Digital Security Articles & Newsletters

    default social card (URL location fixed)

    Keybase for beginners

    Communication securityGuide

    When working together online, chat tools like Slack are useful, but allow the service provider to read your messages. Keybase simplifies the process of sharing files and having conversations securely.Keybase is end-to-end encrypted, meaning that only you and your conversational partners can read the messages and files you …

    Header image titled, "U.S. Journalism School Security Curriculum"

    Module: File safety

    Guide

    This module begins with a short discussion about information hidden in files, and the potential risks tied to file metadata. It follows with a short exercise to have students find the file metadata embedded in a photo, followed by discussion of risk minimization.PrerequisitesThreat modeling(Good to know) Malware …

    Header image titled, "U.S. Journalism School Security Curriculum"

    Module: Law enforcement surveillance tech

    Guide

    This section on surveillance tools used by law enforcement is discussion focused, and intends to get students to think critically about the relationship between surveillance, privacy, and transparency. It begins with lecture canvassing a variety of law enforcement surveillance technology, based on research from from the Electronic Frontier Foundation. Afterward, …

    Header image titled, "U.S. Journalism School Security Curriculum"

    Module: Threat modeling

    Guide

    Threat modeling is foundational to thinking through security broadly, and we therefore introduce it before several other more technical topics. We first encourage the use of physical metaphors (e.g., choosing how and where to lock a bicycle) before introducing digital applications to help beginners understand how they may already create …

    Header image titled, "U.S. Journalism School Security Curriculum"

    Module: Device protection

    Guide

    This module should be short, introducing the problem with a video, and open a discussion with students about full disk encryption and strong password protection.PrerequisitesThreat modelingEstimated time20 minutesObjectivesUpon successful completion of this lesson, students will be able to analyze the risks associated with device …

    Header image titled, "U.S. Journalism School Security Curriculum"

    Module: Digital security 101

    Guide

    This module will not provide an exhaustive look at this topic, but will instead provide the starting point for students to know how to investigate their digital security questions as needed.This lecture and activities will briefly introduce several foundational topics on digital security, including the basics of threat modeling, …

    Header image titled, "U.S. Journalism School Security Curriculum"

    Module: Authentication (Part 2)

    Guide

    This short module opens with an introduction to the problem space (password reuse), followed by introducing password managers, and optionally having students install one and sign up for an email with a randomized password.PrerequisitesThreat modeling(Good to know) Authentication - Part 1Estimated time20-25 minutes (35-40 minutes …