curse for them. On the one hand, the speed of communications has brought them closer to their colleagues from around the world, and the news of human rights viola- tions spreads around within minutes. People are being mobilised via the Internet, and many social campaigns have moved online. The negative aspect of the widespread use of computers and the Internet lies in over reliance on complex technology and the increased threat from targeted electronic surveil- lance and attacks. At the same time, the defenders in poorer countries who do not have computers and/or access to the Internet have found themselves left out of global focus and reach - another example of the imbalance caused by the digital divide.


Over the years, HRDs have learnt to operate in their own environment and have developed mechanisms for their own protection and prevention of attacks. They know their countries' legal systems, have networks of friends and take decisions based on everyday wisdom. Computers and Internet, however, con- stitute a whole new world to discover and understand. It is their lack of interest or capacity to learn about electronic security that has lead to numerous arrests, attacks and misunderstandings in the human rights community. Electronic security and digital privacy should become not just an important area for comprehension and participation, but also a new battleground in the struggle for the worldwide adherence to the principles of the UDHR.

Emails do not arrive at their destination, Internet connection is intermittent, computers are confiscated and viruses damage years of work. These problems are commonplace and familiar. Another common phenomenon is the increasing attention of those in power to online publishing. The authorities are actively searching through Internet news sites, blogs and forums – with swift retribution in cases when "undesired" material originating from a HRD is dis- covered. Take the case of Mohamed Abbou, who was serving a 3,5 year prison term in Tunisia for publishing online an article that compared Tunisian prisons to Abu Ghraib4. In China, dozens of journalists are in prison because of their Internet-related activities5.

Human rights defenders need to secure their work by learning about the tech- nology and concepts of the computer and Internet operations. This will make them more effective in protecting themselves and in promoting the rights of those they try to defend.

1
European Parliament, Temporary Committee on the Echelon Interception System (2001) Report on the Existence of a Global System for the Interception of Private and Commercial Communications (ECHELON interception system), May 18, 2001. (2001/2098(INI)) (adopted July 11, 2001) Available at http://www.europarl.eu.int/tempcom/echelon/pdf/prechelon_en.pdf

2
Privacy International – Privacy and Human Rights Report 2004 – The Threats to Privacy

3
www.newseurasia.net July 6th, 2006

4
Front Line - http://www.frontlinedefenders.org/ news/2081

5
Reporters Sans Frontières - www.rsf.org February 2007