CreditsLast Updated 2016-06
This is LevelUp's repository of Community Resources and Tools - this is where you'll find all trainer-contributed content, such as field-tested training modules, facilitation tools and aids, and other useful content. Also found here is our growing index of helpful resources, guides, and tools that you can provide to training participants before, during, or after an event.
Leave a note anywhere on this page - look for the Hypothes.is toolbar in the upper right-hand corner.
Send us an email at email@example.com (GPG public key here) with a request to join the LevelUp Mailing List, to stay updated with the latest on LevelUp, be informed of changes or improvements to the site, and interact with others in the training community.
Virtually every “sophisticated” hack of an individual reporter or entire newsroom starts with a relatively simple attack: phishing and spear phishing. There are plenty of ways to be phished, and it happens incredibly frequently. Prepare yourself with our guide to mitigate or avoid phishing or spear phishing attacks.
Staying safe on your computer, phone and online isn’t about having the latest security tools or paying lots of money to other people to keep you safe. By far the most powerful defense is to change your own behavior. Explore this site to learn how to keep yourself and your friends and family safer…and be your own Cyber Superhero.
The CryptoParty Handbook is an introduction for anyone to the basics of cryptography tools, and how to throw a CryptoParty, an open-format party that is free to anyone (independent of age, gender or knowledge) who is interested in learning or teaching cryptography software and concepts. Topics covered include Tor, public key encryption, and Off The Record (OTR) messaging, and others.
CyberArabs is a website with news, guides, videos, and tutorials on digital security best practices for civil society organizations, journalists, and human rights defenders . Topics include creating good passwords, recognizing phishing, secure email, and others.
The Digital First Aid Kit is a self-diagnostic tool for human rights defenders, journalists, bloggers, and online activists to understand the types of threats they and their colleagues and friends face, and how to deal with them or seek help from a specialist. Topics covered include: secure communication, account hijacking, malware, and DDoS mitigation, and others.
Digital Footprint is a guide for individuals, businesses, organizations and governments to understand, assess and mitigate the data that is collected when they use digital technologies. Topics covered include data that is collected by social media, point of sale transactions, and Wi-Fi networks, and others.
The Digital Security First Aid Kit is a basic guide to what steps to take and groups to contact when human rights defenders find themselves in a digital security emergency. Topics covered include: what to do when your social media account is hacked, how to anonymously access a blocked website, and how to send encrypted emails, and others.
This handbook explores the laws and technologies that have developed in the United States that affect how journalists operate and protect their sources, including basic best digital security practices for journalists to mitigate these risks. Topics include strategies and tools to use when communicating with linkable and unlinkable sources, the importance of https connections, and email encryption and others.
Rory Peck Trust’s Digital Security Resources are a collection of guides for freelance journalists on basic digital security practices. Topics covered include, how to access blocked content, safely use public networks or shared computers, and recognize social engineering attacks, amongst others.
Email Self-Defense is a walkthrough guide for anyone to learn how to encrypt their email using free, open source software. Topics covered include creating a keypair, uploading keys to public keyservers, sending a test email to a bot, and signing keys, amongst others.
On July 2, 2013, Freedom of the Press Foundation published this whitepaper entitled Encryption Works. It is a Guide to Protecting Your Privacy for Journalists, Sources, and Everyone Else. This guide has not updated in over a year. Luckily, Freedom of the Press Foundation is working on an updated version that is linked to from the website.
Information Security for Journalists is a handbook for investigative journalists that outlines the most effective means of keeping work private and safe from spying. It explains how to write safely, how to think about security and how to safely receive, store and send information that must be kept out of the hands of others.
The Internet Society developed three interactive online tutorials focused on identity and privacy. Each tutorial takes about five minutes and gives Internet users a solid foundation when it comes to making informed choices about their unique online identities.
Me & My Shadow helps anyone to learn about how their data is collected when browsing the internet on a computer or mobile phone, and how to minimize the data that is sent.
Protege.LA is a simple repository for Spanish language digital security resources that allows anyone to search for resources to match their needs by filtering according to different digital security topics.
Security in-a-Box is a comprehensive toolkit for beginners, activists, or human rights defenders about digital security best practices, with guides on how to protect your data on your computer, social media, and mobile phones, and step-by-step instructions for downloading and using digital security software.
Surveillance Self-Defense is a guide of videos and tutorials that help anyone assess their own digital surveillance risks, and learn how to use tools and adopt good practices to protect their privacy on computers and mobile phones. Topics covered include how to create strong passwords, delete your data securely on your device, use PGP email encryption, and tips for keeping your data safe at a protest, and others.
The Internet Society developed three interactive online tutorials focused on identity and privacy. Each tutorial takes about five minutes and gives Internet users a solid foundation when it comes to making informed choices about their unique online identities. - Created by the Internet Society - Languages English, Spanish, French, and Bahasa Indonesian. - http://www.internetsociety.org/your-digital-footprint-matters
Zen and the Art of Making Tech Work for You is a community-built resource on information security for the growing community of women and trans* activists, human rights defenders and technologists. It is designed to be a living, growing collection of practical guidance and information that uniquely speaks to the community’s needs, experiences, and activism, both online and offline. Topics include: creating and managing identities online, safe spaces in the public sphere, and exploring tools for collboration. Please note this manual is currently in beta.
FLOSS Manuals is a community-driven website that features manuals about free and open source software.
A list of a number of desktop tools and mobile phone apps that help to protect user privacy and data integrity. The following lists, though not exhaustive, provides links to a number of them, categorized by function, that the ISC Project has found effective for protecting various facets of user privacy.
Tactical Tech’s Me and My Shadow project helps you control your data traces, see how you’re being tracked, and find out more about the data industry.
Learn which online services are allegedly a part of PRISM and which open source alternatives exist to protect your privacy online.
The Secure Messaging Scorecard is an assessment of messaging technologies (including chat, text, email, and video) rated on digital security best practices, including encryption, documentation of cryptography design, and whether they’ve received independent security audits, amongst others.
Tasharuk is a community-driven website that serves as a peer-to-peer knowledge base for anyone to create or find high-quality resources on digital or social technologies.
A website that assembles, curates, and provide’s easy access to a large list of tools that can be used for social change projects. This platform includes a range of secure and insecure tools.
The Engine Room aggregated resources, including for mobile data collection decision-making, as part of their recent study on how organisations select tech (for governance/accountability, but the resources are broader).
Every year Torrent Freak publishes a review of Virtual Private Network (VPN) services, based on how anonymous they really make the user. Reviews are based on whether or not (or how long) the services log users’ IP addresses, and other privacy sensitive practices.
A new, very detailed comparison of VPN providers. Note that this represents largely the analysis by the author, and focuses on features which are available by default and/or very clear and easy to activate.