PERSONAL and MUTUAL AID/SOCIAL SECURITY
Integrated Security [Integrated Security http://www.integratedsecuritymanual.org/ http://www.integratedsecuritymanual.org/] Defending human rights is vital work performed all over the world. It is difficult and often dangerous. These aspects of the work are hard to talk about. Rarely, if ever, do women human rights defenders have the time, or the safe spaces, to think about their security and well-being. Therefore we have created the concept of Integrated Security Workshops, and this manual.
Rising up without Burning Out http://mindfuloccupation.org/files/mindful_ocupation_booklet_20120425.pdf - Created by Mindful Occupation. Activists guide to mutual aid and self-care. Mindful Occupation resource list - http://mindfuloccupation.org/external-resources/
Security Culture Zine; http://security.resist.ca/personal/culture.shtml
Know your rights
Protest rights and Freedom of Assembly project
Protektor Manuals http://protektor-blog.blogspot.com/ A great set of guides to help you install and set up a variety of security software on your computers (guides avail for mac, windows, linux). These have a lot of screen shots so are easy to follow and because the writer is very open to suggestions and requests and he keeps these up to date!
Security in a Box - by Tactical Tech https://security.ngoinabox.org/ Tac Tech is a group that makes guides/courses for NGOs on technical issues like security, visualization, using mobiles for advocacy (http://www.tacticaltech.org/). They're based in the UK and provide these guides as well as in person trainings. This toolkit is educational -- teaching you about info security but also tactical -- teaching you about how to install and set up specific programs.
Riseup's security guides https://help.riseup.net/en/security Riseup commits to keeping your data private to you. Dig the frame of these guides, "The increasing importance of information and communication has brought with it another phenomenon: the rise of a surveillance society. You can think of surveillance as an attempt by the powerful to maintain their dominance by asserting control over communication."
Defense against Denial Of Service Guide from AccessNow.org https://www.accessnow.org/policy-activism/press-blog/defense-against-denial-of-service-guide There are two parts to this guide. The first part outlines preparatory steps that can be taken by Civil Society organizations to improve their website’s resilience, should it come under attack. However, we do understand that most Civil Society organizations’ first introduction to DoS attacks comes when they suddenly find themselves the victim of an attack. The second part of this guide provides a step-by-step process to assist the staff of NGOs to efficiently deal with that stressful situation.
Google's GMail Security Checklist http://support.google.com/mail/bin/static.py?hl=en&page=checklist.cs&tab=29488
Resource made by google -- helps you walk through making sure that your GMail account is more secure. Includes instructions for checking your computer, your browser, your account, and your gmail settings.
Stay Safe Online http://www.google.com/goodtoknow/online-safety/ More Security Lessons by Google; Simply explained some include videos and illustrations.
How to Hide From Google http://howto.wired.com/wiki/Hide_From_Google Google started off the new year by announcing that they will be changing their privacy policies so that they can create more detailed profiles of their users. Starting March 1st, 2012, Google will combine information from user’s Gmail, Google Search history, YouTube, and other services. Prior to this change, Google profiled their users, but restricted the profile data use to the service from which the data was collected.
Because we have come to rely on web services so much in our day-to-day activities, it simply isn't an option to stop using search, webmail, and social networking. But there are ways for heavy users to keep a low profile so that, should Google turn decidedly evil, you won't be completely at their mercy. If you are concerned about the amount of information that Google knows about you for whatever reason, here are some techniques you can use to guard your privacy online.
MOBILE PHONE SECURITY
SaferMobile.org https://safermobile.org Resources to help you learn about mobile security. If you're hoping to begin learning about mobile security, check out the basics area: https://safermobile.org/type-category/security-basics/ The site also includes training materials -- in case you want to run a mobile security training, these are a text-book like resource for doing so.
TOR - for anonymous browsing and censorship circumvention
Adium (MacOS) - OTR and encrypted chat
Pidgin (Windows, Linux) - OTR and encrypted chat
Ghostery - http://www.ghostery.com/