توضیحاتی در مورد کتاب A Practical Security Handbook for Activists and Campaigns
نام کتاب : A Practical Security Handbook for Activists and Campaigns
ویرایش : v 2.7
عنوان ترجمه شده به فارسی : یک کتابچه امنیتی عملی برای فعالان و کمپین ها
سری :
ناشر :
سال نشر : 2008
تعداد صفحات : 71
ISBN (شابک) : 1903998144
زبان کتاب : English
فرمت کتاب : pdf
حجم کتاب : 869 کیلوبایت
بعد از تکمیل فرایند پرداخت لینک دانلود کتاب ارائه خواهد شد. درصورت ثبت نام و ورود به حساب کاربری خود قادر خواهید بود لیست کتاب های خریداری شده را مشاهده فرمایید.
فهرست مطالب :
1 Introduction
1.1 Why security is important
1.2 What is security?
1.3 Setting up the ‘security process’
1.4 Other Resources
2 Security For Campaigns
2.1 Basic campaign security
a. Media strategy
b. Your address
c. Answering emails, letters & phone calls
d. Websites
e. Keep files encrypted
f. Need to know
g. Office security
2.2 Advanced campaign security
a. Burning rubbish
b. Paper trails
c. Sources
d. Backups
e. Tampering
f. Autonomous structuring
g. Communications
2.3 Meetings (Basics)
2.4 Meetings (High Security)
2.5 Secure information transfer
2.6 Gossiping
2.7 Being monitored
3 Dealing with infiltrators & grasses
3.1 New People
3.2 Do you have an infiltrator
3.3 Initial action & gathering evidence
3.4 Exposing the infiltrator
3.5 Dealing with the fallout
3.6 Gatherings
3.7 Grasses after arrest
3.8 Other infiltration methods
3.9 Private Investigators & Police
4 Security For Actions
4.1 Choosing people
4.2 Scouting out the area
4.3 Planning
4.4 Communications
4.5 Acquiring equipment
4.6 Clothing & other traceables
4.7 Disposing of equipment/clothes
4.8 Communiqués & photos
4.9 Mobile phones
4.10 Phone boxes
4.11 CCTV
4.12 Travelling
4.13 Being Chased
4.14 Evidence gathering tools
4.15 Debriefing
4.16 Shitting in your backyard
4.17 Conclusion
5 Security for Demonstrations
5.1 General Rules
5.2 Evidence Gatherers & FIT
5.3 Cameras
5.4 Travelling to demonstrations
5.5 Debriefing
5.6 First Aid
5.7 Dealing with Provocateurs
6 Personal Security
6.1 Dealing with the police
6.2 At Home
6.2.1 Control the information in your house
6.2.2 Preparing for a raid
6.2.3 Phones, computers & emails
6.2.4 Mail
6.2.5 Being aware of intruders
6.2.6 Being bugged
6.3 Your area and neighbours
6.4 Your car
6.5 Self‐defence
6.6 Your Personal Profile
6.6.1 Your Online Profile
7 Surveillance
7.1 Preparation for surveillance detection
7.2 Vehicles
7.3 On foot
7.4 Rural surveillance
7.5 Counter‐surveillance
7.6 Blatant surveillance
8 Computer Security & Internet Privacy
8.1 Security
8.2 Internet Privacy
9 UK Legal Issues
9.1 Regulation of Internet Powers Act
10 Talking to others about security
11 Future shocks
12 Closed Culture vs. Open Culture
13 Writing Letters
14 Mobile Phones
15 Conclusion
16 Final note, contact details & Disclaimer