ISC Updates

In order to keep you informed about what we’re doing, we produce regular updates highlighting the ISC Project’s successes and achievements, as well as the successes and achievements of our partners. These include brief reports about our past events as well as news about information security innovations that we have helped our partners to come up with and implement.

The ISC Project’s FY2016 Round of Small Technology Grants Is Now Closed

As of June 30, 2016, the ISC Project closed its most recent round of Small Technology Grants.

For information purposes, you can still view the now archived Request for Applications (RFA) and download the grant application:

Read More

Finally, some good news about Organizational Security

This joint post comes from a group of organizational security practitioners from digital rights groups around the world, including the ISC Project’s Kody Leonard. It was drafted in preparation for a gathering at the Internet Freedom Festival on March 1-6, 2016, in Valencia, Spain.

When a group of us “organizational security practitioners” gathered in Prague in February 2016, we were cautiously optimistic about what we could achieve.

Many security experts and practitioners have been gaining invaluable experience while working to strengthen human right defenders and civil society organizations’ awareness, ability, and confidence in thwarting security threats while continuing on their striving for positive change. Read More

Project Shield – Google’s Anti-DDoS Service for Human Rights, Election Monitoring, and Media Organizations Websites

Every day, malicious attacks take down websites belonging to activists and independent media around the world. In many countries, these sites are often the only outlet for alternative information to that distributed by state authorities, so these attacks can effectively silence the voices speaking out on human rights, anti-corruption, and other critical issues. Distributed denial of service (DDoS) is one common type of attack in which an adversary controls and directs a large number of computers to visit the targeted website all at the same time. Read More

Meet Peerio, A Cloud-Based Open-Source End-to-End Encrypted Messaging Platform

There are several available options for secure online messaging and document sharing. A new entry in this field is Peerio.

Peerio combines messaging, group chat, and document sharing capabilities on one platform, similar to services like Gmail and Dropbox. However, unlike other platforms, Peerio features complete end-to-end encryption of all communications sent via the service. Read More

SMEX launches Tasharuk, a Collaborative Knowledge Base for Netizens

Do you believe in collaboration? Are you looking to share your training materials or learn from others? Would you benefit from a repository of knowledge focused on digital media? If so, we invite you to become a user of Tasharuk, a new collaborative knowledge base where netizens can search, add, collect, share, and rate resources that focus on using social technologies to strengthen their societies. Read More

The Open Integrity Index Helps You Make Smart Choices about Online Privacy Tools and Services

Those online sometimes encounter restrictions to their freedom of expression and access to information. This is often the case for activists and journalists working in illiberal societies. While software developers have created a variety of circumvention, anonymity, and privacy tools and services, the privacy and security risks associated with specific tools are often unclear. Read More

Lantern field testing and translation help to ensure user safety

As Internet connectivity continues to expand global access to information, website blocking and other forms of censorship have become more prevalent. To safeguard access to information, users sometimes require robust and reliable tools to bypass Internet blockages. One great option is Lantern, a censorship circumvention tool developed by the US-based Brave New Software. Lantern helps users access blocked Internet content by employing a peer-to-peer (P2P) trust network. Read More

Tor User Experience Report

Activists working in dangerous environments often know that they must protect themselves online but fail to do so because the required software is difficult to configure, use, or understand. As a result, many users simply ignore these tools and remain vulnerable to online censorship, surveillance, and attacks. Read More

InformaCam’s Testing and Translation to Aid in Field Reporting and Evidence Gathering

In the fast-paced, high-stakes world of human rights reporting, the ability to quickly source and verify on-the-ground data is essential. Today, one of the most prominent sources of on-the-ground footage and documentation of human rights abuses is smartphone media. Read More

StoryMaker Reduces Threats to Citizen Journalists

In the fast paced, ever-changing world of citizen activism, timely on-the-ground media coverage of critical events increasingly depends on stories produced by citizen journalists. These are often the authors who are uniquely positioned to capture the photos and video footage of events as they happen and transmit that information globally from their mobile phones. Unfortunately, as citizen journalists witness and report stories, they become frequent targets of violence and surveillance. Read More

Project Byzantium

In emergency situations such as post-disaster environments, communication and coordination often become difficult due to damaged, inoperable, or insufficient infrastructure.  To address these challenges, HacDC (a non-profit group of developers based in Washington, DC) created Project Byzantium, an inexpensive and easy-to-deploy replacement for wireless communication infrastructure.  Read More

Ethersheet 1.0

Over the past several years, online office tools such as Google Docs have become an integral part of many people’s lives. These tools allow you to collaborate and create documents, spreadsheets, surveys, and presentations online and in real time. However, many of these tools are privately owned and are not designed to prioritize security and anonymity. Read More

OONIBear Detects and Locates Man-in-the-Middle Attacks

While the use of public-key encryption helps to protect users’ communications and data from unwanted and potentially malicious viewers, it is not an invulnerable solution. The current X.509 public-key infrastructure (PKI) is susceptible to man-in-the-middle (MitM) attacks. They allow an attacker to intercept an existing connection as well as read and modify a victim’s encrypted communication with a server. Read More

Gpg4win Now Available for Microsoft Outlook 2010/2013

Strong cryptography is essential to anyone who wants to communicate and transfer information safely online. Public-private key cryptography is especially useful, as it does not depend on secure channels for key exchange. Gpg4win is one such open-source email and file encryption solution for Windows users.The ISC Project is happy to announce that Gpg4win is now available for Microsoft Outlook 2010/2013 and now includes support for 64-bit versions of Microsoft Windows. Read More