You are on page 1of 29

- 3.

..


2013

4 - - -
/(202) 27926281:

Info@afteegypt.org :
www.afteegypt.org :

LibreOffice Gimp
FireFox Ubuntu
3

..






.


.


.

.
.



.

..







.



.

.


..
..



/
.

.



:
5

..





.

.







.

.


/


6

..


.

!..

!..
!..




.
7

..





) (

" " .




" "
. " "

.

//


.


.

..

" "IP Address






.




.

)(
.





.

..
- ).

(1).

- (6

/(2).

- .

)(3

TOR

(4).

- (7).

- (8).

(5).




.
.
IMEI SIM
/
10

..


.

GPS
Bluetooth


.

.
- -

.PIN

- -

- (10).

(9).

- (11).

whatsapp - SIM
(12)..

- - HTTPS

11

..
.

(13).

GPS - .
Wireless

wireless .

.
TOR(14).

- .

SIM SD

-
12

..
.

- -

- -

HTTPS
.

- .

13

..

..
..




-






.

14

..






..
..



)(














.


""


.
15

..





.

..


) ..(

.

.

/



16

..
.
.



""
.


""


.




17

..




.


..






.
..


.

..
.

18

..



24
48
.



.


.

19

..

20

..






""

.



)(

21

..

.
..

8




.


.


.

)


(
-

22

..

23

..



- -
https://securityinabox.org/ar/chapter_0
-2 - https://securityinabox.org/ar/chapter_0_4
-3 - https://securityinabox.org/ar/chapter_0_
- https://securityinabox.org/ar/chapter_0


-4
- - https://securityinabox.org/ar/truecrypt
-6 https://securityinabox.org/ar/chapter_03
- - https://securityinabox.org/ar/tor
- OTR https://securityinabox.org/ar/pidgin
-8
-9 /http://www.android.com/devices
-0 -
/http://www.mozilla.org/en-US/mobile
- https://securityinabox.org/ar/node/294
-2 ) (
https://securityinabox.org/ar/chapter__02
-3 avast
http://www.avast.com/free-mobile-security
-4 Avira
/http://www.avira.com/en/download/product/avira-free-android-security


-4
https://securityinabox.org/ar/node/2948

24

..

- - https://securityinabox.org/ar

- 2

https://www.accessnow.org/pages/protecting-your-security-online

25

..
must be issued by the prosecution. Also the warrant for search in cases of digital
crimes must state the materials which the search may include, usually
computers, mobile phones, CDs, memory cards and other tools of saving and
using digital data.
Finally, the manual discussed other legal aspects, such as the questioning of the
person concerned, his/her rights in disclosing passwords; elements that may
lead to the indictment of the person concerned; and lastly the investigation
bodies that are entitled to investigate crimes of digital publishing, expert reports
and the right of the defendant to request an expert as well as the right to reject
one in case the defendant feels his or her lack of impartiality.

26

..

II. Legal section


In the legal section we tried to present simplified legal concepts regarding
crimes of publishing as well as some guidelines for activists in case they are
legally compromised. We presented a definition of crimes of digital publishing
and charges the activists may face in view of what they publish on the Internet.
We focused on some legal aspects such as the concept of publicity since a
crime of digital publishing is not complete unless if the element of publicity is
present, indicating that a number of individuals may access what has been
published without being indicted therefore.
The manual also addresses the differences between personal and public
messages since this depends on the number of people messaged and the
nature of the content. If the number of the recipients was one, two or three this
would be considered personal messaging. but if the number of recipients was
unlimited this would be considered public messaging for lack of the element of
privacy.
We also addressed the issue of responsibility for comments made on the digital
content since these are not the responsibility of the publisher especially if the
content was illegal. the crime here is personal as well as the punishment and no
one can be charged for actions of others and thus the legal responsibility lies
with the person who made the comment while that of the publisher is limited by
what has been published on the original post.
Further the manual addressed evidence for digital crimes, being the most
difficult to prove in view of the difficulty of material control over all its aspects.
The manual then addressed cases of arrest of people accused of crimes of
publishing, where it differentiates between cases of flagrante delicto of a crime
of digital publishing and issuance of a prosecution permit for arrest and cases
where a person is summoned by the prosecution for interrogation in a case of
digital publishing.
the manual also explained procedures of personal or home search for a person
accused of a digital crime, where the search is considered illegal in the absence
of a warrant unless the person is caught in flagrante delicto. Otherwise a warrant
27

..
I. Technical section
This section addresses a number of issues related to common traditions and
practices by users and activists as well as recommendations for the use of
certain programs which increase digital security in addition to general advice
concerning protection of digital data, users and activists accounts on social
networks, in addition to a section addressing the use of mobile phones.
At its outset the manual defines the concept of digital security and its importance
for activists and users especially those using more than one channel such as the
mobile, personal PCs, ipads etc. in addition to social networks and personal
accounts on the internet. It then proceeds to explain practices and traditions
used by the user or activists which could negatively or positively affect digital
security. Among those traditions is the location of use recommending against the
use of the internet in public cafes nor the use of computers that are being used
by more than one person such as at the workplace, as well as not leaving
sensitive data on those computers. the manual also recommends the use of
open systems and getting used to them since they provide more security than
other systems.We also discouraged other common practices such as leaving
personal computers and mobiles with others.
The manual also explains hacking processes and the theoretical concept behind
it in addition the most common ways of hacking, concluding with a number of
guidelines to increase the level of digital security while using computers such as
using strong antivirus program, open systems, elaborate passwords, backups, as
well as safe instant messaging programs.
The manual also addressed digital security in using mobile phones and
explaining how they could be bugged as well as suggesting precautions through
using strong passwords, and certain systems and programs as well as other
recommendations concerning safe web surfing, messaging, distant deletion etc.
Finally the manual includes some suggestions regarding the use of social
networks, while securing privacy and protection of personal data: use of
passwords, safe surfing as well as other practices which could negatively or
positively affect level of digital security of personal information.

28

..

Manual
Legal Digital Security
Summary
Preface
With the increasing use of the internet, mobile phone and the different
applications in mobilization, advocacy, organization and dissemination of news
etc, the importance of digital security cannot be overestimated, especially that
governments have become increasingly concerned towards the spreading use of
this technology, as reflected in the legal prosecution of some social media users
who have been accused of defamation of religion or insult to executive bodies,
slander among others because of what they post or share on the internet or
otherwise.
In addition to the above several publications have been produced by activists
and human rights organizations including technical instructions regarding
protection and digital security. what this manual offers is an attempt at an
elaboration of some theoretical concepts. We have included some programs
which would help users to protect their data during use as well as highlighting
some legal aspects related to hearings and trials concerning digital publishing
cases to be used by lawyers in their defense in cases of violation of freedom of
digital freedoms.

29

..

) (

" "

30

You might also like