Condensed Bibliography

Introduction to Public Interest Cybersecurity

Sean Brooks, Center for Long-Term Cybersecurity. “Defending Politically Vulnerable Organizations Online” [https://cltc.berkeley.edu/wp-content/uploads/2018/07/CLTC_Defending_PVOs.pdf]

Citizen Lab’s “About Us” Paper. [https://citizenlab.ca/wp-content/uploads/2018/05/18033-Citizen-Lab-booklet-p-E.pdf]

Citizen Lab’s Security Planner. [https://securityplanner.org/]

Sandro Contenta, Toronto Star. “How these Toronto sleuths are exposing the world’s digital spies while risking their own lives” [https://www.thestar.com/news/canada/2019/12/13/from-a-tower-in-toronto-they-watch-the-watchers-how-citizen-lab-sleuths-are-exposing-the-worlds-digital-spies-while-risking-their-own-lives.html]

Havron et al. "Clinical computer security for victims of intimate partner violence." In Proceedings of the 28th USENIX Security Symposium (pp. 105-122).[https://www.nixdell.com/papers/2019-usenix_clinical_security_FULL.pdf]

Deji Olukotun, Access Now. “Spyware in Mexico: an interview with Luis Fernando García of R3D Mexico” [https://www.accessnow.org/spyware-mexico-interview-luis-fernando-garcia-r3d-mexico/]

Tactical Tech's Annual Report [https://cdn.ttc.io/s/tacticaltech.org/Tactical-Tech-2018-Annual-Report.pdf]

Ethics and the Citizen Clinic Code of Conduct

Citizen Clinic. "Student Code of Conduct" [https://www.citizenclinic.io/Clinic_Curriculum/Modules/Ethics/Student_Code_of_Conduct/]

Shannon Vallor, The Markkula Center for Applied Ethics. “An Introduction to Cybersecurity Ethics” [https://www.scu.edu/media/ethics-center/technology-ethics/IntroToCybersecurityEthics.pdf]

Old School INFOSEC: Basic Controls

Le Blond et al. “A look at targeted attacks through the lense of an NGO” [www.usenix.org/system/files/conference/usenixsecurity14/sec14-paper-blond.pdf]

Sean Brooks, CLTC, TechSoup Webinar. “Cybersecurity in Low-Risk Organizations: Understanding Your Risk and Making Practical Improvements.”: [https://cltc.berkeley.edu/2019/02/25/cltc-and-citizen-clinic-present-cybersecurity-in-low-risk-organizations-webinar/]

Citizen Lab’s Security Planner. [https://securityplanner.org/]

Electronic Frontier Foundation’s Surveillance Self-Defense guide. [https://ssd.eff.org/]

Alex Gaynor. “What happens when you type google.com into your browser's address box and press enter?" [https://github.com/alex/what-happens-when]

Rus Shuler. “How Does the Internet Work?” [web.stanford.edu/class/msande91si/www-spr04/readings/week1/InternetWhitepaper.htm]

Digital Surveillance of Politically Vulnerable Organizations: The Threat Landscape

Stephen Arnold. “Telestrategies - An Interview with Dr. Jerry Lucas” [http://www.arnoldit.com/search-wizards-speak/telestrategies-2.html]

Joseph Cox. “I Gave a Bounty Hunter $300. Then He Located Our Phone” [https://motherboard.vice.com/en_us/article/nepxbz/i-gave-a-bounty-hunter-300-dollars-located-phone-microbilt-zumigo-tmobile]

Vernon Silver and Ben Elgin. “Torture in Bahrain Becomes Routine With Help From Nokia Siemens” [https://web.archive.org/web/20111006185329/http://www.bloomberg.com/news/2011-08-22/torture-in-bahrain-becomes-routine-with-help-from-nokia-siemens-networking.html]

John Scott-Railton et al, Citizen Lab. “Bittersweet: Supporters of Mexico’s soda tax targeted with NSO exploit links” [https://citizenlab.ca/2017/02/bittersweet-nso-mexico-spyware/]

Problem Diagnosis and Reframing

Netgain. “Digital Security and Grantcraft Guide” [fordfoundation.org/media/3334/digital-security-grantcraft-guide-v10-final-22317.pdf]

Arthur Turner. “Consulting Is More Than Giving Advice” [https://hbr.org/1982/09/consulting-is-more-than-giving-advice]

Thomas Wedell-Wedellsborg. “Are You Solving the Right Problems?” [https://hbr.org/2017/01/are-you-solving-the-right-problems]

Threat Modeling & Bounding Risk Assessments

Electronic Frontier Foundation, “Surveillance Self-Defense: Your Security Plan” [https://ssd.eff.org/en/playlist/activist-or-protester#your-security-plan]

NIST SP 800-37 “Risk Management Framework for Information Systems and Organizations.” Chapter 2 only. [https://csrc.nist.gov/CSRC/media/Publications/sp/800-37/rev-2/draft/documents/sp800-37r2-draft-ipd.pdf or Shutdown Mirror]

NIST SP 800-39 “Managing Information Security Risk.” Chapter 2 only. [https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-39.pdf or Shutdown Mirror]

NISTIR 8062 “An Introduction to Privacy Engineering and Risk Management in Federal Systems.” [https://nvlpubs.nist.gov/nistpubs/ir/2017/NIST.IR.8062.pdf or Shutdown Mirror]

Contextual & Capacity Research

SAFETAG, Internews. "SAFETAG Guide" Skim to Section 2.2, then read Section 2.2 and Section 2.3. [https://safetag.org/guide/]

Read and Explore Examples About PESTLE. (use an ad-blocker!) [https://pestleanalysis.com/what-is-pestle-analysis/]

Jorge Luis Sierra. “Digital and Mobile Security for Mexican Journalists and Bloggers” [https://freedomhouse.org/sites/default/files/Digital%20and%20Mobile%20Security%20for%20Mexican%20Journalists%20and%20Bloggers.pdf]

Information Gathering

Ruba Abu-Salma et al. “Obstacles to the Adoption of Secure Communication Tools” [https://ieeexplore.ieee.org/abstract/document/7958575/]

Jeanette Blomberg et al. "An Ethnographic Approach to Design" [https://www.researchgate.net/publication/262363851_An_Ethnographic_Approach_to_Design]

Jenna Burrell. "The Field Site as a Network: A Strategy for Locating Ethnographic Research" [https://doi.org/10.1177/1525822X08329699]

Collaboration on International ICT Policy in East and Southern Africa. “Safeguarding Civil Society: Assessing Internet Freedom and the Digital Resilience of Civil Society in East Africa” - Read each chapter, but for one country only. [https://cipesa.org/?wpfb_dl=237]

Lofland and Lofland. Read Chapter 5 (66-98) "Logging Data" in "Analyzing social settings: A guide to qualitative observation and analysis" [https://searchworks.stanford.edu/view/10531063]

Open Source Research Methods, Safety, and Tools

Awesome OSINT [https://github.com/jivoi/awesome-osint]

Ian Barwise. “Open-Source Intelligence (OSINT) Reconnaissance” [https://medium.com/@z3roTrust/open-source-intelligence-osint-reconnaissance-75edd7f7dada]

Conor Fortune, Amnesty International. “Digitally dissecting atrocities – Amnesty International’s open source investigations.” [https://www.amnesty.org/en/latest/news/2018/09/digitally-dissecting-atrocities-amnesty-internationals-open-source-investigations/]

OSINT Framework [https://osintframework.com/]

OSINT.link [https://osint.link]

Travis Lishok, Protective Intelligence. “Part I: An Introduction To OSINT Research For Protective Intelligence Professionals” [https://www.protectiveintelligence.com/blog/osint-intro-for-protective-intelligence-pt1]

Travis Lishok, Protective Intelligence. “Part 2: An Introduction To OSINT Research For Protective Intelligence Professionals” [https://www.protectiveintelligence.com/blog/osint-intro-for-protective-intelligence-pt2]

SECALERTS - Automated Security Audit [https://secalerts.co/security-audit]

Marc Wilson, PCWDLD.com. "OSINT Tools & Software for Passive & Active Recon & Security!" [https://www.pcwdld.com/osint-tools-and-software]

Security Law and Policy Factors

James C. Scott. “Seeing Like a State” - Chapter 9 [https://libcom.org/files/Seeing%20Like%20a%20State%20-%20James%20C.%20Scott.pdf]

Kim Fong et al. “A CRIMSon Tide of Data: An Assessment of Potential Privacy Problems of the Consolidate Records Information Management System” [http://people.ischool.berkeley.edu/~strush/CRIMS_FongRowlandTrush_Feb2018.pdf]

Adversary Persona Development

Julian Cohen. “Playbook Based Testing.” [https://medium.com/@HockeyInJune/playbook-based-testing-5df4b656113a]

Bill Marczak and John Scott-Railton, Citizen Lab. “Keep Calm and (Don’t) Enable Macros: A New Threat Actor Targets UAE Dissidents” [https://citizenlab.ca/2016/05/stealth-falcon/]

Nick Merrill, Daylight Security Research Lab. "Adversary Personas" [https://daylight.berkeley.edu/adversary-personas/]

Microsoft’s STRIDE and related blog posts. [https://cloudblogs.microsoft.com/microsoftsecure/2007/09/11/stride-chart/]

Threat Scenario Development

Mitre’s ATT&CK Wiki. [https://attack.mitre.org/]

Mitre’s PRE-ATT&CK Techniques. [https://attack.mitre.org/techniques/pre/]

Mitre’s Common Vulnerabilities and Exposures search.[https://cve.mitre.org/cve/]

Changing Security Behaviors

The Engine Room. “Ties That Bind: Organisational Security for Civil Society” [https://www.theengineroom.org/civil-society-digital-security-new-research/]

Adrienne Porter Felt et al. “Improving SSL Warnings: Comprehension and Adherence” [https://dl.acm.org/citation.cfm?id=2702442]

Francesca Musiani and Ksenia Ermoshina. “What is a Good Secure Messaging Tool? The EFF Secure Messaging Scorecard and the Shaping of Digital (Usable) Security” [https://www.westminsterpapers.org/articles/10.16997/wpcc.265/]

Alma Whitten and Doug Tygar. “Why Johnny Can’t Encrypt” [https://www.usenix.org/legacy/publications/library/proceedings/sec99/full_papers/whitten/whitten_html/index.html]

Social Engineering and Phishing

Citizen Clinic. "Phishing Simulation Policy" [https://www.citizenclinic.io/Clinic_Infrastructure/Phishing_Simulation/]

Masashi Crete-Nishihata et al, Citizen Lab. "Spying on a Budget: Inside a Phishing Operation with Targets in the Tibetan Community" [https://citizenlab.ca/2018/01/spying-on-a-budget-inside-a-phishing-operation-with-targets-in-the-tibetan-community/]]

Micah Lee, The Intercept. “It’s Impossible To Prove Your Laptop Hasn’t Been Hacked. I Spent Two Years Finding Out.” [https://theintercept.com/2018/04/28/computer-malware-tampering/]

Rachel Tobac. Social Proof Security. “How I would Hack You: Social Engineering Step-by-Step” [https://www.youtube.com/watch?v=L5J2PgGOLtE]

Designing Security Training

Electronic Frontier Foundation. “Am I the Right Person?” [https://sec.eff.org/articles/right-person-to-train]

Electronic Frontier Foundation. “How to Teach Adults” [https://sec.eff.org/articles/how-to-teach-adults]

Browse the rest of EFF’s Security Education Companion. [https://sec.eff.org/]

Rachel Weidinger et al. “How To Give A Digital Security Training” [https://medium.com/@geminiimatt/how-to-give-a-digital-security-training-4c83af667d40]

Rachel Weidinger et al. “Digital Security Training Resources for Security Trainers, Fall 2019 Edition” [https://medium.com/cryptofriends/digital-security-training-resources-for-security-trainers-spring-2017-edition-e95d9e50065e]

Psychosocial Resilience

Rated R for Resilience resource site. [https://sites.google.com/view/ratedr/basics]

Angela Chen. The Verge. “Moderating content doesn’t have to be so traumatic” [https://www.theverge.com/2019/2/27/18243359/content-moderation-mental-health-ptsd-psychology-science-facebook]

Sam Dubberley and Michele Grant. First Draft. “Journalism and Vicarious Trauma” [https://firstdraftnews.org/wp-content/uploads/2017/04/vicarioustrauma.pdf]

Sarah Jeong, Charlie Warzel, Brianna Wu, Joan Donovan. New York Times. “Everything is GamerGate” [https://www.nytimes.com/interactive/2019/08/15/opinion/gamergate-twitter.html] - Read all of the four essays.

Harmful Information (Misinformation and Harassment)

Tahmina Ansari, First Draft. “This Muslim journalist embraced social media until it ‘ruined’ his life” [https://firstdraftnews.org/this-muslim-journalist-embraced-social-media-until-it-ruined-his-life/]

Nicholas Monaco and Carly Nyst. Institute For The Future. “State-Sponsored Trolling: How Governments Are Deploying Disinformation as Part of Broader Digital Harassment Campaigns”. Read pages 3 to 21 & 45 to 51. [http://www.iftf.org/statesponsoredtrolling]

Sarah Oh and Travis L. Adkins. InterAction. “Disinformation Toolkit.” [https://staging.interaction.org/documents/disinformation-toolkit/]

Cindy Otis. USA Today. “Americans could be a bigger fake news threat than Russians in the 2020 presidential campaign” [https://www.usatoday.com/story/opinion/2019/07/19/disinformation-attacks-americans-threaten-2020-election-column/1756092001/]

Reply All podcast. “#112 The Prophet” Listen to or read transcript. [https://www.gimletmedia.com/reply-all/112-the-prophet]Introduction to Public Interest Cybersecurity

Sean Brooks, Center for Long-Term Cybersecurity. “Defending Politically Vulnerable Organizations Online” [https://cltc.berkeley.edu/wp-content/uploads/2018/07/CLTC_Defending_PVOs.pdf]

Citizen Lab’s “About Us” Paper. [https://citizenlab.ca/wp-content/uploads/2018/05/18033-Citizen-Lab-booklet-p-E.pdf]

Citizen Lab’s Security Planner. [https://securityplanner.org/]

Sandro Contenta, Toronto Star. “How these Toronto sleuths are exposing the world’s digital spies while risking their own lives” [https://www.thestar.com/news/canada/2019/12/13/from-a-tower-in-toronto-they-watch-the-watchers-how-citizen-lab-sleuths-are-exposing-the-worlds-digital-spies-while-risking-their-own-lives.html]

Havron et al. "Clinical computer security for victims of intimate partner violence." In Proceedings of the 28th USENIX Security Symposium (pp. 105-122).[https://www.nixdell.com/papers/2019-usenix_clinical_security_FULL.pdf]

Deji Olukotun, Access Now. “Spyware in Mexico: an interview with Luis Fernando García of R3D Mexico” [https://www.accessnow.org/spyware-mexico-interview-luis-fernando-garcia-r3d-mexico/]

Tactical Tech's Annual Report [https://cdn.ttc.io/s/tacticaltech.org/Tactical-Tech-2018-Annual-Report.pdf]

Ethics and the Citizen Clinic Code of Conduct

Citizen Clinic. "Student Code of Conduct" [https://www.citizenclinic.io/Clinic_Curriculum/Modules/Ethics/Student_Code_of_Conduct/]

Shannon Vallor, The Markkula Center for Applied Ethics. “An Introduction to Cybersecurity Ethics” [https://www.scu.edu/media/ethics-center/technology-ethics/IntroToCybersecurityEthics.pdf]

Old School INFOSEC: Basic Controls

Le Blond et al. “A look at targeted attacks through the lense of an NGO” [www.usenix.org/system/files/conference/usenixsecurity14/sec14-paper-blond.pdf]

Sean Brooks, CLTC, TechSoup Webinar. “Cybersecurity in Low-Risk Organizations: Understanding Your Risk and Making Practical Improvements.”: [https://cltc.berkeley.edu/2019/02/25/cltc-and-citizen-clinic-present-cybersecurity-in-low-risk-organizations-webinar/]

Citizen Lab’s Security Planner. [https://securityplanner.org/]

Electronic Frontier Foundation’s Surveillance Self-Defense guide. [https://ssd.eff.org/]

Alex Gaynor. “What happens when you type google.com into your browser's address box and press enter?" [https://github.com/alex/what-happens-when]

Rus Shuler. “How Does the Internet Work?” [web.stanford.edu/class/msande91si/www-spr04/readings/week1/InternetWhitepaper.htm]

Digital Surveillance of Politically Vulnerable Organizations: The Threat Landscape

Stephen Arnold. “Telestrategies - An Interview with Dr. Jerry Lucas” [http://www.arnoldit.com/search-wizards-speak/telestrategies-2.html]

Joseph Cox. “I Gave a Bounty Hunter $300. Then He Located Our Phone” [https://motherboard.vice.com/en_us/article/nepxbz/i-gave-a-bounty-hunter-300-dollars-located-phone-microbilt-zumigo-tmobile]

Vernon Silver and Ben Elgin. “Torture in Bahrain Becomes Routine With Help From Nokia Siemens” [https://web.archive.org/web/20111006185329/http://www.bloomberg.com/news/2011-08-22/torture-in-bahrain-becomes-routine-with-help-from-nokia-siemens-networking.html]

John Scott-Railton et al, Citizen Lab. “Bittersweet: Supporters of Mexico’s soda tax targeted with NSO exploit links” [https://citizenlab.ca/2017/02/bittersweet-nso-mexico-spyware/]

Problem Diagnosis and Reframing

Netgain. “Digital Security and Grantcraft Guide” [fordfoundation.org/media/3334/digital-security-grantcraft-guide-v10-final-22317.pdf]

Arthur Turner. “Consulting Is More Than Giving Advice” [https://hbr.org/1982/09/consulting-is-more-than-giving-advice]

Thomas Wedell-Wedellsborg. “Are You Solving the Right Problems?” [https://hbr.org/2017/01/are-you-solving-the-right-problems]

Threat Modeling & Bounding Risk Assessments

Electronic Frontier Foundation, “Surveillance Self-Defense: Your Security Plan” [https://ssd.eff.org/en/playlist/activist-or-protester#your-security-plan]

NIST SP 800-37 “Risk Management Framework for Information Systems and Organizations.” Chapter 2 only. [https://csrc.nist.gov/CSRC/media/Publications/sp/800-37/rev-2/draft/documents/sp800-37r2-draft-ipd.pdf or Shutdown Mirror]

NIST SP 800-39 “Managing Information Security Risk.” Chapter 2 only. [https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-39.pdf or Shutdown Mirror]

NISTIR 8062 “An Introduction to Privacy Engineering and Risk Management in Federal Systems.” [https://nvlpubs.nist.gov/nistpubs/ir/2017/NIST.IR.8062.pdf or Shutdown Mirror]

Contextual & Capacity Research

SAFETAG, Internews. "SAFETAG Guide" Skim to Section 2.2, then read Section 2.2 and Section 2.3. [https://safetag.org/guide/]

Read and Explore Examples About PESTLE. (use an ad-blocker!) [https://pestleanalysis.com/what-is-pestle-analysis/]

Jorge Luis Sierra. “Digital and Mobile Security for Mexican Journalists and Bloggers” [https://freedomhouse.org/sites/default/files/Digital%20and%20Mobile%20Security%20for%20Mexican%20Journalists%20and%20Bloggers.pdf]

Information Gathering

Ruba Abu-Salma et al. “Obstacles to the Adoption of Secure Communication Tools” [https://ieeexplore.ieee.org/abstract/document/7958575/]

Jeanette Blomberg et al. "An Ethnographic Approach to Design" [https://www.researchgate.net/publication/262363851_An_Ethnographic_Approach_to_Design]

Jenna Burrell. "The Field Site as a Network: A Strategy for Locating Ethnographic Research" [https://doi.org/10.1177/1525822X08329699]

Collaboration on International ICT Policy in East and Southern Africa. “Safeguarding Civil Society: Assessing Internet Freedom and the Digital Resilience of Civil Society in East Africa” - Read each chapter, but for one country only. [https://cipesa.org/?wpfb_dl=237]

Lofland and Lofland. Read Chapter 5 (66-98) "Logging Data" in "Analyzing social settings: A guide to qualitative observation and analysis" [https://searchworks.stanford.edu/view/10531063]

Open Source Research Methods, Safety, and Tools

Awesome OSINT [https://github.com/jivoi/awesome-osint]

Ian Barwise. “Open-Source Intelligence (OSINT) Reconnaissance” [https://medium.com/@z3roTrust/open-source-intelligence-osint-reconnaissance-75edd7f7dada]

Conor Fortune, Amnesty International. “Digitally dissecting atrocities – Amnesty International’s open source investigations.” [https://www.amnesty.org/en/latest/news/2018/09/digitally-dissecting-atrocities-amnesty-internationals-open-source-investigations/]

OSINT Framework [https://osintframework.com/]

OSINT.link [https://osint.link]

Travis Lishok, Protective Intelligence. “Part I: An Introduction To OSINT Research For Protective Intelligence Professionals” [https://www.protectiveintelligence.com/blog/osint-intro-for-protective-intelligence-pt1]

Travis Lishok, Protective Intelligence. “Part 2: An Introduction To OSINT Research For Protective Intelligence Professionals” [https://www.protectiveintelligence.com/blog/osint-intro-for-protective-intelligence-pt2]

SECALERTS - Automated Security Audit [https://secalerts.co/security-audit]

Security Law and Policy Factors

James C. Scott. “Seeing Like a State” - Chapter 9 [https://libcom.org/files/Seeing%20Like%20a%20State%20-%20James%20C.%20Scott.pdf]

Kim Fong et al. “A CRIMSon Tide of Data: An Assessment of Potential Privacy Problems of the Consolidate Records Information Management System” [http://people.ischool.berkeley.edu/~strush/CRIMS_FongRowlandTrush_Feb2018.pdf]

Adversary Persona Development

Julian Cohen. “Playbook Based Testing.” [https://medium.com/@HockeyInJune/playbook-based-testing-5df4b656113a]

Bill Marczak and John Scott-Railton, Citizen Lab. “Keep Calm and (Don’t) Enable Macros: A New Threat Actor Targets UAE Dissidents” [https://citizenlab.ca/2016/05/stealth-falcon/]

Nick Merrill, Daylight Security Research Lab. "Adversary Personas" [https://daylight.berkeley.edu/adversary-personas/]

Microsoft’s STRIDE and related blog posts. [https://cloudblogs.microsoft.com/microsoftsecure/2007/09/11/stride-chart/]

Threat Scenario Development

Mitre’s ATT&CK Wiki. [https://attack.mitre.org/]

Mitre’s PRE-ATT&CK Techniques. [https://attack.mitre.org/techniques/pre/]

Mitre’s Common Vulnerabilities and Exposures search.[https://cve.mitre.org/cve/]

Changing Security Behaviors

The Engine Room. “Ties That Bind: Organisational Security for Civil Society” [https://www.theengineroom.org/civil-society-digital-security-new-research/]

Adrienne Porter Felt et al. “Improving SSL Warnings: Comprehension and Adherence” [https://dl.acm.org/citation.cfm?id=2702442]

Francesca Musiani and Ksenia Ermoshina. “What is a Good Secure Messaging Tool? The EFF Secure Messaging Scorecard and the Shaping of Digital (Usable) Security” [https://www.westminsterpapers.org/articles/10.16997/wpcc.265/]

Alma Whitten and Doug Tygar. “Why Johnny Can’t Encrypt” [https://www.usenix.org/legacy/publications/library/proceedings/sec99/full_papers/whitten/whitten_html/index.html]

Social Engineering and Phishing

Citizen Clinic. "Phishing Simulation Policy" [https://www.citizenclinic.io/Clinic_Infrastructure/Phishing_Simulation/]

Masashi Crete-Nishihata et al, Citizen Lab. "Spying on a Budget: Inside a Phishing Operation with Targets in the Tibetan Community" [https://citizenlab.ca/2018/01/spying-on-a-budget-inside-a-phishing-operation-with-targets-in-the-tibetan-community/]]

Micah Lee, The Intercept. “It’s Impossible To Prove Your Laptop Hasn’t Been Hacked. I Spent Two Years Finding Out.” [https://theintercept.com/2018/04/28/computer-malware-tampering/]

Rachel Tobac. Social Proof Security. “How I would Hack You: Social Engineering Step-by-Step” [https://www.youtube.com/watch?v=L5J2PgGOLtE]

Designing Security Training

Electronic Frontier Foundation. “Am I the Right Person?” [https://sec.eff.org/articles/right-person-to-train]

Electronic Frontier Foundation. “How to Teach Adults” [https://sec.eff.org/articles/how-to-teach-adults]

Browse the rest of EFF’s Security Education Companion. [https://sec.eff.org/]

Rachel Weidinger et al. “How To Give A Digital Security Training” [https://medium.com/@geminiimatt/how-to-give-a-digital-security-training-4c83af667d40]

Rachel Weidinger et al. “Digital Security Training Resources for Security Trainers, Fall 2019 Edition” [https://medium.com/cryptofriends/digital-security-training-resources-for-security-trainers-spring-2017-edition-e95d9e50065e]

Psychosocial Resilience

Rated R for Resilience resource site. [https://sites.google.com/view/ratedr/basics]

Angela Chen. The Verge. “Moderating content doesn’t have to be so traumatic” [https://www.theverge.com/2019/2/27/18243359/content-moderation-mental-health-ptsd-psychology-science-facebook]

Sam Dubberley and Michele Grant. First Draft. “Journalism and Vicarious Trauma” [https://firstdraftnews.org/wp-content/uploads/2017/04/vicarioustrauma.pdf]

Sarah Jeong, Charlie Warzel, Brianna Wu, Joan Donovan. New York Times. “Everything is GamerGate” [https://www.nytimes.com/interactive/2019/08/15/opinion/gamergate-twitter.html] - Read all of the four essays.

Harmful Information (Misinformation and Harassment)

Tahmina Ansari, First Draft. “This Muslim journalist embraced social media until it ‘ruined’ his life” [https://firstdraftnews.org/this-muslim-journalist-embraced-social-media-until-it-ruined-his-life/]

Nicholas Monaco and Carly Nyst. Institute For The Future. “State-Sponsored Trolling: How Governments Are Deploying Disinformation as Part of Broader Digital Harassment Campaigns”. Read pages 3 to 21 & 45 to 51. [http://www.iftf.org/statesponsoredtrolling]

Sarah Oh and Travis L. Adkins. InterAction. “Disinformation Toolkit.” [https://staging.interaction.org/documents/disinformation-toolkit/]

Cindy Otis. USA Today. “Americans could be a bigger fake news threat than Russians in the 2020 presidential campaign” [https://www.usatoday.com/story/opinion/2019/07/19/disinformation-attacks-americans-threaten-2020-election-column/1756092001/]

Reply All podcast. “#112 The Prophet” Listen to or read transcript. [https://www.gimletmedia.com/reply-all/112-the-prophet]

Last updated