<a target="_blank" href="https://twitter.com/intent/tweet?url=https%3A%2F%2Fgames.demcloud.org%2Fcybersecurity.html&text=Learn%20about%20Cybersecurity%20while%20you%20help%20your%20candidate%20win!&via=NDI&hashtags=cybersecuritygame" target="_blank">Twitter</a>
<a target="_blank" href="https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fgames.demcloud.org%2Fcybersecurity.html&src=sdkpreparse&display=popup
" target="_blank">Facebook</a>
Learn%20about%20Cybersecurity%20while%20you%20help%20your%20candidate%20win!Cheppers UI Instructions
tag "blue" - Phase 2
tag "yellow" - Phase 3
-------------------------------------------------------------------
''For using Tweego''
Use d:filepath to change the directory OR use the full path in the tweego line
The tweego line: tweego -o thenameyouwant.html thefullpathtothetweegofile.tw
the html file will appear in the same directory as the tweego file)
------------------------------------------------------------------
There is javascript for Chapel's disable macro. Don't forget to copy it over to the main if it works.
Note: I didn't use it - doesn't work for my purposes. Leave it here and don't port it over or delete it.
-------------------------------------------------------------------
''Cool tutorial for how to use the share button:''
Source: https://missfruitypie.wordpress.com/2018/12/15/twine-tutorial-how-to-use-the-share-menu-in-sugarcube-v2/
Twitter link: https://twitter.com/intent/tweet?url=<your website>&text=<your message>&via=<your Twitter handle>&hashtags=<your hashtags>
Facebook link: https://www.facebook.com/sharer/sharer.php?u=<your URL>&src=sdkpreparse&display=popup
''To create a menu that includes the share button: ''
<<nobr>>
<nav id="menu" role="navigation">
<ul id="menu-core">
<li id="menu-item-saves">
<a onclick="SugarCube.UI.saves();" tabindex="0">Saves</a>
</li>
<li id="menu-item-settings">
<a onclick="SugarCube.UI.settings();" tabindex="0">Settings</a>
</li>
<li id="menu-item-restart">
<a onclick="SugarCube.UI.restart();" tabindex="0">Restart</a>
</li>
<li id="menu-item-share">
<a onclick="SugarCube.UI.share();" tabindex="0">Share</a>
</li>
</ul>
</nav>
<</nobr>>
'' Twee Notation''
Twee 3 notation is written as a series of four parts for the header of each passage:
Sigil: (Required) Two colons (":") followed by a space
Passage Name: (Required) The name of the passage
Tags: (Optional) Optional tags
Metadata: (Optional) Information about the passage
The content of a passage continues until the next header of a passage is found or the input ends with at least a single empty line between passage headers.<span class="title-3">Meet Paola, Jamal, Tina, and Milo!</span>
INSERT GRAPHIC
Leaders of their own civil society organizations, they're looking for advice on how to more safely and effectively conduct their work in the digital world. Paola's not quite sure how to organize a safe virtual workshop; Jamal could use some help with digital fundraising and collecting donations; Tina needs to build a community of supporters online; and Milo needs support on how to safely collect and store sensitive data.
Although they all face tough challenges, the good news is that each of them know Anna and Julian - two local democracy activists turned digital security trainers. Today, you'll be helping Anna and Julian as they support their friends' organizations achieve their goals while staying safe.
Let's choose where to get started:
<<if $Paola is false>><span class="rtn">[[Meet Paola ->Organizing Virtual Workshops]]</span><</if>>
<<if $Jamal is false>><span class="rtn">[[Meet Jamal ->Digital Fundraising]]</span><</if>>
<<if $Tina is false>><span class="rtn">[[Meet Tina ->Online Community Building]]</span><</if>>
<<if $Milo is false>><span class="rtn">[[Meet Milo ->Collecting Data]]</span><</if>>
2023 Version
Writing and Twine: Evan Summers, NDI
UI: TBD
Character Images: TBD
/* Vignette Toggles */
<<set $Paola to false>>
<<set $Jamal to false>>
<<set $Tina to false>>
<<set $Milo to false>>
<<set $PaolaWorkshop to null>>
<<set $PaolaVideoCall to null>>
<<set $JamalFundExcel to false>>
<<set $JamalFundCS to false>>
<<set $JamalFundCivi to false>>
<<set $JamalFundSF to false>>
<<set $JamalFundSheets to false>>
<<set $TinaInstagram to false>>
<<set $TinaTwitter to false>>
<<set $TinaFBpage to false>>
<<set $TinaFBgroup to false>>
<<set $MiloOnlineSurvey to false>>
<<set $MiloMessagingApp to false>>
<<set $MiloPhone to false>>
<<set $MiloMobileApp to false>>
<<set $MiloExcel to false>>
<<set $MiloGoogleSheet to false>>
<<set $MiloSelfHosted to false>>
<<set $MiloUwazi to false>>
<<set $MiloUSB to false>>
<<set $MiloLocalServer to false>>
<a target="_blank" href="https://twitter.com/intent/tweet?url=https%3A%2F%2Fgames.demcloud.org%2Fcybersecurity.html&text=Learn%20about%20Cybersecurity%20while%20you%20help%20your%20candidate%20win!&via=NDI&hashtags=cybersecuritygame" target="_blank">Twitter</a>
<a target="_blank" href="https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fgames.demcloud.org%2Fcybersecurity.html&src=sdkpreparse&display=popup
" target="_blank">Facebook</a>
Learn%20about%20Cybersecurity%20while%20you%20help%20your%20candidate%20win!Cheppers UI Instructions
tag "blue" - Phase 2
tag "yellow" - Phase 3
-------------------------------------------------------------------
''For using Tweego''
Use d:filepath to change the directory OR use the full path in the tweego line
The tweego line: tweego -o thenameyouwant.html thefullpathtothetweegofile.tw
the html file will appear in the same directory as the tweego file)
------------------------------------------------------------------
There is javascript for Chapel's disable macro. Don't forget to copy it over to the main if it works.
Note: I didn't use it - doesn't work for my purposes. Leave it here and don't port it over or delete it.
-------------------------------------------------------------------
''Cool tutorial for how to use the share button:''
Source: https://missfruitypie.wordpress.com/2018/12/15/twine-tutorial-how-to-use-the-share-menu-in-sugarcube-v2/
Twitter link: https://twitter.com/intent/tweet?url=<your website>&text=<your message>&via=<your Twitter handle>&hashtags=<your hashtags>
Facebook link: https://www.facebook.com/sharer/sharer.php?u=<your URL>&src=sdkpreparse&display=popup
''To create a menu that includes the share button: ''
<<nobr>>
<nav id="menu" role="navigation">
<ul id="menu-core">
<li id="menu-item-saves">
<a onclick="SugarCube.UI.saves();" tabindex="0">Saves</a>
</li>
<li id="menu-item-settings">
<a onclick="SugarCube.UI.settings();" tabindex="0">Settings</a>
</li>
<li id="menu-item-restart">
<a onclick="SugarCube.UI.restart();" tabindex="0">Restart</a>
</li>
<li id="menu-item-share">
<a onclick="SugarCube.UI.share();" tabindex="0">Share</a>
</li>
</ul>
</nav>
<</nobr>>
'' Twee Notation''
Twee 3 notation is written as a series of four parts for the header of each passage:
Sigil: (Required) Two colons (":") followed by a space
Passage Name: (Required) The name of the passage
Tags: (Optional) Optional tags
Metadata: (Optional) Information about the passage
The content of a passage continues until the next header of a passage is found or the input ends with at least a single empty line between passage headers.<div class="main-section"><div class="title-section"><span class="title-3">Digital Organizing SOS:<br/><span class="title-4">Stories of Security</span></span></div>
<p>Meet Paola, Jamal, Tina, and Milo! Leaders of their own <strong>civil society organizations</strong>, they're looking for advice on <strong>how to more safely and effectively conduct their work in the digital world.</strong> Paola's not quite sure how to organize a safe virtual workshop; Jamal could use some help with digital fundraising and collecting donations; Tina needs to build a community of supporters online; and Milo needs support on how to safely collect and store sensitive data.</p><p>Although they all face tough challenges, the good news is that each of them knows Ana and Julian - two local democracy activists turned digital security trainers. Today, <strong>you'll be helping Ana and Julian</strong> as they support their friends' organizations achieve their goals while staying safe.</p>
<div class="container samewidth"><div class="row"><h2 style="margin: auto;">The Security Trainers:</h2></div>
<div class="row security-trainers"><br><div class="col"><img alt="A woman with light skin, dark hair, gold earrings, and a purple shirt" src="cr_images/ana%20avatar.svg"> <p style="margin-top:0px;">Ana</p></div><div class="col"><img alt="A man with brown skin, dark hair, and purple shirt" src="cr_images/julian%20avatar.svg"><p style="margin-top:0px;">Julian</p></div></div></div><p>Let's choose where to get started:</p><div class="avatar-section"><<if $Paola is false>><span class="rtn avatar"><img alt="Paola: A woman with light skin, purple hair, and a purple shirt" src="cr_images/paola-avatar.svg">[[Meet Paola ->Organizing Virtual Workshops]]</span><</if>>
<<if $Jamal is false>><span class="rtn avatar"><img alt="Jamal: A middle eastern non binary person with tan skin, dark hair, facial hair, and a purple shirt" src="cr_images/jamal-avatar.svg">[[Meet Jamal ->Digital Fundraising]]</span><</if>>
<<if $Tina is false>><span class="rtn avatar"><img alt="Tina: A woman with dark skin, dark short hair, and a purple shirt" src="cr_images/tina-avatar.svg">[[Meet Tina ->Online Community Building]]</span><</if>>
<<if $Milo is false>><span class="rtn avatar"><img alt="Milo: A wheelchair user, is an asian man with dark hair and a purple shirt" src="cr_images/milo-avatar.svg">[[Meet Milo ->Collecting Data]]</span><</if>></div>
<div align="center"><img alt="NDI Logo" src="cr_images/NDI-logo.jpg" width="15%"><p>A project of The National Democratic Institute for International Affairs (NDI)</p></div>
</div>
<div class="image-section"><div class="bg-graphic home"><img alt="Our game characters Paola, Jamal, Tina, and Milo waving and smiling" src="cr_images/main%20page%20team%20photo.svg" class="team-photo"></div></div><div class="main-section"><div><span class="title-3">Meet Jamal!</span></div><p>Jamal’s CSO is planning to launch a fundraising campaign to provide therapy to survivors of LGBTQI+-targeted violence. Jamal knows lots of interested donors both domestically and abroad who want to pitch in and support, and they are eager to get started raising money.</p><p>Before Jamal and their team can start collecting funds, they’ll need to select a fundraising strategy and tool that can help them achieve their objectives for the campaign. A quick google search for options is overwhelming, but Jamal is able to narrow it down to a few choices.</p><p>Jamal knows Ana and Julian, the digital security experts, and consults with them in an attempt to make a final decision. Which of the following options do you think they’d recommend? You can select more than one option if you’d like!</p><div class="bounding-box"><div class="checkbox"><div class="cb-inner"><<checkbox "$JamalFundExcel" false true>><label class="hidden-label" for="checkbox-jamalfundexcel">Collect cash door-to-door and track in excel</label><span>Collect cash door-to-door while keeping track of donations in an Excel spreadsheet on Jamal’s laptop</span></div></div>
<div class="checkbox"><div class="cb-inner"><<checkbox "$JamalFundCS" false true>><label class="hidden-label" for="checkbox-jamalfundcs">Build a crowdsourced campaign on a public fundraising platform like GoFundMe or Innpactia</label><span>Build a crowdsourced campaign on a public fundraising platform like GoFundMe or Innpactia</span></div></div>
<div class="checkbox"><div class="cb-inner"><<checkbox "$JamalFundCivi" false true>><label class="hidden-label" for="checkbox-jamalfundcivi">Use a free, open source fundraising and donor management tool like CiviCRM to manage donor information and collect donations</label><span>Use a free, open-source fundraising and donor management tool like CiviCRM to manage donor information and collect donations</span></div></div>
<div class="checkbox"><div class="cb-inner"><<checkbox "$JamalFundSF" false true>><label class="hidden-label" for="checkbox-jamalfundsf">Use a sophisticated commercial platform, such as Salesforce or SugarCRM, to manage donor information and collect donations</label><span>Use a sophisticated commercial platform, such as Salesforce or SugarCRM, to manage donor information and collect donations</span></div></div>
<div class="checkbox"><div class="cb-inner"><<checkbox "$JamalFundSheets" false true>><label class="hidden-label" for="checkbox-jamalfundsheets">Use a cloud-based platform like Google Sheets to track donations in a collaborative document</label><span>Use a cloud-based platform like Google Sheets to track donations in a collaborative document</span></div></div></div>
<span class="rtn">[[Let's go->Digital Security Advice for Fundraising]]</span><span class="back-btn"><<back>></span>
<<set $Jamal to true>></div>
<div class="bg-graphic page-2"><img alt="Jamal smiling and waving" class="jamal-main" src="cr_images/jamal-main.svg"></div><div class="main-section"><div><span class="title-3">Meet Milo!</span></div>
<p>Milo’s CSO focuses on collecting, analyzing, and publishing data about the challenges women in his country face when running for elected office. Given the prevailing gender norms in the country, politically active women who are willing to share their stories with Milo’s organization are often putting themselves at risk to do so. Despite the risks, a growing number of women have been reaching out to share their stories. In part due to the current method of collecting every story through in-person interviews with handwritten notes stored at the office, this increase in volume is putting a real strain on the organization’s ability to effectively collect and manage all of the necessary data.</p><p>Milo’s friends (and digital security experts) Ana and Julian have mentioned to him how the organization’s “paper-first” methods put its sensitive information at risk to loss or theft, and others in the organization have started complaining about how long the manual process takes. Milo knows that his organization needs to adopt some new methods for more secure and efficient data collection from candidates in both rural and urban areas - but he isn’t sure where to start.</p><p>Given the goals of Milo’s organization and the context in which they are operating, what data collection tools do you think the digital security experts recommend to Milo and his colleagues?</p><div class="bounding-box">
<div class="checkbox"><div class="cb-inner"><<checkbox "$MiloOnlineSurvey" false true>><label class="hidden-label" for="checkbox-miloonlinesurvey">A traditional online survey tool, such as Survey Monkey or Google Forms, that can be completed online</label><span><img alt="Survey Monkey Icon" src="cr_images/survey%20monkey.svg">A traditional online survey tool, such as Survey Monkey or Google Forms, that can be completed online </span></div></div>
<div class="checkbox"><div class="cb-inner"><<checkbox "$MiloMessagingApp" false true>><label class="hidden-label" for="checkbox-milomessagingapp">A Telegram, WhatsApp, or other popular messaging channel or public group</label><span><img alt="Telegram Icon" src="cr_images/telegram.svg"> A Telegram, WhatsApp, or other popular messaging channel or public group</span></div></div>
<div class="checkbox"><div class="cb-inner"><<checkbox "$MiloPhone" false true>><label class="hidden-label" for="checkbox-milophone">A phone number for receiving calls and SMS</label><span><img alt="Phone icon" src="cr_images/phone.svg"> A phone number for receiving calls and SMS</span></div></div>
<div class="checkbox"><div class="cb-inner"><<checkbox "$MiloMobileApp" false true>><label class="hidden-label" for="checkbox-milomobileapp">A mobile app-based data collection tool designed for human rights documentation, such as the Tella app</label><span><img alt="Tella App Icon" src="cr_images/t-mobile.svg"> A mobile app-based data collection tool designed for human rights documentation, such as the Tella app </span></div></div>
</div>
<span class="rtn">[[Let's go->Digital Security Advice for Data Collection]]</span><span class="back-btn"><<back>></span>
<<set $Milo to true>></div>
<div class="image-section"><div class="bg-graphic page-4"><img alt="Milo smiling and waving" class="milo-main" src="cr_images/meet%20milo.svg"></div></div>2023 Version
Writing and Twine: Evan Summers, NDI
UI: TBD
Character Images: TBD
<div class="main-section"><div class="main-content"><div><span class="title-3">Securely Organizing the Workshop</span></div><<if $PaolaSMS is true or $PaolaPhone is true>><p>❌ Ana and Julian do not recommend that Paola and her colleagues use SMS or Phone Calls because these common communication options have no encryption in place at all.</p><</if>><<if $PaolaEmail is true>><p>🟡 While email is an improvement on phone calls and SMS, Ana and Julian do not recommend that Paola use it for these highly sensitive communications because it typically only uses transport-layer encryption, which leaves communications readable to the service provider.</p><</if>><<if $PaolaTelegram is true>><p>🟡 While not the worst option, Ana and Julian don’t recommend Telegram because it does not consistently apply its end-to-end encryption across all messages (such as group chats).</p><</if>><<if $PaolaWhatsApp is true>><p>🟡 Whatsapp is fully end-to-end encrypted, but its security partly depends upon you and those with whom you communicate enabling certain settings. These include turning off cloud backups or using end-to-end encrypted backups, setting a strong WhatsApp pin, and enabling security notifications.</p><</if>><<if $PaolaSignal is true>><p>✔️ Signal is the best choice and the option that Ana and Julian recommend due to its end-to-end encryption and robust security settings.</p><</if>><p>Ana and Julian recommend an end-to-end encrypted (E2EE) option (like Signal) because this type of encryption means that Paola’s sensitive messages are scrambled so that only the sender and receiver can read them. Without proper E2EE, Paola’s supposedly confidential messages to her clients could be intercepted, shared with bad actors by her service provider, or otherwise leaked, breaking the important confidentiality between her organization and the victims they represent.</p></div><strong>Paola and her staff will, based upon Ana and Julian’s advice, also take steps to:</strong>
<ul>
><li>Ensure that their smartphones and computers are <a target="_blank" href= "https://cso.cyberhandbook.org/topics/securing-accounts-devices/secure-devices">up-to-date and free from malware</a> by turning on automatic updates and using licensed software and operating systems.</li>
>><li><<linkreplace "Why is this important?">>Hackers are always trying to find vulnerabilities in software and operating systems in order to infect devices with malware and steal information. Using licensed and fully updated software and operating systems (made easier by turning on automatic updates!) are key defenses against this threat.<</linkreplace>></li>
><li>Protect accounts with <a target="_blank" href= "https://cso.cyberhandbook.org/topics/securing-accounts-devices/secure-accounts-passwords-and-two-factor-authentication">strong passwords (stored in a password manager) and two-factor authentication</a> (ideally via a security key or two-factor app).</li>
>><li><<linkreplace "Why is this important?">>Paola’s organization could lose supporters, money, and credibility if its email or social media accounts are hacked. This typically happens when an adversary or bot gains access to a short, easy-to-guess, or repeated password and does not have to bypass two-factor authentication (2FA) - an extra layer of security that requires users to provide both a password AND an additional form of verification to log in.<</linkreplace>></li>
><li>Ensure everyone in the organization is set up with and using an organizational email account</li>
>><li><<linkreplace "Why is this important?">>Using organization-managed email accounts helps to limit the common risks that arise when staff use personal email addresses for their work. For example, by providing organization-issued email accounts to staff, Paola can enforce best practices like strong passwords and 2FA on any accounts the organization manages, and can shut down an account with access to sensitive information that may have been breached.<</linkreplace>></li>
><li>Avoid using USBs to share files and instead use end-to-end encrypted file sharing tools (like Signal)</li>
>><li><<linkreplace "Why is this important?">>USBs are <a target="_blank" href= "https://cso.cyberhandbook.org/topics/storing-data/communications-and-sharing-data"> common vectors for malware</a>, so it is safest to avoid plugging them into devices and risk passing infections from one device to another. As an alternative, Paola can use secure apps like Signal to share documents, slide decks, or photos related to the workshop with her teammates and the workshop invitees.<</linkreplace>></li>
</ul>
<span class="pos">Consider the recommendations you selected. Compare them to the security best practices that Ana and Julian provided, taking a moment to think about how you might improve your recommendations next time.</span>
<span class="rtn">[[Next ->Digital Security Advice for Organizing a Workshop II]]</span><span class="back-btn"><<back>></span>
</div>
<div class="image-section"><div class="bg-graphic paola-page2">
<<if $PaolaSMS is true or $PaolaPhone is true>>
<img alt="Our instructor characters Ana and Julian disappointed that Paola has chosen a non-ideal option" src="cr_images/paola%20discouraged%20new.png" class="team-photo">
<<elseif $PaolaEmail is true or $PaolaWhatsApp is true or $PaolaTelegram is true>>
<img alt="Our instructor characters Ana and Julian encouraged that Paola has chosen an ideal option" src="cr_images/paola%20encouraged%20new.png" class="team-photo">
<<elseif $PaolaSignal is true>>
<img alt="Our instructor characters Ana and Julian encouraged that Paola has chosen an ideal option" src="cr_images/paola%20encouraged%20signal.png" class="team-photo">
<<else>>
<img alt="Our instructor characters Ana and Julian excited that Paola has chosen the best option" src="cr_images/paola-page2-main-image.png" class="team-photo">
<</if>>
</div></div><div class="main-section"><span class="title-3">Welcome to the end of the road!</span>
<div>We’d love to hear your feedback. Take a minute to provide your thoughts <a target="_blank" href="https://survey.alchemer.com/s3/7369133/Cyber-Survey">here</a>.</div>
<img alt="A final image with the words Thank You and all our characters smiling and waving" src="cr_images/final%20thank%20you.png" class="thank-you">
</div><div class="main-section"><div class="content-section"><div><span class="title-3">Hosting the Workshop Online</span></div><p>Using the previously mentioned tips, Paola will be able to reach out to her network securely, explain her organization’s upcoming event, and create a guest list. With a guest list confirmed, Paola’s next step is to create and distribute a virtual workshop link to participants and conduct the workshop. She will need to select a virtual meeting platform, configure the meeting settings, and successfully run the workshop.</p><p>Paola once again turns to Ana and Julian for advice. What tool(s) do you think they’d recommend given the situation?</p><div class="checkbox"><<checkbox "$PaolaZoom" false true>><label class="hidden-label" for="checkbox-paolazoom">Zoom</label><img alt="ZOOM Icon" src="cr_images/zoom%20icon.svg"> <div>Zoom</div></div>\
<div class="checkbox"><<checkbox "$PaolaGoogleMeet" false true>><label class="hidden-label" for="checkbox-paolagooglemeet">Google Meet</label><img alt="Google Meet Icon" src="cr_images/google%20meet%20icon.svg"> <div>Google Meet</div></div>\
<div class="checkbox"><<checkbox "$PaolaMicrosoftTeams" false true>><label class="hidden-label" for="checkbox-paolamicrosoftteams">Microsoft Teams</label><img alt="Microsoft Teams Icon" src="cr_images/microsoft%20teams%20icon.svg"> <div>Microsoft Teams</div></div>\
<div class="checkbox"><<checkbox "$PaolaSignal" false true>><label class="hidden-label" for="checkbox-paolasignal">Signal</label><img alt="Signal Icon" src="cr_images/signal%20icon.svg"> <div>Signal</div></div>\
<div class="checkbox"><<checkbox "$PaolaJitsiMeets" false true>><label class="hidden-label" for="checkbox-paolajitsimeets">Jitsi</label><img alt="Jitsi Icon" src="cr_images/jitsi%20meets%20icon.svg"> <div>Jitsi Meet</div></div>
<span class="rtn">[[Next->Digital Security Advice for Organizing a Workshop III]]</span><span class="back-btn"><<back>></span></div>
</div>/* Vignette Toggles */
<<set $Paola to false>>
<<set $Jamal to false>>
<<set $Tina to false>>
<<set $Milo to false>>
<<set$PaolaWhatsApp to false>>
<<set$PaolaSMS to false>>
<<set$PaolaTelegram to false>>
<<set$PaolaSignal to false>>
<<set$PaolaEmail to false>>
<<set$PaolaPhone to false>>
<<set $PaolaWorkshop to null>>
<<set $PaolaVideoCall to null>>
<<set $PaolaZoom to null>>
<<set $PaolaGoogleMeet to null>>
<<set $PaolaMicrosoftTeams to null>>
<<set $PaolaJitsiMeets to null>>
<<set $JamalFundExcel to false>>
<<set $JamalFundCS to false>>
<<set $JamalFundCivi to false>>
<<set $JamalFundSF to false>>
<<set $JamalFundSheets to false>>
<<set $TinaInstagram to false>>
<<set $TinaTwitter to false>>
<<set $TinaFBpage to false>>
<<set $TinaFBgroup to false>>
<<set $MiloOnlineSurvey to false>>
<<set $MiloMessagingApp to false>>
<<set $MiloPhone to false>>
<<set $MiloMobileApp to false>>
<<set $MiloExcel to false>>
<<set $MiloGoogleSheet to false>>
<<set $MiloSelfHosted to false>>
<<set $MiloUwazi to false>>
<<set $MiloUSB to false>>
<<set $MiloLocalServer to false>>
<div class="main-section"><div class="main-content"><div><span class="title-3">Securing Online Workshops</span></div><p>Just as with messages, encryption is critical to protecting video and audio calls from being snooped on by potential adversaries.</p><<if $PaolaZoom is true or $PaolaJitsiMeets is true>><p>🟡 Zoom and Jitsi Meet are both solid options - so long as Paola takes the time to properly configure her settings. Zoom requires that the call host <a target="_blank" target="_blank" href="https://support.zoom.us/hc/en-us/articles/360048660871-End-to-end-E2EE-encryption-for-meetings">enable such encryption in their Zoom account/call settings</a>, while Jitsi Meet requires that a user <a target="_blank" target="_blank" href="https://jitsi.org/e2ee-in-jitsi">turn on the “End-to-end Encryption” option</a> in the menu and make sure that all participants fill in the same password or phrase in the “key” field.</p><</if>><<if $PaolaGoogleMeet is true or $PaolaMicrosoftTeams is true>><p>❌ While Google Meet and Microsoft Teams are solid options for everyday video meetings of a less sensitive nature, for highly sensitive conversations like Paola’s event, they are likely not the best choice because neither provides end-to-end encryption for group calls or by default.</p><</if>><p>✔️ Signal is the best option because it offers <a target="_blank" target="_blank" href="https://support.signal.org/hc/en-us/articles/360052977792-Group-Calling-Voice-or-Video-with-Screen-Sharing">E2EE video calls</a> by default. This means that all video and audio calls on Signal have E2EE in place without Paola needing to change any settings.</p><p><strong>In addition to selecting an application that allows for end-to-end encrypted video calls, Paola and her staff will, based upon Ana and Julian’s advice, also take steps to:</strong>
<ul>
><li>Configure the video meeting platform with proper security settings to ensure appropriate access controls</li>
>><li><<linkreplace "Why is this important?">>Properly protecting the meeting requires more than just turning on end-to-end encryption. Paola can set a strong meeting password and enable a waiting room in Zoom, for example. With a waiting room in place, she can check every guest’s name in the room before allowing them to enter the meeting, thereby limiting the risk of bad actors entering the call, eavesdropping on the sensitive conversation, or “Zoom bombing” (i.e. dramatically disrupting the conversation, making it difficult or impossible to conduct the meeting as planned.)<</linkreplace>></li>
><li>Instruct participants to join using a <a target="_blank" href= "https://cso.cyberhandbook.org/topics/staying-safe/browsing-securely">trusted VPN and HTTPS.</a></li>
>><li><<linkreplace "Why is this important?">>Given the sensitive nature of the call and the fact that some participants will be calling in from countries where tools like Signal and even ZOOM are being blocked, a virtual private network (VPN) is important to help circumvent blocking and protect internet traffic from other forms of surveillance and censorship. Paola can remind participants before joining the call to use a <a target="_blank" href= "https://ssd.eff.org/module/choosing-vpn-thats-right-you#:~:text=You%20should%20review%20your%20VPN,the%20VPN%20provider%20does%20business."> trusted VPN</a>, while also reminding everyone to ensure that HTTPS is in place while they browse and to use a strong password on their at-home or in-office WiFi routers.<</linkreplace>></li>
</ul></p><span class="pos">Consider the recommendations you selected. Compare them to the security best practices that Ana and Julian provided, taking a moment to think about how you might improve your recommendations next time.</span>
<span class="rtn">[[Next->Paola's Action Pack]]</span><span class="back-btn"><<back>></span></div></div>
<div class="image-section"><div class="bg-graphic">
<<if $PaolaGoogleMeet is true or $PaolaMicrosoftTeams is true>>
<img alt="Our trainers Ana and Julian discouraged that Paola has made a not ideal choice" src="cr_images/online%20workshop%20discouraged%20paola.svg" class="team-photo">
<<elseif $PaolaZoom is true or $PaolaJitsiMeets is true>>
<img alt="Our trainers Ana and Julian encouraged that Paola has made a good choice" src="cr_images/online%20workshop%20encouraged%20paola.svg" class="team-photo">
<<else>>
<img alt="Our trainers Ana and Julian excited that Paola has made the best choice" src="cr_images/online%20workshop%20right%20choice%20paola.svg" class="team-photo">
<</if>></div></div><div class="main-section"><span class="title-3">Meet Paola!</span>
<p>Paola’s civil society organization (CSO) works to prosecute hate crimes. Given the difficult political context in which the organization works, Paola is always concerned about the safety and security of her staff and the people they work with. Right now, she is working on her first-ever virtual workshop for lawyers from around the region on how to successfully prosecute hate crimes.</p>\
<p>To start the program, Paola will need everyone in the organization to communicate with their networks to identify the right people to invite to the workshops. To do this, Paola knows that her staff will need to use their phones and computers, and some form of email and/or messaging apps, to conduct outreach. But she’s not quite sure which tools her organization should use to safely get the job done.</p>\
<p>Paola often turns to her friends Ana and Julian - two digital security experts well-known in the community - for advice in situations like this one. What tool(s) do you think they’d recommend to Paola given her organization’s outreach and safety needs?</p>\
<div class="checkbox"><<checkbox "$PaolaWhatsApp" false true>><label class="hidden-label" for="checkbox-paolawhatsapp">WhatsApp</label><img alt="WhatsApp Icon" src="cr_images/whatsapp.svg"> <div>WhatsApp</div></div>\
<div class="checkbox"><label class="hidden-label" for="checkbox-paolasms">SMS</label><<checkbox "$PaolaSMS" false true>> <img alt="SMS Icon" src="cr_images/SMS%20text.svg"> <div>SMS Text</div></div>\
<div class="checkbox"><label class="hidden-label" for="checkbox-paolatelegram">Telegram</label><<checkbox "$PaolaTelegram" false true>> <img alt="Telegram App Icon" src="cr_images/t-mobile.svg"> <div>Telegram</div></div>\
<div class="checkbox"><label class="hidden-label" for="checkbox-paolasignal">Signal</label><<checkbox "$PaolaSignal" false true>> <img alt="Signal App Icon" src="cr_images/signal%20icon.svg"> <div>Signal</div></div>\
<div class="checkbox"><label class="hidden-label" for="checkbox-paolaemail">Email</label><<checkbox "$PaolaEmail" false true>> <img alt="Email Icon" src="cr_images/Email.svg"> <div>Email</div></div>\
<div class="checkbox"><label class="hidden-label" for="checkbox-paolaphone">Phone</label><<checkbox "$PaolaPhone" false true>> <img alt="Phone Icon" src="cr_images/phone.svg"> <div>Phone calls</div></div>
<span class="rtn">[[Next->Digital Security Advice for Organizing a Workshop]]</span><span class="back-btn"><<back>></span>
<<set $Paola to true>>
</div>
<div class="bg-graphic page-1"><img alt="Paola smiling and waving" class="paola-main" src="cr_images/meet-paola.svg"></div><div class="main-section"><div class="title-section"><span class="title-3">You've helped Paola!</span></div><p><div>To help Paola and her organization implement their recommendations, Ana and Julian share a few resources, including:</div><ul><li>How to use Signal on <a target="_blank" href= "https://ssd.eff.org/module/how-use-signal-android">Android</a> and <a target="_blank" href= "https://ssd.eff.org/module/how-use-signal-ios">iPhone</a>.</li>
<li>How to enable automatic updates on <a target="_blank" href= "https://gadgets360.com/apps/features/how-to-disable-or-enable-automatic-app-updates-on-android-1662649">Android</a>, <a target="_blank" href= "https://support.apple.com/en-us/HT202180">iPhone</a>,<a target="_blank" href= "https://support.microsoft.com/en-us/topic/how-to-change-your-automatic-updates-settings-by-using-windows-security-center-804009cd-7931-fc07-5ada-6b157a854201">Windows computers</a>, and <a target="_blank" href= "https://support.apple.com/guide/mac-help/keep-your-mac-up-to-date-mchlpx1065/mac">Mac computers</a>.</li>
<li>Tips to <a target="_blank" href= "https://bitwarden.com/blog/7-tips-to-protect-your-bitwarden-account/">set up a secure password manager</a>.</li>
<li>The <a target="_blank" href= "https://2fa.directory/us/">2FA Directory</a> and instructions to set up the <a target="_blank" href= "https://authy.com/features/setup/">Authy</a> two-factor authentication app.</li>
<li>Nonprofit plan options from <a target="_blank" href= "https://www.google.com/nonprofits/offerings/workspace/">Google Workspace</a> and <a target="_blank" href= "https://www.microsoft.com/en-us/nonprofits/microsoft-365">Microsoft 365</a> for setting up organization-specific email.</li>
<li>How to enable <a target="_blank" href= "https://support.zoom.us/hc/en-us/articles/360048660871-End-to-end-E2EE-encryption-for-meetings">end-to-end encryption on Zoom</a>, along with <a target="_blank" href= "https://support.zoom.us/hc/en-us/articles/360041848151-In-meeting-security-options"> other Zoom security settings</a>.</li>
<li>How to <a target="_blank" href= "https://ssd.eff.org/module/choosing-vpn-thats-right-you"> choose the right VPN</a>.</li></ul></p><p>To find more information about all the tools mentioned here and more, visit the <a target="_blank" href="https://cso.cyberhandbook.org/">Cybersecurity Handbook for Civil Society Organizations</a>.</p><<if $Paola is false or $Jamal is false or $Tina is false or $Milo is false>><p>Just as Ana and Julian wrap up with Paola, their phones start buzzing with their other friends' requests for help. Where to next?</p><</if>><div class="container samewidth"><div class="row"><h2 style="margin: auto;">The Security Trainers:</h2></div><div class="row security-trainers"><br><div class="col"><img alt="A woman with light skin, dark hair, gold earrings, and a purple shirt" src="cr_images/ana%20avatar.svg"> <p style="margin-top:0px;">Ana</p></div><div class="col"><img alt="A man with brown skin, dark hair, and purple shirt" src="cr_images/julian%20avatar.svg"><p style="margin-top:0px;">Julian</p></div></div></div><div class="avatar-section"><<if $Paola is false>><span class="rtn">[[Meet Paola ->Organizing Virtual Workshops]]</span><</if>>\
\
<<if $Jamal is false>><span class="rtn avatar"><img alt="Jamal: A middle eastern non binary person with tan skin, dark hair, facial hair, and a purple shirt" src="cr_images/jamal-avatar.svg">[[Meet Jamal ->Digital Fundraising]]</span><</if>>\
\
<<if $Tina is false>><span class="rtn avatar"><img alt="Tina: A woman with dark skin, dark short hair, and a purple shirt" src="cr_images/tina-avatar.svg">[[Meet Tina ->Online Community Building]]</span><</if>>\
\
<<if $Milo is false>><span class="rtn avatar"><img alt="Milo: A wheelchair user, is an asian man with dark hair and a purple shirt" src="cr_images/milo-avatar.svg">[[Meet Milo ->Collecting Data]]</span><</if>>\
\
<<if $Paola is true>><span class="rtn avatar"><img alt="Paola: A woman with light skin, purple hair, and a purple shirt" src="cr_images/paola-avatar.svg">[[Meet Paola Again ->Organizing Virtual Workshops]]</span><</if>>\
\
<<if $Jamal is true>><span class="rtn avatar"><img alt="Jamal: A middle eastern non binary person with tan skin, dark hair, facial hair, and a purple shirt" src="cr_images/jamal-avatar.svg">[[Meet Jamal Again ->Digital Fundraising]]</span><</if>>\
\
<<if $Tina is true>><span class="rtn avatar"><img alt="Tina: A woman with dark skin, dark short hair, and a purple shirt" src="cr_images/tina-avatar.svg">[[Meet Tina Again ->Online Community Building]]</span><</if>>\
\
<<if $Milo is true>><span class="rtn avatar"><img alt="Milo: A wheelchair user, is an asian man with dark hair and a purple shirt" src="cr_images/milo-avatar.svg">[[Meet Milo Again ->Collecting Data]]</span><</if>>\
\
<<if $Paola is true and $Jamal is true and $Tina is true and $Milo is true>><p>Great work! Ana and Julian have addressed the needs of everyone in their community (for now, at least).</p><div style="width: 100%; margin-bottom: 25px;">
<span class="rtn">[[Wrap Up ->End Game]]</span>
</div><</if>>
</div><span class="back-btn"><<back>></span></div><div class="image-section"><div class="bg-graphic home"><img alt="Our trainers Ana and Julian waving Paola goodbye and Paola saying thank you" src="cr_images/paola%20saying%20goodbye%20to%20the%20trainers.svg" class="jamal-tina-milo"></div></div><div class="main-section"><div><span class="title-3">Securely Fundraising</span></div>
<<if $JamalFundExcel is true>><p>❌ Julian and Ana advise them against keeping track of donations in an Excel spreadsheet and collecting cash door-to-door because such a strategy could expose Jamal, and the donor information saved in an Excel file on their computer, to physical risks in a hostile environment.</p><</if>><p>✔️ According to Julian and Ana, <<if $JamalFundCS is true>> a crowdsource platform, or<</if>><<if $JamalFundCivi is true>> a contact management system like CiviCRM, or<</if>><<if $JamalFundSF is true>> a tool like Salesforce, or<</if>><<if $JamalFundSheets is true>> a cloud-based platform like google sheets, or<</if>> most of the other options could be a good choice for Jamal's CSO! The key is ensuring a tool and approach's adherence to the following core principles:</p><ul>
><li>Strong reputation for trust, security, and reliability</li>
>><li><<linkreplace "Why is this important?">>Using a tool from a trusted vendor with a good reputation is critical. Has their tool undergone independent code audits to review it for security vulnerabilities? Does the vendor have strong commitments, backed up in contracts or written agreements, to not sell or share customers’ private data? Do they have the technical expertise to keep their product secure? A quick google search and checking with experts like Ana and Julian can go a long way in helping Jamal verify the legitimacy and trustworthiness of potential vendors and tools.<</linkreplace>></li>
><li>Sustainability - both from a technology and human resource perspective</li>
>><li><<linkreplace "Why is this important?">>It is of course critical for Jamal to select a tool that their organization can afford - which is why they will likely steer away from a premium contact relationship management (CRM) tool like Salesforce. On the other end of the spectrum, an open-source tool like CiviCRM may be free to begin with, but will require someone with the appropriate tech and security skills to <a target="_blank" href= "http://dem.tools/civi">host and maintain the system</a>. Whether they pay a trusted company, hire skilled technical staff, or partner with a hosting organization that helps to alleviate the financial and technical burden on civic and nonprofit groups, Jamal will need to keep in mind their plan for keeping a system secured and running over the long term.<</linkreplace>></li>
><li>Ability to comply with local data protection or localization requirements</li>
>><li><<linkreplace "Why is this important?">>Since Jamal’s organization <a target="_blank" href= "https://unctad.org/page/data-protection-and-privacy-legislation-worldwide"> operates in a country</a> that has specific <a target="_blank" href= "https://itif.org/publications/2021/07/19/how-barriers-cross-border-data-flows-are-spreading-globally-what-they-cost/"> data privacy and localization requirements</a>, it will be important to familiarize themselves with the relevant rules and regulations so that they can choose a tool to meet the organization’s locally specific needs and avoid unintentional trouble.<</linkreplace>></li>
><li>Strong access controls - including strong password and two-factor authentication requirements, robust user permissions, and access auditing features</li>
>><li><<linkreplace "Why is this important?">>Unauthorized access to the donor database can lead to the compromise of sensitive information such as donor names, contact details, addresses, and bank account/credit card numbers. For Jamal, keeping their donor list secure will be critical not just to maintain donor trust (and hopefully earn additional donations in the future), but also to protect donors living in societies where support for LGBTQI+ rights might put them in harm's way.<</linkreplace>></li>
</ul>
<span class="pos">Consider the recommendations you selected. Compare them to the security best practices that Ana and Julian provided, taking a moment to think about how you might improve your recommendations next time.</span>
<span class="rtn">[[Next ->Digital Security Advice for Fundraising II]]</span><span class="back-btn"><<back>></span></div>
<div class="image-section"><div class="bg-graphic">
<<if $JamalFundExcel is true>>
<img alt="Our trainers Ana and Julian discouraged that Jamal has chosen Excel" src="cr_images/securely%20fundraising%20discouraged%20-%20jamal.svg" class="jamal-page2">
<<else>>
<img alt="Our trainers Ana and Julian excited that Jamal has made the correct choice" src="cr_images/securely%20fundraising%20encouraged%20-%20jamal.svg" class="jamal-page2">
<</if>></div></div><div class="main-section"><div><span class="title-3">Protecting the Website</span></div><p>After selecting a donor management and fundraising platform - Jamal’s CSO decides on one that integrates directly with their website so they can leverage the popularity of their most prominent web platform - the organization will need to launch their campaign and start collecting donations. As donors flock to their site, Jamal once again seeks out Ana and Julian for some advice. Based upon their input, Jamal decides to take the following steps to help keep the organization’s website operational and secure.</p><ul>
><li>Move to a <a target="_blank" href= "https://cso.cyberhandbook.org/topics/staying-safe/keep-your-websites-online">trusted hosting provider</a></li>
>><li><<linkreplace "Why is this important?">>Websites are hosted on computers - and computers are vulnerable to hacking. Jamal learned that using existing hosting services is a more secure option because they manage all the site security for him. Some options include Wordpress.com, Wix, or eQualitie’s <a target="_blank" href= "https://equalit.ie/eqpress-secure-hosting-with-deflect/"> eQPress</a> for Wordpress sites.<</linkreplace>></li>
><li><a target="_blank" href= "https://cso.cyberhandbook.org/topics/staying-safe/keep-your-websites-online">Install an SSL certificate</a> to ensure all traffic to the website is encrypted</li>
>><li><<linkreplace "Why is this important?">>This helps <a target="_blank" href= "https://cso.cyberhandbook.org/topics/staying-safe/browsing-securely">protect</a> the names and credit card information of donors sending money via the site!<</linkreplace>></li>
><li>Implement two-factor authentication to protect all user accounts on the website</li>
>><li><<linkreplace "Why is this important?">>As mentioned before, it’s critical to keep all accounts secure! In this case, a compromised website can mean Jamal could lose access to the website, and this can hurt his organization financially and reputationally.<</linkreplace>></li>
><li>Add <a target="_blank" href= "https://cso.cyberhandbook.org/topics/staying-safe/keep-your-websites-online">DDoS protection</a> for the website</li>
>><li><<linkreplace "Why is this important?">>Distributed Denial of Service (DDoS) attacks are where a large group of computers simultaneously drown the server in malicious traffic. Since Jamal works at a civil society organization, he can most likely qualify for free DDoS protection - which makes it much harder for an adversary to take his website down.<</linkreplace>></li>
</ul><p><span class="pos">Consider the recommendations you selected. Compare them to the security best practices that Ana and Julian provided, taking a moment to think about how you might improve your recommendations next time.</span></p><span class="rtn">[[Next->Jamal's Action Pack]]</span><span class="back-btn"><<back>></span></div>
<div class="image-section"><div class="bg-graphic"><img alt="Jamal receiving training about digital security" src="cr_images/protecting%20website%20main%20image%20-%20jamal.svg" class="jamal-page3"></div></div> <div class="main-section"><div class="title-section"><span class="title-3">You've helped Jamal!</span></div><p><div>To help Jamal and their organization implement a couple of these best practices, Ana and Julian share the following links:</div><ul><li>DDOS protection services (free for nonprofits) from <a target="_blank" href= "https://www.cloudflare.com/galileo/">Cloudflare's Project Galileo</a> and from <a target="_blank" href= "https://deflect.ca/">eQualitie's Deflect</a>.</li>
<li>How to get free, secure WordPress site hosting as a nonprofit through eQualitie's <a target="_blank" href= "https://equalit.ie/eqpress-secure-hosting-with-deflect/">eQPress service</a>.</li></ul></p><p>To find more information about all the tools mentioned here and more, visit the <a target="_blank" target="_blank" href="https://cso.cyberhandbook.org/">Cybersecurity Handbook for Civil Society Organizations</a>.</p><<if $Paola is false or $Jamal is false or $Tina is false or $Milo is false>><p>With Jamal's questions answered, Ana and Julian can turn their attention to another friend in need. Where to next?</p><</if>><div class="container samewidth"><div class="row"><h2 style="margin: auto;">The Security Trainers:</h2></div><div class="row security-trainers"><br><div class="col"><img alt="A woman with light skin, dark hair, gold earrings, and a purple shirt" src="cr_images/ana%20avatar.svg"> <p style="margin-top:0px;">Ana</p></div><div class="col"><img alt="A man with brown skin, dark hair, and purple shirt" src="cr_images/julian%20avatar.svg"><p style="margin-top:0px;">Julian</p></div></div></div><div class="avatar-section"><<if $Paola is false>><span class="rtn avatar"><img alt="Paola: A woman with light skin, purple hair, and a purple shirt" src="cr_images/paola-avatar.svg">[[Meet Paola ->Organizing Virtual Workshops]]</span><</if>>\
\
<<if $Jamal is false>><span class="rtn avatar"><img alt="Jamal: A middle eastern non binary person with tan skin, dark hair, facial hair, and a purple shirt" src="cr_images/jamal-avatar.svg">[[Meet Jamal ->Digital Fundraising]]</span><</if>>\
\
<<if $Tina is false>><span class="rtn avatar"><img alt="Tina: A woman with dark skin, dark short hair, and a purple shirt" src="cr_images/tina-avatar.svg">[[Meet Tina ->Online Community Building]]</span><</if>>\
\
<<if $Milo is false>><span class="rtn avatar"><img alt="Milo: A wheelchair user, is an asian man with dark hair and a purple shirt" src="cr_images/milo-avatar.svg">[[Meet Milo ->Collecting Data]]</span><</if>>\
\
<<if $Paola is true>><span class="rtn avatar"><img alt="Paola: A woman with light skin, purple hair, and a purple shirt" src="cr_images/paola-avatar.svg">[[Meet Paola Again ->Organizing Virtual Workshops]]</span><</if>>\
\
<<if $Jamal is true>><span class="rtn avatar"><img alt="Jamal: A middle eastern non binary person with tan skin, dark hair, facial hair, and a purple shirt" src="cr_images/jamal-avatar.svg">[[Meet Jamal Again ->Digital Fundraising]]</span><</if>>\
\
<<if $Tina is true>><span class="rtn avatar"><img alt="Tina: A woman with dark skin, dark short hair, and a purple shirt" src="cr_images/tina-avatar.svg">[[Meet Tina Again ->Online Community Building]]</span><</if>>\
\
<<if $Milo is true>><span class="rtn avatar"><img alt="Milo: A wheelchair user, is an asian man with dark hair and a purple shirt" src="cr_images/milo-avatar.svg">[[Meet Milo Again ->Collecting Data]]</span><</if>>\
\
<<if $Paola is true and $Jamal is true and $Tina is true and $Milo is true>><p>Great work! Ana and Julian have addressed the needs of everyone in their community (for now, at least). </p><div style="width: 100%; margin-bottom: 25px;">
<span class="rtn">[[Wrap Up ->End Game]]</span>
</div><</if>></div><span class="back-btn"><<back>></span></div>
<div class="image-section"><div class="bg-graphic home"><img alt="Our trainers Ana and Julian waving Jamal goodbye and Jamal saying thank you" src="cr_images/jamal%20saying%20goodbye%20to%20the%20trainers.svg"></div></div><div class="main-section"><div><span class="title-3">Meet Tina!</span></div><p>Tina wants to create an online community for people in her region with disabilities to advocate for greater accessibility. Her organization already connects with a large group of activists through in-person events, but due to challenges (and costs) of organizing face-to-face meetings, Tina would like to create an online community to sustain and grow the engagement. Tina’s organization has three goals: 1) for the organization’s message to be heard by a wider audience, 2) to have a safe space to facilitate online discussion with their supporters, and 3) to replicate some of their big in-person events online. </p><p>To get started, Tina will need to decide which tools make the most sense given her organization’s community building goals. With so many social media platforms out there, she’s having trouble knowing where to start, especially given all the online safety threats she has heard about.</p><p>Tina knows security experts Ana and Julian from their time together at another nonprofit, so she reaches out to them for advice. Given what you know about Tina’s situation, what platforms, tools, or accounts do you think Ana and Julian suggest for her organization?</p><div class="bounding-box"><div class="checkbox"><div class="cb-inner"><<checkbox "$TinaInstagram" false true>><label class="hidden-label" for="checkbox-tinainstagram">An Instagram page for posting content publicly, raising awareness, and spreading the organization’s message to attract new members</label><span><img alt="An Instagram Icon" src="cr_images/ig.svg">An Instagram page for posting content publicly, raising awareness, and spreading the organization’s message to attract new members</span></div></div>
<div class="checkbox"><div class="cb-inner"><<checkbox "$TinaTwitter" false true>><label class="hidden-label" for="checkbox-tinatwitter">A Twitter account for sharing their message to the media in order to help amplify their outreach campaign</label> <span><img alt="A Twitter Icon" src="cr_images/twitter.svg">A Twitter account for sharing their message to the media in order to help amplify their outreach campaign</span></div></div>
<div class="checkbox"><div class="cb-inner"><<checkbox "$TinaFBpage" false true>><label class="hidden-label" for="checkbox-tinafbpage">An official Facebook page to host Facebook Live streams of formerly in-person events</label><span><img alt="An Facebook Icon" src="cr_images/fb.svg">An official Facebook page to host Facebook Live streams of formerly in-person events</span></div></div>
<div class="checkbox"><div class="cb-inner"><<checkbox "$TinaFBgroup" false true>><label class="hidden-label" for="checkbox-tinafbgroup">A public Facebook group for facilitating discussion between verified community members</label>
<span><img alt="A second Facebook Icon" src="cr_images/fb.svg">A public Facebook group for facilitating discussion between verified community members</span></div></div></div>
<span class="pos">Consider the recommendations you selected. Compare them to the security best practices that Ana and Julian provided, taking a moment to think about how you might improve your recommendations next time.</span>
<span class="rtn">[[Let's go->Digital Security Advice for Online Community Building]]</span><span class="back-btn"><<back>></span>
<<set $Tina to true>></div>
<div class="bg-graphic page-3"><img class="tina-main" alt="Tina smiling and waving" src="cr_images/tina-main.svg"></div><div class="main-section"><div><span class="title-3">Securing Online Workshops </span></div><p>The good news: Any and all of these options can be great ways to help Tina achieve her goals. The key, as Ana and Julian remind her, is to implement core digital security best practices alongside whatever online platforms Tina’s organization selects.</p><<if $TinaInstagram is true>><p>🟡 If that platform is Instagram, Tina should be sure to follow <a target="_blank" href="https://help.instagram.com/566810106808145">these guidelines</a> to enable two-factor authentication in addition to a strong password to protect the account.</p><</if>><<if $TinaTwitter is true>><p>🟡 If that platform is Twitter, it is critical for Tina to enable two-factor authentication, in addition to a strong password, following <a target="_blank" href="https://help.twitter.com/en/managing-your-account/two-factor-authentication">these instructions</a>.</p><</if>><<if $TinaFBpage is true or $TinaFBgroup is true>><p>🟡 If Tina’s organization chooses Facebook, she should be sure to follow <a target="_blank" href="https://www.facebook.com/help/148233965247823">these two-factor authentication guidelines</a> to protect her account, in addition of course to using a strong password.</p><</if>><p>In addition to two-factor authentication and strong passwords, it is also important for Tina’s organization to change the passwords of any shared accounts, and to remove account access for any staff that leaves the organization. Why is access control so important? As Julian and Ana are quick to point out, promptly removing account access is critical to ensuring that former employees are not able to post potentially harmful content to the organization’s social media pages after they depart. Without strong offboarding policies like this, Tina could leave her organization susceptible to having their accounts taken over by disgruntled former employees or other bad actors who take advantage of old, unmaintained accounts.</p><p>Beyond these basic account security best practices, Ana and Julian recommend that Tina’s organization take the following steps to help ensure their growing online community is protected and feels safe when engaging online:</p><ul>
><li>Create a policy around what to post</li>
>><li><<linkreplace "Why is this important?">>A <a target="_blank" href= "http://dem.tools/civi">comprehensive content policy</a> will help Tina’s organization limit the risk of private information being posted on one of their social media channels and can act as an important way to ensure that potentially sensitive information (such as names and images of their community members) are not posted without those members’ consent. Social media of all forms should be considered a public space, and given this expectation of publicity, it will be important for Tina’s organization to formalize rules around what type of content should and should not be posted to their accounts.<</linkreplace>></li>
><li>Create digital harassment policies</li>
>><li><<linkreplace "Why is this important?">>Online harassment and hate are unfortunately very common, and it will be very difficult for Tina to build an effective online community or presence without a plan to address it. Tina will need to have policies in place to protect herself, others in her organization, and members of her community. After reading <a target="_blank" href= "https://onlineharassmentfieldmanual.pen.org/"> PEN America's Online Harassment Field Manual</a> and NDI's <a target="_blank" href="https://www.ndi.org/publications/interventions-end-online-violence-against-women-politics">Interventions to End Online Violence Against Women in Politics</a>, Tina began developing answers to key questions such as “how will I support my organization or community members who receive digital harassment?”, “how will my organization publicly respond to digital harassment that our members receive?”, “how can we <a target="_blank" href= "https://guides.accessnow.org/self-doxing.html"> defend ourselves against doxing</a>?" and “when should I block, silence, restrict, or just ignore online trolls?”, among many other key concerns.<</linkreplace>></li>
><li>Develop live streaming protocols</li>
>><li><<linkreplace "Why is this important?">>Live streaming can be a great way to interact directly with the community in real time, but it also means losing some control over what information might inadvertently become public. Tina’s organization will want to set up live streams to ensure that anyone who may be on screen or whose identity may be revealed on video, through the chat, or a Q&A session is fully aware of the public nature of the event before participating. Tina will also want to ensure someone is on hand to handle any online trolls that might attempt to flood the live stream with negative comments or otherwise disruptive activity. Tina may also want to remind any panelists joining live streams to avoid streaming from in front of an identifiable location if they are concerned about revealing their location to the general public.<</linkreplace>></li>
><li>Be informed and aware of phishing</li>
>><li><<linkreplace "Why is this important?">><a target="_blank" href= "https://cso.cyberhandbook.org/topics/securing-accounts-devices/phishing-common-threat-devices-and-accounts"> Phishing</a> can happen via emails, SMS, messaging apps, and phone calls, but it is also very common on social media via posts and direct messages. As Tina’s organization brings a new community of users into the social media space, it’s important to ensure they are aware of this common threat and able to defend against it. Attackers may try to get Tina, her staff, or other members of the online community to type sensitive information (like passwords) into a fake website in order to gain access to their accounts, ask them to share private information (like a credit card number) via a direct message, or convince them to download malware through a malicious link that can infect their devices.<</linkreplace>></li>
</ul>
<span class="pos">Consider the recommendations you selected. Compare them to the security best practices that Ana and Julian provided, taking a moment to think about how you might improve your recommendations next time.</span>
<span class="rtn">[[Next ->Tina's Action Pack]]</span><span class="back-btn"><<back>></span></div>
<div class="image-section"><div class="bg-graphic"><img alt="Our trainers Ana and Julian training Tina on security for online community building" src="cr_images/online%20workshop%20tina%202.svg"></div></div><div class="main-section"><div class="title-section"><span class="title-3"> You've helped Tina! </span></div><p><div>To help Tina and her organization implement these best practices, Ana and Julian share the following resources:</div><ul><li>A <a target="_blank" href= "https://phishingquiz.withgoogle.com/?hl=en">phishing quiz</a> from Google to help practice spotting phishing attacks.</li>
<li>The aforementioned <a target="_blank" href= "https://onlineharassmentfieldmanual.pen.org/">Online Harassment Field Manual</a> from PEN America.</li>
<li>Privacy guides from major social media platforms <a target="_blank" href= "https://www.facebook.com/help/325807937506242">Facebook</a>, <a target="_blank" href= "https://help.twitter.com/en/safety-and-security/twitter-privacy-settings">Twitter</a>, <a target="_blank" href= "https://www.facebook.com/help/instagram/196883487377501">Instagram</a>, and <a target="_blank" href= "https://support.google.com/youtube/answer/157177?co=GENIE.Platform%3DDesktop&hl=en">YouTube</a>.</li>
<li>A how-to guide for <a href= “https://www.ndi.org/sites/default/files/Addressing%20Gender%20%26%20Disinformation%202%20%281%29.pdf”>addressing online misogyny and gendered disinformation</a> from NDI.</li>
<li>A guide to <a href= “https://guides.accessnow.org/self-doxing.html”>self doxxing</a> developed by Access Now.</li></ul></p><p>To find more information about all the tools mentioned here and more, visit the <a target="_blank" href="https://cso.cyberhandbook.org/">Cybersecurity Handbook for Civil Society Organizations</a>.</p><<if $Paola is false or $Jamal is false or $Tina is false or $Milo is false>><p>Ana and Julian are feeling confident that Tina can turn their advice into meaningful action. But their day isn't over yet... where should they go next?</p><</if>><div class="container samewidth"><div class="row"><h2 style="margin: auto;">The Security Trainers:</h2></div><div class="row security-trainers"><br><div class="col"><img alt="A woman with light skin, dark hair, gold earrings, and a purple shirt" src="cr_images/ana%20avatar.svg"> <p style="margin-top:0px;">Ana</p></div><div class="col"><img alt="A man with brown skin, dark hair, and purple shirt" src="cr_images/julian%20avatar.svg"><p style="margin-top:0px;">Julian</p></div></div></div><div class="avatar-section"><<if $Paola is false>> <span class="rtn avatar"><img alt="Paola: A woman with light skin, purple hair, and a purple shirt" src="cr_images/paola-avatar.svg">[[Meet Paola ->Organizing Virtual Workshops]]</span><</if>>\
\
<<if $Jamal is false>><span class="rtn avatar"><img alt="Jamal: A middle eastern non binary person with tan skin, dark hair, facial hair, and a purple shirt" src="cr_images/jamal-avatar.svg">[[Meet Jamal ->Digital Fundraising]]</span><</if>>\
\
<<if $Tina is false>><span class="rtn avatar"><img alt="Tina: A woman with dark skin, dark short hair, and a purple shirt" src="cr_images/tina-avatar.svg">[[Meet Tina ->Online Community Building]]</span><</if>>\
\
<<if $Milo is false>><span class="rtn avatar"><img alt="Milo: A wheelchair user, is an asian man with dark hair and a purple shirt" src="cr_images/milo-avatar.svg">[[Meet Milo ->Collecting Data]]</span><</if>>\
\
<<if $Paola is true>><span class="rtn avatar"><img alt="Paola: A woman with light skin, purple hair, and a purple shirt" src="cr_images/paola-avatar.svg">[[Meet Paola Again ->Organizing Virtual Workshops]]</span><</if>>\
\
<<if $Jamal is true>><span class="rtn avatar"><img alt="Jamal: A middle eastern non binary person with tan skin, dark hair, facial hair, and a purple shirt" src="cr_images/jamal-avatar.svg">[[Meet Jamal Again ->Digital Fundraising]]</span><</if>>\
\
<<if $Tina is true>><span class="rtn avatar"><img alt="Tina: A woman with dark skin, dark short hair, and a purple shirt" src="cr_images/tina-avatar.svg">[[Meet Tina Again ->Online Community Building]]</span><</if>>\
\
<<if $Milo is true>><span class="rtn avatar"><img alt="Milo: A wheelchair user, is an asian man with dark hair and a purple shirt" src="cr_images/milo-avatar.svg">[[Meet Milo Again ->Collecting Data]]</span><</if>>\
\
<<if $Paola is true and $Jamal is true and $Tina is true and $Milo is true>><p>Great work! Ana and Julian have addressed the needs of everyone in their community (for now, at least). </p><div style="width: 100%; margin-bottom: 25px;">
<span class="rtn">[[Wrap Up ->End Game]]</span>
</div><</if>></div><span class="back-btn"><<back>></span></div>
<div class="image-section"><div class="bg-graphic home"><img alt="Our trainers Ana and Julian waving Tina goodbye and Tina saying thank you" src="cr_images/tina%20saying%20goodbye%20to%20the%20trainers.svg" class="team-photo"></div></div><div class="main-section"><div><span class="title-3">Secure Data Collection</span></div>
<p>To help protect the critical information that Milo’s organization collects, Ana and Julian stress the importance of using data collection methods that implement strong encryption.</p><<if $MiloPhone is true>><p>❌ Since phone calls and SMS lack even the most basic encryption, using these standard methods of data collection are not the best choices in this context. Unencrypted communications (like SMS and phone calls) leave any data sent to Milo’s organization via these means susceptible to being intercepted in transit and used against the women whose safety Milo’s organization is trying to help protect.</p><</if>><<if $MiloOnlineSurvey is true>> <p>🟡 Traditional online survey tools like Survey Monkey or Google Forms typically provide transport layer encryption, which provides protection between the person completing the survey or form and the service provider (which in this case would be Google or Survey Monkey). These options, therefore, often make sense for projects collecting less sensitive data and/or for groups that have a strong trust relationship with a given service provider.</p><</if>><<if $MiloMessagingApp is true>> <p>🟡 Messaging apps can certainly provide a simple solution for Milo and his organization to collect information, however, due to the necessity for privacy in sharing these stories, a public group or shared channel is not an appropriate choice. If collecting stories via messaging applications is the only option available, Milo’s organization should use private, one-to-one messages, use an app that ensures all messages are end-to-end encrypted (like Signal), and establish a separate number for accepting reports from women in the community (one that is not tied directly to any staff person’s personal phone or accounts.)</p><</if>><<if $MiloMobileApp is true>><p>✔️ Using a tool designed specifically for safely collecting human rights documentation is the ideal choice. These tools, like the Tella app as one example, include features that help to enhance the security of data not just while it is being collected, but also once it is stored.</p><</if>><p><span class="pos">Consider the recommendations you selected. Compare them to the security best practices that Ana and Julian provided, taking a moment to think about how you might improve your recommendations next time.</span></p><span class="rtn">[[Next ->Storing Data]]</span><span class="back-btn"><<back>></span></div>
<div class="image-section"><div class="bg-graphic">
<<if $MiloPhone is true>>
<img alt="Our trainers Ana and Julian discouraged that Milo has chosen a not-ideal option" src="cr_images/secure%20data%20collection%20discouraged%20milo%201.svg" class="team-photo">
<<elseif $MiloOnlineSurvey is true or $MiloMessagingApp is true>>
<img alt="Our trainers Ana and Julian encouraged that Milo has chosen a good option" src="cr_images/secure%20data%20collection%20encouraged%20milo%201.svg" class="team-photo">
<<else>>
<img alt="Our trainers Ana and Julian excited that Milo has chosen the best option" src="cr_images/secure%20data%20collection%20best%20option%20-%20milo.svg" class="team-photo">
<</if>>
</div></div> <div class="main-section"><div><span class="title-3">Secure Data Storage</span></div>
<p>After deciding on an improved method for collecting data - both from a security and efficiency perspective - Milo’s organization wants to choose a complementary system for secure data storage to ensure that the information they are collecting can be kept safe. After all, they have a significant responsibility to the women whose stories they are collecting to keep this information secure.</p><p>To that end, which tools or techniques for data storage do you think Ana and Julian recommend to Milo and his colleagues?</p><div class="bounding-box">
<div class="checkbox"><div class="cb-inner"><<checkbox "$MiloExcel" false true>><label class="hidden-label" for="checkbox-miloexcel">Excel spreadsheets</label><span>Excel spreadsheets saved on their computers </span></div></div>
<div class="checkbox"><div class="cb-inner"><<checkbox "$MiloGoogleSheet" false true>><label class="hidden-label" for="checkbox-milogooglesheet">Online Spreadsheets</label><span>Online spreadsheets (such as Google Sheets) stored in a cloud storage system (such as Google Drive or Dropbox) </span></div></div>
<div class="checkbox"><div class="cb-inner"><<checkbox "$MiloSelfHosted" false true >><label class="hidden-label" for="checkbox-miloselfhosted">A self-hosted instance of a database tool</label><span>A self-hosted instance of an open-source database tool </span></div></div>
<div class="checkbox"><div class="cb-inner"><<checkbox "$MiloUwazi" false true>><label class="hidden-label" for="checkbox-milouwazi">An externally hosted databased tool that is designed for storing and processing sensitive data</label> <span> A database tool, hosted externally, that is designed for storing and processing sensitive data (such as Huridocs’ Uwazi)</span></div></div>
<div class="checkbox"><div class="cb-inner"><<checkbox "$MiloUSB" false true>><label class="hidden-label" for="checkbox-milousb">Physical Hard Drive or USB</label><span>A physical hard drive or USBs </span></div></div>
<div class="checkbox"><div class="cb-inner"><<checkbox "$MiloLocalServer" false true>><label class="hidden-label" for="checkbox-milolocalserver">A local physical server</label><span> A local physical server </span></div></div>
</div>
<span class="rtn">[[Let's go->Digital Security Advice for Data Storage]]</span><span class="back-btn"><<back>></span></div>
<div class="image-section"><div class="bg-graphic"><img alt="Milo looking confused about all the cloud storage options" src="cr_images/secure%20data%20storage-1.svg"></div></div><div class="main-section"><div><span class="title-3">Secure Data Storage</span></div>
<p>Given the organization’s limited technical capacity and staff, Ana and Julian emphasize the dangers of relying on often popular but difficult-to-secure solutions.</p><<if $MiloUSB is true or $MiloExcel is true>><p>❌ Milo’s organization should avoid storing sensitive information on physical devices such as USBs, external hard drives, and local computers (i.e. Excel documents saved to a desktop) - especially without strong encryption in place. If they have to resort to storing data on USBs or hard drives, it is critical they keep those devices password protected, full disc encrypted, and physically safe (especially while traveling). Due to the risk of physical loss and theft (or the risk of Milo’s kid spilling juice all over the keyboard and frying a computer’s hard drive), storing data in the cloud is generally a more sustainable and secure option.</p><</if>><<if $MiloGoogleSheet is true>><p>🟡 If choosing to store data in Google Drive, Dropbox, One Drive, or another cloud provider, it is important for Milo to keep in mind essential account security best practices. Why? If an account used to access this sensitive data is hacked, data could be manipulated (leading to faulty reports and reputational harm for the organization), deleted in an effort to protect certain bad actors, or stolen to identify and potentially harass women that are willing to share their stories about running for office. It is also important to ensure the organization has trust in the cloud hosting provider to not potentially hand over sensitive data to an adversary or other outside party.</p><</if>><<if $MiloSelfHosted is true or $MiloLocalServer is true>><p>❌ It’s also critical for the organization to avoid hosting its own systems, such as local servers or databases, without robust technical staff in place. With only a small IT team, Milo’s organization lacks the time, skills, and resources needed to adequately maintain and secure its own physical servers. Without multiple skilled cybersecurity professionals on staff, attacks aimed at stealing sensitive data stored on self-hosted infrastructure are much more likely to find success.</p><</if>><p>✔️ As an alternative to self-hosting, local storage devices, and online spreadsheets, Ana and Julian suggest Milo use a tool hosted by an organization with a strong reputation for trust, security, and reliability, designed for collecting and managing sensitive data (such as human rights documentation). One potential option that combines all these factors for him to consider is the <a target="_blank" href="https://tella-app.org/">Tella app</a> and <a target="_blank" href="https://huridocs.org/technology/uwazi/">Huridocs’ Uwazi</a>, which can be hosted by a trusted third party and <a target="_blank" href="https://huridocs.org/2022/07/the-new-tella-app-lets-uwazi-users-document-violations-safely-and-while-offline/">used together</a> to help ease data processing and enhance security. Such tools, designed specifically for processing and storing sensitive information like the personal stories Milo and his team are collecting, can be both a secure and less burdensome way to help individual staff follow data security policies such as saving data in a protected database and not on their own personal devices.</p><p>Beyond these critical tips, Ana and Julian remind Milo about the importance of destroying/shredding any hard copy records of sensitive data, using strong locks on doors and windows, setting up CCTV systems, and having a visitor/guest policy for his organization’s office. <a target="_blank" href="https://cso.cyberhandbook.org/topics/physical-security/protecting-physical-assets">Mitigating physical threats</a> will help Milo’s organization reduce the risk of bad actors breaking into their office and (if successful) easily taking sensitive information. On the flip side, it is also critical that Milo and his team define a data retention policy and keep a secure backup of what is important. If the organization’s data is accidentally erased or stolen, it would be devastating if they do not have a secure backup from which to recover. To that end, Milo will want to take time with his staff to define what data is essential, where it should be <a target="_blank" href="https://cso.cyberhandbook.org/topics/storing-data/storing-data-securely">securely backed up</a>, and for how long.</p><p><span class="pos">Consider the recommendations you selected. Compare them to the security best practices that Ana and Julian provided, taking a moment to think about how you might improve your recommendations next time.</span></p><span class="rtn">[[Next ->Milo's Action Pack]]</span><span class="back-btn"><<back>></span></div>
<div class="image-section"><div class="bg-graphic"><<if $MiloExcel is true or $MiloUSB is true or $MiloSelfHosted is true or $MiloLocalServer is true>>
<img alt="Ana teaching Milo about the risks of storing sensitive data in spreadsheets, physical hard drives, and local servers and databases" src="cr_images/secure%20data%20storage%20usb%20excel%20local%20server.svg" class="team-photo">
<<elseif $MiloGoogleSheet is true>>
<img alt="Ana teaching Milo about online spreadsheets and secured cloud data storage" src="cr_images/secure%20data%20storage%20online%20spreadsheet%20open-source.svg" class="team-photo">
<<else>>
<img alt="Ana teaching Milo about a database tool called Uwazi that is hosted externally and designed for storing and processing sensitive data" src="cr_images/secure%20data%20storage%20uwazi.svg" class="team-photo">
<</if>></div></div> <div class="main-section"><div class="title-section"><span class="title-3">You've helped Milo!</span></div><p><div>To help Milo and his organization implement these best practices, Ana and Julian share the following resources:</div><ul><li>Ensure strong encryption is in place</li>
<li>Avoid using a public group or channel (such as on Telegram or WhatsApp) </li>
<li>Avoid storing sensitive information on physical devices such as USBs, external hard drives, and local computers (i.e. excel documents saved locally) - especially without <a target="_blank" href="https://support.microsoft.com/en-us/windows/turn-on-device-encryption-0c453637-bc88-5f74-5105-741561aae838">strong encryption in place</a></li>
<li>Avoid hosting their own systems, such as local servers or databases, without robust technical staff in place</li>
<li>As an alternative to self-hosting, consider <a target="_blank" href="https://huridocs.org/2022/07/the-new-tella-app-lets-uwazi-users-document-violations-safely-and-while-offline/">a tool</a> hosted by an organization with a strong reputation for trust, security, and reliability, designed for collecting and managing sensitive data (such as human rights documentation)</li>
<li><a target="_blank" href="https://cso.cyberhandbook.org/topics/physical-security/protecting-physical-assets">Mitigate physical threats</a> to their organization’s office, and backup and destroy any hard copy records</li>
<li>Regardless of the system, keep the accounts secure with strong passwords and two-factor authentication</li>
<li>Define a data retention policy and keep a secure backup of what is important</li></ul></p><p>To find more information about all the tools mentioned here and more, visit the <a target="_blank" href="https://cso.cyberhandbook.org/">Cybersecurity Handbook for Civil Society Organizations</a>.</p><<if $Paola is false or $Jamal is false or $Tina is false or $Milo is false>><p>Just as Ana and Julian wrap up with Milo, their phones start buzzing again. Looks like somebody else is in need of some good digital security advice:</p><</if>><div class="container samewidth"><div class="row"><h2 style="margin: auto;">The Security Trainers:</h2></div>
<div class="row security-trainers"><br><div class="col"><img alt="A woman with light skin, dark hair, gold earrings, and a purple shirt" src="cr_images/ana%20avatar.svg"> <p style="margin-top:0px;">Ana</p></div><div class="col"><img alt="A man with brown skin, dark hair, and purple shirt" src="cr_images/julian%20avatar.svg"><p style="margin-top:0px;">Julian</p></div></div></div><div class="avatar-section"><<if $Paola is false>><span class="rtn avatar"><img alt="Paola: A woman with light skin, purple hair, and a purple shirt" src="cr_images/paola-avatar.svg">[[Meet Paola ->Organizing Virtual Workshops]]</span><</if>>\
\
<<if $Jamal is false>><span class="rtn avatar"><img alt="Jamal: A middle eastern non binary person with tan skin, dark hair, facial hair, and a purple shirt" src="cr_images/jamal-avatar.svg">[[Meet Jamal ->Digital Fundraising]]</span><</if>>\
\
<<if $Tina is false>><span class="rtn avatar"><img alt="Tina: A woman with dark skin, dark short hair, and a purple shirt" src="cr_images/tina-avatar.svg">[[Meet Tina ->Online Community Building]]</span><</if>>\
\
<<if $Milo is false>><span class="rtn avatar"><img alt="Milo: A wheelchair user, is an asian man with dark hair and a purple shirt" src="cr_images/milo-avatar.svg">[[Meet Milo ->Collecting Data]]</span><</if>>\
\
<<if $Paola is true>><span class="rtn avatar"><img alt="Paola: A woman with light skin, purple hair, and a purple shirt" src="cr_images/paola-avatar.svg">[[Meet Paola Again ->Organizing Virtual Workshops]]</span><</if>>\
\
<<if $Jamal is true>><span class="rtn avatar"><img alt="Jamal: A middle eastern non binary person with tan skin, dark hair, facial hair, and a purple shirt" src="cr_images/jamal-avatar.svg">[[Meet Jamal Again ->Digital Fundraising]]</span><</if>>\
\
<<if $Tina is true>><span class="rtn avatar"><img alt="Tina: A woman with dark skin, dark short hair, and a purple shirt" src="cr_images/tina-avatar.svg">[[Meet Tina Again ->Online Community Building]]</span><</if>>\
\
<<if $Milo is true>><span class="rtn avatar"><img alt="Milo: A wheelchair user, is an asian man with dark hair and a purple shirt" src="cr_images/milo-avatar.svg">[[Meet Milo Again ->Collecting Data]]</span><</if>>\
\
<<if $Paola is true and $Jamal is true and $Tina is true and $Milo is true>><p>Great work! Ana and Julian have addressed the needs of everyone in their community (for now, at least).</p><div style="width: 100%; margin-bottom: 25px;">
<span class="rtn">[[Wrap Up ->End Game]]</span>
</div>
<</if>></div><span class="back-btn"><<back>></span></div>
<div class="image-section"><div class="bg-graphic home"><img alt="Our trainers Ana and Julian waving Milo goodbye and Milo saying thank you" src="cr_images/milo%20saying%20goodbye%20to%20the%20trainers.svg" class="team-photo"></div></div>