'Participating with Safety' index   «   Mobbs' Environmental Investigations   «   FRAW

APC/GreenNet Internet Rights Logo Association for Progressive Communications

'Participating With Safety'

A series of briefings on information security and on-line safety for civil society organisationse

Written by Paul Mobbs for the Association for Progressive Communications, 2002.
© 2002-2008 APC/Paul Mobbs, released under The Gnu Free Documentation License (GFDL), version 1.2.
For further information contact: http://www.fraw.org.uk/mei/ or mei@fraw.org.uk.

The Association for Progressive Communications (APC) has developed a series of briefings to help those working on-line improve the security of their computer and on-line communications. The briefings were developed as part of a project aimed at improving the on-line security of computer users such as journalists and human rights workers. But the content of the briefings is relevant for all those working on-line.


The series of seven briefings covers the following areas:

  1. Introducing Information Security
    this outlines what information security is, and the different means that exist to protect your information from damage or loss
    On-site HTML file icon On-site PDF file icon On-site PDF file icon
  2. Backing-up Information
    how to organise your information to keep regular copies, how to make back-up copies, and how to store them securely
    On-site HTML file icon On-site PDF file icon On-site PDF file icon
  3. Passwords and Access Controls
    this outlines the purpose of access controls, such as passwords or encryption, and how to use them
    On-site HTML file icon On-site PDF file icon On-site PDF file icon
  4. Using Encryption and Digital Signatures
    describes how data encryption and digital signatures work, and how they can be used to protect your information from unwanted intrusion
    On-site HTML file icon On-site PDF file icon On-site PDF file icon
  5. Computer Viruses
    outlines what computer viruses are, and how to minimise the risks from the damage they may cause
    On-site HTML file icon On-site PDF file icon On-site PDF file icon
  6. Using the Internet Securely
    describes how the Internet can be used as a means of surveillance, by the state and corporations, and how these surveillance measures can by avoided
    On-site HTML file icon On-site PDF file icon On-site PDF file icon
  7. Living Under Surveillance
    outlines the scope of private and state surveillance, and how simple measures can reduce (but never eliminate) the potential impacts of surveillance
    On-site HTML file icon On-site PDF file icon On-site PDF file icon

On-site HTML file icon There is also a glossary of the key terms used in the units,
and which links the main themes of the toolkit together.

On-site ZIP archive file icon If you would like to download the whole of the 'Participating With Safety' toolkit then it is available as a single ZIP file that can be uncompressed and viewed from your hard disk – or mirrored on a web site.




An Introduction to the 'Participating With Safety' Project

Computers are a very useful tool to assist people's work. They not only help with writing, graphic design and publishing information, they are increasingly becoming an essential communications tool as part of computer networks and the Internet.

But the reliance people have on computers is also a weakness. This weakness, and the ways of working around the problems computer technology can create, must be understood by those using computers. Through the understanding of the weaknesses of the way computers and computerised communications work we can take steps to protect our work, our security and our privacy.

There are many different aspects to using computers securely: You can set-up the computer to run more securely and reliably; Using access controls, such as passwords, you can prevent disclosure of information; By organising the information on the computer, and keeping regular copies, you can prevent the loss or corruption of information; and Using various means, you can secure your use of the Internet, and prove the authenticity of your communications.

Using computers more securely is a mixture of learning a little more about how the computer works, and undertaking certain tasks on a regular basis. The vast majority of the risks to your use of your computer come from mistakes in your own use or storage of information, or from the failure of the equipment it is stored on. Surveys in industries dependent on computer technology have found that 75% of data losses are due to internal errors, not from external factors such as computer viruses or deliberate damage. You don't have to organise your information according to a strict formula. But it must be done in a way that everyone who needs to use it understands how data is stored and used. It's also important to organise things to make it easier to keep copies of information, and to store those copies in such as way that they cannot be damaged or destroyed.

The other issue to deal with are the external threats to your work and computerised information. This comes from a variety of sources. There are the everyday risks from bad software and computer viruses. But increasingly we are becoming subject to directed risks; this can be the intrusion by the state or corporations who seek to frustrate or prevent our work taking place, or those seeking to defraud or steal information or computer equipment. The careful management of information, and the use of access controls to data and equipment, can help reduce the impacts of any attacks on you or your organisation. But it is important to realise that you can never completely prevent damage or data loss from external influences.

Overall, the purpose of these briefings is to help you make a qualitative improvement to the security of your computer and communications.




The Internet Rights logo

APC/GreenNet Internet Rights Logo



The Internet rights logo,
drawn by Paul Mobbs,
is available for use under
the Gnu Free Documentation
License. Click the logo to
download a larger version.




Free Documentation License:

Copyright © 2001-2008 Association for Progressive Communications (APC) and Paul Mobbs. Further contributions, editing and translation by Karen Banks, Michael de Beer, Roman Chumuch, Jim Holland, Marek Hudema, Pavel Prokopenko and Pep Turro. The project to develop this series of briefings was managed by the Association for Progressive Communications, and funded by OSI.

Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or any later version (see http://www.gnu.org/copyleft/ for a copy of the license). You can also download the license here.

Please note that the title of the briefing and the 'free documentation license' section are protected as 'invariant sections and should not be modified.

For more information about the Participating With Safety project, or if you have questions about the briefings, contact secdocs@apc.org.







Paul Mobbs/Mobbs' Environmental Investigations Archive – http://www.fraw.org.uk/mei/
© 2002-2008 APC/Paul Mobbs. This document has been released under The Gnu Free Documentation License (GFDL, version 1.2).