Manuals with a gender perspective

From Gender and Tech Resources

This HowTo is still largely Work In Progress.

A list of manuals about privacy and digital security from a gender perspective

Manuals produced by collectives/organisations

  • Association for Progressive Communications - 'Take back the tech'

Linkː https://www.takebackthetech.net/

Licenseː Copyleft

Languageː English, French, Spanish

Take Back The Tech is a global campaign that connects the issue of violence against women and information and communications technology (ICT). It aims to raise awareness on the way violence against women is occurring on ICT platforms such as the Internet and mobile phones, and to call for people to use ICT in activism to end violence against women. It was initiated by the Association for Progressive Communications, Women's Networking Support Programme, in 2006. Since then, the campaign has been taken up and organised by individuals, collectives and non-governmental organizations in at least 24 countries. The platform includes various manuals and howtos such asː

- The "know more section" which list specific information regarding types of Violence Against Women such as Black mail, cyberstalking and hate speech.

- In 2015 they have released with Just Associates (JASS) Southern Africa and Women's Net the following manualː ICTs for Feminist Movement Building: Activist Toolkit

How do we tell our own stories and make ourselves heard? How do we tell stories that empower and inspire, and challenge mainstream stories that tend to silence, erase women’s lives, experiences and voices? How do we communicate with each other and with people beyond our movements? What is the best way to develop messages that reach out to people and make our movements bigger? What tools make the most sense for our context and capacity? How can we communicate safely and securely in a world that has become increasingly risky for activists and women’s rights activists online and offline?

  • Akelarre Ciberfeminista - Kit de autodefensa ciberfeminista #uno'

Linkː https://akelarreciberfeminista.noblogs.org/category/kits/

https://ia801504.us.archive.org/28/items/kit-de-autodefensa-ciberfeminista-uno/kit-de-autodefensa-ciberfeminista-uno.pdf

https://ia801502.us.archive.org/2/items/santoral_digital/santoral_digital.pdf

Licenseː Creative Commons Reconocimiento-CompartirIgual 4.0 Internacional

Languageː Spanish

Este fanzine se cocina durante los encuentros, físicos y virtuales, del #AkelarreCiberfeminista. Surge de una propuesta presentada por Virginia Díez y Lyann Quartas para la convocatoria de “Narrativas digitales en tiempo real” de Medialab-prado. Dicha convocatoria se enmarca en el proyecto de investigación sobre stream y procesos creativos con software y tecnologías libres, que coordina Julián Pérez. #Akelarreciberfeminista (que se colectiviza a través de una convocatoria pública más para formar un grupo de investigación diverso) se trata de empoderarnos y diseñar juntxs un kit de autodefensa feminista en la red. Durante casi tres meses, hemos analizado el activismo digital, con sus nuevas narrativas y performatividades, desde una perspectiva de género y con el objetivo de realizar una guía de seguridad digital feminista.

  • Akelarre Subversiva - Taller de seguridad digital feminista Mis dispositivos, mis cuentas, mis reglas

Linkː https://aquelarresubversiva.net/theme/pdf/taller-manual-aquelarre.pdf

Licenseː Creative Commons Reconocimiento-CompartirIgual - No Comercial

Languageː Spanish

Manual de seguridad desarrollado por Imilla Hacker para el Encuentro Aquelarre Subversiva, Espacio Autónomo Feminista Autogestionado de Bolivia

  • Chayn.org - 'Do It Yourself Online Safety'

Linkː http://chayn.co/safety/

Licenseː Creative Commons Attribution 4.0 license

Languageː English, Arabic, Spanish, French, Farsi, Pashto, Urdu and Russian.

CHAYN is an open-source project that leverages technology to empower women against violence and oppression so they can live happier and healthier lives. Running solely on the passion of skilled volunteers, Chayn leverages technology to address the problems women face today. They are also a pro bono service to charities who work with vulnerable women. Written in simple language, the guide will teach you everything you need to know about how you can be tracked – and how to hide your tracks on email, browsers, facebook and other platforms. This guide can be useful irrespective of your gender, location or situation.

- How to build your own domestic violence case without a lawyer is based on their experience from working with survivors of domestic abuse and their realisation that women can often not have access to legal aid/help because they are either very depressed, it’s too difficult for them to think their way around the legal jargon, they cannot physically approach a lawyer and increasingly, there is no legal aid or counsel is too expensive. Irrespective of whether someone wants to take legal action (criminal, divorce, child custody or asylum) – collecting and presenting evidence is critical.

  • Ciberfeministas Guatemala'

Linkː http://www.ciberfeministas.or.gt/fanzines-libres/ (March 2018: website is down)

Licenseː Copyleft

Languageː Spanish

Hicimos unas pequeñas publicaciones, fanzines, revistitas o folletitos, como quieran llamarlos, para compartir entre todas. Compartimos acá los PDF, para imprimir en hoja oficio, y los editables en .svg para que puedas adaptarlos. Encontraran fanzines acerca de la Privacidad, Violencia machista en línea, Ciberactivismo feminista, Empoderamiento de las mujeres a través de las TIC, Acoso callejero.

  • Ciberfeminismos-Ciberbrujeria - 'GUÍA BÁSICA DE AUTODEFENSA DIGITAL PARA CELULARES'

Linkː https://archive.org/details/guiaautodefensatelefonos

Licenseː Copyleft

Languageː Spanish

Editado para el 32° ENCUENTRO NACIONAL DE MUJERES, TRANS TRAVAS Y LESBIANAS en CHACO, 2017. Nuestros teléfonos no solo son ventanas abiertas en nuestras vidas, sinotambién en las vidas de nuestrxs amigxs, familias, compas...y cualquiera d e nuestrxs contactos. Quizás se piense que no hay nada para ocultar pero no podemos asegurar lo mismo por todxs los contactos con lxs que interactuamos por vía telefónica. Proteger la información de nuestro teléfono es también proteger a nuestrxs amigxs. Cuando hacemos una llamada telefónica o enviamos mensajes, se registran al menos la ubicación geográfica de quien llama y quien contesta, sus números de teléfono, la hora y duración de la comunicación y los números de serie de los dispositivos utilizados. De igual manera pueden ser capturados los datos de nuestras comunicaciones por medio de alguna aplicación del smartphone. En un mismo aparato se vinculan los datos del número telefónico, correo, contactos, actividad en redes sociales, SMS, fotografías, archivos, datos de GPS y a veces la sincronización con otros dispositivos.

  • Coding Rights - Send nudes'

Linkː http://www.codingrights.org/send-nudes/

Licenseː Creative Commons Attribution-ShareAlike 3.0 Unported (CC BY-SA 3.0)

Languageː Brasilian, English

Digital security can also be fun. By apropriation of the meme “send nudes!”, this small project has the goal to spread the word about digital security for the average user, who relies on digital media for their communication, but are not necessarily tuned with the specifics of digital security debate. Also discussing post-porn aesthetics and strategies for combating gender inequalities in the web, it was thought to be more appealing to women and sexual minorities, since they are more easily exposed to online haressment, by practices such as revenge “porn”, doxxing, cyberbulling, etc.

  • Coding Rights - Chupadados

Linkː https://chupadados.codingrights.org/

Licenseː Creative Commons Attribution-ShareAlike 3.0 Unported (CC BY-SA 3.0)

Languageː Brasilian, Spanish

Estos dispositivos son bonitos, gentiles, nos hacen compañía y nos hacen sentir atractivos y amparados. Nos apasionamos por ellos y depositamos en ellos toda nuestra confianza, desde los gestos más cotidianos hasta los secretos más íntimos. Ellos son nuestros objetos de deseo y sueños de consumo. Hasta el día en que nos damos cuenta de que controlan lo que hacemos, monitorean con quiénes nos encontramos y comparten nuestra intimidad con gente que no tiene nada que ver con eso. A partir de conceptos como "Big Data", "Smart Cities" e "Internet de las Cosas", creemos que la abundancia de datos, sumada a la alta capacidad de procesamiento de las computadoras con algoritmos inteligentes, facilitan y proporcionan más eficiencia a las ventas, la economía, el combate al crimen, la movilidad, la protección del medio ambiente, la garantía de la seguridad, de la salud y muchos de los problemas que enfrentamos globalmente. Pero ¿cómo funcionan estas tecnologías y al servicio de qué intereses trabajan? Vean por ejemplo la seccion sobre Cuerpos y su analisis de aplicaciones para control menstrual, aplicaciones deportivas, aplicaciones de salud, dildos, termómetros y colectores menstruales conectados a internet. Gracias a esos dispositivos hoy podemos convertir enfermedades, sexualidades, calorías y sangre menstrual en información, números y valor. El Chupadatos interpreta esas informaciones como mejor le parece. Con su mente oscura, te impone patrones normativos sobre tu peso, tu salud y tu vida sexual, e incluso comparte tu información íntima por ahí. Molesto, ¿no?

  • Consorcio para el Diálogo Parlamentario y la Equidad Oaxaca A.C. - 'Lineamientos para la construcción de planes integrales de protección con enfoque feminista'

Linkː https://gendersec.tacticaltech.org/wiki/images/5/5a/MANUAL_web.pdf

Licenseː Está permitido compartir, copiar y redistribuir los contenidos siempre que se cite la fuente y sea sin fines de lucro.

Languageː Spanish

En el marco de la Campaña de los 16 días de Activismo contra la Violencia de Género, Consorcio Oaxaca presentó el Folleto “Lineamientos para la Construcción de Planes Integrales de Protección con Enfoque Feminista”. Frente al grado de falta de acción por parte del Gobierno para garantizar la labor, la vida y la seguridad de defensoras, defensores y periodistas, resulta necesario dicho instrumento.

  • Crash Override network - 'Various'

Linkː http://crashoverridenetwork.tumblr.com/post/114270394687/so-youve-been-doxed-a-guide-to-best-practices

Licenseː Not specified

Languageː English

This anti-online hate task force, staffed by former targets, provides resources, outreach, and support to combat mob hatred and harassment. They have drafted a manual for everyone, including those curious about doxing and those who have already been targeted, the following is a primer on the realities, pathology, and personal solutions for this particularly nasty form of online harassment.

Preventing Doxing: “Doxing” is a common first-stage tactic of mobs abusers looking to intimidate their targets and start digging up information on their life. Learn some tricks to help prevent it here. Link: http://www.crashoverridenetwork.com/preventingdoxing.html

Guide: Talking to Family and Police: We’ve assembled a few basic tips that we’ve found help the less tech-savvy people in our lives understand the very real toll of internet harassment, as well as some basic tips to get on the same page with the people in your life and law enforcement, in the event that you unfortunately need it. Link: http://www.crashoverridenetwork.com/familyandpolice.html

So You’ve Been Doxed: A Guide to Best Practices: A primer on the realities, pathology, and personal solutions for this particularly nasty form of online harassment. Link: http://www.crashoverridenetwork.com/soyouvebeendoxed.html

  • Cyborg Feministas - Recursos'

Linkː https://cyborgfeminista.tedic.org/inicio/recursos/

Licenseː Creative Commons Reconocimiento-CompartirIgual 4.0 Internacional

Languageː Spanish

Recursos para descargar e imprimir: Cyborg Feminismo por Adriana Peralta; Sexting por Regi Rivas; Iconos de super mujeres por Florencia Aguirre.

  • Digital Rights Foundation - 'The art of digital security for pakistani women'

Linkː https://digitalrightsfoundation.pk/wp-content/uploads/2017/11/Hamara-Internet-Guidebook-English-Version-2016.pdf

Licenseː Creative Commons Attribution-ShareAlike (CC BY·SA) license.

Languageː English, Urdu

This guidebook has been specially made for Pakistani women and is available in Urdu and English.

  • Donestech.net - 'Redes Sociales en perspectiva de género: Guía para conocer y contrarrestar las violencias de género on-line'

Linkː https://donestech.net/files/redessociales.pdf

Licenseː Creative Commons Attribution - Share Alike - No Commercial

Languageː Spanish

Dentro de ese entramado de redes sociales que se despliegan en nuestras vidas conectadas y fuera de Internet operan una multitud de posibilidades que se entrelazan fuertemente. Por todo ello, es cada vez más importante entender dónde y cómo nos movemos por los espacios conectados, para poder saber cómo operar e influenciar cambios positivos, así como para poder cuidar y cuidarnos entre nosotras para contrarrestar y sobrepasar estas violencias, agresiones y vulnerabilidades que pueden amplificar, complementar o, incluso, cambiar las que ya se experimentan en la vida física. Por todo ello esta publicación incluye, en una primera parte, la presentación de algunas de las características de las redes sociales en general y de las plataformas de redes sociales on-line. Lo abordamos de forma crítica y con perspectiva de género, así como relacionamos internet, las identidades, la privacidad y la seguridad con el género. Seguidamente nos adentramos en las violencias de género y, específicamente, las violencias de género on-line. Partimos de un análisis del panorama de datos cuantitativos y cualitativos existentes para, en la medida de lo posible, visibilizar qué está pasando si nos preguntamos sobre este tipo de violencias. Después, en una segunda parte, exponemos en detalle las violencias de género on-line, así como las posibilidades de hacerles frente. En este sentido, identificamos y definimos un conjunto de violencias de género que están ocurriendo en las redes sociales on-line y presentamos, a la vez, pistas, recomendaciones e iniciativas para profundizar en ellas y lograr autodefendernos, así como contrarrestarlas.

Esta publicación pues, está pensada para que pueda utilizarse también como guía y manual para entender mejor cuales son los componentes de género que atraviesan las redes sociales on-line. Sin embargo, y sobre todo, buscamos contribuir a que desde una posición más informada, crítica y feminista se puedan detectar y conocer las violencias de género on-line y,en la medida de lo posible y en un futuro próximo, se puedan sobrepasar. Por ello, esta publicación puede resultar muy útil a las mujeres, especialmente a las mujeres vocales, feministas y disidentes sexuales y de género, que de forma creciente se ven afectadas por las violencias de género on-line. Además, por el idioma utilizado, las autorías, voces y miradas, así como la mayoría de datos y referencias utilizadas, esta guía resulta especialmente interesante para las mujeres latinas e iberoamericanas.

  • Donestech.net - 'Various'

Linkː http://donestech.net/

Licenseː Creative Commons Attribution - Share Alike - No Commercial

Languageː Spanish, Catalan, English

- Comic Lela: A comic for kids and grown ups available in spanish, catalan, english about free software and free culture (https://www.donestech.net/comic-lela)

- Kit de formacion Genero, Tic y Activismoː A compilation of articles in Spanish about how to link gender, activism and a tactical use of ICT (https://donestech.net/files/kit_cast_5.pdf)

- Guia didàctica per a la formació en perspectiva de gènere i interculturalitat: A toolkit in catalan for telecentres about how to provide trainings to ICT that take into account gender and cultural diversityː (http://www.donestech.net/ca/guia_didactica)

Donestech.net is a cyberfeminist activist research and action collective that investigates the specificities of the relations of women in/with ICT, enhance access of women to technology, creates networks and incorporate/experiment technologies in their research processes and in their technoactivist practices. Comic Lela wants to be a teaching resource, artistic, media and awareness to promote sustainable and radical use of technologies by women.

  • Feminist Frequency - Countering Online Harassment Safety and Support Guide'

Linkː https://onlinesafety.feministfrequency.com/

Licenseː ?

Languageː English, Spanish, Arabic

This guide contains things we’ve learned about how to keep yourself safe from individuals, loosely organized groups & cybermobs online.

  • FemTechNet - 'Center for solutions to online violence'

Linkː http://femtechnet.org/csov/

Licenseː Not specified

Languageː English

The Center for Solutions to Online Violence is both a digital resource space, hosted in perpetuity by FemTechNet, and a community of people working to address the ever-evolving risks faced by women and feminists online. Going forward, the project will be co-facilitated by T.L. Cowan and Moya Bailey, who have been essential to the work this year. They, in turn, are supported by a committee of volunteers and the broader FemTechNet network. In the coming year, CSOV will continue to connect survivors of online violence to resources and communities who can help. It will also continue the hard work of making visible the violences that women of color, queer and trans-creators, and other marginalized communities experience – too often at the hands of those who purport to want to help. Trust is partially about understanding the risks that others face and demonstrating that you are willing to address those risks before doing any additional work. This is the foundation of the Center for Solutions to Online Violence

  • Fundacion Karisma'

Linkː https://karisma.org.co/?wpdmdl=7174

Licenseː Licencia Creative Commons Reconocimiento-Compartir Igual 4.0.

Languageː Spanish

Seguridad, privacidad y proteccion en Twitter, una guia para personas sobrevivientes de acoso y abuso. Esta publicación está basada en Safety, Privacy on Twitter. A guide for survivors of harassment and abuse, elaborada por la National Network to End Domestic Violence (NNEDV) con el apoyo de Twitter. La traducción y adaptación para América Latina ha sido posible gracias al apoyo de Twitter.

  • Marialab, Blogueiras Negras, Universidade Livre Feminista e Cfemea GUIA PRÁTICA DE ESTRATÉGIAS E TÁTICAS PARA A SEGURANÇA DIGITAL FEMINISTA

Linkːhttp://feminismo.org.br/guia/guia-pratica-seguranca-cfemea.pdf

Licenseː Licencia Creative Commons Reconocimiento-Compartir Igual 4.0.

Languageː Português

Esta  Guia  Prática  de  Estratégias  e  Táticas  para  a  Segurança  Digital  Feminista  tem  o  objetivo  de proporcionar  às  mulheres  maior  autonomia  e  segurança  na  internet,  apresentando  estratégias  e táticas de defesa digital para feministas. Os conteúdos são dirigidos para o público de mulheres da América Latina e foram elaborados considerando diferentes mulheres: negras, trans, lésbicas, ativistas/militantes de movimentos organizados de mulheres ou que atuam individualmente na rede, sendo de periferias urbanas, rurais, com distintos níveis de acesso à tecnologia nas suas abordagens

  • HACK*BLOSSOM - `DIY Cybersecurity for Domestic Violence: A resource of privacy + compassion'

Linkː https://hackblossom.org/domestic-violence/

Licenseː CC BY-NC-SA

Languageː English

Why Cybersecurity? Domestic violence isn't always physical. Many intimate partners exert control using the technologies we rely on everyday. Being intimidated by constant phone-calls, stalked by location-sharing apps, humiliated on social media, forced to share sensitive texts and passwords: each of these experiences is a violation of privacy that affects your freedom to make decisions about your life. Being deprived of your autonomy is no less painful when it's digital. DIY Cybersecurity asserts your privacy online. When you're threatened by your partner, you can always reach out to a domestic violence professional. But whenever you need to protect yourself online, you're not alone. Our Threat Scenarios explore, in-depth, how to resist a controlling partner. Each guide is accessible and empathetic: you're not obliged to follow any of our suggestions if you don't feel they're right for you. We also have Defense Strategies for proactively securing your digital life. There's a quick exit button in the sidebar in case you need to suddenly leave the site. If you want to make sure there's no history of your visit, please read our guide on Private Web Browsing.

  • HACK*BLOSSOM - `A DIY Guide to Feminist Cybersecurity'

Linkː https://hackblossom.org/cybersecurity/

Licenseː CC BY-NC-SA

Languageː English, Spanish, German

You have a right to exist safely in digital spaces. Although we have to rely on outside parties for technology to access these spaces, there are tons of helpful tools and strategies that allow you to take greater control of your digital life and mitigate the risk of malicious threats. We’ll walk through common areas of digital life such as web browsing, private data, and smartphones to show you different ways that you can implement as much or little security as you’re comfortable with. You have power to set boundaries and protections in your digital spaces as you see fit: we hope that this guide will help you to make informed, personal decisions on what is right for you.

  • Hacking with care'

Linkː http://hackingwithcare.in/ http://hackingwithcare.in/wiki/doku.php/start#welcome_to_hacking_with_care_wiki http://hackingwithcare.in/by/ressources/

Licenseː CC Attribution-Noncommercial-Share Alike 3.0 Unported

Languageː English

Hacking With Care is collective composed of hackers-activists, caregivers, artists, sociologist, growing quite literally by contact and affinity. Together we imagine, circulate, put in common resources and tools for care in accordance with hackers ethics and peer-to-peer philosophy. We create occasions for body & soul rejuvenation and collective (re)appropriation of care. We work with an understanding of the needs and requirements of specific contexts, as can be found in hacking and activism. Similarly, we like to transmit to caregivers some hackers-activists tools and best practices, for example in relation to privacy/data protection, technological independence, operational security. Other aspects we like are creativity in care, access to knowledge, interdisciplinarity, questioning of norms…

Our actions evolve around two principal axis that could be (but not limited to): Care for hackers-activists and Hackers ethics and tools for caregivers. They include care corners at hackers-activists events, pop-up massage sessions at the quarters of activists organizations, massage and well-being workshops and tutorials, compilation of resources and creation of original resources, research, news watch….

  • Hollaback - Tehcnical safety guides and Social Media Safety Guides'

Linkː https://iheartmob.org/resources

Licenseː Copright

Languageː English

  • Technical Safety Guide: Chances are, you’ve either been harassed online or you might be in the future. We partnered with Take Back the Tech! to design a guide that will walk you through the immediate steps you need to take to feel safe and give you the information you need to make informed decisions.
  • Social Media Safety Guides: We have worked hard alongside each of these platforms to make the process of understanding online safety a priority. Every guide gives user friendly information on how to best use reporting and privacy tools on each platform, and for the very first time all of this information is located in one location!
  • Self-Care Guide: Experiencing online harassment can be overwhelming. You may feel a whole host of (totally valid) emotions. You could even be experiencing physical symptoms such as a pounding heart, nausea, or difficulty sleeping. You might simply feel numb. In these situations, it’s really important to take time out to take care of yourself.
  • Online Harassment: A Comparative Policy Analysis [pdf]: This November 2016 report from DLA Piper offers a comparative analysis on law and policy addressing online harassment in Canada, the UK, the US, and Australia.
  • Know Your Rights: Trying to understand what your rights are on the internet and when they’ve been crossed is tricky. This guide offers US-based readers insight into the federal laws that are meant to protect us; others vary from state to state. It also details several avenues for response.
  • How to Spot Fake News and Recognize Harassment: Brought to you by HeartMob, this resource in comic-form explains how fake news is used to harass and silence – and how to tell whether news is legit.
  • Supportive Organizations: This is a list of organizations with resources for people experiencing online harassment.
  • Internet Democracy Project - Gendering surveillance'

Linkː https://genderingsurveillance.internetdemocracy.in/

Licenseː Creative Commons BY 4.0 (unless otherwise specified).

Languageː English

The Gendering surveillance project aims at showing how the digital age may have further deepened the scrutiny to which women are subjected, women have always been under stringent surveillance - by actors ranging from partners and parents to the state. And this has shaped, and harmed, women’s lives in multiple ways. What can be learned about surveillance from gendering it, then? And what do these insights imply for the fight for stronger human rights protections in the face of surveillance more broadly? See for instance their review and analysis of safety apps, phone bans, or the use of CCTV in garment factories.

  • Institute for War and Peace Reporting- 'Cyber women'

Linkː https://cyber-women.com/en/

Licenseː Creative Commons BY - SA- NC

Languageː English, Spanish, Arabic

Cyberwomen is a digital security curriculum with a holistic and gender perspective, aimed at offering in-person learning experiences to women human right defenders and journalists work in high-risk environments. The guide is geared towards both professional trainers and persons who want to learn how to train others on their digital protection, and include gender considerations as they do so. It is made up of training modules, interactive games, recommendations for evaluating the training, as well as audio-visual and graphic materials as instructional aids. There are some recommendations about which modules to use for different learning levels, time and contexts. You can browse the guide online or download the full version from the site. The creation of CyberWomen was a collaborative process between many devoted people and partner organizations.

  • Institute for War and Peace Reporting- 'Hacks de vida'

Linkː https://archive.org/details/DocumentoHacksdeVida_201803

Licenseː CC BY-ND, Atribución-SinDerivadas Estrella Soria y Luisa Ortiz Pérez

Languageː Spanish

Hacks de vida: Entrevistas con mujeres que ayudan a otras mujeres a enfrentarse a las violencias de género

Este documento es el resultado de más de 20 entrevistas con mujeres que ayudan a otras mujeres a enfrentarse a las violencias de género en línea con valentía, ingenio y esperanza. Contiene consejos, ideas, reflexiones para entender mejor la forma de ayudar y enfrentar la violencia juntxs. Además cuenta con una revisión de la bibliografía más reciente sobre del tema en la región y un poster con consejos prácticos para personas que dan apoyo tecnológico a lxs que enfrentan violencias de género en línea. Con mucho gusto, orgullo y agradecimiento les informamos que está disponible en línea la primera edición de Hacks de Vida: https://archive.org/details/DocumentoHacksdeVida_201803 Los stickers y posters están en archive si los necesitan o los quieren replicar: https://archive.org/details/@hacks_de_vida

  • Mozzila Foundation - 'Teaching Kit: Combatting Cyber Violence Against Women and Girls'

Linkː https://d157rqmxrxj6ey.cloudfront.net/amira/33977/

Licenseː Creative Commons By Share Alike

Languageː English

In this three-part series learners focus on understanding the impact of cyber violence against women and girls, creating safer places online, knowing how to address bullying or attacks when they happen, and participating in online communities in a supportive manner. Activities will take young women and girls from understanding online violence to actively advocating against it. This module was created for women and girls in emerging countries where internet adoption for women is at the utmost highest, along with a concern for security and harassment, but can be adapted for audiences everywhere.

  • Small Media - Jensat: Graphic Novel Illustrates Cybersecurity, Gender, and Sexuality in Contemporary Iran'

Linkː https://jensiat.io/ https://thecreatorsproject.vice.com/blog/iranian-graphic-novel-cybersecurity-gender-sexuality

Licenseː CC Attribution-NonCommercial 2.5 Generic

Languageː Farsi

Jensiat is a newly launched online graphic novel addressing cybersecurity, gender, and sexuality in contemporary Iran. The site, designed and developed by UK-based Small Media, is the combined effort of a team of journalists, writers, and artists seeking to bring light to these issues through a story any young Iranian can relate to.

  • Social TIC/Ciberseguras - 'Violencia contra las mujeres y tecnología: Estrategias de respuesta'

Linkː https://socialtic.org/blog/violencia-contra-las-mujeres-y-tecnologia-estrategias-de-respuesta/

Licenseː CC BY SA NC

Languageː Spanish

Compartimos un compilado de tácticas para el combate de la violencia relacionada con la tecnología. Este compilado incluye varias formas en las que mujeres han respondido ante diferentes tipos de agresiones, varias de estas respuesta cuentan con notas y ejemplos. Al compartirlo, buscamos que más mujeres que enfrentan este tipo de violencia puedan usarlo para trazar una estrategia de respuesta y también que quienes acompañamos a mujeres en estas situaciones encontremos una herramienta útil de consulta.

  • Tactical technology collective - 'My Shadow Curricula + Materials'

Linkː https://myshadow.org/train + https://myshadow.org/materials

Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)

Languageː English (and Spanish coming soon)

Session outlines for trainers. WORKSHOP outlines can be used to run longer, structured sessions; these often pull in multiple activities. Stand-alone ACTIVITIES can be used to illustrate a single issue.

  • Tactical technology collective - 'Zen and the art of making tech work for you'

Linkː https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual/es

Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)

Languageː English and Spanish

Tactical Technology Collective (in the framework of its one year project “Securing Online and Offline Freedoms for Women: Expression, Privacy and Digital Inclusion”) has released in September 2015 a manual tackling some privacy and security issues from a gender perspective. It is the result of a collaborative effort that has involved our growing community of women and trans* activists, human rights defenders and technologists. The manual was created in response to our community’s requests for ideas and guidance on topics they needed, but couldn’t find elsewhere and has been written and reviewed by over 20 women coming from 19 different countries. The current content focuses on two overlapping issues: First, how can we craft appropriate online presences (or a series of them) that strengthen our ability to communicate and work online safely?; Secondly, how can we collaboratively create safe online and offline spaces that enable our communities to share, collaborate, and communicate safely?

The manual grew out of the 2014 Gender and Technology Institute, organised by Tactical Technology Collective and the Association for Progressive Communications (APC). Until next January 2016, we hope to achieve a better understanding of the readers audience, their background and needs and also to gather through this extended community more feed back about the manual in order to get a better grasp of the dimensions that are missing and which are the other tools, processes, readings and cases studies that should be added. We hope to have it translated, edited and printed in 2016.

  • Tactical technology collective - Digital Security tools and tactics for the LGBTI community in the Middle East and North Africa

Linkː https://securityinabox.org/en/lgbti-mena

Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)

Languageː English

̟̇̇̇̇̇̇̇̇̆̈Digital Security tools and tactics for the LGBTI community in the Middle East and North Africa was designed and written in collaboration with LGBTI human rights defenders from the region. The guide serves as a contextualised introduction to the Security in-a-Box toolkit for human rights defenders, produced by Tactical Technology Collective and Front Line Defenders, expanding on its content to include important information, tools and tips particularly relevant to the LGBTI community in this region region, as identified by members of the community in workshops carried out in 2012.

  • Tactical technology collective - Women's Rights Campaigning Info-activism Toolkit

Linkː https://womensrights.informationactivism.org/

Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)

Languageː English, Hindi, Arabic and Swahili.

The Women's Rights Campaigning: Info-Activism Toolkit is a guide for women's rights activists, advocates, NGOs and community-based organisations who want to use technology tools and practices in their campaigning.

  • Tecnicas Rudas - 'Digital Security Assessment for Human Rights Organizations: A guide for facilitators'

Linkː https://gendersec.tacticaltech.org/wiki/index.php/Digital_Security_Assessment_for_Human_Rights_Organizations:_A_guide_for_facilitators

https://gendersec.tacticaltech.org/wiki/index.php/Diagnósticos_en_seguridad_digital_para_organizaciones_defensoras_de_derechos_humanos_y_del_territorio:_un_manual_para_facilitadores

Licenseː CC BY SA NC

Languageː English, Spanish

This guide is directed primarily at the digital security training community, but may also prove useful for an organization that chooses to initiate a digital security process on its own. The activities and structure proposed herein can and should be adapted to the specific circumstances and needs of the organization. The guide can also be a useful reference for facilitators throughout the implementation of the diagnostic. The methodology can also be applied to individual assessments with minimal adjustments.

  • The Engine room - 'DATNAV: NEW GUIDE TO NAVIGATE AND INTEGRATE DIGITAL DATA IN HUMAN RIGHTS RESEARCH'

Linkː https://www.theengineroom.org/datnav-digital-data-in-human-rights-research/

Licenseː Commons Attribution-ShareAlike 4.0 International

Languageː English, Spanish, Arabic

Launching DatNav: a guide designed to help you navigate and integrate digital data into your human rights research. DatNav is the result of a collaboration between Amnesty International, Benetech, and The Engine Room which began in late 2015 culminating in an intense four day writing sprint facilitated by Chris Michael and Collaborations for Change in May 2016. Security relates to physical safety, health, finances, discrimination, privacy, etc. Security threats vary from person to person and group to group. For some their religion or sexual orientation may pose the greatest safety risk. Understanding these concerns from the perspective of everyone involved in your work is the first step in fostering a productive and safe environment.

  • Trollbusters - 'Digital Hygiene Course'

Linkː https://yoursosteam.wordpress.com/digital-hygiene-course/

Licenseː ?

Languageː English

Prevent online harassment before it starts. Each lesson takes 5-10 minutes to complete. Start now by keeping harassment from migrating offline.

  • Web we wantː Recipes for a Digital Revolution

Linkː http://www.scribd.com/doc/283942238/Recipes-for-a-Digital-Revolution

Licenseː Copyright

Languageː English

10 delicious recipes for digital rights activism from Latin America that will make you want to stir up your own ideas and serve them to your friends.

  • Women Human Rights Defenders International Coalition (WHRD IC)ː Gendering Documentation : A Manual for and about Women Human Rights Defenders

Linkː http://www.defendingwomen-defendingrights.org/wp-content/uploads/2015/12/WHRD-IC-Gendering-Documentation-Manual-1.pdf

Licenseː Creative Commons BY (Creative Commons Attribution 4.0 International Licence)

Languageː English

Gendering Documentation: A Manual For and About Women Human Rights Defenders goes beyond traditional human rights documentation guides to provide a unique tool for capturing the specific nature of contexts facing, advocacy of and violations against WHRDs. It explores abuses related to gender, their gendered consequences, the many purposes of documenting WHRDs’ lives, various forms of WHRD advocacy with documentation, and steps to take to create documentation processes and products that are both gender-sensitive and gender-responsive.

  • Women's Media Center - 'Speech project'

Linkː http://wmcspeechproject.com/online-abuse-101/

Licenseː Copyright

Languageː English

The WMC Speech Project is dedicated to raising public and media awareness about online harassment. The past several years have seen an increase in news, as well as a growing understanding that online harassment is a social, civil rights and workplace issue. However, many people, and institutions, think of harassment as “bullying,” instead of its much more complex and dynamic reality. While online abuse can and does happen to anyone, the focus of this project is on the ways in which women’s rights and expression are affected by intersectional harassment related to their gender, class, race, sexuality and more.

Manuals produced by individuals

  • How to Survive the Internet: Strategies for Staying Safer Online by Yael Grauer'

Linkː https://yaelwrites.com/wp-content/uploads/2014/11/saferonline.pdf

Licenseː ?

Languageː English

Being subjected to threats, unwanted contact, compromised accounts, hacked websites, or having sensitive information shared online is an awful experience. In the midst of this, it can be confusing to know how to react and which steps to take to protect yourself. You’re likely to get conflicting advice on whether to take incidents seriously or ignore them, and trying to get up to speed on online security strategies with limited technical knowledge can make an already stressful situation more overwhelming. It’s not always obvious who’s responsible for ongoing harassment or how many people are involved, and trying to address a threat with limited information can be difficult. Please remember that you are not alone. If you were, this guide wouldn't be here. You will get through this.

  • Necesito Privacidad para la autonomia de mi deseo by Lucía Egaña y Julieta Rodríguez (Platohedro)'

Linkː http://lucysombra.org/TXT/Fanzine_necesito_privacidad.pdf https://archive.org/details/FanzineNecesitoPrivacidad

Licenseː CC Attribution-Noncommercial-Share Alike 3.0

Languageː Spanish

Nos planteamos pensar la seguridad feminista de forma expandida hacia diversas áreas de nuestra vida aprendiendo herramientas concretas para fortalecer la seguridad y privacidad digital. A través de estas herramientas y sus funcionalidades buscamos pensar en las vulnerabilidades cotidianas y cómo éstas se comportan atravesadas por el género.

  • Smart Girl's Guide to Privacy by Violet Blue'

Linkː https://www.nostarch.com/smartgirlsguide

You can download chapter 2ː But this is just my phoneǃ (https://www.nostarch.com/download/Smart%20Girls%20Guide%20to%20Privacy_Chapter2.pdf)

Licenseː Copyright

Languageː English

In The Smart Girl’s Guide to Privacy, award-winning author and investigative journalist Violet Blue shows you how women are targeted online and how to keep yourself safe. Blue’s practical, user-friendly advice will teach you how to: Delete personal content from websites; Use website and browser privacy controls effectively; Recover from and prevent identity theft; Figure out where the law protects you—and where it doesn’t; Set up safe online profiles; Remove yourself from people-finder websites.

  • Twenty ways to help someone who's being bullied online..... by Laurie Penny'

Linkː https://www.patreon.com/posts/12240673

Licenseː Copyright

Languageː English

Online abuse is real, and it sucks, and facing it down has nothing to do with 'strength.' If someone you know is experiencing online harassment, it can be very hard to know what to do or say. Here's a working list of suggestions for how to behave and how not to behave, based on extensive personal experience - mine and other people's. Mainly it boils down to everyone being a bit bloody braver. I hope this helps. 

  • So, you’re getting harassed on the Internet. What do you do now? by Deanna Zandt'

Linkː https://medium.com/@deanna/so-you-re-getting-harassed-on-the-internet-what-do-you-do-now-c30207cae0c

Licenseː Copyright

Languageː English

The past year or so has seen an incredible intense ramp-up around online harassment and abuse. It’s as if everyone who ever had a sadistic digital thought ever looked at the #gamergate mess and said, “Yeah! That’s what I want to do!” Many people feel helpless in the face of such attacks. But there ARE things you can do, right now, to protect yourself. Read on.

  • Programas de radio El Desarmador por Imilla hacker'

Linkː https://archive.org/details/@imilla_hacker&tab=uploads and http://www.eldesarmador.org/

You can download chapter 2ː But this is just my phoneǃ (https://www.nostarch.com/download/Smart%20Girls%20Guide%20to%20Privacy_Chapter2.pdf)

Licenseː Creative Commons Attribution-NonCommercial 4.0 International

Languageː Spanish

El Desarmador es una iniciativa de La Imilla Hacker (https://imillahacker.sdf.org). Imilla es la voz quechua/aymara que quiere decir niña o mujer joven. Somos un colectivo enfocado en la producción de contenidos alternativos sobre tecnopolítica y sociedad; con la intención de abrir las puertas al análisis de varios temas como la privacidad, el anonimato, la vigilancia, la gobernanza de internet, la violencia en línea contra las mujeres, y la apropiación de la infraestructura de las telecomunicaciones.

Before producing a manual

Before producing a new manual some questions we should askː

  • Don't reinvent the wheelǃ Are you duplicating upstream work?
  • If a similar manual is already available Who's behind it? Is it a long-term project or a one shot one? Can you continue or complement their work?
  • Who's the public and what are the objectives ? What are their security & technical levels? What are their comprehension about feminism?
  • Who will produce/develop it and for whom (generational gap, geographical location, socio-demographic dimension)?
  • Will your manual will be more about tools and how to configure those, or will it be more about threat modelling and/or behavioural processes?
  • Under which license will you distribute it and which rights will you grant third parties (access, use, copy, remix, etc)?
  • Credits your reviewers and experts that have provided you with feed back!!
  • How will you maintain it? This encompass questions about frequency of updates needs depending of the tools and processes you will detail, and about processes you will run to engage your community in updating contents with you.
  • How will you get feedback and peer review from readers? Will you be able to include all the feed back? (Some criteria will deal with correctness, completeness, up to date). Remember to always indicate the last date the manual has been updated/released.
  • How will you achieve or not translation & translatability of your manual? Which type of platforms will you use for achieving the translation? Will you achieve also cultural translation for instance?
  • Accessible for disable people
  • Will you provide further support to the readers such as a contact mail or a hotline?
  • How will you ensure that your contents are ethical, inclusive and trans-queer-feminist "approved"?
  • How will we monitor the impact of our self learning resources/Impact Assessment methodologies?
  • How the distribution will be done? What is the target public?
  • Think about potential partnerships (researchers, academia, volunteer translators etc)