| 
  • If you are citizen of an European Union member nation, you may not use this service unless you are at least 16 years old.

  • You already know Dokkio is an AI-powered assistant to organize & manage your digital files & messages. Very soon, Dokkio will support Outlook as well as One Drive. Check it out today!

View
 

Protocols to Protect Survivors from Surveillance

Page history last edited by andrew 11 years, 2 months ago

Title: Protocols to Protect Survivors from Surveillance and Cyber Stalking

 

Owners: Sarah and Andrew

 

Summary: Perpetrators of domestic violence often take advantage of technology to enable surveillance and cyber stalking of victims. The goal of this project is to develop protocols to determine if a client is being wiretapped or being abused using technology, and identify questions that advocates can ask to determine if a client is actually being wiretapped.

 

Current thoughts are at https://wiki.tpo.is/DRAFT%20Cyberstalking%20Clean%20Communication%20Protocols

 

The hackathon goal is to write a mobile-compatible webapp which guides an advocate through an initial interaction with a victim of stalking. This apps focuses on the technology aspects of the victim. As a test, we've infected a phone with a stalking app and will use the webapp guide to walk the victim through determining if they are infected, how to safely communicate with the advocate, and to find them resources to help escape their abuser or stalker.  Ultimately, the goal is to help them remove the infection and start to recover their life.

 

In 14 hours, we wrote a webapp which works on any device to guide advocates and helpers through a series of steps to start helping victims of tech stalking. Welcome to http://www.fuerza.is

 

The source code for the app is available at https://github.com/dvhackathon/Fuerza

Comments (0)

You don't have permission to comment on this page.