top of page

Digital security

Digital security mainly deals with self-security whereby thing like a person doesn’t steal you identity and writes bad stuff about you also thing like not pinpointing you location where stokers would or may do harm. A good strong password is recommended which consist of a capital letter, lower case latter and a number and should be at least 8 characters.

 

Cyberbullying is the use of information technology to repeatedly harm or harass other people in a deliberate manner. According to U.S. Legal Definitions, Cyber-bullying could be limited to posting rumors or gossips about a person in the internet bringing about hatred in other’s minds; or it may go to the extent of personally identifying victims and publishing materials severely defaming and humiliating them.”

 

 

 

they are alot of cyber crimes. so with that yo need to protect your course alot of people are hacking into your account and stealing your information and pretending to be and course harm to other. they have been a lot of stories whereby people do that and it is not good and nice unto otherers like for example

Cyber Bullying Stories: The Ryan Halligan Case (1989 – 2003)

The Cyberbullying Story:the website operated by Ryan’s parents, John and Kelly Halligan, early concerns about Ryan’s speech, language and motor skills development led to him receiving special education services from pre-school through the fourth grade. Ryan’s academic and physical struggles made him the regular target of a particular bully at school between the fifth and seventh grade. In February 2003, a fight between Ryan and the bully not only ended the harassment at school, but led to a supposed friendship. However, after Ryan shared an embarrassing personal story, the newly found friend returned to being a bully and used the information to start a rumour that Ryan was gay. The taunting continued into the summer of 2003, although Ryan thought that he had struck a friendship with a pretty, popular girl through AOL Instant Messenger (AIM). Instead, he later learned that the girl and her friends thought it would be funny to make Ryan think the girl liked him and use it to have him share more personally embarrassing material—which was copied and pasted into AIM exchanges with her friends. On October 7, 2003, Ryan hanged himself in the family bathroom. After his son’s death, John discovered a folder filled with IM exchanges throughout that summer that made him realize “that technology was being utilized as weapons far more effective and reaching [than] the simple ones we had as kids.”Aftermath: There were no criminal charges filed following Ryan’s death because no criminal law applied to the circumstances. Seven months after Ryan’s death, Vermont’s Bully Prevention Law (ACT 117) was signed into law by Governor Jim Douglas. John Halligan also authored Vermont’s Suicide Prevention Law (ACT 114), which passed unchanged in April 2006.

 

or Cyber Bullying Stories: The  Megan Meier Case (1992 – 2006)

 

The Cyberbullying Story: In December 2007, Tina Meier founded the nonprofit Megan Meier Foundation. The non-profit was named in honour of Tina’s 13-year-old daughter who hanged herself in a bedroom closet in October 2006. Megan struggled with attention deficit disorder and depression in addition to issues with her weight. About five weeks before her death, a 16-year-old boy named Josh Evans asked Megan to be friends on the social networking website MySpace. The two began communicating online regularly, although they never met in person or spoke on the phone. “Megan had a lifelong struggle with weight and self-esteem,” Tina said on the Foundation website. “And now she finally had a boy who she thought really thought she was pretty.”

In mid-October, Josh began saying he didn’t want to be friends anymore, and the messages became more cruel on October 16, 2006, when Josh concluded by telling Megan, “The world would be a better place without you.” The cyberbullying escalated when additional classmates and friends on MySpace began writing disturbing messages and bulletins. Tina said on the Foundation website that it was about 20 minutes after Megan went to her room after leaving the computer that the mother found her daughter had hanged herself in her bedroom closet. Megan died the following day, three weeks before what would have been her 14th birthday.

Aftermath: According to the Associated Press, it was later that fall when a neighbor informed Megan’s parents that Josh was not a real person. Instead, the account was created by another neighbor, Lori Drew, her 18-year-old temporary employee Ashley Grills, and Drew’s teenage daughter, who used to be friends with Megan. One year later, the case began receiving national attention. While the county prosecutor declined to file any criminal charges in the case, federal prosecuted charged her with one count of conspiracy and three violations of the Computer Fraud and Abuse Act for accessing protected computers without authorization. A federal grand jury indicted Drew on all four counts in 2008, but U.S. District Judge George Wu acquitted Drew in August 2009 and vacated the conviction.

In addition to the Megan Meier Foundation, Tina also worked closely to help Missouri legislature pass Senate Bill 818, unofficially known as “Megan’s Law” in August 2008. In April 2009, U.S. Representative Linda Sánchez of California introduced the “Megan Meier Cyber bullying Prevention Act.“, which aimed to end the harassment of a cyberbully seriously – but unfortunately it was not enacted

 

these are one of the many stories of cycber bullying which has effected a lot of people in they live and little was done to help these helpless soul.

In the last 10 years many policy issues have been introduced, debated and in some cases institutionalized in national legislation or internet standards. These policies were aimed at increasing web security, set technical standards, ensure access or deal with cyber security issues. However, in the last years APC and Tactical Tech have witnessed a trend where digital security is being criminalized, new technologies are developed to undermine digital security and the data business model of the internet is raising new challenges for access, inclusion and privacy. This is specifically detrimental for political actors and marginalized communities. To raise awareness on new policy issues in the internet governance landscape APC and Tactical Tech will hold a break out session on new policy issues.

In the lead up to the IGF 2015 Tactical Tech and APC will engage in a mapping of the new policy issues around digital security. The findings of this mapping will set the stage for the framing of the break out groups. The break out group will start with a quick intro to the topic that will present the highlights of a mapping on the policy issues around digital security. After this initial short introduction the participants break out in groups and discuss these sub-issues further.

bottom of page