Martus Helping human rights advocates protect, manage, and effectively utilize information.

Slides:



Advertisements
Similar presentations
Presentation. Contemporary Communication Fast – connects us quickly without delays Reliable – works always Global – connects us with the whole world Low.
Advertisements

Social Media.
© 2009 VMware Inc. All rights reserved VMware Horizon Mobile Intro - NetHope Deepak Puri Director Mobile Business Development +1 (415)
Objectives Overview Differentiate among laptops, tablets, and servers Describe the purpose and uses of smartphones, digital cameras, portable media players,
Objectives Overview Differentiate among laptops, tablets, and servers Describe the purpose and uses of smartphones, digital cameras, portable media players,
Discovering Computers: Chapter 1
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
TC2-Computer Literacy Mr. Sencer February 4, 2010.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
Bar|Scan ® Asset Inventory System The leader in asset and inventory management.
OPC Alarm.NET.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Customized solutions. Keep It Secure Contents  Protection objectives  Endpoint and server software  Protection.
A Guide for Getting Started
A Guide to Getting Started
Introduction to HASP ® Software DRM Solutions, Products, Benefits All Rights Reserved © Aladdin Knowledge Systems.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
IMonitor Software About IMonitorSoft Since the year of 2002, coming with EAM Security Series born, IMonitor Security Company stepped into the field of.
Working with Applications Lesson 7. Objectives Administer Internet Explorer Secure Internet Explorer Configure Application Compatibility Configure Application.
P6 - CONFIGURE THE SOFTWARE. CONFIGURE SOFTWARE Most software can be configured to suit an individual user, for example by changing the appearance of.
Item Web 2.0 application relevant to teacher’s work.
Computers Mrs. Doss.
Operating Systems Concepts 1/e Ruth Watson Chapter 4 Chapter 4 Windows Utilities Ruth Watson.
Copyright © Allyn & Bacon 2008 POWER PRACTICE Chapter 8 Using the Web for Teaching and Learning START This multimedia product and its contents are protected.
Martus Helping human rights advocates protect, manage, and effectively utilize information.
TRUSTPORT PRODUCT PORTFOLIO Marcela Parolkova Sales Director.
IS 2101—FALL 2009 Chapter 6 Getting Started with Windows Vista 9/22/08 and 9/24/08 9/21/09 1 IS Fall 2009.
In addition to Word, Excel, PowerPoint, and Access, Microsoft Office® 2013 includes additional applications, including Outlook, OneNote, and Office Web.
THE EASY WAY TO STAGE ZEBRA’S ANDROID MOBILE COMPUTERS
Getting In Control Of Today’s Information Overload 50 Ways to Use Evernote in Your Real Estate Business.
A Guide to Getting Started. 2 Free social learning network for teachers, students, schools and districts Safe and easy way to connect Exchange ideas Share.
 Computer News  Wireless Printer & Scanning  Your Computer Problems  Website &  
OCR Cambridge National ICT Mr Conti 10X 25 th April 2014.
Safeguarding OECD Information Assets Frédéric CHALLAL Head, Systems Engineering Team OECD.
TECHNOLOGY GUIDE THREE Protecting Your Information Assets.
Overview of Microsoft ISA Server. Introducing ISA Server New Product—Proxy Server In 1996, Netscape had begun to sell a web proxy product, which optimized.
Pasewark & Pasewark Microsoft Office 2003: Introductory 1 INTRODUCTORY MICROSOFT OUTLOOK Lesson 1 – Outlook Basics and .
Martus: Helping human rights advocates protect, manage, and effectively utilize information.
1 OGM Presentation for Your Hospital Today. 2 The Ongoing Maintenance Program The OGM Program Components.
StageNow The easy way to stage Android mobile computers from Zebra Technologies.
WEB APPLICATIONS FOR BUSINESS Gwen Kitiwano 1 Presented by: Gwen Kitiwano.
1 Title: Introduction to Computer Instructor: I LTAF M EHDI.
Weever Apps Capabilities Overview. Over 65% of business have mobile employees.
1 Copyright © 2015 Pexus LLC Easy Download, Install & Configure Pydio on your Patriot PS Personal.
Welcome to Edmodo Professional Development Workshop American School of Guatemala Tuesday, October 23, 2012 Thank you to Mrs. Vanita Vance – College Station.
1 REMOTE CONTROL SYSTEM V7 2 Introduction.
Benefits: An Affordable Source Document / Report Digitizing & Retrieval Solution for Oklahoma Cities / Towns under 5,000 in Population! Utilize an Unlimited.
30 Apps for Librarians Sana Moulder & Bryson Kopf.
AKick Software’s Many Years of Excellence us: | Website: Toll Free:
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
ITMT Windows 7 Configuration Chapter 7 – Working with Applications.
How to Recover Data from SanDisk Memory Card ?. 2 Sources:
PGP Desktop (Client only) By: Courtney Wirtz & Vincent Verner.
SECUREAPP GENERATOR Lowering the barrier to strong, open encryption in mobile data collection Jim Fruchterman Founder/CEO, Benetech.
Collaboration & Data Collection TechnologyOctober 2014Butler Institute for Families Visionary Evaluation for a Sustainable, Equitable Future AEA Roundtable.
GroupRocket.net How to Choose Collaboration Software for Your Company Click this URL – GroupRocket.netGroupRocket.net.
Notes on Backups Presented by Dave Mawdsley, DACS Member, Linux SIG Member a look at priorities and simple backup methods.
Dial-In Number: 1 (631) Webinar ID: FHC Tech Talk Automation and Efficiency Series Talk #1 Carbonite automated backup.
DISCOVERING COMPUTERS 2018 Digital Technology, Data, and Devices
Presented by Dave Mawdsley, DACS Member, Linux SIG Member
TECHNOLOGY GUIDE THREE
The Martus Project Marc B. Levine The Benetech Initiative
Store, Share, Sync and Collaborate
Martus مساعدة الناشطين الحقوقيين لحماية المعلومات ولإدارتها ثم استخدامها بفعالية Partnership with Benetech, a non-profit organization that develops and.
Call AVG Antivirus Support | Fix Your PC
Brendan Foody, Sharon O’Malley, Ryan McGrane
Unit# 5: Internet and Worldwide Web
COMPLETE BUSINESS TEXTING SOLUTION
Technology 101 Changing the way, we work, live, play and learn.
Presentation transcript:

Martus Helping human rights advocates protect, manage, and effectively utilize information

Benetech: Technology Serving Humanity Benetech Initiatives: Global Literacy– Bookshare Environmental Conservation – Miradi Human Rights Program – Martus Benetech Labs – Social Coding for Good

Benetech Human Rights Program A nonprofit organization Martus – Secure human rights information management software Martus Outreach and Support Team: &

Information: An Advocate's Vital Asset National Police Archives, Guatemala City, Guatemala

Easy to use Affordable Easy to customize Flexibility with data sharing Backup servers for safeguarding information Ability to search and report on information A way to publicize public data on the Internet The Wish List

The Martus Human Rights Bulletin System Free Open source Secure Information management system

The Martus Workspace

Create bulletins to save information in Martus

Attach any type of file to a Martus bulletin Examples: Photos Scanned images Text files Spreadsheets

Keep some of your information completely private

Martus: Secure by Design Martus uses a well-established form of encryption also used by:  Banks  Commercial websites  Security products such as PGP  (Pretty Good Privacy:

Encryption MARTUS automatically encrypts your information and backs it up via a secure (SSL) connection over the Internet to a Martus server of your choice.

Encryption: How does it work? Example: HELLO Algorithm: rotation Key: 2 Encrypted text: JGNNQ This is a very simple example to illustrate the concept of encryption. Martus uses a much more complex algorithm of encryption that scrambles the bulletin so that it can only be read by people with the right key. Encryption protects the bulletins easily and automatically.

Encryption: What does it look like? What you see: What they see:

Backing up information in Martus Martus automatically backs up bulletins to a remote server of your choice. Martus servers operating around the world, including: o Alternatives (Vancouver, Canada) o Open Society Archives (Budapest, Hungary)

Martus over Tor

Share your information with other Martus users

Backing up to the servers Secure Martus Server People you trust Your computer

End-to-End Encryption: Cornerstone of digital secrecy Without encryption...

End-to-End Encryption: Cornerstone of digital secrecy With encryption...

Choose different configurations based on the needs of your organization

Martus is highly customizable

Why customize? Organize information in a consistent way Especially helpful if you are working with other people Make sure you have collected all of the useful pieces of information Facilitate data entry Prevent inconsistency and errors

Searching in Martus Search “Any Field” - for a full text search Search on a specific standard or custom field – to focus your search Use AND/OR search functionality - to sharpen your search. Save Search specifications - to use them again later

Create reports in Martus Select which fields and order of appearance Filter bulletins by search criteria Choose to print full bulletin information, summary counts, or both Select public bulletins, private, or both

Martus report examples

Create charts in Martus

Martus for Android Write-only Interacts with other mobile Apps Attach files Saves bulletins to server Download saved bulletins on desktop More mobility: Mobile Martus

Amnesic Wipes all traces on shutdown Incognito All internet traffic is anonymized Locked down File system is read-only Portable Install to USB stick, DVD or SD card More security: Martus on Tails

Martus Users are Worldwide

Network for Human Rights Documentation - Burma The ND-Burma network has been using Martus since 2004 to secure and share stories of human rights abuse inside Burma

Guatemalan National Police Archive Project Martus has been used to manage and encrypt information from the millions of documents in the Guatemalan National Police Archives.

Security is a Practice: Other tools OpenPGP for encryption Pidgin/Adium/Cryptocat for encrypted chat Jitsi for encrypted VOIP Tor for anonymous browsing Whole disk encryption

Welcome to the Martus Community! Thank you!