<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.digitalrights.community/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=5.40.111.162</id>
	<title>TCU Wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.digitalrights.community/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=5.40.111.162"/>
	<link rel="alternate" type="text/html" href="https://wiki.digitalrights.community/index.php?title=Special:Contributions/5.40.111.162"/>
	<updated>2026-05-04T00:30:49Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.42.3</generator>
	<entry>
		<id>https://wiki.digitalrights.community/index.php?title=Template:Notes&amp;diff=38748</id>
		<title>Template:Notes</title>
		<link rel="alternate" type="text/html" href="https://wiki.digitalrights.community/index.php?title=Template:Notes&amp;diff=38748"/>
		<updated>2017-03-07T19:58:45Z</updated>

		<summary type="html">&lt;p&gt;5.40.111.162: /* Additional Notes */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;noinclude&amp;gt;&lt;br /&gt;
This is the &amp;quot;Notes&amp;quot; template.&lt;br /&gt;
It should be called in the following format:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
{{Notes&lt;br /&gt;
|Session Outputs=&lt;br /&gt;
|Next Steps=&lt;br /&gt;
|Additional Notes=&lt;br /&gt;
|Relevant Resources=&lt;br /&gt;
|Contributors=&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Edit the page to see the template text.&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&amp;lt;includeonly&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{Notes&lt;br /&gt;
|Session Outputs=Part 1 slides: https://goo.gl/XVLLPt (Google Slides)&lt;br /&gt;
|Next Steps=&lt;br /&gt;
|Additional Notes=&lt;br /&gt;
|Relevant Resources=&lt;br /&gt;
|Contributors=&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==Next Steps==&lt;br /&gt;
{{{Next Steps|}}}&lt;br /&gt;
&lt;br /&gt;
==Session Outputs==&lt;br /&gt;
{{{Session Outputs|}}}&lt;br /&gt;
&lt;br /&gt;
==Additional Notes==&lt;br /&gt;
{{{Additional Notes|}}}&lt;br /&gt;
&lt;br /&gt;
What follows are notes taken by synnick on 7/3/17 at the session&lt;br /&gt;
&lt;br /&gt;
== What is OONI? ==&lt;br /&gt;
Is a FOSS project focused on decentralization platform for monitoring internet cenorship&lt;br /&gt;
&lt;br /&gt;
All of the data is made available in raw formats to the public. The public is free to perform analysis on the data&lt;br /&gt;
&lt;br /&gt;
started in 2012 with measurements from over 180 to 190 countries.&lt;br /&gt;
&lt;br /&gt;
OONi is a research expirement that is trying to characterize different forms of censorship in context.&lt;br /&gt;
&lt;br /&gt;
Partner rganizations in Africa, SE, ME, have helped provide measurements, background and understanding of the data collected.&lt;br /&gt;
&lt;br /&gt;
The project provides the largest open data set available about internet censorship across the world. They only confirm cases of censorship when they detect blocked pages. This does not mean that other countries are not censoring traffic.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OONI Functionality ==&lt;br /&gt;
&lt;br /&gt;
There are 5 areas that are measured&lt;br /&gt;
&lt;br /&gt;
1) Blocking of websites&lt;br /&gt;
Uses the blocked url lists chosen by the user.&lt;br /&gt;
&lt;br /&gt;
The goal of the test is to recreate the normal process of visiting a web page.&lt;br /&gt;
&lt;br /&gt;
They use DNS lookup, TCP connections, HTTP request, Invalid request line -- quasi hacking -- Title tag, Headers checks which will look for header mangling from middle boxes that inject and change https headers. These transparent network proxies are not always bad -- they can provide caching and net speed ups for mobile networks for example.&lt;br /&gt;
status code&lt;br /&gt;
&lt;br /&gt;
These heuristics can produce false positives when the control does not match the test results. This was a design choice to try and avoid the chances of hiding censorship &lt;br /&gt;
&lt;br /&gt;
It is hard to distinguish a network failure from a censorship event.&lt;br /&gt;
&lt;br /&gt;
2) Whether or not instant messaging apps works&lt;br /&gt;
&lt;br /&gt;
The app tests try to reach the endpoints related to the companies network services that are required for the application to function properly.&lt;br /&gt;
&lt;br /&gt;
3) Circumvention tools are available or not&lt;br /&gt;
4) Detection of middle boxes&lt;br /&gt;
&lt;br /&gt;
The middlebox tests are designed to detect if transparent network proxies are deployed in a countries network. The DPI tests that the OONI probes try have sometimes demonstrated that this caching technology may have been used to censor websites.&lt;br /&gt;
&lt;br /&gt;
5) General network performance&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Risks ==&lt;br /&gt;
&lt;br /&gt;
Your usage of the probe is not secret to agents monitoring internet traffic.&lt;br /&gt;
&lt;br /&gt;
The probes itself connects to pornographic content that may be illegal in your country.&lt;br /&gt;
&lt;br /&gt;
Detection of middle boxes may be considered illegal as hacking&lt;br /&gt;
&lt;br /&gt;
Usage of the tool may be deemed illegal.&lt;br /&gt;
&lt;br /&gt;
The projects operators are not aware of anyone encountering legal trouble from a users usage of the tool.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Helps ==&lt;br /&gt;
Remove the plausible deniabilty of ordered censorship.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Usage ==&lt;br /&gt;
&lt;br /&gt;
OONi was a command line probe. OONI can be run on a rasberry pi. Deploying a probe is made easier by an image that packages ooni simply.&lt;br /&gt;
&lt;br /&gt;
There is also a mobile applications. The application does not support every type of test already written for the original version.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Choices available ==&lt;br /&gt;
&lt;br /&gt;
Users are asked to answer questions before they can use the application&lt;br /&gt;
&lt;br /&gt;
Test lists are places for Thursday there will be a discussion that goes deeper on the urls and its management.&lt;br /&gt;
&lt;br /&gt;
When operating a probe you are able to choose:&lt;br /&gt;
- A global content list.&lt;br /&gt;
- An in country list.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Types of tests to run&lt;br /&gt;
&lt;br /&gt;
Where and how to upload the OONI data.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Data collection ==&lt;br /&gt;
&lt;br /&gt;
Try to be minimal about collected expirement. IP addresses are scrubbed, but sometimes the project has missed removing personally identifiable information.&lt;br /&gt;
&lt;br /&gt;
The OONI control servers can recieve data over tor. The servers can be reached over HTTPS as well as clound-fronting.&lt;br /&gt;
&lt;br /&gt;
There are many benefits to publishing this data publicly:&lt;br /&gt;
&lt;br /&gt;
It allows other researchers to consider other questions. A group could verify a reasearch question: &amp;quot;Which countries are actively blocking tor.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
This data could be used in court cases as evidence.&lt;br /&gt;
&lt;br /&gt;
Story telling could help advocates produce compelling stories around the impact censorship has.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Data Interpretation ==&lt;br /&gt;
&lt;br /&gt;
An API is available for download of the OONI data from the control servers.&lt;br /&gt;
&lt;br /&gt;
Definitive Internet censorship is codified by what the team considers a confirmed &#039;blocked page&#039;&lt;br /&gt;
&lt;br /&gt;
== Involvement ==&lt;br /&gt;
&lt;br /&gt;
Partnership project&lt;br /&gt;
IRC and slack monthly community meetings&lt;br /&gt;
Running probes is great.&lt;br /&gt;
Contributing to test lists is great&lt;br /&gt;
Analyzing the data&lt;br /&gt;
Story telling is great too.&lt;br /&gt;
&lt;br /&gt;
openObservatory&lt;br /&gt;
#ooni (irc.oftc.net)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Uganda ==&lt;br /&gt;
&lt;br /&gt;
President [XXX] from 1986. During elections partner organizations helped produce research that demonstrated discrepancies between ISPs that censored traffic.&lt;br /&gt;
&lt;br /&gt;
When the government ordered a shutdown they asked the ISP to block social media, and left the ISP to implement the block.&lt;br /&gt;
&lt;br /&gt;
Since December 2015 there has been many protests in Uganda. An OONI user deployed a probe during the protests. Third party DPI tech was deployed to track &lt;br /&gt;
&lt;br /&gt;
Torproject and psyphon were deployed.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Malayasia ==&lt;br /&gt;
&lt;br /&gt;
Discovered the blocking of 39 different websites via DNS block pages.&lt;br /&gt;
&lt;br /&gt;
Interestingly, many of the blocked pages were related to the 1MDB scandal -- an organization focused on internal economic development. The washingpost revealed that 700m was deposited into personal accounts of politicians from the fund.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Question &amp;amp; Answers ==&lt;br /&gt;
&lt;br /&gt;
Should the project consider providing by default an opt-in versus an opt-in type of model.&lt;br /&gt;
&lt;br /&gt;
A probe run on its own does not provide a meaningful experiment. One the ooni probes quiz questions specifically tests to see if the user understands the implications.&lt;br /&gt;
&lt;br /&gt;
Is the team considering other methodology for tagging definitive cases of cenorship other than DNS based blocking or HTTP testing?&lt;br /&gt;
&lt;br /&gt;
Measurements are being grouped into 4 catergories&lt;br /&gt;
&lt;br /&gt;
1) Nothing is happening&lt;br /&gt;
2) Something is not quiet okay&lt;br /&gt;
3) DNS based blocking and&lt;br /&gt;
4) Red HTTPS blocks&lt;br /&gt;
&lt;br /&gt;
The process of analyzing and confiriming whether a country is censored is a semi-manual process.&lt;br /&gt;
&lt;br /&gt;
Does the team work with chokepoint and RIPE ATLAS?&lt;br /&gt;
&lt;br /&gt;
Collabartion occurs via the citizenlab testing list. RIPE ATLAS and the ooni project produced a joint report together.&lt;br /&gt;
&lt;br /&gt;
How does the team ensure that the uncensored network is not censored?&lt;br /&gt;
&lt;br /&gt;
The control vantage points are located at a trusted provider.&lt;br /&gt;
&lt;br /&gt;
There is a problem with thepiratebay being censored by Cogent an internet transit provider?&lt;br /&gt;
&lt;br /&gt;
Maybe the analysis could look at the routing of probes through different autonomous systems. The project could use probes deployed in ISPs to help provide control and more data to help understand this type of filtering.&lt;br /&gt;
&lt;br /&gt;
In Africa governments have largely been blocking social media. Does the blocking of SM constitute this type of blocking?&lt;br /&gt;
&lt;br /&gt;
Typically the project means a block page where a ministry of communication has spefically taken down content.&lt;br /&gt;
&lt;br /&gt;
Is there any IPv6 tesing and measurements?&lt;br /&gt;
&lt;br /&gt;
No, only IPv6 DNS lookups.&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
{{{Contributors|}}}&lt;br /&gt;
&amp;lt;/includeonly&amp;gt;&lt;/div&gt;</summary>
		<author><name>5.40.111.162</name></author>
	</entry>
	<entry>
		<id>https://wiki.digitalrights.community/index.php?title=Template:Notes&amp;diff=38709</id>
		<title>Template:Notes</title>
		<link rel="alternate" type="text/html" href="https://wiki.digitalrights.community/index.php?title=Template:Notes&amp;diff=38709"/>
		<updated>2017-03-07T14:03:34Z</updated>

		<summary type="html">&lt;p&gt;5.40.111.162: /* Additional Notes */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;noinclude&amp;gt;&lt;br /&gt;
This is the &amp;quot;Notes&amp;quot; template.&lt;br /&gt;
It should be called in the following format:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
{{Notes&lt;br /&gt;
|Session Outputs=&lt;br /&gt;
|Next Steps=&lt;br /&gt;
|Additional Notes=&lt;br /&gt;
|Relevant Resources=&lt;br /&gt;
|Contributors=&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Edit the page to see the template text.&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&amp;lt;includeonly&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Session Outputs==&lt;br /&gt;
{{{Session Outputs|}}}&lt;br /&gt;
&lt;br /&gt;
==Next Steps==&lt;br /&gt;
{{{Next Steps|}}}&lt;br /&gt;
&lt;br /&gt;
==Relevant Resources==&lt;br /&gt;
{{{Relevant Resources|}}}&lt;br /&gt;
&lt;br /&gt;
==Additional Notes==&lt;br /&gt;
{{{Additional Notes|}}}&lt;br /&gt;
&lt;br /&gt;
Survey conducted by CIMA in August/September 2015, published March 2016 (154 respondents - global coverage) http://www.cima.ned.org/resource/journalist-security-in-the-digital-world/&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
{{{Contributors|}}}&lt;br /&gt;
&amp;lt;/includeonly&amp;gt;&lt;/div&gt;</summary>
		<author><name>5.40.111.162</name></author>
	</entry>
	<entry>
		<id>https://wiki.digitalrights.community/index.php?title=Template_talk:Notes&amp;diff=38634</id>
		<title>Template talk:Notes</title>
		<link rel="alternate" type="text/html" href="https://wiki.digitalrights.community/index.php?title=Template_talk:Notes&amp;diff=38634"/>
		<updated>2017-03-06T17:22:22Z</updated>

		<summary type="html">&lt;p&gt;5.40.111.162: Notes of the session&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Introducing CPJ’s new emergency response team – March 6, 2017 IFF&lt;br /&gt;
&lt;br /&gt;
Colin Perreira new Journalist Safety specialist, based in London, working on journalists facing emergency situations. &lt;br /&gt;
Joined by Tom, working on CPJ’s Internet Freedom &lt;br /&gt;
&lt;br /&gt;
CPJ compiles a list on every journalist being killed, imprisoned or exiled in the course of their work each year. 5 major programs for major global regions, publish relevant and timely updates on attacks on the press with goal of deterring future attacks and getting best possible outcomes for future cases. Write letters, using UN and other supranational bodies reporting and advocacy mechanisms to reduce impunity for those who harm journalists, bring them to justice and release imprisoned journalists. &lt;br /&gt;
&lt;br /&gt;
Traditional advocacy methods of name and shame, strongly worded letters to bad actors, are effective against traditional westphalian nations but not against non-gov’t organizations with authority in areas where they operate (i.e. terrorist orgs and criminal cartels). CPJ formed emergency response team at CPJ is to use methods beyond reporting and advocacy to support journo safety worldwide. Our focus in emergency response team is on prevention and rounded remediation. Increasing our capacity to share journalist safety info before journos are imprisoned, executed or anything bad happens to them to provide more expedient response when conditions become unsafe so they can protect themselves and avoid most dangerous situations. We don’t tell journalists not to do their job, follow a specific story, etc. but we want to provide best practices, best tools and best procedures to be safe in whatever the reporting is. Point is to build a culture of safety, especially for freelancers without security advisors and institutional support. Last week published a CPJ report going into motivations for physical digital and psychological approaches to safety. &lt;br /&gt;
&lt;br /&gt;
Reason we’re here today is also because we know we’re not alone in doing this, not the only people trying to enumerate best practices for safe travel and we don’t want to unnecessarily duplicate that, we want to collaborate with those with different goals/methods, if you are working on something we want to share with everyone. &lt;br /&gt;
&lt;br /&gt;
Tom is computers person, Colin is physical safety, Maria runs program in NYC and Nicole works on psychological safety and on journalist assistance program (i.e. when journalists are attacked, face legal bills, medical bills, unanticipated expenses associated with their work =&amp;gt; small grants to journalists around the world to pay for this).&lt;br /&gt;
&lt;br /&gt;
Colin:  No journalism background, security background until after 9/11, wanted to be a journalist and studied Islamic extremism. Been working on these topics for a long time and in the UK media sector they’ve been focusing on security for much longer than other countries/industries. In 80s/90s you could do what you wanted when working for a big news organizations. During Balkans War, UK media had to change how they operated b/c many freelancers were flying out and the kill rate of them was extremely high. One BBC journalist was sent to Croatia with no experience covering a conflict zone and he was on the ground for less than 24 hours and drove into an ambush and was killed. The first the BBC management learned of this was when they heard on the news that he had died. A culture of safety was clearly what needed to be worked on. The concept of safety itself was a difficult concept to get into journalists’ practices and for them not to see it as a hindrance to their work. Basically whatever hair brained scheme a journalist comes up with, we can’t say no to it, we simply point out it’s a bad idea and what to avoid. Today the BBC model is a very strong one and Colin has been tasked multiple times to re-create this management model in those businesses. CPJ has hired Colin to do this for the freelance community and the frontline activist community for journalists. He creates infrastructure to manage risk, effectively. &lt;br /&gt;
&lt;br /&gt;
Tom: right now we have models that are identified for institutions, but we want also to focus on those without an institution behind them, i.e. build Institutions for freelancers. &lt;br /&gt;
&lt;br /&gt;
Question: does CPJ have a protocol for keeping safe on social media?&lt;br /&gt;
The answer is no. Mozilla does have some best practices they’ve put forth. Advice put out recently regarding stalking, fixation and abuse predominately because of the increase in abuse against American journalists receiving abuse since the election and they’ve asked for it. Facebook is not as much a problem for that issue, but mostly it’s twitter and anonymous sources. Advisory put out recently by CPJ, something we put out when elevated risk is detected, highlighting existing resources. &lt;br /&gt;
&lt;br /&gt;
Comment: how to protect certain journalists in Mexico who have multiple identities on social identity in order to stay safe. It’s a broad discussion of online harassment and keeping safe concerning different issues, cross sections of journalists.&lt;br /&gt;
&lt;br /&gt;
Question: how does CPJ deal with mental health issues in cases of PTSD for journalists?&lt;br /&gt;
CPJ has adopted model of dividing safety threats into three categories, physical, digital and psycho-social. Threat modeling and mitigations people take to evaluate risk: i.e. someone with specialty in computers will evaluate all technological risks but won’t anticipate the other two categories naturally. Media organizations should have a much bigger role in psycho-social type threats and how to address them, i.e. when to take breaks from work, dealing with PTSD, safety consequences on mental health as a consequence of their work must be dealt with just like if they had experienced physical attacks. Promotion across organizations.&lt;br /&gt;
&lt;br /&gt;
Comment: media organizations have been working a lot lately on peer support for psycho-social effects, working on it at ACOS, and it’s proven to be one of the key things for psychological support.&lt;br /&gt;
CPJ: communities of freelancers, peer communities are a critical structure as a substitute for the corporate infrastructure that can help protect the physical and digital and psycho-social effects on journalists.&lt;br /&gt;
&lt;br /&gt;
Question: regarding digital security, tools, trainings raise awareness, but does CPJ work in social media policy? Many policy changes have occurred over past years which affect privacy of journalists.&lt;br /&gt;
&lt;br /&gt;
CPJ: training journalists is important but it’s better to not have to train because the world is safer to begin with, i.e. with great policies and practices of social media organizations/technology with good underlying norms. Separate part of CPJ’s work, i.e. advocacy program working to change policy norms in the legislative/governance sense. Technology program advocates with tech companies, open-source projects, tool developers to make sure tools have best interests of journalists and those who gather and disseminate news are safer. &lt;br /&gt;
&lt;br /&gt;
Comment: RSF + CPJ + ACOS team up to work on policy, especially in DC, regarding recent US DHS detentions of journalists at the border/possible device searches because we’re all interested in working on this together because common goal.&lt;br /&gt;
&lt;br /&gt;
Question: problem with journalists being stubborn about how they work. Perception is journalists tend to distrust anyone but themselves or anyone but their own media organization so how can media organizations work better with CPJ to amend this issue? &lt;br /&gt;
CPJ: more than happy to help on individual level to work with media organizations in order to foster better connections and communications. &lt;br /&gt;
&lt;br /&gt;
Comment: Someone trains a lot of local journalists, what is CPJ doing to increase protection of killings of local journalists, especially for local journalists who would’ve survived if they had helmets, which they didn’t. Lack of access to non-western, English speaking freelancers.&lt;br /&gt;
CPJ: we are trying to tell media organizations how to offer this. But we don’t offer it ourselves, specific legal implications of full body armor lending by NGOs in Libya, other countries? &lt;br /&gt;
&lt;br /&gt;
Question: how do you define who is a journalist? i.e. feminine well-known blogger who is also queer and in India, is that still a journalist for you? Organizations who are doing this and are well-resourced and are able to get equipment and be out there? &lt;br /&gt;
CPJ: attacks on people who engage in acts of journalism have consequences on the act of journalism in itself. Many people engaging in journalism also engage in other pursuits, i.e. activism activity. When you’re collecting information according to journalist principles and reporting information to the public, then you’re engaging in journalism and we want to protect that individual. CPJ’s assistance program has a broad definition of journalist/blogger, once someone is in the program receiving assistance we have a broad sense of who can receive protection. &lt;br /&gt;
&lt;br /&gt;
Comment: the security environment is really failing because there are huge gaps. HEFAT (verify) training doesn’t work for everyone, i.e. in Mexico. You said you have support, but what is the timeline of how quickly you can react?&lt;br /&gt;
CPJ: processes each request with all due haste in terms of what is an immediate response, how urgently needs to be dealt with. Currently we’re evaluating where the gaps are and the newest most emerging threats are not automatically captured and we haven’t yet concluded what we’ll say about the training other than telling people to get good training. We need to say what sort of content should be provided, etc. Hostile environment training is based on military training as an offshoot and it’s designed for western journalists going to a war torn country and then coming home, and doesn’t meet local concerns. If trying to select a training program you should look at who is training, who they’ve trained in the past and what circumstances, environments they have been working in. &lt;br /&gt;
&lt;br /&gt;
Comment: CPJ’s manual is great to help with prevention and takes journalists a good deal of the way toward safety. But the problem is that things have become static because the diversity of threats is intense. Can you create a clearing house of input of people encountering situations not already in the manual to help perfect it and make it useful for others, esp. in different unprecedented decisions? I.e. what is the protocol and when do you assume when someone has been kidnapped? &lt;br /&gt;
Manual is CPJ’s journalists’ security manual, downloadable online. We’re making improvements at the moment to address gaps. CPJ is working with Elisabet and ACOS to create a product called infoshare to push examples of best practices and exporting them to other situations. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Action points, please contact us individually/in groups to discuss.&lt;/div&gt;</summary>
		<author><name>5.40.111.162</name></author>
	</entry>
	<entry>
		<id>https://wiki.digitalrights.community/index.php?title=Template:Notes&amp;diff=38633</id>
		<title>Template:Notes</title>
		<link rel="alternate" type="text/html" href="https://wiki.digitalrights.community/index.php?title=Template:Notes&amp;diff=38633"/>
		<updated>2017-03-06T17:16:42Z</updated>

		<summary type="html">&lt;p&gt;5.40.111.162: /* Additional Notes */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;noinclude&amp;gt;&lt;br /&gt;
This is the &amp;quot;Notes&amp;quot; template.&lt;br /&gt;
It should be called in the following format:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
{{Notes&lt;br /&gt;
|Session Outputs=&lt;br /&gt;
|Next Steps=&lt;br /&gt;
|Additional Notes=&lt;br /&gt;
|Relevant Resources=&lt;br /&gt;
|Contributors=&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Edit the page to see the template text.&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&amp;lt;includeonly&amp;gt;&lt;br /&gt;
==Session Outputs==&lt;br /&gt;
&lt;br /&gt;
==Next Steps==&lt;br /&gt;
{{{Next Steps|}}}&lt;br /&gt;
&lt;br /&gt;
==Additional Notes==&lt;br /&gt;
{{{Additional Notes|}}}&lt;br /&gt;
Introducing CPJ’s new emergency response team – March 6, 2017 IFF&lt;br /&gt;
&lt;br /&gt;
Colin Perreira new Journalist Safety specialist, based in London, working on journalists facing emergency situations. &lt;br /&gt;
Joined by Tom, working on CPJ’s Internet Freedom &lt;br /&gt;
&lt;br /&gt;
CPJ compiles a list on every journalist being killed, imprisoned or exiled in the course of their work each year. 5 major programs for major global regions, publish relevant and timely updates on attacks on the press with goal of deterring future attacks and getting best possible outcomes for future cases. Write letters, using UN and other supranational bodies reporting and advocacy mechanisms to reduce impunity for those who harm journalists, bring them to justice and release imprisoned journalists. &lt;br /&gt;
&lt;br /&gt;
Traditional advocacy methods of name and shame, strongly worded letters to bad actors, are effective against traditional westphalian nations but not against non-gov’t organizations with authority in areas where they operate (i.e. terrorist orgs and criminal cartels). CPJ formed emergency response team at CPJ is to use methods beyond reporting and advocacy to support journo safety worldwide. Our focus in emergency response team is on prevention and rounded remediation. Increasing our capacity to share journalist safety info before journos are imprisoned, executed or anything bad happens to them to provide more expedient response when conditions become unsafe so they can protect themselves and avoid most dangerous situations. We don’t tell journalists not to do their job, follow a specific story, etc. but we want to provide best practices, best tools and best procedures to be safe in whatever the reporting is. Point is to build a culture of safety, especially for freelancers without security advisors and institutional support. Last week published a CPJ report going into motivations for physical digital and psychological approaches to safety. &lt;br /&gt;
&lt;br /&gt;
Reason we’re here today is also because we know we’re not alone in doing this, not the only people trying to enumerate best practices for safe travel and we don’t want to unnecessarily duplicate that, we want to collaborate with those with different goals/methods, if you are working on something we want to share with everyone. &lt;br /&gt;
&lt;br /&gt;
Tom is computers person, Colin is physical safety, Maria runs program in NYC and Nicole works on psychological safety and on journalist assistance program (i.e. when journalists are attacked, face legal bills, medical bills, unanticipated expenses associated with their work =&amp;gt; small grants to journalists around the world to pay for this).&lt;br /&gt;
&lt;br /&gt;
Colin:  No journalism background, security background until after 9/11, wanted to be a journalist and studied Islamic extremism. Been working on these topics for a long time and in the UK media sector they’ve been focusing on security for much longer than other countries/industries. In 80s/90s you could do what you wanted when working for a big news organizations. During Balkans War, UK media had to change how they operated b/c many freelancers were flying out and the kill rate of them was extremely high. One BBC journalist was sent to Croatia with no experience covering a conflict zone and he was on the ground for less than 24 hours and drove into an ambush and was killed. The first the BBC management learned of this was when they heard on the news that he had died. A culture of safety was clearly what needed to be worked on. The concept of safety itself was a difficult concept to get into journalists’ practices and for them not to see it as a hindrance to their work. Basically whatever hair brained scheme a journalist comes up with, we can’t say no to it, we simply point out it’s a bad idea and what to avoid. Today the BBC model is a very strong one and Colin has been tasked multiple times to re-create this management model in those businesses. CPJ has hired Colin to do this for the freelance community and the frontline activist community for journalists. He creates infrastructure to manage risk, effectively. &lt;br /&gt;
&lt;br /&gt;
Tom: right now we have models that are identified for institutions, but we want also to focus on those without an institution behind them, i.e. build Institutions for freelancers. &lt;br /&gt;
&lt;br /&gt;
Question: does CPJ have a protocol for keeping safe on social media?&lt;br /&gt;
The answer is no. Mozilla does have some best practices they’ve put forth. Advice put out recently regarding stalking, fixation and abuse predominately because of the increase in abuse against American journalists receiving abuse since the election and they’ve asked for it. Facebook is not as much a problem for that issue, but mostly it’s twitter and anonymous sources. Advisory put out recently by CPJ, something we put out when elevated risk is detected, highlighting existing resources. &lt;br /&gt;
&lt;br /&gt;
Comment: how to protect certain journalists in Mexico who have multiple identities on social identity in order to stay safe. It’s a broad discussion of online harassment and keeping safe concerning different issues, cross sections of journalists.&lt;br /&gt;
&lt;br /&gt;
Question: how does CPJ deal with mental health issues in cases of PTSD for journalists?&lt;br /&gt;
CPJ has adopted model of dividing safety threats into three categories, physical, digital and psycho-social. Threat modeling and mitigations people take to evaluate risk: i.e. someone with specialty in computers will evaluate all technological risks but won’t anticipate the other two categories naturally. Media organizations should have a much bigger role in psycho-social type threats and how to address them, i.e. when to take breaks from work, dealing with PTSD, safety consequences on mental health as a consequence of their work must be dealt with just like if they had experienced physical attacks. Promotion across organizations.&lt;br /&gt;
&lt;br /&gt;
Comment: media organizations have been working a lot lately on peer support for psycho-social effects, working on it at ACOS, and it’s proven to be one of the key things for psychological support.&lt;br /&gt;
CPJ: communities of freelancers, peer communities are a critical structure as a substitute for the corporate infrastructure that can help protect the physical and digital and psycho-social effects on journalists.&lt;br /&gt;
&lt;br /&gt;
Question: regarding digital security, tools, trainings raise awareness, but does CPJ work in social media policy? Many policy changes have occurred over past years which affect privacy of journalists.&lt;br /&gt;
&lt;br /&gt;
CPJ: training journalists is important but it’s better to not have to train because the world is safer to begin with, i.e. with great policies and practices of social media organizations/technology with good underlying norms. Separate part of CPJ’s work, i.e. advocacy program working to change policy norms in the legislative/governance sense. Technology program advocates with tech companies, open-source projects, tool developers to make sure tools have best interests of journalists and those who gather and disseminate news are safer. &lt;br /&gt;
&lt;br /&gt;
Comment: RSF + CPJ + ACOS team up to work on policy, especially in DC, regarding recent US DHS detentions of journalists at the border/possible device searches because we’re all interested in working on this together because common goal.&lt;br /&gt;
&lt;br /&gt;
Question: problem with journalists being stubborn about how they work. Perception is journalists tend to distrust anyone but themselves or anyone but their own media organization so how can media organizations work better with CPJ to amend this issue? &lt;br /&gt;
CPJ: more than happy to help on individual level to work with media organizations in order to foster better connections and communications. &lt;br /&gt;
&lt;br /&gt;
Comment: Someone trains a lot of local journalists, what is CPJ doing to increase protection of killings of local journalists, especially for local journalists who would’ve survived if they had helmets, which they didn’t. Lack of access to non-western, English speaking freelancers.&lt;br /&gt;
CPJ: we are trying to tell media organizations how to offer this. But we don’t offer it ourselves, specific legal implications of full body armor lending by NGOs in Libya, other countries? &lt;br /&gt;
&lt;br /&gt;
Question: how do you define who is a journalist? i.e. feminine well-known blogger who is also queer and in India, is that still a journalist for you? Organizations who are doing this and are well-resourced and are able to get equipment and be out there? &lt;br /&gt;
CPJ: attacks on people who engage in acts of journalism have consequences on the act of journalism in itself. Many people engaging in journalism also engage in other pursuits, i.e. activism activity. When you’re collecting information according to journalist principles and reporting information to the public, then you’re engaging in journalism and we want to protect that individual. CPJ’s assistance program has a broad definition of journalist/blogger, once someone is in the program receiving assistance we have a broad sense of who can receive protection. &lt;br /&gt;
&lt;br /&gt;
Comment: the security environment is really failing because there are huge gaps. HEFAT (verify) training doesn’t work for everyone, i.e. in Mexico. You said you have support, but what is the timeline of how quickly you can react?&lt;br /&gt;
CPJ: processes each request with all due haste in terms of what is an immediate response, how urgently needs to be dealt with. Currently we’re evaluating where the gaps are and the newest most emerging threats are not automatically captured and we haven’t yet concluded what we’ll say about the training other than telling people to get good training. We need to say what sort of content should be provided, etc. Hostile environment training is based on military training as an offshoot and it’s designed for western journalists going to a war torn country and then coming home, and doesn’t meet local concerns. If trying to select a training program you should look at who is training, who they’ve trained in the past and what circumstances, environments they have been working in. &lt;br /&gt;
&lt;br /&gt;
Comment: CPJ’s manual is great to help with prevention and takes journalists a good deal of the way toward safety. But the problem is that things have become static because the diversity of threats is intense. Can you create a clearing house of input of people encountering situations not already in the manual to help perfect it and make it useful for others, esp. in different unprecedented decisions? I.e. what is the protocol and when do you assume when someone has been kidnapped? &lt;br /&gt;
Manual is CPJ’s journalists’ security manual, downloadable online. We’re making improvements at the moment to address gaps. CPJ is working with Elisabet and ACOS to create a product called infoshare to push examples of best practices and exporting them to other situations. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Action points, please contact us individually/in groups to discuss.&lt;br /&gt;
&lt;br /&gt;
==Relevant Resources==&lt;br /&gt;
{{{Relevant Resources|}}}&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
{{{Contributors|}}}&lt;br /&gt;
&amp;lt;/includeonly&amp;gt;&lt;br /&gt;
&lt;br /&gt;
test&lt;/div&gt;</summary>
		<author><name>5.40.111.162</name></author>
	</entry>
	<entry>
		<id>https://wiki.digitalrights.community/index.php?title=Template:Notes&amp;diff=38628</id>
		<title>Template:Notes</title>
		<link rel="alternate" type="text/html" href="https://wiki.digitalrights.community/index.php?title=Template:Notes&amp;diff=38628"/>
		<updated>2017-03-06T15:44:28Z</updated>

		<summary type="html">&lt;p&gt;5.40.111.162: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;noinclude&amp;gt;&lt;br /&gt;
This is the &amp;quot;Notes&amp;quot; template.&lt;br /&gt;
It should be called in the following format:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
{{Notes&lt;br /&gt;
|Session Outputs=&lt;br /&gt;
|Next Steps=&lt;br /&gt;
|Additional Notes=&lt;br /&gt;
|Relevant Resources=&lt;br /&gt;
|Contributors=&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Edit the page to see the template text.&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&amp;lt;includeonly&amp;gt;&lt;br /&gt;
==Session Outputs==&lt;br /&gt;
&lt;br /&gt;
==Next Steps==&lt;br /&gt;
{{{Next Steps|}}}&lt;br /&gt;
&lt;br /&gt;
==Additional Notes==&lt;br /&gt;
{{{Additional Notes|}}}&lt;br /&gt;
&lt;br /&gt;
==Relevant Resources==&lt;br /&gt;
{{{Relevant Resources|}}}&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
{{{Contributors|}}}&lt;br /&gt;
&amp;lt;/includeonly&amp;gt;&lt;/div&gt;</summary>
		<author><name>5.40.111.162</name></author>
	</entry>
</feed>