Skip to main content

Egypt: No to Illegal Confiscation of Personal Devices

On the 30th of June 2009, the security officers at Cairo International Airport have detained an activist blogger, Wael Abbas, who frequently writes about torture cases and police abuse in Egypt. Mr. Abbas was also frisked and the officers confiscated his laptop computer and other belongings.
By this conduct the police violated the following articles of the Egyptian constitution which says:

Article 41:"…no person may be arrested, inspected, detained or his freedom restricted or prevented from free movement except by an or necessitated by investigations and preservation of the security…"
Article 42:"…Any person may not be detained or imprisoned except in places defined by laws organizing prisons…"
Article 45:"…wires, telephone calls and other means of communication shall have their own sanctity and secrecy and may not be confiscated or monitored except by a causal judicial warrant…"
Actually confiscating personal devices such as mobiles, laptops, cameras, portable hard-drives during social peaceful protests, in the airports and different other places became a remarkable trend followed by the Security Services.
Such devices may contain personal information, pictures and files which should not be uncovered without judicial warrant. Further over Bloggers, Human Rights Defenders and Political Activists, especially in the Arab region, are highly subjected to this kind of threats, intimidations and violations.
Consequently, a group of Egyptian bloggers ,including Mr. Abbas, and human rights activists, came-up with the idea of designing a Badge to be used on Blogs and Websites having the following title: No to Illegal Confiscation of Personal Devices.
A Facebook Event was created to circulate the badge and to invite people to support.
How can you help?
- Add the badge to your blog/website.
- Write articles about the issue of illegal and extrajudicial confiscation of personal belongings.
- Invite your friends to do the same.

Support the Cause, Put the Badge and Spread the Word.
* By EBfHR Editor, Published on Global Voices Online

Popular posts from this blog

رحلتي في التعافي على مدار ٤ سنين

مفيش اي حد حقيقي هيساعدك غير نفسك.. صدقني مهما كان القاع مظلم وحاسس الحياة متهالكة احضن نفسك طمن نفسك وامسك ايدك خطوات صغيرة. ده عبارة عن مجموعة صور كل واحد بيحكي رحلتي في التعافي والصحة النفسية والبدنية على مدار اخر ٤ سنين عملت فيهم ٣ عمليات جراحية منهم اثنين في رجلي اليمين كان جالي كذا تمزق في الغضروف، واستئصال الزايدة لانها كانت على وشك تعمل بووم. كنت بعارف جامد مع الاكتئاب والتروما، وحالتي النفسية كانت متهالكة تماما ومعاها جسمي وروحي... [قضيت فترات بصلح جسمي] وزني وصل ١٢٥ كيلو على مشاكل غضروف وصدرية وكوليسترول، كنت دبدوب بكرش ثري دي بسند عليه الكيبورد والشاي. المهم، بدأت رحلتي في التعافي خطوات صغيرة، تكريس كل وقتي في تحسين وتطوير حالتي النفسية والبدنية ومعاها الروحانية.. مزيج من الرسم، والتليون، والرقص، والطبلة، والملاكمة، وتاي تشي، وسكاي دايفينج انا فتحت باب الطيارة ونطيت كذا مرة، وسباحة، وركوب عجل يوميا، وجري، وتسلق..  بس حقيقي من كل التجارب دي اكتر حاجة دخلت فيها بقوة ومزاج هي رياضة الكاليسثنكس، واهم حاجة عملتها اني اخدت التعافي بدوام كامل واقصى التزام اقدر عليه. مكنش ...

Few words on Encryption and Egypt

In dangerous times - whether during conflict, unrest, or disinformation - encryption isn’t a luxury. It’s a life-saving layer of security for individuals and societies. Weakening it doesn’t make us safer; it makes everyone more vulnerable. And no one is safe until everyone is safe. A few words on #encryption and #Egypt's context: 1. On decryption assistance mandates and Egypt’s context Decryption assistance mandates - as in forcing companies or individuals to provide access to encrypted data - don’t really function in practice, whether in Egypt or elsewhere. In Egypt’s case, we don’t see explicit legal mechanisms for ‘lawful access’ like those proposed in Western debates, but we do see functional equivalents through other means: broad surveillance powers, vague national security clauses, pressure on service providers, infrastructure ownership by the state, and granting isps and mobile operators secret licenses that gives the security full access to backend. There’s no clear overs...