Unmasking Digital terrorism

The Internet touches almost all aspects of everyone’s daily life, whether we realize it or not. Defenders Protection Initiative has organised a digital security webinar that is designed to engage and educate public and CSO partners to raise awareness about the importance of cybersecurity, to share experiences and solutions to trending cyber insecurity.

Read More

The Digital Security Conference 2017

Defenders protection initiative is committed to re-enforcing the resilience of Human Rights Defenders against digital/cyber attacks. Following a survey to assess the digital security posture of civil society organisations in Uganda, DPI organised #DigiSecCon17; The Digital Security Conference 2017, themed,  “Why should Civil Society in Uganda Worry” that was held in Kampala at the Serena Conference Centre, on the 8th of September 2017.

Read More

Petya Cyber Attack

“This new Petya ransomware variant is like WannaCry without the kill switch, spreading automatically from computer to computer by itself and locking files,” Steve Malone, the director of security product management at Mimecast

Read More

Are Ugandan CSO’s FATF Compliant?

What is FATF

The Financial Action Task Force (FATF) is an inter-governmental “policy-making body, established in 1989 by the Ministers of its Member jurisdictions (including Uganda). 

Read More

Uganda Police in UShs 5bn spy deal

Police and Office of the President are in advanced stages of acquiring hi-tech surveillance software from Israel and Italy to begin large-scale spying on Ugandans, five years after the passage of the Interception of Communications Act, a leaked email by WikiLeaks reveals.

Read More

Lessons From the Mbabazi Petition Burglary Incident

After Uganda’s 2016 Presidential election, one of the former presidential candidates, Mr John Patrick Amama Mbabazi, made preparations to challenge the election results in the Supreme Court. The offices of his lawyers were however broken into in the night leading to the 9th of March 2016. Evidence for the petition was taken in documents and computer equipment. This incident obviously negatively affected the petition. There are conflicting opinions on the motive for the burglary and who the perpetrators of the burglary were.

Read More