Group 2

From Library Freedom Wiki Page
Jump to navigation Jump to search

Neural-net User Services Modeling Nomenclature Club AKA Group 2:

Group members: Wren, Leigh Ann, Ellie

Graphic design:

  • Alison sent Wren's outline to Mike on September 18, Mike sent draft on September 23rd. English version complete September 29.



   1. taking a harm reduction approach to digital privacy, leading to increased awareness and improved data protection for patrons, staff, and the wider community. 
   2. Providing library staff and volunteers a variety of options for helping personalize threat models for vulnerable populations

Narrative and responsibilities:

Policy and procedure: Deliverables:

A. Vendor agreements (Wren): potentially between libraries -- like a set of guidelines outside of which we would reject a vendor's product that would include a policy document for the individual library and some sort of group designation

(Patron Privacy/Data Protection Policy- maybe this is folded in with the vendor agreement piece?(??))

B. CCTV Use Policy: (Ellie) Policy to limit security camera use to specific purposes and excluding future expansion to include hi-res/live-streaming/facial recognition AI/etc. Specifics on who has access, how long it is stored, sharing with law enforcement, etc. (by November) HELP NEEDED - Any examples would be welcome

Patron programming: (Ellie) Privacy basics in digital literacy training – Privacy basics will be interwoven with basic digital literacy content over a four-part training series. Topics covered will include: Passwords and password managers, browser extensions (https everywhere, privacy badger), simple threat modeling, etc. -


   A. Course materials (by October) - 
   B. case study +/or brief evaluation (November) HELP NEEDED - maybe graphic design help with report if it is something to be shared.


   A. Planning and Curriculum development (8/19 - 9/19)
   B. Outreach (9/19)
   C. Pilot program (10/19)
   D. Evaluation and writeup (11/19)

Staff development: (Ellie) Privacy harm reduction workshop for library staff (Ellie in collaboration with Kelly & Sara from cohort 1). The idea is to put together a "privacy roadshow" that could be presented at libraries around the state.


   A. Course outline 
   B. Presentation
   C. Other materials (e.g., activities, handouts) HELP NEEDED - graphic design for handouts maybe?


   A. Planning meeting (8/22/19) 
   B. Draft workshop outline and materials  (9/19 - 10/19)
   C. Pilot workshop with staff (10/19)
   D. Refine and disseminate (11/19 - forever)

Staff training: (Wren) A presentation about stalkerware/threat modeling in the context of domestic violence relationshops.


   A. Presentation
   B. Risk Assessment/Path to safety infographic


   A. Revamp the presentation I made to DV Shelter staff about stalkerware/threat modeling (Beginning of Sept.) 
   B. Collect any client specific use cases that I run into (End of Sept.)
   C. Create draft infographic document (End of Sept.) 
   D. Refine and disseminate (11/19 - forever)

Materials to disseminate directly to at risk populations (Ideally posters/hand-outs). (Leigh Ann)

          My personal area of interest is Native American Women on reservations, since they face a unique threat model that leaves very open to abuse, while having little recourse, however, after discussing with the group, I'd be more than happy to open that idea up to at risk populations more generally.


Rural libraries face unique challenges when it comes to digital privacy. In areas where internet access is limited, many patrons rely on the library for all or nearly all their digital needs. Often these patrons have low levels of digital literacy, little knowledge of the risks of being tracked and surveilled online, and are not familiar with the tools they can use to protect themselves. In addition, populations that are especially vulnerable to abuse through exploitation of their personal data are often more isolated and have less access to resources than in other locations.

We are focusing on specific at risk populations from within our rural communities, but the work we are doing may be relevant to larger locations.

Current Activity: As a group we will be working on the following:

Leigh Ann will be creating materials to disseminate directly to Native American Women on reservations, since they face a unique threat model that leaves them open to abuse, while having little recourse. They will begin by reaching out to the contacts Alison suggested, and seeing what other work has already been done in this area, and where help is most needed.

Wren will be be trying out a threat modeling/preventative tools course with domestic abuse shelter staff and begin data gathering on what privacy/surveillance problems that clients are running into. He is also pushing his local mayor to implement a local surveillance software ban.

Ellie will be piloting a computer basics peer-learning series that begins in August. Ellie will also be drafting policy around CCTV, limiting its use to specific purposes and excluding future expansion to include hi-res/live-streaming/facial recognition – as her library system has been granted funding for CCTV implementation that they plan to use.

Will update as progress continues.

Wren gave a lecture to shelter staff about threat modeling for people in domestic violence situations. Focusing on location data, its obfuscation by the user and mechanisms for discovery by the attacker. Staff seemed to believe that the use of location data to monitor victims was a common occurrence and something that they did not feel particularly fit to handle. Staff ended up having a lot of concern about their own infrastructure, which I tempered -- but which demonstrated a need for IT training. There seems to be a need for clients to have a resource for help with assuring that their devices are set up to be private. I will be setting up one-on-one interactions with clients who have concerns about their device as cases arise.