Scripps J School at Ohio University Trip Report
Ohio University EW Scripps Journalism School Trip Report for 07 to 09 November 2012
Danny O'Brien of Committee to Protect Journalists and I were invited to talk to journalism students at the E.W. Scripps School of Journalism in Ohio University. The topics were around computer security risks and protections from the perspective of journalists. CPJ maintains a great guide for reporters to survive dangerous situations appropriately called the Journalist Security Guide. This covers both offline and online situations. My role was to highlight the experience of Tor, what we've seen, and how we've protected both citizen and professional journalists the world over. I also covered using Tails as one tool in your toolbox to let you do the work of a journalist from anywhere.
Andy Alexander was our host for the three days. We started off with a great dinner to share information about what both Danny and I have learned over the past few years in working with journalists. Andy has a long career of experience in foreign correspondence and reporting. His experiences covering a few decades highlight the need for journalists to learn how to protect themselves when reporting anywhere in the world.
The next day was a first-year class about journalism in general. Danny and I presented to around 200 students. The computer couldn't read my USB drive, so I couldn't use my presentation, rather I used the website to quickly cover Tor, how it works, and why journalists should care. I then discussed a range of attacks against an individual from fairly basic malware infections through more advanced traffic analysis and content swapping. My PirateBox did work, so anyone could get the presentations and copies of Tor locally if they so desired.
We had a great lunch with Professor Kalyango and then head off to WOUB for a 30 minute podcast/radio interview.
Afterwards, we went off to the main panel event to talk to fourth year and graduate students about online security and the risks for journalists. Once again, the USB drive couldn't be read, but the PirateBox worked fine. The lecture lasted around 90 minutes with a Q&A session. Unlike the freshman class, a number of people had questions or wanted to verify what Danny and I stated.
We were then taken out to dinner by the top students at the J School. It was a great Middle Eastern kabob place to have an hour of discussions with the students.
And thanks to Lindsay for getting up at 06:30 to drive me to the airport and for the great discussion along the way. I look forward to reading her dispatches from East Africa in the near future.
Also published via email at https://lists.torproject.org/pipermail/tor-reports/2012-November/000082…
Please note that the comment area below has been archived.
My computer doesn't like
My computer doesn't like your presentation either. ;) I get a 404, because there's a space between "2012" and "20" instead of "-".
Please be aware that it is
Please be aware that it is not possible to to post comments to any of the older blog entries.
This is by design to stop
This is by design to stop spammers.
Shouldn't you at least wait
Shouldn't you at least wait until a given Tor release has been deprecated and replaced
by a new one before closing comments on the related blog entry?
Comments are already closed for Tor Browser Bundle 2.2.39-5 , despite it being the most recent TBB announcement on the blog.
An interesting idea, but the
An interesting idea, but the fact that the PB wiki appears to require registration to post a comment leads me to wonder about the strength of the committment to true anonymity. I'll post here what I intended to say there. If PirateBox is a truly open WIFI network (and I have no reason to doubt that), others with intent to identify can easily eavesdrop. It would be a very good idea for the PB site to include advice on masquerading MAC addresses and blanking (or forging) computer serial numbers since that data could be correlated to known internet activity to identify the users.
PirateBoxes are self-contained. They are not internet access devices.
why bridge finder key is
why bridge finder key is removed from the tor?
WHY is there this message in
WHY is there this message in the message log of the Vidalia Control Panel: "Tor vXXXXXX. This is experimental software. Do not rely on it for strong anonimity."
I thought TOR was recommending whistleblowers, activists, media, bussinesses and Military & Law Enforcement to use Tor. I also thought Tor was the strongest anonymity software available so far.
Why that message above? To mess with peoples heads?