<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://gendersec.tacticaltech.org/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Dan</id>
		<title>Gender and Tech Resources - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://gendersec.tacticaltech.org/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Dan"/>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php/Special:Contributions/Dan"/>
		<updated>2026-04-05T14:48:14Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.26.2</generator>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Holistic_Security,_Train_Of_Trainers,_Germany&amp;diff=4598</id>
		<title>Holistic Security, Train Of Trainers, Germany</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Holistic_Security,_Train_Of_Trainers,_Germany&amp;diff=4598"/>
				<updated>2015-08-03T10:24:37Z</updated>
		
		<summary type="html">&lt;p&gt;Dan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Activities&lt;br /&gt;
|Title of the activity=Holistic Security, Training of Advanced Security Trainers (TOAST)&lt;br /&gt;
|Category=Digital Security, Gender and Tech&lt;br /&gt;
|Start when ?=2015/04/20&lt;br /&gt;
|End when ?=2015/04/24&lt;br /&gt;
|Where is located the activity ?=Berlin, Germany&lt;br /&gt;
|Geo-localization of the activity ?=52.5200066, 13.404954&lt;br /&gt;
|Who organize it=Tactical Technology Collective&lt;br /&gt;
|organisation(s) website=https://tacticaltech.org/&lt;br /&gt;
|For whom is it organized=Security Trainers, Self care Trainers, Digital Security Trainers&lt;br /&gt;
|How many people trained=26&lt;br /&gt;
|Motivations for organizing training=This was the key event for the part of the holistic security project which is focuesd on fostering best practices and community-building among security trainers. The objectives of the TOAST were as follows:&lt;br /&gt;
&lt;br /&gt;
*  Identify and build the cross-domain knowledge necessary to improve trainers' own security and well-being in the course of their work &lt;br /&gt;
*  Learn, co-create and practice new exercises, and approaches for trainers from each domain to integrate in their trainings&lt;br /&gt;
*  Identify avenues of collaboration with participants from different domains&lt;br /&gt;
*  In the context of Tactical Tech's ongoing work (with partner organisations) on holistic security resources for human rights defenders and trainers, to explore and ideally agree upon a common framework and language for security, protection and well-being of HRDs across domains.&lt;br /&gt;
*  Contribute to the fortification of a collaborative cross-domain network of trainers&lt;br /&gt;
|Topics addressed=Holistic security, well-being, risk analysis, digital security, gender, emergency response, travel security, communication security&lt;br /&gt;
|Links about the activity=Articles, videos, photos on-line, ...&lt;br /&gt;
}}&lt;br /&gt;
{{Planning and documentation&lt;br /&gt;
|Methodologies for training=participative 'unconferencing' format. &lt;br /&gt;
sub-facilitation.&lt;br /&gt;
|Existing toolkits and resources=Workbook on secuirty for human rights defenders: https://www.frontlinedefenders.org/files/workbook_eng.pdf&lt;br /&gt;
Integrated Secuirty Manual: http://integratedsecuritymanual.org&lt;br /&gt;
protection manual for human rights defenders http://protectioninternational.org/publication/new-protection-manual-for-human-rights-defenders-3rd-edition/&lt;br /&gt;
pbi mexico: programa de asesorias en seguridad y protección - guía de facilitacion: http://www.pbi-mexico.org/fileadmin/user_files/projects/mexico/images/News/Reducido_GuiaFacilitacion.pdf&lt;br /&gt;
}}&lt;br /&gt;
{{Learning outcomes&lt;br /&gt;
|Feedbacks=Extremely positive&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Dan</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Holistic_Security,_Train_Of_Trainers,_Germany&amp;diff=4597</id>
		<title>Holistic Security, Train Of Trainers, Germany</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Holistic_Security,_Train_Of_Trainers,_Germany&amp;diff=4597"/>
				<updated>2015-08-03T10:23:18Z</updated>
		
		<summary type="html">&lt;p&gt;Dan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Activities&lt;br /&gt;
|Title of the activity=Holistic Security, Training of Advanced Security Trainers (TOAST)&lt;br /&gt;
|Category=Digital Security&lt;br /&gt;
|Start when ?=2015/07/21&lt;br /&gt;
|End when ?=2015/07/24&lt;br /&gt;
|Where is located the activity ?=Berlin, Germany&lt;br /&gt;
|Geo-localization of the activity ?=Berlin, Germany&lt;br /&gt;
|Who organize it=Tactical Technology Collective&lt;br /&gt;
|organisation(s) website=https://tacticaltech.org/&lt;br /&gt;
|For whom is it organized=Security Trainers, Self care Trainers, Digital Security Trainers&lt;br /&gt;
|How many people trained=26&lt;br /&gt;
|Motivations for organizing training=This was the key event for the part of the holistic security project which is focuesd on fostering best practices and community-building among security trainers. The objectives of the TOAST were as follows:&lt;br /&gt;
&lt;br /&gt;
*  Identify and build the cross-domain knowledge necessary to improve trainers' own security and well-being in the course of their work &lt;br /&gt;
*  Learn, co-create and practice new exercises, and approaches for trainers from each domain to integrate in their trainings&lt;br /&gt;
*  Identify avenues of collaboration with participants from different domains&lt;br /&gt;
*  In the context of Tactical Tech's ongoing work (with partner organisations) on holistic security resources for human rights defenders and trainers, to explore and ideally agree upon a common framework and language for security, protection and well-being of HRDs across domains.&lt;br /&gt;
*  Contribute to the fortification of a collaborative cross-domain network of trainers&lt;br /&gt;
|Topics addressed=Holistic security, well-being, risk analysis, digital security, gender, emergency response, travel security, communication security&lt;br /&gt;
|Links about the activity=Articles, videos, photos on-line, ...&lt;br /&gt;
}}&lt;br /&gt;
{{Planning and documentation&lt;br /&gt;
|Methodologies for training=participative 'unconferencing' format. &lt;br /&gt;
sub-facilitation.&lt;br /&gt;
|Existing toolkits and resources=Workbook on secuirty for human rights defenders: https://www.frontlinedefenders.org/files/workbook_eng.pdf&lt;br /&gt;
Integrated Secuirty Manual: http://integratedsecuritymanual.org&lt;br /&gt;
protection manual for human rights defenders http://protectioninternational.org/publication/new-protection-manual-for-human-rights-defenders-3rd-edition/&lt;br /&gt;
pbi mexico: programa de asesorias en seguridad y protección - guía de facilitacion: http://www.pbi-mexico.org/fileadmin/user_files/projects/mexico/images/News/Reducido_GuiaFacilitacion.pdf&lt;br /&gt;
}}&lt;br /&gt;
{{Learning outcomes&lt;br /&gt;
|Feelings=How was it ?&lt;br /&gt;
|Feedbacks=What were the impressions ?&lt;br /&gt;
|START=What will you start doing ?&lt;br /&gt;
|STOP=What will you stop doing ?&lt;br /&gt;
|KEEP=What will you keep doing ?&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Dan</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Holistic_Security,_Train_Of_Trainers,_Germany&amp;diff=4596</id>
		<title>Holistic Security, Train Of Trainers, Germany</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Holistic_Security,_Train_Of_Trainers,_Germany&amp;diff=4596"/>
				<updated>2015-08-03T10:13:30Z</updated>
		
		<summary type="html">&lt;p&gt;Dan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Activities&lt;br /&gt;
|Title of the activity=Holistic Security, Training of Advanced Security Trainers (TOAST)&lt;br /&gt;
|Category=Digital Security&lt;br /&gt;
|Start when ?=2015/07/21&lt;br /&gt;
|End when ?=2015/07/24&lt;br /&gt;
|Where is located the activity ?=Berlin, Germany&lt;br /&gt;
|Who organize it=Tactical Technology Collective&lt;br /&gt;
|organisation(s) website=https://tacticaltech.org/&lt;br /&gt;
|For whom is it organized=Security Trainers, Self care Trainers, Digital Security Trainers&lt;br /&gt;
|How many people trained=40&lt;br /&gt;
|Topics addressed=Holistic security&lt;br /&gt;
|Links about the activity=Articles, videos, photos on-line, ...&lt;br /&gt;
}}&lt;br /&gt;
{{Planning and documentation}}&lt;br /&gt;
{{Learning outcomes&lt;br /&gt;
|Feelings=How was it ?&lt;br /&gt;
|Feedbacks=What were the impressions ?&lt;br /&gt;
|START=What will you start doing ?&lt;br /&gt;
|STOP=What will you stop doing ?&lt;br /&gt;
|KEEP=What will you keep doing ?&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Dan</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Holistic_security_-_What_is_Security%3F&amp;diff=1122</id>
		<title>Holistic security - What is Security?</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Holistic_security_-_What_is_Security%3F&amp;diff=1122"/>
				<updated>2015-05-27T09:24:29Z</updated>
		
		<summary type="html">&lt;p&gt;Dan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Tutorial&lt;br /&gt;
|Title of the tutorial=1.1 Draw Your Day &amp;amp; What is Security?&lt;br /&gt;
|Tutorial category=Discussion&lt;br /&gt;
|Duration (hours)=1.5&lt;br /&gt;
|Learning objectives=Objective: Grounding the notion of security in the day-to-day life and experience of the participants. Participants defining what security means for them. Introducing the idea of holistic security.&lt;br /&gt;
|Prerequisites=A comfortable space for participants. &lt;br /&gt;
1/2 sheet of flipchart and markers for each participant&lt;br /&gt;
Flipchart and markers for facilitator&lt;br /&gt;
|Methodology=''By: D. Ó Clunaigh (TTC), A. Ravi (FLD)''&lt;br /&gt;
&lt;br /&gt;
== Activity: Draw Your Day ==&lt;br /&gt;
&lt;br /&gt;
Participants are given a half sheet of flipchart paper each. &lt;br /&gt;
&lt;br /&gt;
Step 1 Instructions: Draw a typical, active working day for you in your activism, from when you get up in the morning until you go to sleep at night. Consider questions like:&lt;br /&gt;
&lt;br /&gt;
* When you wake up, and the rituals you have to start the day (where are you, who are you with...) &lt;br /&gt;
* When you leave your home and where you go first. What do you take with you (e.g. mobile phones, handbags,...) - be sure to include that.  &lt;br /&gt;
* Where do you go - what does the journey look like? Who else is there? &lt;br /&gt;
* Think about where you are when you're working. Who are you working with? What devices are you using, if any? &lt;br /&gt;
* Do you eat or relax during the day? &lt;br /&gt;
* How do you get home? Or what do you do before you go home? &lt;br /&gt;
* What do you do in the evenings? When do you sleep? &lt;br /&gt;
&lt;br /&gt;
Give participants approx. 15 minutes to make an initial drawing. Remind them that there is no obligation to share the drawing itself and they do not have to impress anyone. The exercise is simply a way of reflecting on existing habits and relating them to our security. &lt;br /&gt;
&lt;br /&gt;
Step 2: Allow 5-10 minutes for participants to reflect on anything which occurred to them during the process.&lt;br /&gt;
&lt;br /&gt;
== Discussion: What is Security? == &lt;br /&gt;
[Adapted from the Integrated Security Manual – www.integratedsecuritymanual.org ]&lt;br /&gt;
&lt;br /&gt;
Instructions: Taking a break from drawing for a moment, we are going to perform a quick word-association exercise. Word association can be useful, because there is often great honesty in our initial reactions to concepts. &lt;br /&gt;
&lt;br /&gt;
The facilitator will give you a word to respond to, and participants respond as quickly as possible without thinking with the other words which they associate to that. &lt;br /&gt;
&lt;br /&gt;
Give an example: 'Elephant'.&lt;br /&gt;
Give the real word: 'Security'&lt;br /&gt;
&lt;br /&gt;
Participants will respond with many different words. Write them on a flipchart to the extent possible. Give up to 10 minutes for this. &lt;br /&gt;
Optional step: some minutes into the exercise, emphasise that participants respond to what security means to them personally. You may note a major shift in the kinds of words which come up.&lt;br /&gt;
&lt;br /&gt;
Notes to share with participants: &lt;br /&gt;
This exercise tends to be unique with every group: this is because security is fundamentally a personal concept which we must define for ourselves in the context of activism which puts us at risk.&lt;br /&gt;
&lt;br /&gt;
Many of the words we associate with security will have positive connotations, while others may be associated with militarism and conflict. It is important that we reclaim its meaning for ourselves from this realm. &lt;br /&gt;
&lt;br /&gt;
== Input: Security as personal and holistic ==&lt;br /&gt;
&lt;br /&gt;
Many of the words associated to family, friends, finances, freedom, and concepts  – these relate to our most fundamental desire for well-being, which is entirely subjective. We define this for ourselves. We give our own meaning to security when our work inherently implies we take decisions which result in others posing a threat to us. Ultimately, our aim in this or any training related to security is to build on our ability to protect our well-being. Any security measures which don't fortify our well-being, are counter-productive. &lt;br /&gt;
&lt;br /&gt;
Many of the words will relate to the security of physical spaces, structures and vehicles. This is somewhat less subjective, and more scientific. This can be a very useful 'science' to learn more about – for example, how to keep our offices more secure from theft or break-ins. However, we should only build these skills to the extent they are useful to us. &lt;br /&gt;
&lt;br /&gt;
Many of the words will relate to digital and information security: digital security can be more objectively or scientifically determined , for instance, by testing information systems (and/or devices).  However, again, we should only engage with digital security tactics and tools to the extent that they are useful in our work and supportive of our well-being, which they can be: knowing our information is protected can be a great source of relaxation for us.&lt;br /&gt;
&lt;br /&gt;
== Deepening: identifying our threats and strategies ==&lt;br /&gt;
&lt;br /&gt;
Step 1: Participants return to their drawings. Look at your typical day and identify or add:&lt;br /&gt;
&lt;br /&gt;
* Where do you see danger or the potential for danger in your day. Consider your well-being and health, along with the physical spaces you're in, and the devices you're using. &lt;br /&gt;
&lt;br /&gt;
Allow 5-10 minutes for this, and 5-10 further for reflection. This may be a conversation in which participants share their vulnerabilities, so be sure not to cut them short. &lt;br /&gt;
&lt;br /&gt;
'''Remember:''' you are not here to have the answers to all problems. However, recognise openly that they are now taking an empowering step to organise and improve their security situation. &lt;br /&gt;
&lt;br /&gt;
Step 2: Participants return to their drawings. Look at your typtical day and identify or add:&lt;br /&gt;
* Where do you see strategies, plans, tools, tactics that you already use in order to stay safe and protect yourself? &lt;br /&gt;
&lt;br /&gt;
Give 10 minutes for this and allow a further 10 for reflections.&lt;br /&gt;
&lt;br /&gt;
== Synthesis ==&lt;br /&gt;
&lt;br /&gt;
* Security is personal, subjective, and we define it for ourselves.&lt;br /&gt;
* Our well-being should be the fundamental reference for security. &lt;br /&gt;
* We are already programmed and have learned many tactics and great resilience to continue in our work in spite of the challenges we face.&lt;br /&gt;
With that as our starting point, we can go forward into analysing our work from the perspective of digital, physical and psycho-social security in order to improve our situation.&lt;br /&gt;
|Number of facilitators involved=1&lt;br /&gt;
|Technical needs=Flipchart and markers&lt;br /&gt;
|Theoretical and on line resources=Integrated security manual: http://integratedsecuritymanual.org&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Dan</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Holistic_security_-_What_is_Security%3F&amp;diff=1119</id>
		<title>Holistic security - What is Security?</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Holistic_security_-_What_is_Security%3F&amp;diff=1119"/>
				<updated>2015-05-27T09:21:53Z</updated>
		
		<summary type="html">&lt;p&gt;Dan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Tutorial&lt;br /&gt;
|Title of the tutorial=1.1 Draw Your Day &amp;amp; What is Security?&lt;br /&gt;
|Tutorial category=Discussion&lt;br /&gt;
|Duration (hours)=1.5&lt;br /&gt;
|Learning objectives=Objective: Grounding the notion of security in the day-to-day life and experience of the participants. Participants defining what security means for them. Introducing the idea of holistic security.&lt;br /&gt;
|Prerequisites=A comfortable space for participants. &lt;br /&gt;
1/2 sheet of flipchart and markers for each participant&lt;br /&gt;
Flipchart and markers for facilitator&lt;br /&gt;
|Methodology=== Activity: Draw Your Day ==&lt;br /&gt;
&lt;br /&gt;
Participants are given a half sheet of flipchart paper each. &lt;br /&gt;
&lt;br /&gt;
Step 1 Instructions: Draw a typical, active working day for you in your activism, from when you get up in the morning until you go to sleep at night. Consider questions like:&lt;br /&gt;
&lt;br /&gt;
* When you wake up, and the rituals you have to start the day (where are you, who are you with...) &lt;br /&gt;
* When you leave your home and where you go first. What do you take with you (e.g. mobile phones, handbags,...) - be sure to include that.  &lt;br /&gt;
* Where do you go - what does the journey look like? Who else is there? &lt;br /&gt;
* Think about where you are when you're working. Who are you working with? What devices are you using, if any? &lt;br /&gt;
* Do you eat or relax during the day? &lt;br /&gt;
* How do you get home? Or what do you do before you go home? &lt;br /&gt;
* What do you do in the evenings? When do you sleep? &lt;br /&gt;
&lt;br /&gt;
Give participants approx. 15 minutes to make an initial drawing. Remind them that there is no obligation to share the drawing itself and they do not have to impress anyone. The exercise is simply a way of reflecting on existing habits and relating them to our security. &lt;br /&gt;
&lt;br /&gt;
Step 2: Allow 5-10 minutes for participants to reflect on anything which occurred to them during the process.&lt;br /&gt;
&lt;br /&gt;
== Discussion: What is Security? == &lt;br /&gt;
[Adapted from the Integrated Security Manual – www.integratedsecuritymanual.org ]&lt;br /&gt;
&lt;br /&gt;
Instructions: Taking a break from drawing for a moment, we are going to perform a quick word-association exercise. Word association can be useful, because there is often great honesty in our initial reactions to concepts. &lt;br /&gt;
&lt;br /&gt;
The facilitator will give you a word to respond to, and participants respond as quickly as possible without thinking with the other words which they associate to that. &lt;br /&gt;
&lt;br /&gt;
Give an example: 'Elephant'.&lt;br /&gt;
Give the real word: 'Security'&lt;br /&gt;
&lt;br /&gt;
Participants will respond with many different words. Write them on a flipchart to the extent possible. Give up to 10 minutes for this. &lt;br /&gt;
Optional step: some minutes into the exercise, emphasise that participants respond to what security means to them personally. You may note a major shift in the kinds of words which come up.&lt;br /&gt;
&lt;br /&gt;
Notes to share with participants: &lt;br /&gt;
This exercise tends to be unique with every group: this is because security is fundamentally a personal concept which we must define for ourselves in the context of activism which puts us at risk.&lt;br /&gt;
&lt;br /&gt;
Many of the words we associate with security will have positive connotations, while others may be associated with militarism and conflict. It is important that we reclaim its meaning for ourselves from this realm. &lt;br /&gt;
&lt;br /&gt;
== Input: Security as personal and holistic ==&lt;br /&gt;
&lt;br /&gt;
Many of the words associated to family, friends, finances, freedom, and concepts  – these relate to our most fundamental desire for well-being, which is entirely subjective. We define this for ourselves. We give our own meaning to security when our work inherently implies we take decisions which result in others posing a threat to us. Ultimately, our aim in this or any training related to security is to build on our ability to protect our well-being. Any security measures which don't fortify our well-being, are counter-productive. &lt;br /&gt;
&lt;br /&gt;
Many of the words will relate to the security of physical spaces, structures and vehicles. This is somewhat less subjective, and more scientific. This can be a very useful 'science' to learn more about – for example, how to keep our offices more secure from theft or break-ins. However, we should only build these skills to the extent they are useful to us. &lt;br /&gt;
&lt;br /&gt;
Many of the words will relate to digital and information security: digital security can be more objectively or scientifically determined , for instance, by testing information systems (and/or devices).  However, again, we should only engage with digital security tactics and tools to the extent that they are useful in our work and supportive of our well-being, which they can be: knowing our information is protected can be a great source of relaxation for us.&lt;br /&gt;
&lt;br /&gt;
== Deepening: identifying our threats and strategies ==&lt;br /&gt;
&lt;br /&gt;
Step 1: Participants return to their drawings. Look at your typical day and identify or add:&lt;br /&gt;
&lt;br /&gt;
* Where do you see danger or the potential for danger in your day. Consider your well-being and health, along with the physical spaces you're in, and the devices you're using. &lt;br /&gt;
&lt;br /&gt;
Allow 5-10 minutes for this, and 5-10 further for reflection. This may be a conversation in which participants share their vulnerabilities, so be sure not to cut them short. &lt;br /&gt;
&lt;br /&gt;
'''Remember:''' you are not here to have the answers to all problems. However, recognise openly that they are now taking an empowering step to organise and improve their security situation. &lt;br /&gt;
&lt;br /&gt;
Step 2: Participants return to their drawings. Look at your typtical day and identify or add:&lt;br /&gt;
* Where do you see strategies, plans, tools, tactics that you already use in order to stay safe and protect yourself? &lt;br /&gt;
&lt;br /&gt;
Give 10 minutes for this and allow a further 10 for reflections.&lt;br /&gt;
&lt;br /&gt;
== Synthesis ==&lt;br /&gt;
&lt;br /&gt;
* Security is personal, subjective, and we define it for ourselves.&lt;br /&gt;
* Our well-being should be the fundamental reference for security. &lt;br /&gt;
* We are already programmed and have learned many tactics and great resilience to continue in our work in spite of the challenges we face.&lt;br /&gt;
With that as our starting point, we can go forward into analysing our work from the perspective of digital, physical and psycho-social security in order to improve our situation.&lt;br /&gt;
|Number of facilitators involved=1&lt;br /&gt;
|Technical needs=Flipchart and markers&lt;br /&gt;
|Theoretical and on line resources=Integrated security manual: http://integratedsecuritymanual.org&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Dan</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Holistic_security_-_What_is_Security%3F&amp;diff=1118</id>
		<title>Holistic security - What is Security?</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Holistic_security_-_What_is_Security%3F&amp;diff=1118"/>
				<updated>2015-05-27T09:20:17Z</updated>
		
		<summary type="html">&lt;p&gt;Dan: Created page with &amp;quot;{{Tutorial |Title of the tutorial=1.1 Draw Your Day &amp;amp; What is Security? |Tutorial category=Discussion |Duration (hours)=1.5 |Learning objectives=Objective: Grounding the notio...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Tutorial&lt;br /&gt;
|Title of the tutorial=1.1 Draw Your Day &amp;amp; What is Security?&lt;br /&gt;
|Tutorial category=Discussion&lt;br /&gt;
|Duration (hours)=1.5&lt;br /&gt;
|Learning objectives=Objective: Grounding the notion of security in the day-to-day life and experience of the participants. Participants defining what security means for them. Introducing the idea of holistic security.&lt;br /&gt;
|Prerequisites=A comfortable space for participants. &lt;br /&gt;
1/2 sheet of flipchart and markers for each participant&lt;br /&gt;
Flipchart and markers for facilitator&lt;br /&gt;
|Methodology=== Activity: Draw Your Day ==&lt;br /&gt;
Participants are given a half sheet of flipchart paper each. &lt;br /&gt;
&lt;br /&gt;
Step 1 Instructions: Draw a typical, active working day for you in your activism, from when you get up in the morning until you go to sleep at night. Consider questions like:&lt;br /&gt;
&lt;br /&gt;
* When you wake up, and the rituals you have to start the day (where are you, who are you with...) &lt;br /&gt;
* When you leave your home and where you go first. What do you take with you (e.g. mobile phones, handbags,...) - be sure to include that.  &lt;br /&gt;
* Where do you go - what does the journey look like? Who else is there? &lt;br /&gt;
* Think about where you are when you're working. Who are you working with? What devices are you using, if any? &lt;br /&gt;
* Do you eat or relax during the day? &lt;br /&gt;
* How do you get home? Or what do you do before you go home? &lt;br /&gt;
* What do you do in the evenings? When do you sleep? &lt;br /&gt;
&lt;br /&gt;
Give participants approx. 15 minutes to make an initial drawing. Remind them that there is no obligation to share the drawing itself and they do not have to impress anyone. The exercise is simply a way of reflecting on existing habits and relating them to our security. &lt;br /&gt;
&lt;br /&gt;
Step 2: Allow 5-10 minutes for participants to reflect on anything which occurred to them during the process.&lt;br /&gt;
&lt;br /&gt;
== Discussion: What is Security? == &lt;br /&gt;
[Adapted from the Integrated Security Manual – www.integratedsecuritymanual.org ]&lt;br /&gt;
&lt;br /&gt;
Instructions: Taking a break from drawing for a moment, we are going to perform a quick word-association exercise. Word association can be useful, because there is often great honesty in our initial reactions to concepts. &lt;br /&gt;
&lt;br /&gt;
The facilitator will give you a word to respond to, and participants respond as quickly as possible without thinking with the other words which they associate to that. &lt;br /&gt;
&lt;br /&gt;
Give an example: 'Elephant'.&lt;br /&gt;
Give the real word: 'Security'&lt;br /&gt;
&lt;br /&gt;
Participants will respond with many different words. Write them on a flipchart to the extent possible. Give up to 10 minutes for this. &lt;br /&gt;
Optional step: some minutes into the exercise, emphasise that participants respond to what security means to them personally. You may note a major shift in the kinds of words which come up.&lt;br /&gt;
&lt;br /&gt;
Notes to share with participants: &lt;br /&gt;
This exercise tends to be unique with every group: this is because security is fundamentally a personal concept which we must define for ourselves in the context of activism which puts us at risk.&lt;br /&gt;
&lt;br /&gt;
Many of the words we associate with security will have positive connotations, while others may be associated with militarism and conflict. It is important that we reclaim its meaning for ourselves from this realm. &lt;br /&gt;
== &lt;br /&gt;
Input: Security as personal and holistic ==&lt;br /&gt;
&lt;br /&gt;
Many of the words associated to family, friends, finances, freedom, and concepts  – these relate to our most fundamental desire for well-being, which is entirely subjective. We define this for ourselves. We give our own meaning to security when our work inherently implies we take decisions which result in others posing a threat to us. Ultimately, our aim in this or any training related to security is to build on our ability to protect our well-being. Any security measures which don't fortify our well-being, are counter-productive. &lt;br /&gt;
&lt;br /&gt;
Many of the words will relate to the security of physical spaces, structures and vehicles. This is somewhat less subjective, and more scientific. This can be a very useful 'science' to learn more about – for example, how to keep our offices more secure from theft or break-ins. However, we should only build these skills to the extent they are useful to us. &lt;br /&gt;
&lt;br /&gt;
Many of the words will relate to digital and information security: digital security can be more objectively or scientifically determined , for instance, by testing information systems (and/or devices).  However, again, we should only engage with digital security tactics and tools to the extent that they are useful in our work and supportive of our well-being, which they can be: knowing our information is protected can be a great source of relaxation for us.&lt;br /&gt;
&lt;br /&gt;
== &lt;br /&gt;
Deepening: identifying our threats and strategies ==&lt;br /&gt;
Step 1: Participants return to their drawings. Look at your typical day and identify or add:&lt;br /&gt;
&lt;br /&gt;
* Where do you see danger or the potential for danger in your day. Consider your well-being and health, along with the physical spaces you're in, and the devices you're using. &lt;br /&gt;
&lt;br /&gt;
Allow 5-10 minutes for this, and 5-10 further for reflection. This may be a conversation in which participants share their vulnerabilities, so be sure not to cut them short. &lt;br /&gt;
&lt;br /&gt;
'''Remember:''' you are not here to have the answers to all problems. However, recognise openly that they are now taking an empowering step to organise and improve their security situation. &lt;br /&gt;
&lt;br /&gt;
Step 2: Participants return to their drawings. Look at your typtical day and identify or add:&lt;br /&gt;
* Where do you see strategies, plans, tools, tactics that you already use in order to stay safe and protect yourself? &lt;br /&gt;
&lt;br /&gt;
Give 10 minutes for this and allow a further 10 for reflections.&lt;br /&gt;
== &lt;br /&gt;
Synthesis ==&lt;br /&gt;
&lt;br /&gt;
* Security is personal, subjective, and we define it for ourselves.&lt;br /&gt;
* Our well-being should be the fundamental reference for security. &lt;br /&gt;
* We are already programmed and have learned many tactics and great resilience to continue in our work in spite of the challenges we face.&lt;br /&gt;
With that as our starting point, we can go forward into analysing our work from the perspective of digital, physical and psycho-social security in order to improve our situation.&lt;br /&gt;
|Number of facilitators involved=1 +&lt;br /&gt;
|Technical needs=Flipchart and markers&lt;br /&gt;
|Theoretical and on line resources=Integrated security manual: http://integratedsecuritymanual.org&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Dan</name></author>	</entry>

	</feed>