mobile safety

Working Towards a Deeper Understanding of Digital Safety for Children and Young People in Developing Nations

Posted by EKStallings on Dec 19, 2011
Working Towards a Deeper Understanding of Digital Safety for Children and Young People in Developing Nations data sheet 413 Views
Author: 
Gasser, Urs, Colin Maclay, John Palfre
Publication Date: 
Jun 2010
Publication Type: 
Report/White paper
Abstract: 

This exploratory study is a first output of an ongoing collaboration between the Berkman Center for Internet & Society at Harvard University and UNICEF. It is intended as a contribution towards building a deeper understanding of children’s safety in a digital context in developing nations. More specifically, the objectives of the paper are threefold: First (and foremost), it seeks to raise awareness about issues related to digital safety for youth in developing nations. Second, it aims to provide a tentative map of these issues and give insights into the current state of the respective

 

 

Featured?: 
No

Evaluating Security Apps

Posted by MelissaLoudon on Sep 22, 2011

Particularly for smartphones, there are many apps that promise improved privacy and security for your mobile communications. Like all apps, some are very good, but other are poorly written or overpriced, and may even be malicious. This article will help you evaluate whether you should trust their promises.

Before You Start

Security apps are most useful as part of a coherent security policy covering all your mobile communications. The Mobile Risk Assessment Primer will help you complete an inventory of mobile communications risks, and decide which are most important and most feasible to mitigate.

Once you’ve completed a risk assessment, it’s important to search broadly for security apps. MobileActive is in the process of reviewing many of these from our current list of security apps, but the mobile security landscape changes quickly. Ask friends and colleagues, read about your specific security need online, and search your device’s app marketplace. Once you’ve identified as many options as possible, it’s time to start evaluating your security apps.

Will It Work on Your Phone?

As with computer software, some mobile apps are built to work on one platform - Android, iPhone, Blackberry, Symbian, Java - and may not work on others. There may be other requirements too, such as particular phone models. Make sure the apps you have chosen are all going to work on your device.

Also consider how you will actually get the app - can it be downloaded from a web link that you open on your phone, or can you get it from an app marketplace? Some apps can also be downloaded to a PC and transferred via bluetooth or a data cable. This step sounds obvious, but it can be tricky when you don’t have stable Internet access on your phone or aren’t used to the app install process.

Safer Facebook

Posted by SaferMobile on Aug 09, 2011
Safer Facebook data sheet 6164 Views
Author: 
Melissa Loudon
Abstract: 

Facebook has more than 500 million users, half of which access the site through their mobile phone. Being able to communicate your message to an audience this large is exceptionally valuable. At the same time, your activities on the site generate very detailed information about you and your networks. If you are concerned about surveillance, this information can put you at risk. This how-to explains what those risks are and how to use Facebook on your mobile device more securely. 

Facebook has more 500 million users, half of which access the site through their mobile phones. Being able to communicate your message to an audience this large is exceptionally valuable. At the same time your activities on the site generate very detailed information about you and your networks. If you are concerned about surveillance, this information can put you at risk.

Assess Your Facebook Mobile Risks

Like Twitter, Facebook is a way to get your messages to a potentially large audience. It is not a secure method of communication for sensitive information.

This article offers advice about how to mitigate risks when using Facebook as a dissemination and organizing tool. In particular, we consider the following risks:

  • The risk that your public activities on Facebook reveal compromising information about you or your networks - for example, revealing the identity of supporters or identifying people who were present at a particular event.
  • The risk of your private information being revealed to a third party without your consent.
  • The risk that your account details (username and password) are discovered, and that someone may impersonate you.
  • The risk of your account being deleted or suspended.
  • The risk that Facebook is blocked or becomes inaccessible.

in general, you should only use Facebook to share information that you consider public. Public information can be freely distributed by you, your organization, and your supporters, without any risk to individuals or organizational operations. In communicating public information, you can send and receive this information without taking any precautions.


Are Your Apps Trustworthy? 6 Questions to Ask

Posted by MelissaLoudon on Jun 30, 2011

Smartphones (iPhone, Android, Blackberry, Windows Mobile, Symbian) and many feature phones allow you to download and install mobile applications (“apps”). Apps do many useful things. However, some apps (and other types of software, such as your mobile operating system) can also present security risks. These include:

  • Apps and other software may have access to information stored on or generated by your phone.

  • Apps and other software may have the ability to transmit this information using your phone’s Internet connection.

Malicious apps or other mobile software installed on your mobile device can expose you to the following risks:

  • Your conversations may be listened to or recorded without your knowledge.

  • Your text messages, emails and web traffic may be monitored and logged.

  • Data stored on your phone (contacts, calendar entries, photos and video) may be accessed or copied.

  • Passwords stored or entered on your phone may be stolen and used to access your online accounts.

  • Your locationmaybetracked, even when your phone is switched off.

With smartphones gaining market share, malicious apps are beginning to pose a serious threat. In an article titled “Your Apps Are Watching You”, the Wall Street Journal tested popular iPhone and Android apps, and found that of 101 apps tested, 56 transmitted a unique identifier for the phone without informing the user or asking for consent. 47 apps also transmitted the phone’s location, while 5 sent age, gender or other personal details to various companies. The App Genome Project reports that 28% of all apps in the Android Market and 34% of all free apps in the Apple App Store have the capability to access location, while 7.5% of Android Market apps and 11% of Apple App Store apps have the capability to access users’ contacts.

It can be very difficult to tell which apps are safe and which are not. App behaviours that might not bother most users, such as transmitting the phone’s location to an advertising server, can be unacceptable to people with higher privacy and security requirements.

This article offers suggestions on how to assess risks to security and privacy posed by apps.

SaferMobile LockDown Guides

Posted by SaferMobile on Jun 29, 2011

Despite the smartphone craze of the past 5 years, featurephones are still king in much of the world. From the perspective of activists, rights defenders, and journalists, they cannot be ignored. And feature phones have plenty of built-in capability to help users stay safer. During the course of our research, we've uncovered valuable features that even the most experienced users may not be aware of.

As a part of SaferMobile, a project of MobileActive.org, we've focused on documenting the most important ways that a user can lock down a mobile handsets. No external apps or special tools are required, just a charged battery. We've condensed these tips into single-page, device-specific reference guides for a variety of makes & models that get straight to the point. And yes, we made sure to cover smartphones and featurephones.

A Guide to Mobile Security Risk Assessment

Posted by SaferMobile on Jun 10, 2011
A Guide to Mobile Security Risk Assessment data sheet 4301 Views
Author: 
SaferMobile
Abstract: 

You are an activist, rights defender, or journalist. You use a mobile device. And you work in sometimes risky situations in your country. This guide will help you implement mobile security practices in your work. It will help you assess the particular risks that face you and then assist you in developing a plan to mitigate those risks.

Location

safetyicon

You are an activist, rights defender, or journalist. You use a mobile device. And you work in sometimes risky situations in your country.

This guide will help you implement mobile security practices in your work. It will help you assess the particular risks that face you and then assist you in developing a plan to mitigate those risks. First, we'll cover some of basic concepts. Then, in the second part of this guide, we'll take you through developing your own risk assessment in 5 steps.

We have previously published a Mobile Risk Primer that describes general security vulnerabilities associated with mobile technology and communication. Read it!

Throughout this guide, we'll also highlight the fictitious case of Asima, a blogger and activist in Egypt. Examples of how Asima might complete the assessment worksheet and create a security plan for her work are highlighted in this guide.

Asima lives in Cairo, Egypt and is a blogger and an activist. She used to maintain a blog on Blogspot, but now mostly uses Facebook and Twitter to follow current events, to share information, and to communicate with colleagues. She tweets from her mobile phone while in traffic and at cafes and protests and from her computer when she is at work or at home.


Introducing SaferMobile: Mobile Security for Rights Defenders, Activists, and Journalists

Posted by SaferMobile on May 16, 2011

Activists, rights defenders, and journalists use mobile devices for reporting, organizing, mobilizing, and documenting. We have written about many of these uses for years now, describing how mobile phones provide countless benefits to activists and rights defenders. Mobile tech is relatively low cost and allows for increased efficiencies and vast reach, for example. But, there is a darker side.

Mobile Phones present specific risks to rights defenders, journalists, and activists. We believe that is is critically important to know that mobile communication is inherently insecure and exposes rights defenders and those working in sensitive environment to risks that are not easy to detect or overcome. (We provide an overview of those risks in this Primer, for instance)

To address mobile safety and security for rights defenders, we are introducing SaferMobile, to help activists, human rights defenders, and journalists assess the mobile communications risks that they are facing, and then use appropriate mitigation techniques to increase their ability to organize, report, and work more safely.

What is SaferMobile? 

  • Online and offline educational and tactical resources (risk evaluation tools, case studies, how-to guides, security tool reviews); 
  • Trainings and curricula for use in various countries and with different constituencies; 
  • Specific mobile security software focused on the needs of rights defenders, activists, and journalists.

As will all that we do, we believe that there certain values and principles that are paramount in this work. For SaferMobile, we are following these principles:

  • We believe that skilled, trained, and knowledgeable activists, journalists, and rights defenders are key to democratic changes. We also believe that the smart and effective use of technology constitutes an integral piece of their skill set.
  • The better activists, journalists, and rights defender are able to work, the more safely they are able to organize and communicate, the more likely it is that their work is effective and heard. 
  • We are committed to accessible, useful, actionable, and technically accurate and secure content, materials, and software. 
  • We are also committed to describing technological vulnerabilities in terms that non-technical users can easily understand. 
  • We work with activists on the ground to ensure that the content we produce addresses real uses and risks. 
  • We also seek responsive connections between activists and security professionals so that both are more able to assess and respond to changing risks.  
  • Lastly, we are maintaining information that reflects current security risks and technological vulnerabilities and is vetted for security and technological accuracy by knowledgeable experts.

Roadmap and Process

The SaferMobile project is just beginning its second Phase. Phase 1 included needs assessment with users and peers – activists, rights defenders, journalists, technologists, security experts, and mobile developers. Through this research, we outlined plans for web content, training curriculum and tools (software) and are now creating these pieces in Phase 2 of the project (May-August 2011). 

Our approach is iterative and open – we work as a team to develop ideas and welcome review and comments from peers. We maintain a wiki for this initial phase that will act as a living lab for content and code as we develop both. 

Mobile Security Risks: A Primer for Activists, Journalists and Rights Defenders

Posted by SaferMobile on May 11, 2011
Mobile Security Risks: A Primer for Activists, Journalists and Rights Defenders data sheet 22386 Views
Author: 
SaferMobile
Abstract: 

A primer on mobile security risks for activists, rights defenders, and journalists. includes tips on how to protect yourself. 

Location

Activists, rights defenders, and journalists use mobile devices and communications for reporting, organizing, mobilizing, and documenting.  Mobiles provide countless benefits -- relatively low cost, increased efficiencies, vast reach -- but they also present specific risks to rights defenders and activists.  




Additionally, information about other mobile uses, such as your photos or video, your data, the Internet sites you visit from your phone, and your physical location, are stored on your device and often logged by your mobile network. (The above graphic shows a schematic overview of the layers of the mobile networks to give you sense of the different elements that make up communications between two phones.)How much is this putting you at risk?  This Overview will help you evaluate your level of risk in regard to your mobile communications.