Condensed Bibliography
Introduction to Public Interest Cybersecurity
Sean Brooks, Center for Long-Term Cybersecurity. âDefending Politically Vulnerable Organizations Onlineâ [https://cltc.berkeley.edu/wp-content/uploads/2018/07/CLTC_Defending_PVOs.pdf]
Citizen Labâs âAbout Usâ Paper. [https://citizenlab.ca/wp-content/uploads/2018/05/18033-Citizen-Lab-booklet-p-E.pdf]
Citizen Labâs Security Planner. [https://securityplanner.org/]
Sandro Contenta, Toronto Star. âHow these Toronto sleuths are exposing the worldâs digital spies while risking their own livesâ [https://www.thestar.com/news/canada/2019/12/13/from-a-tower-in-toronto-they-watch-the-watchers-how-citizen-lab-sleuths-are-exposing-the-worlds-digital-spies-while-risking-their-own-lives.html]
Havron et al. "Clinical computer security for victims of intimate partner violence." In Proceedings of the 28th USENIX Security Symposium (pp. 105-122).[https://www.nixdell.com/papers/2019-usenix_clinical_security_FULL.pdf]
Deji Olukotun, Access Now. âSpyware in Mexico: an interview with Luis Fernando GarcĂa of R3D Mexicoâ [https://www.accessnow.org/spyware-mexico-interview-luis-fernando-garcia-r3d-mexico/]
Tactical Tech's Annual Report [https://cdn.ttc.io/s/tacticaltech.org/Tactical-Tech-2018-Annual-Report.pdf]
Ethics and the Citizen Clinic Code of Conduct
Citizen Clinic. "Student Code of Conduct" [https://www.citizenclinic.io/Clinic_Curriculum/Modules/Ethics/Student_Code_of_Conduct/]
Shannon Vallor, The Markkula Center for Applied Ethics. âAn Introduction to Cybersecurity Ethicsâ [https://www.scu.edu/media/ethics-center/technology-ethics/IntroToCybersecurityEthics.pdf]
Old School INFOSEC: Basic Controls
Le Blond et al. âA look at targeted attacks through the lense of an NGOâ [www.usenix.org/system/files/conference/usenixsecurity14/sec14-paper-blond.pdf]
Sean Brooks, CLTC, TechSoup Webinar. âCybersecurity in Low-Risk Organizations: Understanding Your Risk and Making Practical Improvements.â: [https://cltc.berkeley.edu/2019/02/25/cltc-and-citizen-clinic-present-cybersecurity-in-low-risk-organizations-webinar/]
Citizen Labâs Security Planner. [https://securityplanner.org/]
Electronic Frontier Foundationâs Surveillance Self-Defense guide. [https://ssd.eff.org/]
Alex Gaynor. âWhat happens when you type google.com into your browser's address box and press enter?" [https://github.com/alex/what-happens-when]
Rus Shuler. âHow Does the Internet Work?â [web.stanford.edu/class/msande91si/www-spr04/readings/week1/InternetWhitepaper.htm]
Digital Surveillance of Politically Vulnerable Organizations: The Threat Landscape
Stephen Arnold. âTelestrategies - An Interview with Dr. Jerry Lucasâ [http://www.arnoldit.com/search-wizards-speak/telestrategies-2.html]
Joseph Cox. âI Gave a Bounty Hunter $300. Then He Located Our Phoneâ [https://motherboard.vice.com/en_us/article/nepxbz/i-gave-a-bounty-hunter-300-dollars-located-phone-microbilt-zumigo-tmobile]
Vernon Silver and Ben Elgin. âTorture in Bahrain Becomes Routine With Help From Nokia Siemensâ [https://web.archive.org/web/20111006185329/http://www.bloomberg.com/news/2011-08-22/torture-in-bahrain-becomes-routine-with-help-from-nokia-siemens-networking.html]
John Scott-Railton et al, Citizen Lab. âBittersweet: Supporters of Mexicoâs soda tax targeted with NSO exploit linksâ [https://citizenlab.ca/2017/02/bittersweet-nso-mexico-spyware/]
Problem Diagnosis and Reframing
Netgain. âDigital Security and Grantcraft Guideâ [fordfoundation.org/media/3334/digital-security-grantcraft-guide-v10-final-22317.pdf]
Arthur Turner. âConsulting Is More Than Giving Adviceâ [https://hbr.org/1982/09/consulting-is-more-than-giving-advice]
Thomas Wedell-Wedellsborg. âAre You Solving the Right Problems?â [https://hbr.org/2017/01/are-you-solving-the-right-problems]
Threat Modeling & Bounding Risk Assessments
Electronic Frontier Foundation, âSurveillance Self-Defense: Your Security Planâ [https://ssd.eff.org/en/playlist/activist-or-protester#your-security-plan]
NIST SP 800-37 âRisk Management Framework for Information Systems and Organizations.â Chapter 2 only. [https://csrc.nist.gov/CSRC/media/Publications/sp/800-37/rev-2/draft/documents/sp800-37r2-draft-ipd.pdf or Shutdown Mirror]
NIST SP 800-39 âManaging Information Security Risk.â Chapter 2 only. [https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-39.pdf or Shutdown Mirror]
NISTIR 8062 âAn Introduction to Privacy Engineering and Risk Management in Federal Systems.â [https://nvlpubs.nist.gov/nistpubs/ir/2017/NIST.IR.8062.pdf or Shutdown Mirror]
Contextual & Capacity Research
SAFETAG, Internews. "SAFETAG Guide" Skim to Section 2.2, then read Section 2.2 and Section 2.3. [https://safetag.org/guide/]
Read and Explore Examples About PESTLE. (use an ad-blocker!) [https://pestleanalysis.com/what-is-pestle-analysis/]
Jorge Luis Sierra. âDigital and Mobile Security for Mexican Journalists and Bloggersâ [https://freedomhouse.org/sites/default/files/Digital%20and%20Mobile%20Security%20for%20Mexican%20Journalists%20and%20Bloggers.pdf]
Information Gathering
Ruba Abu-Salma et al. âObstacles to the Adoption of Secure Communication Toolsâ [https://ieeexplore.ieee.org/abstract/document/7958575/]
Jeanette Blomberg et al. "An Ethnographic Approach to Design" [https://www.researchgate.net/publication/262363851_An_Ethnographic_Approach_to_Design]
Jenna Burrell. "The Field Site as a Network: A Strategy for Locating Ethnographic Research" [https://doi.org/10.1177/1525822X08329699]
Collaboration on International ICT Policy in East and Southern Africa. âSafeguarding Civil Society: Assessing Internet Freedom and the Digital Resilience of Civil Society in East Africaâ - Read each chapter, but for one country only. [https://cipesa.org/?wpfb_dl=237]
Lofland and Lofland. Read Chapter 5 (66-98) "Logging Data" in "Analyzing social settings: A guide to qualitative observation and analysis" [https://searchworks.stanford.edu/view/10531063]
Open Source Research Methods, Safety, and Tools
Awesome OSINT [https://github.com/jivoi/awesome-osint]
Ian Barwise. âOpen-Source Intelligence (OSINT) Reconnaissanceâ [https://medium.com/@z3roTrust/open-source-intelligence-osint-reconnaissance-75edd7f7dada]
Conor Fortune, Amnesty International. âDigitally dissecting atrocities â Amnesty Internationalâs open source investigations.â [https://www.amnesty.org/en/latest/news/2018/09/digitally-dissecting-atrocities-amnesty-internationals-open-source-investigations/]
OSINT Framework [https://osintframework.com/]
OSINT.link [https://osint.link]
Travis Lishok, Protective Intelligence. âPart I: An Introduction To OSINT Research For Protective Intelligence Professionalsâ [https://www.protectiveintelligence.com/blog/osint-intro-for-protective-intelligence-pt1]
Travis Lishok, Protective Intelligence. âPart 2: An Introduction To OSINT Research For Protective Intelligence Professionalsâ [https://www.protectiveintelligence.com/blog/osint-intro-for-protective-intelligence-pt2]
SECALERTS - Automated Security Audit [https://secalerts.co/security-audit]
Marc Wilson, PCWDLD.com. "OSINT Tools & Software for Passive & Active Recon & Security!" [https://www.pcwdld.com/osint-tools-and-software]
Security Law and Policy Factors
James C. Scott. âSeeing Like a Stateâ - Chapter 9 [https://libcom.org/files/Seeing%20Like%20a%20State%20-%20James%20C.%20Scott.pdf]
Kim Fong et al. âA CRIMSon Tide of Data: An Assessment of Potential Privacy Problems of the Consolidate Records Information Management Systemâ [http://people.ischool.berkeley.edu/~strush/CRIMS_FongRowlandTrush_Feb2018.pdf]
Adversary Persona Development
Julian Cohen. âPlaybook Based Testing.â [https://medium.com/@HockeyInJune/playbook-based-testing-5df4b656113a]
Bill Marczak and John Scott-Railton, Citizen Lab. âKeep Calm and (Donât) Enable Macros: A New Threat Actor Targets UAE Dissidentsâ [https://citizenlab.ca/2016/05/stealth-falcon/]
Nick Merrill, Daylight Security Research Lab. "Adversary Personas" [https://daylight.berkeley.edu/adversary-personas/]
Microsoftâs STRIDE and related blog posts. [https://cloudblogs.microsoft.com/microsoftsecure/2007/09/11/stride-chart/]
Threat Scenario Development
Mitreâs ATT&CK Wiki. [https://attack.mitre.org/]
Mitreâs PRE-ATT&CK Techniques. [https://attack.mitre.org/techniques/pre/]
Mitreâs Common Vulnerabilities and Exposures search.[https://cve.mitre.org/cve/]
Changing Security Behaviors
The Engine Room. âTies That Bind: Organisational Security for Civil Societyâ [https://www.theengineroom.org/civil-society-digital-security-new-research/]
Adrienne Porter Felt et al. âImproving SSL Warnings: Comprehension and Adherenceâ [https://dl.acm.org/citation.cfm?id=2702442]
Francesca Musiani and Ksenia Ermoshina. âWhat is a Good Secure Messaging Tool? The EFF Secure Messaging Scorecard and the Shaping of Digital (Usable) Securityâ [https://www.westminsterpapers.org/articles/10.16997/wpcc.265/]
Alma Whitten and Doug Tygar. âWhy Johnny Canât Encryptâ [https://www.usenix.org/legacy/publications/library/proceedings/sec99/full_papers/whitten/whitten_html/index.html]
Social Engineering and Phishing
Citizen Clinic. "Phishing Simulation Policy" [https://www.citizenclinic.io/Clinic_Infrastructure/Phishing_Simulation/]
Masashi Crete-Nishihata et al, Citizen Lab. "Spying on a Budget: Inside a Phishing Operation with Targets in the Tibetan Community" [https://citizenlab.ca/2018/01/spying-on-a-budget-inside-a-phishing-operation-with-targets-in-the-tibetan-community/]]
Micah Lee, The Intercept. âItâs Impossible To Prove Your Laptop Hasnât Been Hacked. I Spent Two Years Finding Out.â [https://theintercept.com/2018/04/28/computer-malware-tampering/]
Rachel Tobac. Social Proof Security. âHow I would Hack You: Social Engineering Step-by-Stepâ [https://www.youtube.com/watch?v=L5J2PgGOLtE]
Designing Security Training
Electronic Frontier Foundation. âAm I the Right Person?â [https://sec.eff.org/articles/right-person-to-train]
Electronic Frontier Foundation. âHow to Teach Adultsâ [https://sec.eff.org/articles/how-to-teach-adults]
Browse the rest of EFFâs Security Education Companion. [https://sec.eff.org/]
Rachel Weidinger et al. âHow To Give A Digital Security Trainingâ [https://medium.com/@geminiimatt/how-to-give-a-digital-security-training-4c83af667d40]
Rachel Weidinger et al. âDigital Security Training Resources for Security Trainers, Fall 2019 Editionâ [https://medium.com/cryptofriends/digital-security-training-resources-for-security-trainers-spring-2017-edition-e95d9e50065e]
Psychosocial Resilience
Rated R for Resilience resource site. [https://sites.google.com/view/ratedr/basics]
Angela Chen. The Verge. âModerating content doesnât have to be so traumaticâ [https://www.theverge.com/2019/2/27/18243359/content-moderation-mental-health-ptsd-psychology-science-facebook]
Sam Dubberley and Michele Grant. First Draft. âJournalism and Vicarious Traumaâ [https://firstdraftnews.org/wp-content/uploads/2017/04/vicarioustrauma.pdf]
Sarah Jeong, Charlie Warzel, Brianna Wu, Joan Donovan. New York Times. âEverything is GamerGateâ [https://www.nytimes.com/interactive/2019/08/15/opinion/gamergate-twitter.html] - Read all of the four essays.
Harmful Information (Misinformation and Harassment)
Tahmina Ansari, First Draft. âThis Muslim journalist embraced social media until it âruinedâ his lifeâ [https://firstdraftnews.org/this-muslim-journalist-embraced-social-media-until-it-ruined-his-life/]
Nicholas Monaco and Carly Nyst. Institute For The Future. âState-Sponsored Trolling: How Governments Are Deploying Disinformation as Part of Broader Digital Harassment Campaignsâ. Read pages 3 to 21 & 45 to 51. [http://www.iftf.org/statesponsoredtrolling]
Sarah Oh and Travis L. Adkins. InterAction. âDisinformation Toolkit.â [https://staging.interaction.org/documents/disinformation-toolkit/]
Cindy Otis. USA Today. âAmericans could be a bigger fake news threat than Russians in the 2020 presidential campaignâ [https://www.usatoday.com/story/opinion/2019/07/19/disinformation-attacks-americans-threaten-2020-election-column/1756092001/]
Reply All podcast. â#112 The Prophetâ Listen to or read transcript. [https://www.gimletmedia.com/reply-all/112-the-prophet]Introduction to Public Interest Cybersecurity
Sean Brooks, Center for Long-Term Cybersecurity. âDefending Politically Vulnerable Organizations Onlineâ [https://cltc.berkeley.edu/wp-content/uploads/2018/07/CLTC_Defending_PVOs.pdf]
Citizen Labâs âAbout Usâ Paper. [https://citizenlab.ca/wp-content/uploads/2018/05/18033-Citizen-Lab-booklet-p-E.pdf]
Citizen Labâs Security Planner. [https://securityplanner.org/]
Sandro Contenta, Toronto Star. âHow these Toronto sleuths are exposing the worldâs digital spies while risking their own livesâ [https://www.thestar.com/news/canada/2019/12/13/from-a-tower-in-toronto-they-watch-the-watchers-how-citizen-lab-sleuths-are-exposing-the-worlds-digital-spies-while-risking-their-own-lives.html]
Havron et al. "Clinical computer security for victims of intimate partner violence." In Proceedings of the 28th USENIX Security Symposium (pp. 105-122).[https://www.nixdell.com/papers/2019-usenix_clinical_security_FULL.pdf]
Deji Olukotun, Access Now. âSpyware in Mexico: an interview with Luis Fernando GarcĂa of R3D Mexicoâ [https://www.accessnow.org/spyware-mexico-interview-luis-fernando-garcia-r3d-mexico/]
Tactical Tech's Annual Report [https://cdn.ttc.io/s/tacticaltech.org/Tactical-Tech-2018-Annual-Report.pdf]
Ethics and the Citizen Clinic Code of Conduct
Citizen Clinic. "Student Code of Conduct" [https://www.citizenclinic.io/Clinic_Curriculum/Modules/Ethics/Student_Code_of_Conduct/]
Shannon Vallor, The Markkula Center for Applied Ethics. âAn Introduction to Cybersecurity Ethicsâ [https://www.scu.edu/media/ethics-center/technology-ethics/IntroToCybersecurityEthics.pdf]
Old School INFOSEC: Basic Controls
Le Blond et al. âA look at targeted attacks through the lense of an NGOâ [www.usenix.org/system/files/conference/usenixsecurity14/sec14-paper-blond.pdf]
Sean Brooks, CLTC, TechSoup Webinar. âCybersecurity in Low-Risk Organizations: Understanding Your Risk and Making Practical Improvements.â: [https://cltc.berkeley.edu/2019/02/25/cltc-and-citizen-clinic-present-cybersecurity-in-low-risk-organizations-webinar/]
Citizen Labâs Security Planner. [https://securityplanner.org/]
Electronic Frontier Foundationâs Surveillance Self-Defense guide. [https://ssd.eff.org/]
Alex Gaynor. âWhat happens when you type google.com into your browser's address box and press enter?" [https://github.com/alex/what-happens-when]
Rus Shuler. âHow Does the Internet Work?â [web.stanford.edu/class/msande91si/www-spr04/readings/week1/InternetWhitepaper.htm]
Digital Surveillance of Politically Vulnerable Organizations: The Threat Landscape
Stephen Arnold. âTelestrategies - An Interview with Dr. Jerry Lucasâ [http://www.arnoldit.com/search-wizards-speak/telestrategies-2.html]
Joseph Cox. âI Gave a Bounty Hunter $300. Then He Located Our Phoneâ [https://motherboard.vice.com/en_us/article/nepxbz/i-gave-a-bounty-hunter-300-dollars-located-phone-microbilt-zumigo-tmobile]
Vernon Silver and Ben Elgin. âTorture in Bahrain Becomes Routine With Help From Nokia Siemensâ [https://web.archive.org/web/20111006185329/http://www.bloomberg.com/news/2011-08-22/torture-in-bahrain-becomes-routine-with-help-from-nokia-siemens-networking.html]
John Scott-Railton et al, Citizen Lab. âBittersweet: Supporters of Mexicoâs soda tax targeted with NSO exploit linksâ [https://citizenlab.ca/2017/02/bittersweet-nso-mexico-spyware/]
Problem Diagnosis and Reframing
Netgain. âDigital Security and Grantcraft Guideâ [fordfoundation.org/media/3334/digital-security-grantcraft-guide-v10-final-22317.pdf]
Arthur Turner. âConsulting Is More Than Giving Adviceâ [https://hbr.org/1982/09/consulting-is-more-than-giving-advice]
Thomas Wedell-Wedellsborg. âAre You Solving the Right Problems?â [https://hbr.org/2017/01/are-you-solving-the-right-problems]
Threat Modeling & Bounding Risk Assessments
Electronic Frontier Foundation, âSurveillance Self-Defense: Your Security Planâ [https://ssd.eff.org/en/playlist/activist-or-protester#your-security-plan]
NIST SP 800-37 âRisk Management Framework for Information Systems and Organizations.â Chapter 2 only. [https://csrc.nist.gov/CSRC/media/Publications/sp/800-37/rev-2/draft/documents/sp800-37r2-draft-ipd.pdf or Shutdown Mirror]
NIST SP 800-39 âManaging Information Security Risk.â Chapter 2 only. [https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-39.pdf or Shutdown Mirror]
NISTIR 8062 âAn Introduction to Privacy Engineering and Risk Management in Federal Systems.â [https://nvlpubs.nist.gov/nistpubs/ir/2017/NIST.IR.8062.pdf or Shutdown Mirror]
Contextual & Capacity Research
SAFETAG, Internews. "SAFETAG Guide" Skim to Section 2.2, then read Section 2.2 and Section 2.3. [https://safetag.org/guide/]
Read and Explore Examples About PESTLE. (use an ad-blocker!) [https://pestleanalysis.com/what-is-pestle-analysis/]
Jorge Luis Sierra. âDigital and Mobile Security for Mexican Journalists and Bloggersâ [https://freedomhouse.org/sites/default/files/Digital%20and%20Mobile%20Security%20for%20Mexican%20Journalists%20and%20Bloggers.pdf]
Information Gathering
Ruba Abu-Salma et al. âObstacles to the Adoption of Secure Communication Toolsâ [https://ieeexplore.ieee.org/abstract/document/7958575/]
Jeanette Blomberg et al. "An Ethnographic Approach to Design" [https://www.researchgate.net/publication/262363851_An_Ethnographic_Approach_to_Design]
Jenna Burrell. "The Field Site as a Network: A Strategy for Locating Ethnographic Research" [https://doi.org/10.1177/1525822X08329699]
Collaboration on International ICT Policy in East and Southern Africa. âSafeguarding Civil Society: Assessing Internet Freedom and the Digital Resilience of Civil Society in East Africaâ - Read each chapter, but for one country only. [https://cipesa.org/?wpfb_dl=237]
Lofland and Lofland. Read Chapter 5 (66-98) "Logging Data" in "Analyzing social settings: A guide to qualitative observation and analysis" [https://searchworks.stanford.edu/view/10531063]
Open Source Research Methods, Safety, and Tools
Awesome OSINT [https://github.com/jivoi/awesome-osint]
Ian Barwise. âOpen-Source Intelligence (OSINT) Reconnaissanceâ [https://medium.com/@z3roTrust/open-source-intelligence-osint-reconnaissance-75edd7f7dada]
Conor Fortune, Amnesty International. âDigitally dissecting atrocities â Amnesty Internationalâs open source investigations.â [https://www.amnesty.org/en/latest/news/2018/09/digitally-dissecting-atrocities-amnesty-internationals-open-source-investigations/]
OSINT Framework [https://osintframework.com/]
OSINT.link [https://osint.link]
Travis Lishok, Protective Intelligence. âPart I: An Introduction To OSINT Research For Protective Intelligence Professionalsâ [https://www.protectiveintelligence.com/blog/osint-intro-for-protective-intelligence-pt1]
Travis Lishok, Protective Intelligence. âPart 2: An Introduction To OSINT Research For Protective Intelligence Professionalsâ [https://www.protectiveintelligence.com/blog/osint-intro-for-protective-intelligence-pt2]
SECALERTS - Automated Security Audit [https://secalerts.co/security-audit]
Security Law and Policy Factors
James C. Scott. âSeeing Like a Stateâ - Chapter 9 [https://libcom.org/files/Seeing%20Like%20a%20State%20-%20James%20C.%20Scott.pdf]
Kim Fong et al. âA CRIMSon Tide of Data: An Assessment of Potential Privacy Problems of the Consolidate Records Information Management Systemâ [http://people.ischool.berkeley.edu/~strush/CRIMS_FongRowlandTrush_Feb2018.pdf]
Adversary Persona Development
Julian Cohen. âPlaybook Based Testing.â [https://medium.com/@HockeyInJune/playbook-based-testing-5df4b656113a]
Bill Marczak and John Scott-Railton, Citizen Lab. âKeep Calm and (Donât) Enable Macros: A New Threat Actor Targets UAE Dissidentsâ [https://citizenlab.ca/2016/05/stealth-falcon/]
Nick Merrill, Daylight Security Research Lab. "Adversary Personas" [https://daylight.berkeley.edu/adversary-personas/]
Microsoftâs STRIDE and related blog posts. [https://cloudblogs.microsoft.com/microsoftsecure/2007/09/11/stride-chart/]
Threat Scenario Development
Mitreâs ATT&CK Wiki. [https://attack.mitre.org/]
Mitreâs PRE-ATT&CK Techniques. [https://attack.mitre.org/techniques/pre/]
Mitreâs Common Vulnerabilities and Exposures search.[https://cve.mitre.org/cve/]
Changing Security Behaviors
The Engine Room. âTies That Bind: Organisational Security for Civil Societyâ [https://www.theengineroom.org/civil-society-digital-security-new-research/]
Adrienne Porter Felt et al. âImproving SSL Warnings: Comprehension and Adherenceâ [https://dl.acm.org/citation.cfm?id=2702442]
Francesca Musiani and Ksenia Ermoshina. âWhat is a Good Secure Messaging Tool? The EFF Secure Messaging Scorecard and the Shaping of Digital (Usable) Securityâ [https://www.westminsterpapers.org/articles/10.16997/wpcc.265/]
Alma Whitten and Doug Tygar. âWhy Johnny Canât Encryptâ [https://www.usenix.org/legacy/publications/library/proceedings/sec99/full_papers/whitten/whitten_html/index.html]
Social Engineering and Phishing
Citizen Clinic. "Phishing Simulation Policy" [https://www.citizenclinic.io/Clinic_Infrastructure/Phishing_Simulation/]
Masashi Crete-Nishihata et al, Citizen Lab. "Spying on a Budget: Inside a Phishing Operation with Targets in the Tibetan Community" [https://citizenlab.ca/2018/01/spying-on-a-budget-inside-a-phishing-operation-with-targets-in-the-tibetan-community/]]
Micah Lee, The Intercept. âItâs Impossible To Prove Your Laptop Hasnât Been Hacked. I Spent Two Years Finding Out.â [https://theintercept.com/2018/04/28/computer-malware-tampering/]
Rachel Tobac. Social Proof Security. âHow I would Hack You: Social Engineering Step-by-Stepâ [https://www.youtube.com/watch?v=L5J2PgGOLtE]
Designing Security Training
Electronic Frontier Foundation. âAm I the Right Person?â [https://sec.eff.org/articles/right-person-to-train]
Electronic Frontier Foundation. âHow to Teach Adultsâ [https://sec.eff.org/articles/how-to-teach-adults]
Browse the rest of EFFâs Security Education Companion. [https://sec.eff.org/]
Rachel Weidinger et al. âHow To Give A Digital Security Trainingâ [https://medium.com/@geminiimatt/how-to-give-a-digital-security-training-4c83af667d40]
Rachel Weidinger et al. âDigital Security Training Resources for Security Trainers, Fall 2019 Editionâ [https://medium.com/cryptofriends/digital-security-training-resources-for-security-trainers-spring-2017-edition-e95d9e50065e]
Psychosocial Resilience
Rated R for Resilience resource site. [https://sites.google.com/view/ratedr/basics]
Angela Chen. The Verge. âModerating content doesnât have to be so traumaticâ [https://www.theverge.com/2019/2/27/18243359/content-moderation-mental-health-ptsd-psychology-science-facebook]
Sam Dubberley and Michele Grant. First Draft. âJournalism and Vicarious Traumaâ [https://firstdraftnews.org/wp-content/uploads/2017/04/vicarioustrauma.pdf]
Sarah Jeong, Charlie Warzel, Brianna Wu, Joan Donovan. New York Times. âEverything is GamerGateâ [https://www.nytimes.com/interactive/2019/08/15/opinion/gamergate-twitter.html] - Read all of the four essays.
Harmful Information (Misinformation and Harassment)
Tahmina Ansari, First Draft. âThis Muslim journalist embraced social media until it âruinedâ his lifeâ [https://firstdraftnews.org/this-muslim-journalist-embraced-social-media-until-it-ruined-his-life/]
Nicholas Monaco and Carly Nyst. Institute For The Future. âState-Sponsored Trolling: How Governments Are Deploying Disinformation as Part of Broader Digital Harassment Campaignsâ. Read pages 3 to 21 & 45 to 51. [http://www.iftf.org/statesponsoredtrolling]
Sarah Oh and Travis L. Adkins. InterAction. âDisinformation Toolkit.â [https://staging.interaction.org/documents/disinformation-toolkit/]
Cindy Otis. USA Today. âAmericans could be a bigger fake news threat than Russians in the 2020 presidential campaignâ [https://www.usatoday.com/story/opinion/2019/07/19/disinformation-attacks-americans-threaten-2020-election-column/1756092001/]
Reply All podcast. â#112 The Prophetâ Listen to or read transcript. [https://www.gimletmedia.com/reply-all/112-the-prophet]
Last updated