Editing LFI Course Materials 2020/Week two

Jump to navigation Jump to search

Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision Your text
Line 1: Line 1:
=== Week 2: Foundational reading===
+
History of the internet, early govt surveillance, ideology, corp model -- declaration of ind of cyberspace, californian ideology, donna haraway, humdog, other basic stuff, donna haraway
* Real time lecture: March 23, 9-11 Pacific/12-2 Eastern on Zoom: https://zoom.us/j/9129428892
+
 
 +
 
 +
 
 +
 
 +
=== Week 2: Threat modeling and basics of teaching privacy===
 +
* Real time lecture: May 31st 10 am Pacific/1 pm Eastern
  
 
==== Overview ====
 
==== Overview ====
We'll begin by getting into some background about what's going on and how we got here. Our focus this week will be on a range of readings...a little bit of the history and politics of Big Data and government surveillance, as well as some of the historical ideas about what a more just internet could look like. We don't have anywhere near the time to go through all of the history here, so we'll just be focusing on some of the bigger issues. Please have the reading completed before our Monday lecture, because we'll spend that lecture talking about what we learned. Later, we'll continue the discussion on libraryfreedom.chat. You'll also review the Data Detox Kit and complete one day of it for your weekly tasks.
+
This week we'll cover some of the building blocks of privacy advocacy: threat modeling, and learning basic privacy strategies and tools. Threat modeling is a method for figuring out a privacy strategy that works for someone based on their unique needs. Alison will teach us how to threat model, and then we'll talk about some of the 101 level ways that anyone can protect their privacy. We'll close out the lecture with some resources for learning how to do basic privacy education.  
 +
 
 +
==== Learning objectives ====
 +
* Learn starting points for teaching privacy
 +
* Learn about top privacy resources
 +
* Learn about the importance of threat modeling and how to create a threat model
  
 
==== Readings ====
 
==== Readings ====
All readings for this week are linked on the [https://libraryfreedom.wiki/html/public_html/index.php/LFI_Course_Materials_4/Week_one#Readings week one page]
+
* Read EFF's threat modeling one-pager: https://www.eff.org/files/2015/11/24/3mod_threat-modeling-ssd_9-3-15.pdf
 +
* Browse through Tactical Technology Collective's Data Detox Kit: https://datadetox.myshadow.org/en/home
 +
* Browse through EFF's Surveillance Self-Defense: ssd.eff.org
 +
* Browse through EFF's Security Education Companion: sec.eff.org
  
 
==== Guest lecturer ====
 
==== Guest lecturer ====
Line 12: Line 25:
  
 
==== Discussion ====
 
==== Discussion ====
* How do you see the surveillant assemblage at work in our lives?  
+
* How can we use threat modeling in our everyday work?
* What stands out to you about the ideologies that helped shape the internet?
+
* How could you get started teaching privacy in your library? If you're already teaching privacy, talk about the ways you're doing so.
  
 
==== Tasks ====  
 
==== Tasks ====  
* Lecture, readings and discussion forum
+
* Lecture, readings, discussion forum, and small group work
* Complete one day of the Data Detox Kit: https://datadetoxkit.org/en/home
+
* Complete one day of the Data Detox Kit
 +
* Schedule time with Alison to talk about questions and ideas for your small group projects

Please note that all contributions to Library Freedom Wiki Page may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see Library Freedom Wiki Page:Copyrights for details). Do not submit copyrighted work without permission!

To protect the wiki against automated edit spam, we kindly ask you to solve the following CAPTCHA:

Cancel Editing help (opens in new window)