Neural-net User Services Modeling Nomenclature Club AKA Group 2 Outline:
Rural libraries face unique challenges when it comes to digital privacy. In areas where internet access is limited, many patrons rely on the library for all or nearly all their digital needs. Often these patrons have low levels of digital literacy, little knowledge of the risks of being tracked and surveilled online, and are not familiar with the tools they can use to protect themselves. In addition, populations that are especially vulnerable to abuse through exploitation of their personal data are often more isolated and have less access to resources than in other locations.
We are focusing on specific at risk populations from within our rural communities, but the work we are doing may be relevant to larger locations.
Current Activity: As a group we will be working on the following:
Leigh Ann will be creating materials to disseminate directly to Native American Women on reservations, since they face a unique threat model that leaves them open to abuse, while having little recourse. They will begin by reaching out to the contacts Alison suggested, and seeing what other work has already been done in this area, and where help is most needed.
Wren will be be trying out a threat modeling/preventative tools course with domestic abuse shelter staff and begin data gathering on what privacy/surveillance problems that clients are running into. He is also pushing his local mayor to implement a local surveillance software ban.
Ellie will be piloting a computer basics peer-learning series that begins in August. Ellie will also be drafting policy around CCTV, limiting its use to specific purposes and excluding future expansion to include hi-res/live-streaming/facial recognition – as her library system has been granted funding for CCTV implementation that they plan to use.
Will update as progress continues.
Wren gave a lecture to shelter staff about threat modeling for people in domestic violence situations. Focusing on location data, its obfuscation by the user and mechanisms for discovery by the attacker. Staff seemed to believe that the use of location data to monitor victims was a common occurrence and something that they did not feel particularly fit to handle. Staff ended up having a lot of concern about their own infrastructure, which I tempered -- but which demonstrated a need for IT training. There seems to be a need for clients to have a resource for help with assuring that their devices are set up to be private. I will be setting up one-on-one interactions with clients who have concerns about their device as cases arise.