To Click or Not To Click?
A new Data Detox Kit guide, adapted from content from our Digital Enquirer Kit, explains how to avoid falling for tricky URLs.
In this training series, experts who co-wrote the Digital Enquirer Kit course, will provide you with skills, tools and best practices in digital security and adjacent and relevant topics.
All you need to know:
UPCOMING SESSIONS
***Digital security toolkit against gender-based online violence: part 2***
When? 30th June (Thursday), 11:00 CEST
Lecturer: Denisse A., co-author of the Digital Enquirer Kit
Following up on part 1, this session will explore five more gender-based online violence attacks faced by women and sexual and gender minorities. On this occasion, we will focus on different forms of harassment and the challenges of accessing remedy or justice after experiencing online violence. We will finally identify holistic digital security strategies to prevent, mitigate, support or recover.
→Register here: https://events.exposingtheinvisible.org/dek/gbov-2/
___________________________________________
***Safeguarding Whistleblowers***
When? 7th July (Thursday), 14:00 CEST
Lecturer: Nikita Mazurov, co-author of the Digital Enquirer Kit
A session both on how to stay safe when leaking information if you're a would-be whistleblower, and how to protect your sources if you're the one receiving leaked information.
→Register here: https://events.exposingtheinvisible.org/dek/whistleblowers/
___________________________________________
***Digital security risk assessments***
When? 12th July (Tuesday), 14:00 CEST
Lecturer: Denisse A., co-author of the Digital Enquirer Kit
This session will offer a step-by-step tutorial on how to produce a digital security risk assessment from a holistic perspective. It will focus on identifying threats, vulnerabilities, measuring impact, with an emphasis on developing resilience and recovery strategies after an attack.
→Register here: https://events.exposingtheinvisible.org/dek/assess-risks/
___________________________________________
***All About VPNs***
When?26th July (Tuesday), 14:00 CEST
Lecturer: Nikita Mazurov, co-author of the Digital Enquirer Kit
We've probably all heard about them, but what are VPNs, exactly? When is a good time to use them, and when is it better not to? And finally, when picking a VPN to use, how do you pick one that's right for you?
→Register here: https://events.exposingtheinvisible.org/dek/vpns/
___________________________________________
***Best practices to reduce harms in projects***
When? 28th July (Thursday), 14:00 CEST
Lecturer: Denisse A., co-author of the Digital Enquirer Kit
This session will address risk mitigation strategies to safeguard the wellbeing of individuals and groups while implementing a project. It will address different forms of vulnerabilities that could be exploited or amplified during online interactions during workshops, group work or outreach.
→ Register here: https://events.exposingtheinvisible.org/dek/reduce-harms/
___________________________________________
***Instructional Strategies for Digital Security Training***
When? 3rd August (Wednesday), 14:00 CEST\ Lecturer: A. Hayder, Instructional Designer
In this session, we will dig deeper into Digital Security trainings, answering questions such as: what are the particularities of this topic? What do learners often fear or are sceptical about? What could be the different ways to approach it? We will also review some of the best-practices for Digital Security training and awareness. We will dig deeper into some of the frequently used methods like case studies and simulations and how they’re applied to achieve instructional goals.
→ Register here: https://events.exposingtheinvisible.org/dek/digisec-training/
PAST SESSIONS RECORDING VIDEOS
***Securing Your Online Accounts***
Lecturer: Nikita Mazurov, co-author of the Digital Enquirer Kit
Everything you want to know about how to keep your online accounts secure, including: how to maximize privacy settings, set up advanced protection (what exactly is 'two-factor authentication'?), use a password manager, monitor your account for signs of take-over, and stay safe against phishing attacks.
→Watch here: https://vimeo.com/718709375
___________________________________________
***Digital security toolkit against gender-based online violence: part 1***
Lecturer: Denisse A., co-author of the Digital Enquirer Kit
This session will offer an introduction to the concept of gender-based online violence, and explore five types of gendered attacks used to limit confidentiality, integrity and access to information by women and sexual and gendered minorities. We will finally identify holistic digital security strategies to prevent, mitigate or recover.
→Watch here: https://vimeo.com/721087723
___________________________________________
***A Look Inside Internet Scam Operations***
Lecturer: Nikita Mazurov, co-author of the Digital Enquirer Kit
A deep dive into three types of online fraud: extortion scams, romance scams, and fake job offers. Be able to spot scam emails by learning which red flags to watch out for and how the scams work.
→Watch here: https://vimeo.com/723356438
___________________________________________
ABOUT THE LECTURERS:
ABOUT THE DIGITAL ENQUIRER KIT:
The Digital Enquirer Kit is an e-learning course that guides learners on how to prevent the spread of misinformation, available on the free platform atingi.org. The course covers topics including media literacy, verification, and how to navigate the internet safely.
These events are part of the Digital Enquirer Kit project, and are organized by Tactical Tech in 2022. The Digital Enquirer Kit is produced and funded by The Deutsche Gesellschaft für Internationale Zusammenarbeit (GIZ) GmbH.
Disclaimer: These webinars reflect the lecturers’ views. The organizers are not responsible for any use that may be made of the information it contains.
A new Data Detox Kit guide, adapted from content from our Digital Enquirer Kit, explains how to avoid falling for tricky URLs.
The Glass Room presents Capsule 1.0, a quarterly showcase of digital objects - old and new - from previous Community Edition series, independent investigations and collaborations. This first capsule explores how our phone numbers, face prints and personal data travel from our smartphones to different third-party organisations.
Due to the pandemic and resulting quarantine, millions of people are using digital tools to continue their work and communication from home. A new article for the Heinrich-Böll-Stiftung by our Programme Director, Christy Lange, asks: how secure are the digital tools that have become a part of our everyday life?
Stay digitally, physically and psychologically safe and aware of potential risks by adopting some basic good practices and tools to keep your human sources, yourself and your evidence protected in this new chapter of Exposing the Invisible: The Kit.
Cet article aborde les questions de savoir quelle technologie est bonne, sûre et appropriée à utiliser en ces temps complexes si nous voulons agir et travailler de manière responsable et à distance. Comment décider de la technologie à laquelle nous devons faire confiance ? Il examine également ce qui pourrait être fait à l'avenir pour répondre à cette question beaucoup plus facilement qu'aujourd'hui.
Tactical Tech's co-founder Marek Tuszynski addresses the question of which technology is good, safe and appropriate to help us act and work responsibly and remotely during the coronavirus pandemic - and how to make answering this question easier in the future.