Cybersecurity

CYBERSECURITY

Cybersecurity attacks are redefining geopolitics and the nature of contemporary warfare. Human rights defenders, journalists, and humanitarian actors are facing unprecedented digital threats, with deep impacts on democratic processes and the safety of marginalized communities. We challenge governments and businesses engaging in global cybersecurity activities to shift their focus from state control and securitization of the internet toward protection of individual rights and the safety of people and communities at risk.

Four strategies to defend encryption and our human rights

When we fight for encryption, we fight for human rights. It enables us to stay safe online, and communicate privately and freely. Yet governments keep pushing to undermine it, and Apple’s plan to bypass encryption is an alarming sign of private sector capitulation to this pressure.

Resources

UNHRC_Eric Bridiers|

Cybersecurity

To keep us safe, global cybersecurity norms must be human-centered and protect rights

At the United Nations OEWG meetings, we highlighted the increase in cyber attacks for surveillance and the global epidemic of internet shutdowns, both of which threaten the ability to use the internet securely.

|

Cybersecurity

Why Latin America should protect, not persecute, information security researchers

Information security researchers help keep people safe online, yet they are being persecuted in Latin America when they should be protected.

Digital Security

Who we hurt when we attack encryption

Encryption is a vital tool for keeping human rights defenders safe from powerful adversaries. Case studies from Access Now’s Digital Security Helpline show how strong encryption makes the world safer for everyone.

EU Ukraine

Cybersecurity

Cyberattacks on Ukraine’s infrastructure and civil society violate human rights

Following cyberattacks on Ukraine and its human rights defenders, we call on the international community to help protect people.

#KeepItOn: Community feedback on data collection and verification

As the #KeepItOn campaign enters into its eighth year, Access Now is committed to revamping the Shutdown Tracker Optimization Project (STOP). In order to improve our collective advocacy and rapid

Cybersecurity

Analysis: the Myanmar junta’s Cybersecurity Law would be a disaster for human rights

The Myanmar junta’s efforts to achieve ultimate control over civic space is continuing — through a devastating draft Cybersecurity Law.

Telegram vs Russia

Digital Security

Encrypt all the messages — across all the platforms

Elon Musk’s planned Twitter buyout is spurring new calls for end-to-end encryption (E2EE) for messaging. Here’s why it’s both desirable and feasible to make E2EE messaging interoperable across major communications platforms, as the E.U. Digital Markets Act envisions.

Latest Updates

Digital Security
Digital Security

From crisis to conflict, we must defend digital rights when people need them most

29 May 2023

People feel restrictions on digital rights most intensely in situations of crisis, conflict, or disaster. Here’s how we are safeguarding people’s digital rights in times of both war and peace.

Post
From crisis to conflict, we must defend digital rights when people need them most
29 May 2023
From crisis to conflict, we must defend digital rights when people need them most
Armenia spyware victims: Pegasus hacking in war
Surveillance
Surveillance

Hacking in a war zone: Pegasus spyware in the Azerbaijan-Armenia conflict

25 May 2023

A joint investigation by civil society and independent researchers has uncovered hacking of Armenia spyware victims with NSO Group’s Pegasus spyware.

Publication
Hacking in a war zone: Pegasus spyware in the Azerbaijan-Armenia conflict
25 May 2023
Hacking in a war zone: Pegasus spyware in the Azerbaijan-Armenia conflict
Tech and conflict
Transparency
Transparency

Tech and conflict: a guide for responsible business conduct

18 May 2023

This guide is meant to help tech companies think through the impacts of their decisions in the context of conflict.

Guide
Tech and conflict: a guide for responsible business conduct
18 May 2023
Tech and conflict: a guide for responsible business conduct
EARN IT Act
Cybersecurity
Cybersecurity

Media briefing: proposed UN cybercrime treaty negotiations sidestepping human rights protections and threatening free expression

12 Apr 2023

Access Now and partners are hosting a media briefing on the grave threat to human rights posed by ongoing UN cybercrime treaty negotiations.

Press Release
Media briefing: proposed UN cybercrime treaty negotiations sidestepping human rights protections and threatening free expression
12 Apr 2023
Media briefing: proposed UN cybercrime treaty negotiations sidestepping human rights protections and threatening free expression
Thumbnail: cyber
Cybersecurity
Cybersecurity

Submission on the Revised Draft Industry Codes, under the Online Safety Act

24 Mar 2023

Access Now’s submission on the revised Draft Industry Codes under the Online Safety Act.

Publication
Submission on the Revised Draft Industry Codes, under the Online Safety Act
24 Mar 2023
Submission on the Revised Draft Industry Codes, under the Online Safety Act
Cybersecurity
Cybersecurity

New U.S. Cybersecurity Strategy: a strong step forward, with room for improvement

3 Mar 2023

Access Now commends the U.S.’s National Cybersecurity Strategy that centers “respect for human rights,” but it still falls short on collaboration with stakeholders abroad.

Press Release
New U.S. Cybersecurity Strategy: a strong step forward, with room for improvement
3 Mar 2023
New U.S. Cybersecurity Strategy: a strong step forward, with room for improvement
Spy firm for sale graphic
Cybersecurity
Cybersecurity

Whistleblower Leaks Documents And Software Of Israeli Surveillance Tech Company Cellebrite

22 Feb 2023
News
Whistleblower Leaks Documents And Software Of Israeli Surveillance Tech Company Cellebrite
Vallari Sanzgiri ↗
22 Feb 2023
Whistleblower Leaks Documents And Software Of Israeli Surveillance Tech Company Cellebrite
Thumbnail: cyber
Cybersecurity
Cybersecurity

Citizens do not know they are “monitored” by the Russian SORM system

21 Feb 2023
News
Citizens do not know they are “monitored” by the Russian SORM system
21 Feb 2023
Citizens do not know they are “monitored” by the Russian SORM system
surveillance
Cybersecurity
Cybersecurity

Citizens do not know they are “monitored” by the Russian SORM system

21 Feb 2023
News
Citizens do not know they are “monitored” by the Russian SORM system
21 Feb 2023
Citizens do not know they are “monitored” by the Russian SORM system
European Ombudsman surveillance
Cybersecurity
Cybersecurity

European Commission Approves Telco Ad Platform Plan

13 Feb 2023
News
European Commission Approves Telco Ad Platform Plan
Emma Woollacott ↗
13 Feb 2023
European Commission Approves Telco Ad Platform Plan
Image: Don’t stop encrypting
Digital Security
Digital Security

What encryption is, and why Kenyans should keep using it

21 Oct 2022

In this blog, we examine what end-to-end encryption is, how it works, and why Kenyans should keep using it.

Post
What encryption is, and why Kenyans should keep using it
21 Oct 2022
What encryption is, and why Kenyans should keep using it
Digital rights
Freedom of Expression
Freedom of Expression

UN roundup and delegate guide: digital rights at the United Nations

14 Sep 2022

Our new brief tracks progress on digital rights at the UN, providing recommendations for advancing international norms and standards to safeguard human rights online. 

Publication
UN roundup and delegate guide: digital rights at the United Nations
14 Sep 2022
UN roundup and delegate guide: digital rights at the United Nations
Thumbnail: cyber
Cybersecurity
Cybersecurity

CERT-In rules: Data privacy and security not mutually exclusive

2 Jul 2022
News
CERT-In rules: Data privacy and security not mutually exclusive
2 Jul 2022
CERT-In rules: Data privacy and security not mutually exclusive
EARN IT Act
Cybersecurity
Cybersecurity

Indian CERT’s Directions will weaken cybersecurity and privacy: experts call for deferral and public consultation

27 Jun 2022

Access Now supports cybersecurity experts from around the world in calling on India’s CERT-In to defer implementation of the new April Directions.

Press Release
Indian CERT’s Directions will weaken cybersecurity and privacy: experts call for deferral and public consultation
27 Jun 2022
Indian CERT’s Directions will weaken cybersecurity and privacy: experts call for deferral and public consultation
EARN IT Act
Digital Security
Digital Security

India’s CERT-In must withdraw April Directions and strengthen privacy and cybersecurity

1 Jun 2022

Access Now and a coalition of organisations and individuals are urging India’s CERT-In to withdraw the April Directions.

Press Release
India’s CERT-In must withdraw April Directions and strengthen privacy and cybersecurity
1 Jun 2022
India’s CERT-In must withdraw April Directions and strengthen privacy and cybersecurity
||
Cybersecurity
Cybersecurity

Meta, Alphabet, and Amazon: A shareholder’s guide to supporting human rights

24 May 2022

We urge Meta, Alphabet, and Amazon shareholders to support greater accountability for the companies’ human rights impacts.

Post
Meta, Alphabet, and Amazon: A shareholder’s guide to supporting human rights
24 May 2022
Meta, Alphabet, and Amazon: A shareholder’s guide to supporting human rights