This book is an introduction to the ever growing and complex world of electronic security. Not only will it raise your level of knowledge and awareness about computers and the Internet, it will also warn you of different risks you may face in the digital environment and will tell you how to deal with them. The book is written for human rights defenders, and therefore it looks at the
ways of preventing the erosion of universally guaranteed freedoms. Alongside elements of theory, it offers possible solutions to some problems of computer and Internet security.

This manual is divided into four parts which can be read in any order. The reader does not require any special expertise, although some basic knowledge of computer and Internet operations would come handy. The chapters, containing information of a more technical nature, are marked ‘For Techies’.

The First Section is about understanding your security needs and vulnerabilities. It describes a non-technical approach to the digital environment. A method of mapping the threats, posed by a particular situation, is offered to help you decide on the strategies for implementing privacy and security solutions.

The Second Section lists various elements of computer and Internet security. It introduces the reader to computer operations and Internet infrastructure. Methods of securing data, bypassing Internet censorship and protecting yourself against malicious attacks are explained in detail.

The Third Section is a summary of worldwide legislation to restrict and monitor information flow and communications. It shows the downward trend, caused by the growth of restrictions to the rights to freedom of expression, privacy and communication, in many countries. Cases of human rights defenders currently in prison or persecuted because of their work through the Internet are presented as examples of the ways some governments enforce these pieces of legislation.

The Fourth Section drafts possible scenarios for human rights defenders and their organisations of dealing with problems of electronic insecurity and ensuring continuation of their work. The scenarios relate to the concepts presented throughout the book and solutions are based on realisable actions.
–––––
Following the case studies, you will find Appendices, aiming to provide you with detailed background on computers and the Internet, as well as in-depth explanations of certain security topics. At the end of the book, there is a Glossary explaining many of the more technical and unfamiliar words used inthis manual.
–––––
This book can be used alongside the NGO in a Box –Security Edition project, a collection of software tools and manuals comprising the necessary resources to achieve better privacy and security on your computers and on the Internet. All software mentioned in this book can be found either in the NGO in a Box – Security Edition or will be included with its next release in the beginning of 2007. All the software can also be downloaded from the Internet. Some of the concepts and technology, described and taught in this manual, have been made illegal in several countries of the world. Please pay careful attention to your local legislation and make an
informed decision about possession and use of this book.

You can read more about the latest developments of the manual on the Frontline website.