Skip to content

Latest commit

 

History

History
63 lines (45 loc) · 3.6 KB

index.md

File metadata and controls

63 lines (45 loc) · 3.6 KB

Defending Dissent in the United States:

A Cryptography Primer, Digital Suppression, and Collective Defense

An open textbook in support of CS175: Communications Security & Social Movements (Oregon State University)

Version 0.1 - mostly a crypto primer

Glencora Borradaile & Michele Gretes

Glencora Borradaile, Associate Professor of Electrical Engineering and Computer Science, Oregon State University

Michele Gretes, Civil Liberties Defense Center Digital Security program; Research Associate, Oregon State University

Table of Contents

[//]: (in accordance with the orignal book proposal, future revisions of this text will add feature Part 0/Preface: History of Surveillance Abuses and possibly Part III: expanded Countermeasures)

This open textbook can be read linearly -- cryptography fundamentals followed by their application in threats to social movement groups and available countermeasures. Alternative reading sequences will be made available as "playlists" in future revisions to the text (e.g. the order presented in-class in CS175 at OSU; suggested sequences for social movement groups or digital security trainers).

Introduction

  1. Scope of this text: social movements, suppression, and communications security*

Part I: Cryptography - Principles & Applications

  1. Introduction: what is encryption?
  2. Modern cryptography
  3. Key Exchange: How to agree on a cryptographic key over the Internet
  4. Cryptographic hash
  5. How the man in the middle can foil your crypto, and what you can do about it.
  6. Passwords
  7. Public key cryptography
  8. Crytographic signing
  9. Metadata
  10. Anonymous Routing

Part II: Digital Threats to Social Movements

  1. Overview of digital threats to social movements
  2. Digital threats from yourself, oversharing*
  3. Digital threats from neighborhood nazis*
  4. Digital threats from bosses and local systems admininstrators*
  5. Digital threats from private industry*
  6. Digital threats from local law enforcement*
  7. Digital threats from nation-states*

Part III: Defending Social Movements - Technical and Operational Countermeasures

  1. What are we trying to achieve with digital security for social movements?
  2. Selecting digital security tools: what makes technology trustworthy?*
  3. Endpoint security*
  4. Effective Passwords*
  5. Private communications*
  6. Anonymity online: Tor

Conclusion

  1. Digital security means solidarity and community defense*
  2. Take-home security plan*

[//]: (to add: APPENDIX: suggestions on community contributions: "bug reports"; "feature requests")

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.**

*indicates a page that is currently locked (to be released in future versions) **once the open textbook reaches maturity (v.1.0) a more permissive license (to allow remixing) will almost certainly apply.