Digital Security Articles & Newsletters

    Header image titled, "U.S. Journalism School Security Curriculum"

    Module: Authentication (Part 1)

    Guide

    This module opens with an introduction to common attacks on online accounts, and the need for two-factor authentication. It then moves on to a few activities having students investigate the security of their own passwords, and where they might set up two-factor authentication for their primary email provider. It closes …

    Header image titled, "U.S. Journalism School Security Curriculum"

    Module: Mass surveillance in the U.S.

    Guide

    This section is intended to be presentation-heavy. It opens with a short video explaining the foreign intelligence surveillance court, followed by another introducing NSA whistleblower Edward Snowden. The legal material can be somewhat dry, so it's especially important to focus on the surveillance capabilities outlined, followed secondarily by the authorities …

    Header image titled, "U.S. Journalism School Security Curriculum"

    Module: Law enforcement surveillance tech

    Guide

    This section on surveillance tools used by law enforcement is discussion focused, and intends to get students to think critically about the relationship between surveillance, privacy, and transparency. It begins with lecture canvassing a variety of law enforcement surveillance technology, based on research from from the Electronic Frontier Foundation. Afterward, …

    Header image titled, "U.S. Journalism School Security Curriculum"

    Module: Threat modeling

    Guide

    Threat modeling is foundational to thinking through security broadly, and we therefore introduce it before several other more technical topics. We first encourage the use of physical metaphors (e.g., choosing how and where to lock a bicycle) before introducing digital applications to help beginners understand how they may already create …

    Header image titled, "U.S. Journalism School Security Curriculum"

    Module: Social engineering

    Guide

    This short module opens with a video of a social engineering professional showing off her skills, then moving on to some psychological principles and tactics underlying social engineering approaches. Next, it includes a brief activity asking students to a consider how a social engineer might get their credit card number. …

    Header image titled, "U.S. Journalism School Security Curriculum"

    Module: Digital security 101

    Guide

    This module will not provide an exhaustive look at this topic, but will instead provide the starting point for students to know how to investigate their digital security questions as needed.This lecture and activities will briefly introduce several foundational topics on digital security, including the basics of threat modeling, …

    Header image titled, "U.S. Journalism School Security Curriculum"

    Module: Authentication (Part 2)

    Guide

    This short module opens with an introduction to the problem space (password reuse), followed by introducing password managers, and optionally having students install one and sign up for an email with a randomized password.PrerequisitesThreat modeling(Good to know) Authentication - Part 1Estimated time20-25 minutes (35-40 minutes …