Cyberwomen © 2017– Institute for War and Peace Reporting
Total Page:16
File Type:pdf, Size:1020Kb
Cyberwomen © 2017– Institute For War And Peace Reporting https://iwpr.net/ Esta obra se encuentra licenciada bajo Atribución-CompartirIgual 4.0 Internacional (CC BY-SA 4.0). https://creativecommons.org/licenses/by-sa/4.0/deed.es Contents I Introduction 13 1 Introduction to Cyberwomen 15 Using the Cyberwomen Curriculum . 16 2 Planning resources 21 Pre-Training Assessments ................... 21 Example training agendas ...................23 3 Acknowledgments 25 II Trust-building exercises 27 4 The rules of the game 29 Leading the Exercise .........................30 Part 1 – The Rules of the Game . 30 Part 2 – “Traffic light” ...................... 31 5 Defenders bingo 33 Leading the Exercise .........................34 6 Tricky candy 37 Leading the Exercise ......................... 37 7 Who do you trust? 39 Leading the exercise .........................40 3 Contents III Rethinking our relationship with technology 41 8 Personal perceptions of security 43 Leading the session ..........................44 Part 1 - What is Safety for You? What is Security for You? . 44 Part 2 - What Does Digital Security Mean to You? . 46 Part 3 - Identifying Motivations, Resistances and Barriers . 46 Part 4 – Digital Security, Gender and Technology Myths . 47 Part 5 – Closing Affirmations . 50 References ...............................50 9 Your rights, your technology 51 Leading the Session .......................... 52 Part 1 – Connecting Rights with Technology . 52 Part 2 – Digital Security and Digital Rights Concepts . 53 References ............................... 55 10 Her-story of technology 57 Leading the Session .......................... 58 References ...............................59 IV Digital security basics 1 61 11 How does the internet work? 63 Leading the session ..........................64 Part 1 - How the Internet Works – Flow of Information and Points of Vulnerability. 64 Part 2 - Vulnerabilities .....................65 Part 3 - Good Practices for Digital Security . 66 References ...............................66 12 Building stronger passwords 67 Leading the Session ..........................68 Part 1 - Introduction .......................68 Part 2 - Why are Passwords Important? . 68 Part 3 - What Can Happen If Your Password is Compromised? 69 Part 4 - How are Passwords Commonly Compromised? . 69 Part 5 - How Can We Make our Passwords Stronger? . 70 References ............................... 71 4 13 Malware and viruses 73 Leading the Session ..........................74 Part 1 - Introduction to Malware . 74 Part 2 - How Can You Get Infected? . 74 Part 3 - Share Examples Involving Women & Women Human Rights Defenders ..................... 75 14 Safe browsing 77 Leading the Session ..........................78 Part 1 - Choosing a Browser ...................78 Part 2 – Safer Browsing Practices . 78 Part 3 – Tools and Extensions for Safer Browsing . 79 Referencia ............................... 81 15 How to secure your computer 83 Leading the Session ..........................84 Part 1 - Introduction .......................84 Part 2 – Physical Environments and Maintenance . 84 Part 3 – Software Safety .....................85 Part 4 – Data Protection and Backups . 87 Part 5 - Deleting Files and Recovering Them . 88 References ...............................88 V Privacy 91 16 Ask me anything! 93 Leading the Exercise .........................94 17 Privacy 97 Leading the Session ..........................98 Part 1 – Do We Truly Have Privacy? . 98 Part 2 – “Self-Doxxing” .....................98 Part 3 – What Do We Do Now? . 100 References ...............................101 18 Networked publics 103 Leading the session . 104 References ...............................105 5 Contents 19 Apps and online platforms 107 Leading the session . 108 Part 1 – Our Devices, Our Data . 108 Part 2 - Who Else is Tracking Us? . 109 Part 3 – Promoting Women’s Rights Using Social Networks . 110 Part 4 – Reclaiming Privacy . 111 References ...............................111 VI Safe online advocacy 113 20 Safer websites 115 Leading the session . 116 Part 1 – What Does an Online Attack Look Like? . 116 Part 2 – Protecting and Securing Websites . 117 References ...............................119 21 Safe online campaigning 121 Leading the session . 122 Part 1 – Introduction and Preventative Planning . 122 Part 2 – Protecting Devices . 123 Part 3 – Managing Account Access . 124 Part 4 – Choosing Apps for Campaigns . 125 Part 5 – Community Building through Facebook . 126 Part 6 – Informed Consent . 127 References ............................127 22 What does your metadata say about you? 129 Leading the session . 130 Part 1 - What is Metadata? . 130 Part 2 - Implications of Metadata in a Human Rights Context . 130 References ...............................131 VII Safer mobiles 133 23 Marco Polo 135 Leading the exercise . 136 24 Mobile phones 1 137 6 Leading the session . 138 Part 1 - What’s a Phone Made Of? . 138 Part 2 – Hands-On Practice . 139 References ...............................140 25 Mobile phones 2 141 Leading the session . 142 Part 1 – Encryption for Mobile Devices . 142 Part 2 – Using GPG on a Mobile Device . 142 Part 3 - Is Your Phone Tracking You? . 143 References ...............................143 VIII Anonymity 145 26 Secret friend 147 Leading the exercise . 148 Part 1 - Introduction . 148 Part 2 - Time to Play! . 148 Part 3 – Closing Circle . 150 27 Anonymity 151 Leading the session . 152 Part 1 – Introduction to Online Anonymity . 152 Part 2 – Identifying Data and Preserving Anonymity . 152 Part 3 – Some Hands-On Practice . 153 28 More online identities! 155 Leading the exercise . 156 Part 1 – Connected Online Identities . 156 Part 2 – Separating and Managing Online Identities . 157 Part 3 – Hands-On Practice and Recommendations . 158 References ...............................160 IX Encryption 161 29 Introduction to encryption 163 Leading the session . 164 Part 1 - Have You Used Encryption Before? . 164 7 Contents Part 2 - Explaining Encryption . 166 References ...............................166 30 Encrypted communication 167 Leading the session . 168 References ...............................168 X Digital security basics 2 169 31 Storage and encryption 171 Leading the session . 172 Part 1 – Data Backups and Planning . 172 Part 2 – Storage and Backup Encryption . 173 References ...............................173 32 Let’s reset! 175 Leading the session . 176 Part 1 – Dispelling the Myth . 176 Part 2 – So What Do We Mean by Resetting? . 176 Part 3 – Check-In: Do You Need to Backup? . 178 Part 4 – Resetting & Rebooting . 178 Part 5 – Live Operating Systems . 179 Part 6 – Hands-On Practice . 180 References ...............................181 XI Online violence against women 183 33 Spectogram 185 Leading the session . 186 34 A feminist internet 189 Leading the session . 190 Part 1 – Raising Awareness . 190 Part 2 - Feminist Principles of the Internet . 191 References ...............................191 35 Symbolic violence 193 Leading the exercise . 194 8 Part 1 - What is Symbolic Violence? . 194 Part 2 - Identifying Symbolic Violence for Ourselves . 195 References ...............................196 36 Reporting abuse on social media platforms 197 Leading the session . 198 References ...............................199 37 Let’s start a documentation journal! 201 Leading the session . 202 Part 1 - Why is Documentation Important? . 202 Part 2 – How Can We Document Incidents? . 203 Part 3 – Starting Our Documentation Journals . 206 Part 4 - Practices and Tips for Maintaining Documentation Journals . 206 38 Doxxing the troll 209 Leading the exercise . 210 Part 1 – What is Doxxing? . 210 Part 2 – Identifying Harassers . 211 Part 3 - Different Profiles, Different Motives . 211 Part 4 - Documenting Incidents & Threats . 212 Part 5 – Getting Ready . 215 Part 7 – Useful Tools . 216 References ...............................218 XII Sexting 219 39 Time to watch! 221 Leading the exercise . 221 40 Sexting 223 Leading the session . 224 Part 1 - Unpacking Social Stigma! . 224 Part 2 - What is Sexting? . 224 Part 3 – Safer Sexting? . 225 References ...............................227 9 Contents XIII Determining the best solution 229 41 Gender-based risk model 231 Leading the exercise . 232 Part 1 – Identifying Risks & Probabilities . 232 Part 2 – Determining Impacts . 234 Part 3 – Strategizing Solutions . 236 References ...............................237 42 Digital security decisions 239 Leading the session . 240 Part 1 - Introduction . 240 Part 2 – How Was Your Software Built? . 240 Part 3 – Thinking About Users . 241 Part 4 – Thinking About Tools . 242 Part 5 – Practice Thinking of Solutions . 243 Part 6 – Resources for Staying Up to Date . 244 43 I decide 245 Leading the exercise . 246 XIV 249 44 Privacy Policy 251 XV Planning ahead 253 45 Organizational security plans and protocols 255 Leading the session . 256 Part 1 – Return of the Risk Model . 256 Part 2 – Plans vs. Protocols . 257 Part 3 – Creating an Organizational Plan and Protocol . 258 Part 4 – What’s Next? . 259 46 Digital security plans and protocols 261 Leading the session . 262 Part 1 – Mapping Organizational Structures and Barriers . 262 Part 2 – Facilitating Organizational Implementation . 262 10 Part 3 – Starting the Conversation . 264 XVI Self-care 267 47 Building feminist self-care 269 Leading the exercise . 270 48 The loving touch 273 Leading the exercise . 274 49 Look 277 Leading the exercise . 278 50 Our reflection 279 Leading the eExercise . 280 51 The act of NO 283 Leading the exercise . 284 52 Love letter to myself 285 Leading the exercise . 286 XVII Closing and review exercises 287 53 Witch coven 289 Leading the exercise . ..