Condensed Bibliography
Last updated
Last updated
Sean Brooks, Center for Long-Term Cybersecurity. โDefending Politically Vulnerable Organizations Onlineโ []
Citizen Labโs โAbout Usโ Paper. []
Citizen Labโs Security Planner. []
Sandro Contenta, Toronto Star. โHow these Toronto sleuths are exposing the worldโs digital spies while risking their own livesโ []
Havron et al. "Clinical computer security for victims of intimate partner violence." In Proceedings of the 28th USENIX Security Symposium (pp. 105-122).[]
Deji Olukotun, Access Now. โSpyware in Mexico: an interview with Luis Fernando Garcรญa of R3D Mexicoโ []
Tactical Tech's Annual Report []
Citizen Clinic. "Student Code of Conduct" [https://www.citizenclinic.io/Clinic_Curriculum/Modules/Ethics/Student_Code_of_Conduct/]
Shannon Vallor, The Markkula Center for Applied Ethics. โAn Introduction to Cybersecurity Ethicsโ []
Le Blond et al. โA look at targeted attacks through the lense of an NGOโ []
Sean Brooks, CLTC, TechSoup Webinar. โCybersecurity in Low-Risk Organizations: Understanding Your Risk and Making Practical Improvements.โ: []
Citizen Labโs Security Planner. []
Electronic Frontier Foundationโs Surveillance Self-Defense guide. []
Citizen Clinic. "Phishing Simulation Policy" [https://www.citizenclinic.io/Clinic_Infrastructure/Phishing_Simulation/]
Citizen Clinic. "Student Code of Conduct" [https://www.citizenclinic.io/Clinic_Curriculum/Modules/Ethics/Student_Code_of_Conduct/]
Citizen Clinic. "Phishing Simulation Policy" [https://www.citizenclinic.io/Clinic_Infrastructure/Phishing_Simulation/]
Alex Gaynor. โWhat happens when you type google.com into your browser's address box and press enter?" []
Rus Shuler. โHow Does the Internet Work?โ []
Stephen Arnold. โTelestrategies - An Interview with Dr. Jerry Lucasโ []
Joseph Cox. โI Gave a Bounty Hunter $300. Then He Located Our Phoneโ []
Vernon Silver and Ben Elgin. โTorture in Bahrain Becomes Routine With Help From Nokia Siemensโ []
John Scott-Railton et al, Citizen Lab. โBittersweet: Supporters of Mexicoโs soda tax targeted with NSO exploit linksโ []
Netgain. โDigital Security and Grantcraft Guideโ []
Arthur Turner. โConsulting Is More Than Giving Adviceโ []
Thomas Wedell-Wedellsborg. โAre You Solving the Right Problems?โ []
Electronic Frontier Foundation, โSurveillance Self-Defense: Your Security Planโ []
NIST SP 800-37 โRisk Management Framework for Information Systems and Organizations.โ Chapter 2 only. [ or ]
NIST SP 800-39 โManaging Information Security Risk.โ Chapter 2 only. [ or ]
NISTIR 8062 โAn Introduction to Privacy Engineering and Risk Management in Federal Systems.โ [ or ]
SAFETAG, Internews. "SAFETAG Guide" Skim to Section 2.2, then read Section 2.2 and Section 2.3. []
Read and Explore Examples About PESTLE. (use an ad-blocker!) []
Jorge Luis Sierra. โDigital and Mobile Security for Mexican Journalists and Bloggersโ []
Ruba Abu-Salma et al. โObstacles to the Adoption of Secure Communication Toolsโ []
Jeanette Blomberg et al. "An Ethnographic Approach to Design" []
Jenna Burrell. "The Field Site as a Network: A Strategy for Locating Ethnographic Research" []
Collaboration on International ICT Policy in East and Southern Africa. โSafeguarding Civil Society: Assessing Internet Freedom and the Digital Resilience of Civil Society in East Africaโ - Read each chapter, but for one country only. []
Lofland and Lofland. Read Chapter 5 (66-98) "Logging Data" in "Analyzing social settings: A guide to qualitative observation and analysis" []
Awesome OSINT []
Ian Barwise. โOpen-Source Intelligence (OSINT) Reconnaissanceโ []
Conor Fortune, Amnesty International. โDigitally dissecting atrocities โ Amnesty Internationalโs open source investigations.โ []
OSINT Framework []
OSINT.link []
Travis Lishok, Protective Intelligence. โPart I: An Introduction To OSINT Research For Protective Intelligence Professionalsโ []
Travis Lishok, Protective Intelligence. โPart 2: An Introduction To OSINT Research For Protective Intelligence Professionalsโ []
SECALERTS - Automated Security Audit []
Marc Wilson, PCWDLD.com. "OSINT Tools & Software for Passive & Active Recon & Security!" []
James C. Scott. โSeeing Like a Stateโ - Chapter 9 []
Kim Fong et al. โA CRIMSon Tide of Data: An Assessment of Potential Privacy Problems of the Consolidate Records Information Management Systemโ []
Julian Cohen. โPlaybook Based Testing.โ []
Bill Marczak and John Scott-Railton, Citizen Lab. โKeep Calm and (Donโt) Enable Macros: A New Threat Actor Targets UAE Dissidentsโ []
Nick Merrill, Daylight Security Research Lab. "Adversary Personas" []
Microsoftโs STRIDE and related blog posts. []
Mitreโs ATT&CK Wiki. []
Mitreโs PRE-ATT&CK Techniques. []
Mitreโs Common Vulnerabilities and Exposures search.[]
The Engine Room. โTies That Bind: Organisational Security for Civil Societyโ []
Adrienne Porter Felt et al. โImproving SSL Warnings: Comprehension and Adherenceโ []
Francesca Musiani and Ksenia Ermoshina. โWhat is a Good Secure Messaging Tool? The EFF Secure Messaging Scorecard and the Shaping of Digital (Usable) Securityโ []
Alma Whitten and Doug Tygar. โWhy Johnny Canโt Encryptโ []
Masashi Crete-Nishihata et al, Citizen Lab. "Spying on a Budget: Inside a Phishing Operation with Targets in the Tibetan Community" ]
Micah Lee, The Intercept. โItโs Impossible To Prove Your Laptop Hasnโt Been Hacked. I Spent Two Years Finding Out.โ []
Rachel Tobac. Social Proof Security. โHow I would Hack You: Social Engineering Step-by-Stepโ []
Electronic Frontier Foundation. โAm I the Right Person?โ
Electronic Frontier Foundation. โHow to Teach Adultsโ []
Browse the rest of EFFโs Security Education Companion. []
Rachel Weidinger et al. โHow To Give A Digital Security Trainingโ []
Rachel Weidinger et al. โDigital Security Training Resources for Security Trainers, Fall 2019 Editionโ []
Rated R for Resilience resource site. []
Angela Chen. The Verge. โModerating content doesnโt have to be so traumaticโ []
Sam Dubberley and Michele Grant. First Draft. โJournalism and Vicarious Traumaโ []
Sarah Jeong, Charlie Warzel, Brianna Wu, Joan Donovan. New York Times. โEverything is GamerGateโ [] - Read all of the four essays.
Tahmina Ansari, First Draft. โThis Muslim journalist embraced social media until it โruinedโ his lifeโ []
Nicholas Monaco and Carly Nyst. Institute For The Future. โState-Sponsored Trolling: How Governments Are Deploying Disinformation as Part of Broader Digital Harassment Campaignsโ. Read pages 3 to 21 & 45 to 51. []
Sarah Oh and Travis L. Adkins. InterAction. โDisinformation Toolkit.โ []
Cindy Otis. USA Today. โAmericans could be a bigger fake news threat than Russians in the 2020 presidential campaignโ []
Reply All podcast. โ#112 The Prophetโ Listen to or read transcript. []Introduction to Public Interest Cybersecurity
Sean Brooks, Center for Long-Term Cybersecurity. โDefending Politically Vulnerable Organizations Onlineโ []
Citizen Labโs โAbout Usโ Paper. []
Citizen Labโs Security Planner. []
Sandro Contenta, Toronto Star. โHow these Toronto sleuths are exposing the worldโs digital spies while risking their own livesโ []
Havron et al. "Clinical computer security for victims of intimate partner violence." In Proceedings of the 28th USENIX Security Symposium (pp. 105-122).[]
Deji Olukotun, Access Now. โSpyware in Mexico: an interview with Luis Fernando Garcรญa of R3D Mexicoโ []
Tactical Tech's Annual Report []
Shannon Vallor, The Markkula Center for Applied Ethics. โAn Introduction to Cybersecurity Ethicsโ []
Le Blond et al. โA look at targeted attacks through the lense of an NGOโ []
Sean Brooks, CLTC, TechSoup Webinar. โCybersecurity in Low-Risk Organizations: Understanding Your Risk and Making Practical Improvements.โ: []
Citizen Labโs Security Planner. []
Electronic Frontier Foundationโs Surveillance Self-Defense guide. []
Alex Gaynor. โWhat happens when you type google.com into your browser's address box and press enter?" []
Rus Shuler. โHow Does the Internet Work?โ []
Stephen Arnold. โTelestrategies - An Interview with Dr. Jerry Lucasโ []
Joseph Cox. โI Gave a Bounty Hunter $300. Then He Located Our Phoneโ []
Vernon Silver and Ben Elgin. โTorture in Bahrain Becomes Routine With Help From Nokia Siemensโ []
John Scott-Railton et al, Citizen Lab. โBittersweet: Supporters of Mexicoโs soda tax targeted with NSO exploit linksโ []
Netgain. โDigital Security and Grantcraft Guideโ []
Arthur Turner. โConsulting Is More Than Giving Adviceโ []
Thomas Wedell-Wedellsborg. โAre You Solving the Right Problems?โ []
Electronic Frontier Foundation, โSurveillance Self-Defense: Your Security Planโ []
NIST SP 800-37 โRisk Management Framework for Information Systems and Organizations.โ Chapter 2 only. [ or ]
NIST SP 800-39 โManaging Information Security Risk.โ Chapter 2 only. [ or ]
NISTIR 8062 โAn Introduction to Privacy Engineering and Risk Management in Federal Systems.โ [ or ]
SAFETAG, Internews. "SAFETAG Guide" Skim to Section 2.2, then read Section 2.2 and Section 2.3. []
Read and Explore Examples About PESTLE. (use an ad-blocker!) []
Jorge Luis Sierra. โDigital and Mobile Security for Mexican Journalists and Bloggersโ []
Ruba Abu-Salma et al. โObstacles to the Adoption of Secure Communication Toolsโ []
Jeanette Blomberg et al. "An Ethnographic Approach to Design" []
Jenna Burrell. "The Field Site as a Network: A Strategy for Locating Ethnographic Research" []
Collaboration on International ICT Policy in East and Southern Africa. โSafeguarding Civil Society: Assessing Internet Freedom and the Digital Resilience of Civil Society in East Africaโ - Read each chapter, but for one country only. []
Lofland and Lofland. Read Chapter 5 (66-98) "Logging Data" in "Analyzing social settings: A guide to qualitative observation and analysis" []
Awesome OSINT []
Ian Barwise. โOpen-Source Intelligence (OSINT) Reconnaissanceโ []
Conor Fortune, Amnesty International. โDigitally dissecting atrocities โ Amnesty Internationalโs open source investigations.โ []
OSINT Framework []
OSINT.link []
Travis Lishok, Protective Intelligence. โPart I: An Introduction To OSINT Research For Protective Intelligence Professionalsโ []
Travis Lishok, Protective Intelligence. โPart 2: An Introduction To OSINT Research For Protective Intelligence Professionalsโ []
SECALERTS - Automated Security Audit []
James C. Scott. โSeeing Like a Stateโ - Chapter 9 []
Kim Fong et al. โA CRIMSon Tide of Data: An Assessment of Potential Privacy Problems of the Consolidate Records Information Management Systemโ []
Julian Cohen. โPlaybook Based Testing.โ []
Bill Marczak and John Scott-Railton, Citizen Lab. โKeep Calm and (Donโt) Enable Macros: A New Threat Actor Targets UAE Dissidentsโ []
Nick Merrill, Daylight Security Research Lab. "Adversary Personas" []
Microsoftโs STRIDE and related blog posts. []
Mitreโs ATT&CK Wiki. []
Mitreโs PRE-ATT&CK Techniques. []
Mitreโs Common Vulnerabilities and Exposures search.[]
The Engine Room. โTies That Bind: Organisational Security for Civil Societyโ []
Adrienne Porter Felt et al. โImproving SSL Warnings: Comprehension and Adherenceโ []
Francesca Musiani and Ksenia Ermoshina. โWhat is a Good Secure Messaging Tool? The EFF Secure Messaging Scorecard and the Shaping of Digital (Usable) Securityโ []
Alma Whitten and Doug Tygar. โWhy Johnny Canโt Encryptโ []
Masashi Crete-Nishihata et al, Citizen Lab. "Spying on a Budget: Inside a Phishing Operation with Targets in the Tibetan Community" ]
Micah Lee, The Intercept. โItโs Impossible To Prove Your Laptop Hasnโt Been Hacked. I Spent Two Years Finding Out.โ []
Rachel Tobac. Social Proof Security. โHow I would Hack You: Social Engineering Step-by-Stepโ []
Electronic Frontier Foundation. โAm I the Right Person?โ
Electronic Frontier Foundation. โHow to Teach Adultsโ []
Browse the rest of EFFโs Security Education Companion. []
Rachel Weidinger et al. โHow To Give A Digital Security Trainingโ []
Rachel Weidinger et al. โDigital Security Training Resources for Security Trainers, Fall 2019 Editionโ []
Rated R for Resilience resource site. []
Angela Chen. The Verge. โModerating content doesnโt have to be so traumaticโ []
Sam Dubberley and Michele Grant. First Draft. โJournalism and Vicarious Traumaโ []
Sarah Jeong, Charlie Warzel, Brianna Wu, Joan Donovan. New York Times. โEverything is GamerGateโ [] - Read all of the four essays.
Tahmina Ansari, First Draft. โThis Muslim journalist embraced social media until it โruinedโ his lifeโ []
Nicholas Monaco and Carly Nyst. Institute For The Future. โState-Sponsored Trolling: How Governments Are Deploying Disinformation as Part of Broader Digital Harassment Campaignsโ. Read pages 3 to 21 & 45 to 51. []
Sarah Oh and Travis L. Adkins. InterAction. โDisinformation Toolkit.โ []
Cindy Otis. USA Today. โAmericans could be a bigger fake news threat than Russians in the 2020 presidential campaignโ []
Reply All podcast. โ#112 The Prophetโ Listen to or read transcript. []