Two legal technology projects scheduled to be worked on at the event were:
- Description: This is a service that creates encrypted databases for “gathering testimony on human rights abuses”
- Goals: “improve the ways forms are created in Martus,” create “Responsive tutorials for Martus,” conduct “Martus User Testing,” and create “Martus Online Training and Help Documentation.”
- Personnel: Barbra Masters, Collin Sullivan.
- Code: https://code.google.com/p/martus/
- Description: this service “makes use of USSD, SMS and voice to establish a conversation with victims and witnesses of mass atrocities” and then to verify that evidence “using crowd-sourcing and ‘dumb’ mobile phones.”
- Hackpad: https://surveillance.hackpad.com/Peoples-Intelligence-qU4LrmXcNp0
- Goals: “List all possible ways to compromise the identity of the users and their data both on user’s devices, over the network and on future People’s Intelligence servers;” “list security protocols to be implemented as well as possible countermeasures for each identified attack;” “Best ways to secure data when it has reached People’s Intelligence servers”
- Personnel: Christophe Billen
If you know of other legal technology projects worked on at this event, or at the other DiscoTech events held on 1-2 March 2014, please feel free to identify them in the comments to this post.
The hackpad for the event is at: https://surveillance.hackpad.com/San-Francisco-UX-Sprint-for-Security-Privacy-Tools-knGnPs8arv4
The eventbright description of the event is at: https://www.eventbrite.com/e/ux-sprint-for-security-privacy-tools-tickets-10090154925
One Twitter hashtag for the event appears to be #DiscoTech
The event was part of MIT Media Lab’s DiscoTech series of workshops on countersurveillance technology.
The event was also part of RightsCon Silicon Valley 2014.