Professional Documents
Culture Documents
..
2013
4 - - -
/(202) 27926281:
Info@afteegypt.org :
www.afteegypt.org :
LibreOffice Gimp
FireFox Ubuntu
3
..
.
.
.
.
.
.
..
.
.
.
..
..
/
.
.
:
5
..
.
.
.
.
/
6
..
.
!..
!..
!..
.
7
..
) (
" " .
" "
. " "
.
//
.
.
..
..
- ).
(1).
- (6
/(2).
- .
)(3
TOR
(4).
- (7).
- (8).
(5).
.
.
IMEI SIM
/
10
..
.
GPS
Bluetooth
.
.
- -
.PIN
- -
- (10).
(9).
- (11).
whatsapp - SIM
(12)..
- - HTTPS
11
..
.
(13).
GPS - .
Wireless
wireless .
.
TOR(14).
- .
SIM SD
-
12
..
.
- -
- -
HTTPS
.
- .
13
..
..
..
-
.
14
..
..
..
)(
.
""
.
15
..
.
..
) ..(
.
.
/
16
..
.
.
""
.
""
.
17
..
.
..
.
..
.
..
.
18
..
24
48
.
.
.
19
..
20
..
""
.
)(
21
..
.
..
8
.
.
.
)
(
-
22
..
23
..
- -
https://securityinabox.org/ar/chapter_0
-2 - https://securityinabox.org/ar/chapter_0_4
-3 - https://securityinabox.org/ar/chapter_0_
- https://securityinabox.org/ar/chapter_0
-4
- - https://securityinabox.org/ar/truecrypt
-6 https://securityinabox.org/ar/chapter_03
- - https://securityinabox.org/ar/tor
- OTR https://securityinabox.org/ar/pidgin
-8
-9 /http://www.android.com/devices
-0 -
/http://www.mozilla.org/en-US/mobile
- https://securityinabox.org/ar/node/294
-2 ) (
https://securityinabox.org/ar/chapter__02
-3 avast
http://www.avast.com/free-mobile-security
-4 Avira
/http://www.avira.com/en/download/product/avira-free-android-security
-4
https://securityinabox.org/ar/node/2948
24
..
- - https://securityinabox.org/ar
- 2
https://www.accessnow.org/pages/protecting-your-security-online
25
..
must be issued by the prosecution. Also the warrant for search in cases of digital
crimes must state the materials which the search may include, usually
computers, mobile phones, CDs, memory cards and other tools of saving and
using digital data.
Finally, the manual discussed other legal aspects, such as the questioning of the
person concerned, his/her rights in disclosing passwords; elements that may
lead to the indictment of the person concerned; and lastly the investigation
bodies that are entitled to investigate crimes of digital publishing, expert reports
and the right of the defendant to request an expert as well as the right to reject
one in case the defendant feels his or her lack of impartiality.
26
..
..
I. Technical section
This section addresses a number of issues related to common traditions and
practices by users and activists as well as recommendations for the use of
certain programs which increase digital security in addition to general advice
concerning protection of digital data, users and activists accounts on social
networks, in addition to a section addressing the use of mobile phones.
At its outset the manual defines the concept of digital security and its importance
for activists and users especially those using more than one channel such as the
mobile, personal PCs, ipads etc. in addition to social networks and personal
accounts on the internet. It then proceeds to explain practices and traditions
used by the user or activists which could negatively or positively affect digital
security. Among those traditions is the location of use recommending against the
use of the internet in public cafes nor the use of computers that are being used
by more than one person such as at the workplace, as well as not leaving
sensitive data on those computers. the manual also recommends the use of
open systems and getting used to them since they provide more security than
other systems.We also discouraged other common practices such as leaving
personal computers and mobiles with others.
The manual also explains hacking processes and the theoretical concept behind
it in addition the most common ways of hacking, concluding with a number of
guidelines to increase the level of digital security while using computers such as
using strong antivirus program, open systems, elaborate passwords, backups, as
well as safe instant messaging programs.
The manual also addressed digital security in using mobile phones and
explaining how they could be bugged as well as suggesting precautions through
using strong passwords, and certain systems and programs as well as other
recommendations concerning safe web surfing, messaging, distant deletion etc.
Finally the manual includes some suggestions regarding the use of social
networks, while securing privacy and protection of personal data: use of
passwords, safe surfing as well as other practices which could negatively or
positively affect level of digital security of personal information.
28
..
Manual
Legal Digital Security
Summary
Preface
With the increasing use of the internet, mobile phone and the different
applications in mobilization, advocacy, organization and dissemination of news
etc, the importance of digital security cannot be overestimated, especially that
governments have become increasingly concerned towards the spreading use of
this technology, as reflected in the legal prosecution of some social media users
who have been accused of defamation of religion or insult to executive bodies,
slander among others because of what they post or share on the internet or
otherwise.
In addition to the above several publications have been produced by activists
and human rights organizations including technical instructions regarding
protection and digital security. what this manual offers is an attempt at an
elaboration of some theoretical concepts. We have included some programs
which would help users to protect their data during use as well as highlighting
some legal aspects related to hearings and trials concerning digital publishing
cases to be used by lawyers in their defense in cases of violation of freedom of
digital freedoms.
29
..
) (
" "
30