Cyberwomen © 2017– Institute for War and Peace Reporting

Cyberwomen © 2017– Institute for War and Peace Reporting

Cyberwomen © 2017– Institute For War And Peace Reporting https://iwpr.net/ Esta obra se encuentra licenciada bajo Atribución-CompartirIgual 4.0 Internacional (CC BY-SA 4.0). https://creativecommons.org/licenses/by-sa/4.0/deed.es Contents I Introduction 13 1 Introduction to Cyberwomen 15 Using the Cyberwomen Curriculum . 16 2 Planning resources 21 Pre-Training Assessments ................... 21 Example training agendas ...................23 3 Acknowledgments 25 II Trust-building exercises 27 4 The rules of the game 29 Leading the Exercise .........................30 Part 1 – The Rules of the Game . 30 Part 2 – “Traffic light” ...................... 31 5 Defenders bingo 33 Leading the Exercise .........................34 6 Tricky candy 37 Leading the Exercise ......................... 37 7 Who do you trust? 39 Leading the exercise .........................40 3 Contents III Rethinking our relationship with technology 41 8 Personal perceptions of security 43 Leading the session ..........................44 Part 1 - What is Safety for You? What is Security for You? . 44 Part 2 - What Does Digital Security Mean to You? . 46 Part 3 - Identifying Motivations, Resistances and Barriers . 46 Part 4 – Digital Security, Gender and Technology Myths . 47 Part 5 – Closing Affirmations . 50 References ...............................50 9 Your rights, your technology 51 Leading the Session .......................... 52 Part 1 – Connecting Rights with Technology . 52 Part 2 – Digital Security and Digital Rights Concepts . 53 References ............................... 55 10 Her-story of technology 57 Leading the Session .......................... 58 References ...............................59 IV Digital security basics 1 61 11 How does the internet work? 63 Leading the session ..........................64 Part 1 - How the Internet Works – Flow of Information and Points of Vulnerability. 64 Part 2 - Vulnerabilities .....................65 Part 3 - Good Practices for Digital Security . 66 References ...............................66 12 Building stronger passwords 67 Leading the Session ..........................68 Part 1 - Introduction .......................68 Part 2 - Why are Passwords Important? . 68 Part 3 - What Can Happen If Your Password is Compromised? 69 Part 4 - How are Passwords Commonly Compromised? . 69 Part 5 - How Can We Make our Passwords Stronger? . 70 References ............................... 71 4 13 Malware and viruses 73 Leading the Session ..........................74 Part 1 - Introduction to Malware . 74 Part 2 - How Can You Get Infected? . 74 Part 3 - Share Examples Involving Women & Women Human Rights Defenders ..................... 75 14 Safe browsing 77 Leading the Session ..........................78 Part 1 - Choosing a Browser ...................78 Part 2 – Safer Browsing Practices . 78 Part 3 – Tools and Extensions for Safer Browsing . 79 Referencia ............................... 81 15 How to secure your computer 83 Leading the Session ..........................84 Part 1 - Introduction .......................84 Part 2 – Physical Environments and Maintenance . 84 Part 3 – Software Safety .....................85 Part 4 – Data Protection and Backups . 87 Part 5 - Deleting Files and Recovering Them . 88 References ...............................88 V Privacy 91 16 Ask me anything! 93 Leading the Exercise .........................94 17 Privacy 97 Leading the Session ..........................98 Part 1 – Do We Truly Have Privacy? . 98 Part 2 – “Self-Doxxing” .....................98 Part 3 – What Do We Do Now? . 100 References ...............................101 18 Networked publics 103 Leading the session . 104 References ...............................105 5 Contents 19 Apps and online platforms 107 Leading the session . 108 Part 1 – Our Devices, Our Data . 108 Part 2 - Who Else is Tracking Us? . 109 Part 3 – Promoting Women’s Rights Using Social Networks . 110 Part 4 – Reclaiming Privacy . 111 References ...............................111 VI Safe online advocacy 113 20 Safer websites 115 Leading the session . 116 Part 1 – What Does an Online Attack Look Like? . 116 Part 2 – Protecting and Securing Websites . 117 References ...............................119 21 Safe online campaigning 121 Leading the session . 122 Part 1 – Introduction and Preventative Planning . 122 Part 2 – Protecting Devices . 123 Part 3 – Managing Account Access . 124 Part 4 – Choosing Apps for Campaigns . 125 Part 5 – Community Building through Facebook . 126 Part 6 – Informed Consent . 127 References ............................127 22 What does your metadata say about you? 129 Leading the session . 130 Part 1 - What is Metadata? . 130 Part 2 - Implications of Metadata in a Human Rights Context . 130 References ...............................131 VII Safer mobiles 133 23 Marco Polo 135 Leading the exercise . 136 24 Mobile phones 1 137 6 Leading the session . 138 Part 1 - What’s a Phone Made Of? . 138 Part 2 – Hands-On Practice . 139 References ...............................140 25 Mobile phones 2 141 Leading the session . 142 Part 1 – Encryption for Mobile Devices . 142 Part 2 – Using GPG on a Mobile Device . 142 Part 3 - Is Your Phone Tracking You? . 143 References ...............................143 VIII Anonymity 145 26 Secret friend 147 Leading the exercise . 148 Part 1 - Introduction . 148 Part 2 - Time to Play! . 148 Part 3 – Closing Circle . 150 27 Anonymity 151 Leading the session . 152 Part 1 – Introduction to Online Anonymity . 152 Part 2 – Identifying Data and Preserving Anonymity . 152 Part 3 – Some Hands-On Practice . 153 28 More online identities! 155 Leading the exercise . 156 Part 1 – Connected Online Identities . 156 Part 2 – Separating and Managing Online Identities . 157 Part 3 – Hands-On Practice and Recommendations . 158 References ...............................160 IX Encryption 161 29 Introduction to encryption 163 Leading the session . 164 Part 1 - Have You Used Encryption Before? . 164 7 Contents Part 2 - Explaining Encryption . 166 References ...............................166 30 Encrypted communication 167 Leading the session . 168 References ...............................168 X Digital security basics 2 169 31 Storage and encryption 171 Leading the session . 172 Part 1 – Data Backups and Planning . 172 Part 2 – Storage and Backup Encryption . 173 References ...............................173 32 Let’s reset! 175 Leading the session . 176 Part 1 – Dispelling the Myth . 176 Part 2 – So What Do We Mean by Resetting? . 176 Part 3 – Check-In: Do You Need to Backup? . 178 Part 4 – Resetting & Rebooting . 178 Part 5 – Live Operating Systems . 179 Part 6 – Hands-On Practice . 180 References ...............................181 XI Online violence against women 183 33 Spectogram 185 Leading the session . 186 34 A feminist internet 189 Leading the session . 190 Part 1 – Raising Awareness . 190 Part 2 - Feminist Principles of the Internet . 191 References ...............................191 35 Symbolic violence 193 Leading the exercise . 194 8 Part 1 - What is Symbolic Violence? . 194 Part 2 - Identifying Symbolic Violence for Ourselves . 195 References ...............................196 36 Reporting abuse on social media platforms 197 Leading the session . 198 References ...............................199 37 Let’s start a documentation journal! 201 Leading the session . 202 Part 1 - Why is Documentation Important? . 202 Part 2 – How Can We Document Incidents? . 203 Part 3 – Starting Our Documentation Journals . 206 Part 4 - Practices and Tips for Maintaining Documentation Journals . 206 38 Doxxing the troll 209 Leading the exercise . 210 Part 1 – What is Doxxing? . 210 Part 2 – Identifying Harassers . 211 Part 3 - Different Profiles, Different Motives . 211 Part 4 - Documenting Incidents & Threats . 212 Part 5 – Getting Ready . 215 Part 7 – Useful Tools . 216 References ...............................218 XII Sexting 219 39 Time to watch! 221 Leading the exercise . 221 40 Sexting 223 Leading the session . 224 Part 1 - Unpacking Social Stigma! . 224 Part 2 - What is Sexting? . 224 Part 3 – Safer Sexting? . 225 References ...............................227 9 Contents XIII Determining the best solution 229 41 Gender-based risk model 231 Leading the exercise . 232 Part 1 – Identifying Risks & Probabilities . 232 Part 2 – Determining Impacts . 234 Part 3 – Strategizing Solutions . 236 References ...............................237 42 Digital security decisions 239 Leading the session . 240 Part 1 - Introduction . 240 Part 2 – How Was Your Software Built? . 240 Part 3 – Thinking About Users . 241 Part 4 – Thinking About Tools . 242 Part 5 – Practice Thinking of Solutions . 243 Part 6 – Resources for Staying Up to Date . 244 43 I decide 245 Leading the exercise . 246 XIV 249 44 Privacy Policy 251 XV Planning ahead 253 45 Organizational security plans and protocols 255 Leading the session . 256 Part 1 – Return of the Risk Model . 256 Part 2 – Plans vs. Protocols . 257 Part 3 – Creating an Organizational Plan and Protocol . 258 Part 4 – What’s Next? . 259 46 Digital security plans and protocols 261 Leading the session . 262 Part 1 – Mapping Organizational Structures and Barriers . 262 Part 2 – Facilitating Organizational Implementation . 262 10 Part 3 – Starting the Conversation . 264 XVI Self-care 267 47 Building feminist self-care 269 Leading the exercise . 270 48 The loving touch 273 Leading the exercise . 274 49 Look 277 Leading the exercise . 278 50 Our reflection 279 Leading the eExercise . 280 51 The act of NO 283 Leading the exercise . 284 52 Love letter to myself 285 Leading the exercise . 286 XVII Closing and review exercises 287 53 Witch coven 289 Leading the exercise . ..

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    328 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us