What follows is an introductory description of the ECSA v1 Demo, available at the end of this walk-through.
This demo is companion to the Technical Report of the feasibility study into a European Capability for Situational
The demo was coded based on a fork of The Chokepoint Project’s web front-end, this fork was
previously known as "ECSA demo V.0", presented during the ECSA workshop.
Technical report scope
The ECSA tender requested a study into a number of requirements and goals which will have to be met by an eventual implementation.
To accurately estimate the necessary effort and resources to meet these objectives, these requirements and goals have been translated into work units.
A work unit is a package of activities and resources which, when completed, yields some technical or operational capability
that enables or fulfils the stated requirements and goals. It is in the context of the feasibility study that this demo is to be understood.
While it is impractical to repeat the entire feasibility study in this walk-through, some core aspects will be described. It is also important to understand that the demo
at the end of this walk-through is not a prototype, but a demonstration with both functioning and illustrative features.
The feasibility study was requested to study a possible implementation which would achieve the following goals:
- a. Monitor and map censorship and surveillance.
- b. Map high-risk countries or destinations where dual-use products are traded for its use in connection with human rights violations.
- c. Monitor, map and collect notifications of human rights violations with the support of ICT tools and provide secure channels for Human Rights defenders to share and
- d. Monitor, map and measure network incidents and network attacks (including those affecting systems of human rights organizations and activists).
- e. Monitor threats to Internet security, resilience and stability and where possible, establish their connection with human rights violations.
- f. Develop an early warning systems based human rights violations through ICT as key indicators.
- g. Monitoring restrictions of the Internet, media and ICT in times of elections.
- h. Monitor developments in internet policy and Internet regulation in target countries and their implementation: i.e.: new laws passed or amended affecting online rights.
- i. Publication of timely reports and alarms on relevant Internet policy, Internet security and human rights related events.
- j. Publication of timely reports and yearly reports analysing the information gathered to provide an expert analysis on the state of global Internet censorship and of the
gravest restrictions and human rights violations related to the use of Internet and other ICT’s.
- l. Improve the way in which ICTs facilitate effective communication in case of crisis management to link professionals, communities and actors involved in humanitarian and
- m. Support the work of circumvention tools and privacy enhancing technologies in adapting to new or evolving threat landscapes.
- n. Provide situational awareness to digital activists and human rights defenders.
- o. Help organizations wording in the field of cyber censorship further refine their research on the ground and further tailor their campaigning activities and the deployment of tools.
- The implementation of a dashboard to seamlessly aggregate and contextualise data
- The implementation of online interactive visualisations by means of Live-Maps
- The definition of the security measures applicable to the monitoring system
- The generation of alarms
- The generation of easy-to-read material and snapshot reports
- The implementation of a repository of 'processed information' (reports)
- The use of open standards, (preference for W3C and/or IETF standards) and protocols
- The use of standardised Applications Programming Interfaces (APIs)
- The specific software and hardware requirements, including hosting (redundant)requirements
- The possibility to integrate mobile applications
While not all of the above are directly relevant for an understanding of the Demo presented at the end of this walk-through it is certainly helpful in understanding what the demo
intends to demonstrate.