How to Be a Woman Online
eBook - ePub

How to Be a Woman Online

Surviving Abuse and Harassment, and How to Fight Back

Nina Jankowicz

Buch teilen
  1. 128 Seiten
  2. English
  3. ePUB (handyfreundlich)
  4. Über iOS und Android verfĂŒgbar
eBook - ePub

How to Be a Woman Online

Surviving Abuse and Harassment, and How to Fight Back

Nina Jankowicz

Angaben zum Buch
Buchvorschau
Inhaltsverzeichnis
Quellenangaben

Über dieses Buch

"Blisteringly witty." Kirkus
"An essential guide." Publisher's Weekly
"Timely." Booklist When Nina Jankowicz's first book on online disinformation was profiled in The New Yorker, she expected attention but not an avalanche of abuse and harassment, predominantly from men, online. All women in politics, journalism and academia now face untold levels of harassment and abuse in online spaces. Together with the world's leading extremism researchers, Jankowicz wrote one of the definitive reports on this troubling phenomenon. Drawing on rigorous research into the treatment of Kamala Harris - the first woman vice-president - and other political and public figures, Nina also uses her own experiences to provide a step-by-step plan for dealing with harassment, abuse, doxing and disinformation in online spaces. The result is a must-read for researchers, journalists and all women with a profile in the online space.

HĂ€ufig gestellte Fragen

Wie kann ich mein Abo kĂŒndigen?
Gehe einfach zum Kontobereich in den Einstellungen und klicke auf „Abo kĂŒndigen“ – ganz einfach. Nachdem du gekĂŒndigt hast, bleibt deine Mitgliedschaft fĂŒr den verbleibenden Abozeitraum, den du bereits bezahlt hast, aktiv. Mehr Informationen hier.
(Wie) Kann ich BĂŒcher herunterladen?
Derzeit stehen all unsere auf MobilgerĂ€te reagierenden ePub-BĂŒcher zum Download ĂŒber die App zur VerfĂŒgung. Die meisten unserer PDFs stehen ebenfalls zum Download bereit; wir arbeiten daran, auch die ĂŒbrigen PDFs zum Download anzubieten, bei denen dies aktuell noch nicht möglich ist. Weitere Informationen hier.
Welcher Unterschied besteht bei den Preisen zwischen den AboplÀnen?
Mit beiden AboplÀnen erhÀltst du vollen Zugang zur Bibliothek und allen Funktionen von Perlego. Die einzigen Unterschiede bestehen im Preis und dem Abozeitraum: Mit dem Jahresabo sparst du auf 12 Monate gerechnet im Vergleich zum Monatsabo rund 30 %.
Was ist Perlego?
Wir sind ein Online-Abodienst fĂŒr LehrbĂŒcher, bei dem du fĂŒr weniger als den Preis eines einzelnen Buches pro Monat Zugang zu einer ganzen Online-Bibliothek erhĂ€ltst. Mit ĂŒber 1 Million BĂŒchern zu ĂŒber 1.000 verschiedenen Themen haben wir bestimmt alles, was du brauchst! Weitere Informationen hier.
UnterstĂŒtzt Perlego Text-zu-Sprache?
Achte auf das Symbol zum Vorlesen in deinem nÀchsten Buch, um zu sehen, ob du es dir auch anhören kannst. Bei diesem Tool wird dir Text laut vorgelesen, wobei der Text beim Vorlesen auch grafisch hervorgehoben wird. Du kannst das Vorlesen jederzeit anhalten, beschleunigen und verlangsamen. Weitere Informationen hier.
Ist How to Be a Woman Online als Online-PDF/ePub verfĂŒgbar?
Ja, du hast Zugang zu How to Be a Woman Online von Nina Jankowicz im PDF- und/oder ePub-Format sowie zu anderen beliebten BĂŒchern aus Politics & International Relations & Political Corruption & Misconduct. Aus unserem Katalog stehen dir ĂŒber 1 Million BĂŒcher zur VerfĂŒgung.

1

Security: Outfitting Yourself Online

I spent my formative years on the internet. For most of high school, my mother limited my computer usage to a half an hour a day, but that didn’t stop me from publishing blogs on whatever the platform of the moment was. When Facebook opened to high school students, I was an early adopter. I posted photos from behind the scenes of musicals I was doing, and when I got to college, would complain about assignments, summer jobs, and the weather in my status updates and Facebook “Notes.” I uploaded a regular stream of photos with what I considered witty captions from my on-campus escapades without much of a thought to them living in perpetuity on the internet or on anyone’s hard drive who cared to download them. Relative strangers tagged me in photos when my band performed around the country.
I don’t regret any of it. I had a great college experience, and compared with most American young adults’ experiences at school, my time on campus was extraordinarily tame. There is no photographic or video evidence of me drinking heavily or using drugs because I never did. There are, however, a lot of less-than-flattering photos of me in my early college attire (sweatpants, t-shirt, and a messy bun), or acting like the enormous nerd that I was and am, singing with my college a cappella group, studying abroad in Russia, and playing concerts with my Harry Potter-themed band.
In 2020, a troll ran an ill-conceived smear campaign featuring videos of some of those escapades. He shared them on Twitter from an alternate account after I discussed disinformation in the presidential election. He tried to shame me into silence, but I wasn’t ashamed. However, I was worried. This man had dug deep enough into my Google search results to find these videos. He selected the ones that made me look the least serious and professional, and went through the trouble of downloading, editing, and sharing them through an alternate account. If he found those, what else did he find? My phone number? My address? My mother’s address? Would he ever deploy them if I debunked another one of his claims? Would I encounter him or one of his acolytes next time I walked the dog?
The night those videos were shared—the culmination of a week-long trolling campaign against me—my nerves and emotions were frayed. I felt unsafe and alone. I signed myself and my husband up for an anti-doxing service, which scrubs online white pages and other public records of your personal information for a fee. I had already been in the public eye for a few years, and so I took care with my physical and technical security, but that evening was a turning point in my online engagement. The days of posting my every fleeting thought or photographic evidence of the mundane occurrences in my life were already long gone, but now it was time for a new level of curation and caution.
* * *
Cindy Otis is one of the many women I’ve relied on to help me weather online attacks. She’s a former CIA officer and fellow disinformation expert. Lest we forget that social media can be a positive place where friendships are formed, Cindy and I met on Twitter when we were both preparing to release our debut books. Since then, we’ve kept in touch through a steady stream of messages, celebrating our successes, lamenting days that could have gone better, and supporting each other through the worst the internet has to offer.
Just before the 2020 election, we were both called on to testify before the U.S. House of Representatives Permanent Select Committee on Intelligence, chaired by Representative Adam Schiff of California. The topic—“Misinformation, Conspiracy Theories, and ‘Infodemics’: Stopping the Spread Online”—couldn’t have been more timely or more likely to attract the criticism of the very people who spread the malign information we were discussing.
The day before the hearing, “Q,” the anonymous leader of the QAnon conspiracy cult, posted a message on 8kun about the proceedings. “Shall We show them, Anon..?” [sic] it began, before listing the names of the all-woman witness panel and closing with the phrase “Forewarned is Forearmed” and a salute to the “Q Team.” The next day, Q adherents spent the two-hour hearing criticizing our appearances, making anti-Semitic slurs, and alleging we were all CIA plants. “Do we see a pattern here?” one poster asked, including a picture of the four women witnesses. “Look at the nose on that broad,” a commenter wrote of me. Another implored, “show us your boobs!” Cindy, who is a wheelchair user and proud disability advocate, was grotesquely ridiculed. The discussion wasn’t void of violent threats, either. One user wrote
Find their feathers
Light them up with truth!
They have exposed themselves.
Attack!
This is a digital battlefield and we will not go silently.
Cindy had already locked down her Twitter account. “I didn’t need the stress of dealing with prep for [the hearing], executing that, and then coming back to disaster mentions” on Twitter, she tells me in a later conversation.1 It’s not a decision she takes lightly. “I know for a fact that that has caused me to [lose] opportunities to expand my reach and 
 increase my credibility,” she says. “When I lock down, nobody can share my content, nobody can follow me. There are those moments where you have that opportunity. I know I’m limiting my professional progress each time I scale back on social media. It’s the calculation I make each time to prioritize my physical safety, my mental health.”
As an open-source analyst and investigator who has uncovered disinformation networks that have made the pages of The Washington Post and other notable publications, Cindy is an expert on the digital breadcrumbs that can be used to target us. “Every social media user needs to make choices about how authentically themselves they’re willing to be online,” she underlines. The tidbits of our lives that make us more human—our family issues, health issues, and personal stories—“those can all be used to target you in the future, either by trolling or through attempted recruitment by intelligence services,” Cindy warns. “The calculation might be that that’s a vulnerability you’re willing to put out there, [but] you want to think carefully about the personal details you’re sharing that might put yourself in a more compromising position.”
But it’s not just the personal details that can get you in trouble; basic cyber hygiene is the foundation to any online security practice. No, it is not the most exciting part of protecting yourself online, but it is the part most connected to your physical safety. From password managers and two-factor authentication to being savvy about the seemingly innocuous tidbits you share on social media, you can build a moat around your public profile, adding an extra layer of security and peace-of-mind as you do your work and make yourself heard.

Basic Cyber Hygiene

Best practices to keep your data, profiles, and devices safe

In June 2021, Representative Mo Brooks, a Republican of Alabama, tweeted a picture of his computer monitor. What was displayed on the screen is unimportant compared to what was stuck to it: in the bottom corner, a sticky note appeared to show Rep. Brooks’s email password and a PIN number. The tweet remained online for 20 hours before it was replaced with a version with the sticky note cropped out.2
Women in the public eye do not have the luxury to be so careless, nor could we possibly expect 20 hours of safety in such a scenario. If Cindy or I had made a similar mistake around our testimonies, for example, it’s likely the QAnon cultists who dug through our online profiles would have attempted to gain access to our accounts. They wouldn’t have been successful, because we follow the basic, easy practices I’m about to outline for you that keep our personal information safe from anyone who might try to harm us.
It’s time to banish the sticky notes and scribbles at the back of your notebooks and proactively strengthen your online security.

Password managers

In today’s digital world, we all maintain hundreds of passwords that are the first line of defense for our personal information. It is tiresome to try to read a news article or make an online purchase to be prompted for your username and password and guess blindly as to what they might be until you finally scrounge around in your desk drawer for the paper scrap that might hold the answer. Worse yet, perhaps you’re in a rush, trying to buy a ticket to a popular concert, and are prompted to create a new account. Uninspired, you decide to make this password an ode to your dog. “ILoveFluffy,” you type. The pet-less among us might go for a significant other’s name, or worse yet, “password1234.” And then, of course, there are the days you don’t want to create a new password at all, and repeat your email or bank password, which you know by heart.
We’ve all been there, but this behavior needlessly exposes us to potential security breaches. If the concert ticket website is compromised, criminals now have access to the other accounts where you used the same password. This is entirely avoidable. It is extremely easy to set up a password manager, a service that will generate, store, and even input every password, username, and security question you have.
Here’s how they work: after signing up for a password manager service (I use LastPass; other services include 1Password, BitWarden, and Dashlane), you create a single password that will log you into your password manager service. This is the only password you’ll ever have to remember so long as you’re using the service. From there, most password managers offer a browser plugin and mobile app that will store all the usernames and passwords for sites and services you use. You won’t have to copy and paste them from site to site, and if you ever update your passwords, the service will log the change automatically. Most of these services will also identify weak or potentially breached passwords affected by large-scale hacks or leaks. A good password manager will also offer two-factor authentication to keep your accounts even more secure (more on this below) and ensure that if someone did crack your complex login information to your password manager, they would not be able to gain access to your account. (You should absolutely turn this on if it’s available on the service you choose.) Best of all, when you create an account on a new site the first time, these services will generate a complex password, full of letters, numbers, and symbols, fitting the requirements of every site or service you use, and you’ll never have to think of or remember one again.
Most web browsers and operating systems offer some version of a password manager (such as Apple Keychain or Google’s Password Manager). Though they are aggressive, incessantly asking “Would you like to save your password?”, convenient (pre-installed with your browser) and cost-effective (most of the best services on the market require a subscription fee of around $30 per year for full operability) they do not always offer the same features that an external service focused only on password management would.3
You may also be tempted to use single sign-on, employing your Google, Facebook, or Amazon account to log in to other websites rather than create new accounts. There are two reasons you should avoid this at all costs. First, the web titans providing those umbrella accounts are likely to harvest data about your behavior on third party services when you log in using the credentials from their site. More importantly, however, if your password for your Google, Facebook, or Amazon account were ever compromised, criminals could then access all your information on sites where you used them to log in. Yikes.
It is likely that you have been the victim of a password breach in the past...

Inhaltsverzeichnis