These recordings teach how to respond to emergency dox defense situations and longterm steps for removing personal data from the internet and offer a step-by-step guide to assessing threats faced by activists, and creating a security plan tailored to those specific threats.