Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Frontline Activists meet the Academy: Tools and Knowledge

966 views

Published on

Published in: Technology, Business
  • ⇒⇒⇒WRITE-MY-PAPER.net ⇐⇐⇐ I love this site. It always finds me the best tutors in accordance with my needs. I have been using it since last year. The prices are not expensive compared to other sites. I am glad I discored this site:)
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Be the first to like this

Frontline Activists meet the Academy: Tools and Knowledge

  1. 1. Frontline Activists meet the Academy: Tools and Knowledge Robert Guerra Global Voices Citizen Media Summit Budapest, Hungary - June 27, 2008
  2. 2. Overview <ul><li>Introduction </li></ul><ul><li>Issues </li></ul><ul><li>Questions to ask </li></ul><ul><li>Recommendations </li></ul><ul><li>Summary </li></ul>
  3. 3. Introduction <ul><li>Mission </li></ul><ul><ul><li>Strategic planning, technology and training. </li></ul></ul><ul><ul><li>Training – Communication security, Anti-Censorship </li></ul></ul><ul><ul><li>Advocacy – Internet Policy & Governance (ICANN, IGF, etc) </li></ul></ul><ul><li>Area of focus : </li></ul><ul><ul><li>North America: USA/Canada </li></ul></ul><ul><ul><li>Latin America & Caribbean </li></ul></ul><ul><ul><li>Africa - Eastern Congo (DRC), South Africa </li></ul></ul><ul><ul><li>Central Asia </li></ul></ul>
  4. 5. Issues <ul><li>Censorship </li></ul><ul><ul><li>Internet (web & email) </li></ul></ul><ul><li>Surveillance </li></ul><ul><ul><li>Internet (web, email), Mobile Phone </li></ul></ul><ul><li>Hacking </li></ul><ul><ul><li>Exploiting website insecurities </li></ul></ul><ul><li>Blocking & Take-down of sites </li></ul>
  5. 6. Questions to ask <ul><ul><li>Background Information </li></ul></ul><ul><ul><ul><li>Mission </li></ul></ul></ul><ul><ul><ul><ul><li>What is the mission of the organization? </li></ul></ul></ul></ul><ul><ul><ul><ul><li>How communicate with others? </li></ul></ul></ul></ul><ul><ul><ul><li>Internet Access – What is it like? </li></ul></ul></ul><ul><ul><ul><ul><li>Internet Café </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Shared Computer </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Home / Office </li></ul></ul></ul></ul><ul><ul><ul><li>Technology </li></ul></ul></ul><ul><ul><ul><ul><li>ISP used </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Mailbox – in /out of country </li></ul></ul></ul></ul>
  6. 7. Recommendations <ul><ul><li>Share best practices </li></ul></ul><ul><ul><ul><li>Tools to decrease vulnerabilities </li></ul></ul></ul><ul><ul><ul><ul><li>Open source software </li></ul></ul></ul></ul><ul><ul><li>Localize </li></ul></ul><ul><ul><ul><li>Software & training manuals </li></ul></ul></ul><ul><ul><li>Support networks </li></ul></ul><ul><ul><ul><li>Decentralized </li></ul></ul></ul><ul><ul><ul><li>Real-time help desk (Support and backup/mirror) </li></ul></ul></ul><ul><ul><li>Monitor / Assess success </li></ul></ul><ul><ul><ul><li>Short, Medium & long Term </li></ul></ul></ul>
  7. 8. Recommendations (2) <ul><ul><li>Email </li></ul></ul><ul><ul><ul><li>Client : </li></ul></ul></ul><ul><ul><ul><ul><li>Thunderbird + GPG Plugin </li></ul></ul></ul></ul><ul><ul><ul><ul><li>PGP (Commercial tool) </li></ul></ul></ul></ul><ul><ul><ul><li>Web: Gmail+SSL </li></ul></ul></ul><ul><ul><ul><li>Mixed: Vaultletsoft, Hushmail </li></ul></ul></ul><ul><ul><ul><ul><li>Free vs Commercial </li></ul></ul></ul></ul><ul><ul><ul><li>Server: Move Mailbox to friendlier jurisdiction </li></ul></ul></ul><ul><ul><ul><ul><li>Google Apps - MX Hosting free ! </li></ul></ul></ul></ul>
  8. 9. Examples
  9. 11. Recommendations (3) <ul><ul><li>Chat </li></ul></ul><ul><ul><ul><li>Keep it simple & Multi-platform </li></ul></ul></ul><ul><ul><ul><ul><li>Peer to Peer tool (Skype) issues – Bandwidth </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Off-The-Record Enabled chat client (OTR) </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Pidgin+ OTR (Adium) </li></ul></ul></ul></ul><ul><ul><li>Anti-Censorship </li></ul></ul><ul><ul><ul><li>TOR </li></ul></ul></ul><ul><ul><ul><li>Psiphon </li></ul></ul></ul><ul><ul><li>Mirroring </li></ul></ul><ul><ul><ul><li>Replication of blog content to mirrors </li></ul></ul></ul>
  10. 12. Recommendations (4) <ul><ul><li>Computer </li></ul></ul><ul><ul><ul><li>Disk Encryption </li></ul></ul></ul><ul><ul><ul><ul><li>Best Crypt </li></ul></ul></ul></ul><ul><ul><ul><ul><li>TrueCrypt (FOSS / Multi-Platform) </li></ul></ul></ul></ul><ul><ul><ul><ul><li>PGP (Commercial) </li></ul></ul></ul></ul><ul><ul><ul><li>Whole Disk Encryption </li></ul></ul></ul><ul><ul><ul><ul><li>FOSS - TrueCrypt (PC) </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Commercial - PGP (Win/PC) </li></ul></ul></ul></ul>
  11. 13. Q & A

×