METHODOLOGY

As part of the research process investigating the use of new technologies and their various impacts on society, SHARE Foundation launched an ongoing monitoring database of violations of the rights of citizens and organizations in Serbia in mid-2014. In addition to insight into trends in this area, the periodically published monitoring reports have enabled us to better direct pressure on responsible institutions to improve and apply the legal protection framework, as well as to contribute to the development of our society's awareness and knowledge of security and risks on the Internet. It is important to note that the cases entering the monitoring database are not only limited to the conventional top to bottom social structures such as government entities towards individuals, but also include violations from actors such as private companies and citizens themselves. The goal is for such cases to become and remain publicly available in order to bring their ubiquity closer to the public, but also to educate about the ways in which such violations can occur. Also, pointing out these violations can contribute to building the capacity of citizens, media and non-governmental organizations to adequately respond to them. While there is no universal way to protect against digital rights violations, awareness and good personal digital hygiene can help prevent or resolve such cases if they are to occur. The monitoring project is in line with SHARE Foundation's overall mission, which is: Control of the powerful and support of the underprivileged in digital spaces.

Compared to the previous versions, the categories, subcategories, but also the ways of collecting cases, as well as the recording and descriptions themselves have been changed. Since 2014, when the monitoring process was started by the SHARE Foundation, the methodology has changed a few times in order to better capture and describe the types of violations through subcategories, either by updating the names of subcategories or adding new ones. For example, in the 2.0 version of the methodology that was released in 2018, additional subcategories were added for several types of violations, a new means of attack (Confiscation and searches) but also a new category called Other violations in order to encapsulate violations that do not fall under any of the existing categories. The last updated version (v2.1) from 2019 underwent minor changes in the Manipulations and propaganda category for adjustment when taking into account violations across countries.

The development of both technical and legal tools, as well as the volume of registered cases, meanwhile posed an increasing challenge to our researchers when selecting and classifying injuries according to the old methodology. Therefore in 2022, we started a review of the existing case base, with the intention of radically reforming the digital rights monitoring system.

Criteria for entering cases

To begin with, we redefined the case selection criteria. The first criterion is always mandatory.

  1. The nature of the injury. The incident happened in the digital space, the damage was caused to digital assets and/or digital rights were violated.

Additionally, the case must meet at least one of the three qualifying criteria:

  1. The extent of the injury. The incident is massive, affecting a large number of citizens or other actors in the community.
  2. Social significance. The context and potential consequences of the injury affect the underlying values or relationships in society.
  3. Innovativeness. Technical means, methods, objectives or other elements of the incident are significantly more advanced than in previous cases.
Categories

A more precise definition of the criteria led to changes in the classification of cases, so they are now classified into one of three categories:

  1. Cyber attacks. Technical incidents, the primary goal of which is the intentional endangerment of computer infrastructure.
  2. Privacy and protection of personal data. This group includes cases of violations, i.e. non-fulfillment of measures prescribed by law, which result in the violation of these personal rights in the digital sphere.
  3. Fraud, threats and manipulations. This category includes various information disorders and manipulations of digital content for the purpose of deception, retaliation, attacks on personality, and prevention of the exercise of personal rights.

Each of these categories is further segmented by specific types of incidents. Also, for each category, possible means, i.e. methods of attack, are listed and, although detailed, due to the rapid development of new technologies, this list is not comprehensive. All three categories, as well as their subcategories, were conceived and named in accordance with the consequences of specific violations in the digital space.

Although at first glance these three categories may seem separate, it is important to take into account that due to the size and interconnectedness of the digital space, cases can often be found in several different subcategories or even categories. As already stated, each category has its own subcategories within which the cases are more closely defined as well as the list of means by which the attacks were carried out. However, there are some differences and that is why it was decided that each category processes its cases separately, because the means can differ in these three spheres of digital space. The actors in these spheres also differ, so for example, in the second category, the violators of rights are mostly states or companies, in the third category it would mostly be citizens or politicians.

Sources of information about incidents

The primary source of monitoring is the public sphere, i.e. traditional and social media. Relevant news and announcements about all potential cases are collected by researchers through an automated process through a defined set of keywords for each category.

Secondary sources consist of databases of injuries and related contents of organizations, associations and other actors that independently monitor incidents in their domain (databases of attacks on journalists, national CERT, commissioners and similar).

Processing of individual cases

A special methodological segment consists of guidelines for researchers, created for uniformity in the selection and processing of incidents during their mapping and entry into the database.

After a specific violation has been identified and verified, the case is entered into the database with a brief description, while the evidence of the violation is archived, whether it is a screenshot of a tweet, a comment or article in which it was published. If available, the time period of the injury is recorded as well as the actors, i.e. the perpetrators of the injury and the injured parties, and the means, i.e. the methods of committing the injury, are also listed.

Principles of work

The revision of the methodology confirmed the basic principles of monitoring digital rights and freedoms, which apply to all of SHARE Foundations’ activities since its establishment:

Transparency. Periodical reports are narrative and leave room for the subjective impressions of researchers, as well as pointing out certain phenomena in accordance with common values and beliefs. However, the monitoring data in raw, machine-readable format is freely available for further use and different interpretations.

Accuracy. As part of the monitoring, researchers carry out basic verification of individual cases based on primary sources of information, for which SHARE Foundation is not responsible. Due to the limited scope of the verification, a mechanism for external correction has been established through an easily accessible, direct channel of communication with the researchers, through which citizens and organizations can deny, correct or supplement the available information about the case. All corrections can be submitted via email to the monitoring team.

Ethics. Researchers respect the privacy of those injured in the incidents they process for the purposes of monitoring, applying special protection measures when the dignity of the person is threatened in the incidents. The integrity of the monitoring base is subject to internal and external checks, while cases are selected according to established criteria, regardless of the researcher's personal beliefs, affection or distaste for the actors of the incident.

I Cyber incidents

Any impact on the integrity or availability of an information system, network or device with the intention of taking control over them, disrupting or interrupting their operation, or changing, stealing, deleting or blocking data on them.

Compromised data

Endangerment of security, confidentiality or integrity of data on an information system or individual device due to unauthorized access, taking control or misuse of data.

Means of attack

Malware (malicious software, virus)
Scams (phishing, skimming)
Traffic interception (man in the middle)
Device theft

Illustrative case

Servers and data of a public company have been the target of a ransomware attack: the so-called ransomware that encrypts data for which decryption requires the payment of a ransom.

Disabled services

Interrupting or disabling the operation of an information system, network or device by maximum engagement of their resources.

Means of attack

DoS/DDoS

Illustrative case

The information infrastructure of an academic network was targeted by distributed denial of service (DDoS) attacks - simultaneous requests from tens of thousands of IP addresses were sent to the servers, which caused the interruption or difficulty of the websites on the network.

Online scams

Exploiting people's trust, naivety, compassion, vanity or greed to extort money or data from them, or to manipulate them into causing a cyber incident themselves.

Means of attack

Social engineering (phishing/vishing/smishing, impersonation)
Fake resources (fake website, email)

Illustrative case

From an address that looks like an authentic email, citizens received a notification about downloading new credentials for accessing the public services portal. An infected document was attached to the message.

Overtaking control

Theft of device access or accounts for online services, including accounts for email, social media, online stores, and the like.

Means of attack

Technical attacks
Social engineering
Unauthorized physical access

Illustrative case

A media association lost access to its Facebook page, where unknown perpetrators began posting inappropriate content. The page was shut down, and the media association was forced to create a new one.

Actors

Perpetrators

Known
Unknown

Injured party

Public sector
Private sector
Civilian sector
Media sector
The public

II Privacy and data protection

The category is dedicated to violations of privacy and personal data in the digital space, from the stage of data collection to their eventual destruction, including unauthorized use through publication, or inadequate protection that leads to their leaking to the public.

Disclosure of data

Publishing information about private life, ie. personal data, with the executors intention to make that information publicly available.

Means of attack

Website posting (including public registries and platforms)
Posting on a social network, blog, chat app
Publication in the media

Illustrative case

An online portal has published a document on its website that contains data on the basis of which several persons can be identified, whose identity should not be publicly available.

Data leakage

Leakage of personal data due to inadequate security measures.

Means of attack

Website leaks (including public registries and platforms)
Posting on a social network, blog, chat app
Leaks in the media

Illustrative case

Personal information from a private company's database became available on social media due to an incident that occurred due to the negligence of their employees.

Unauthorized collection of personal data

Unauthorized collection of personal data, i.e. collection, holding and use of data in violation of the law.

Means of attack

Violation of the principle of limitation in relation to the purpose of processing
Violation of the principle of legality (processing without a legal basis)
Violation of the principle of data minimization
Violation of the principle of limitation of storage period

Illustrative case

A government authority uses an online application that collects more personal data than is necessary to provide the service the application is intended to provide.

Eavesdropping and recording

Interception of electronic communications, eavesdropping and recording, against the law and/or without the knowledge of the person whose communication, voice or recording is in question.

Means of attack

Interception equipment
Wiretapping equipment
Recording equipment

Illustrative case

The state agency monitored email communications between journalists and their sources without authorization.

Actors

Perpetrators

Responsible person from the public sector
Responsible person from the media sector
Responsible person from the corporate sector
A responsible person from a political party
Responsible person from the civil sector
Private person

Injured party

Mass casualty
Individual casualty

III Fraud, threats and manipulations

This category is dedicated to various forms of harassment and retaliation due to expression and activity on the Internet, as well as various forms of content dissemination and manipulation that are carried out in order to achieve certain goals. This category includes cases that play out in all aspects of the digital sphere, including social media activity, algorithmic governance, as well as cases that end up in court.

Public misinformation

Dissemination of information that is intentionally false or fabricated and placed with the aim of harming a person, social group, organization or state (disinformation), as well as spreading information that is based on the truth, but is placed with the malicious intent to harm a person, organization or state in order to discredit, abuse or spread hate speech (misinformation).

Means of attack

Creating and sharing fake content
Content manipulation

Illustrative case

A public figure spread unverified information on social networks.

Self censorship

Editing or removal of politically sensitive or public interest content by the media that originally published it. Bearing in mind that it is very difficult to know exactly whether it is external or internal pressure on the media, i.e. whether it is censorship or self-censorship, this subcategory includes cases in which content was not removed after clear abuse of legal mechanisms.

Means of attack

Content removal
Content modification

Illustrative case

The media portal removed a previously published text that mentioned criticism of the government

Character assassination

Creating fake accounts and content with the aim of discrediting, i.e. endangering the reputation and causing damage to an individual, social group, organization or state.

Means of attack

Creating fake content and accounts
Content manipulation
Impersonation
Distribution of content without consent
Non-consensual distribution of intimate content
Organized attacks on networks targeting vulnerable communities (women, lgbtq+, ethnic minorities, refugees and migrants)
Verbal attacks

Illustrative case

False allegations about a political organization were shared on social media from a fake profile.

Endangering security

Endangering security means attacks on the personality that cause fear and insecurity, in a shorter or longer period, but with greater intensity. Acts such as cyber stalking, threats, calls to violence and publication of personal data (doxxing) fall into this subcategory. Dignity and reputation, as well as privacy, are the target here, and the goal is to force a change in behavior - withdrawal from public life, from social networks, avoiding certain topics and the like. This subcategory also includes unauthorized sharing of personal information, including non-consensual distribution of intimate images or divulging trade secrets.

Means of attack

Verbal attacks
Collection, manipulation, dissemination and misuse of personal data
Doxxing
Direct threats of violence, including threats of a sexual or physical nature
Attacks based on gender and sexual characteristics
Cyber-mobbing
Stalking
Organized attacks on networks targeting vulnerable communities (women, lgbtq+, ethnic minorities, refugees and migrants)
Content filtering and automated moderation

Illustrative case

Death threats and insults sent to journalists’ private addresses.

Discrimination and hate speech

Verbal attacks based on racial, religious, national, ethnic, sexual, political, union and other affiliation and personal characteristics, such as age or economic status, are considered hate speech. Mobbing is also a frequent means of spreading discrimination and hate speech on networks, as well as organized attacks.

Means of attack

Verbal attacks
Collection, manipulation, dissemination and misuse of personal data
Content manipulation
Attacks based on gender and sexual characteristics
Attacks based on racial, religious, national or ethnic affiliation
Cyber-mobbing
Organized attacks on networks targeting vulnerable communities (women, lgbtq+, ethnic minorities, refugees and migrants)
Content filtering and automated moderation

Illustrative case

Discriminatory and false allegations about alleged crimes conducted by migrants were spread in the media and on social networks.

Limiting freedom of expression

Pressures due to expression on the Internet and publication of information often affect members of activist and media society, as well as citizens. These pressures can be reflected in the organized reporting of content, while sometimes they can also include the abuse of legal mechanisms such as SLAPP lawsuits, that is, strategic lawsuits against public participation for journalists or lawsuits for criminal acts such as insult. This subcategory also includes cases where intermediaries (in most cases platforms) remove content or suspend accounts through automated processes due to alleged violations of their rules or terms of use. The most common reasons are inappropriate content and copyright infringement. Decisions are often non-transparent and final, but may also be temporary and revised (due to an error in the automation system or cases of organized reporting).

Means of attack

Organized reporting of accounts or content
Abuse of legal mechanisms
Content filtering and automated moderation
Verbal attacks
Retaliation

Illustrative case

Reporters received misdemeanor charges after attending the protests.

Actors

Perpetrators

Political subject
Authority figures
Big tech
Private companies
Media sector
Individual
Public figures

Injured party

Political subject
Civil society
Media sector
The public
Public figures

Gender based online violence

A form of violence that primarily affects women, girls and sexual minorities. Unlike the other three, this category is applied as an additional framework to all cases in the database in order to get a clearer picture of the prevalence of gender-based violence. The category consists of four subcategories in which funds are clearly defined and match funds from other categories.

Invasion of privacy

Collection, manipulation, dissemination and misuse of personal data
Doxxing
Non-consensual distribution of content (including intimate content)

Character assassination

Creating fake accounts
Identity theft
Content manipulation
Sharing false information and comments for the purpose of discreditation

Harassment

Direct threats of violence, including threats of a sexual or physical nature
Attacks based on gender and sexual characteristics
Cyber-mobbing
Stalking

Targeted and organized attacks on communities

Spreading fake news with malicious intent to discredit organizations and groups within certain communities
Organized attacks on networks targeting vulnerable communities (women, lgbtq+, ethnic minorities, refugees and migrants)
Surveillance