Browse wiki
Digital security for Women, Bosnia |
Category | Privacy Advocacy + , Digital Security + , Gender and Tech + |
---|---|
Detailed schedule and contents |
'''Day one'''
HouseRules and Shared Agree … '''Day one'''
HouseRules and Shared Agreements
Round what is your name and how do you feel?
SESSION 1ː
Speedgeeking:
1. go to the person that is across and share what is your superpower? (group of 2)
2. go to the person you dont know and talk about what are you passionate about (group of 3)
3. say somethingthat nobody knows about you (or u think so) – 5 minutes, 2 people(NO NEED TO REPORT BACK)
Agenda Hacking (post it)
What are your interests, in relation to:
1. Tools and Apps, 2. Problem-Challenge, 3. Issue, 4. Devices, 5. Social media or means of communications
SESSION 2 ː
My Cyber Body
Q: Your first memory of technology (write down year/your age/what was it) + when did you begin to actively use ICT and for which reasons (write down context and motivations) + could you underline if you enjoy it/your pleasure in tech, and/or if it was a forced and stressful relationship with tech?
Work in groups of 3 – share your personal stories and mark donw commonalities and differences, decide what do you want to report back to the whole group? No names, but we want to hear your story
Risk analysis exercise
Group Association of ideas around safety/security
Individual exercise: Your daily routine (10/15 mins)
Put in a paper your daily routine
> When you wake up, and the rituals you have to start the day (where are you, who are you with...)
> When you leave your home and where you go first. What do you take with you (e.g. mobile phones, handbags,...) - be sure to include that.
> Where do you go - what does the journey look like? Who else is there?
Think about where you are when you're working. Who are you working with? > What devices are you using, if any?
> Do you eat or relax during the day?
> How do you get home? Or what do you do before you go home?
> What do you do in the evenings? When do you sleep?
Now add information about the ICT/Tech in your map (10/15 mins)
> What kind of data do you produce/manage/move offline and online?
> Where is this data? (do you keep personal/professional/activist data together)?
> How sensitive is this data (from a work/activist/privacy perspective)
Does it imply personal data about others?
> Are you sharing your device (mobile/computer) or your accounts (email/social media/etc) with another person (family, partner, colleagues etc)?
> How do you deal with this data when you are traveling (to do a training/other purposes?)
> Do you have back up of those data? Have you lost sensitive data before? How did that happen? (device or online account get compromised? )
> How do you build trust in relation to your data and how you store it?
Report to the group about elements of safety and threats you realised about
SESSION 3ː
Spectogram:
1. Revolution is not possible witout feminism
2. Harasser hide behind fake names
3. Pornography harms women
Create your own statements for spectogram (3 groups of 5 plus one – 5 min)
BARBIE session - understanding how tech is engendered / From barbie computer engineer to Hello Barbie.
Pleasure and privacy: Gender Matrix meets Feminist Principles of the internet
Individual exercise: How would you translate those elements into your own reality?
SESSION 4ː
WALL OF FAME:
Celebration of the contribution of women to tech and other important area for all of us ;-)
'''DAY 2'''
9:30-9:45 Morning Circle
9:45-10:45 Feminist principles of internet
10:45-11:00 Break
11:00-13:00 How the internet works? TOR, circumvention
13:00-14:00 Lunch
14:00-15:30 Digital Hygiene: Anti virus , Back Up, Passwords
15:30-15:45 Break
15:45-17:30 Tech Bazaar
After the break, setting is different 4 tables x 4 girls will go before or after the break depending on time and participants questions
4 stations:
1st round
1. File Encryption (30 min)-Alex
2. E-mail Encryption (30 min)-Gillo
2nd Round
3. Chat Encrytion (15 min)
4. Mobile Encryption (15 min) (iphone and android: surespot/chatsecure)
17:30 - 18:00 Closing of the day
'''DAY 3'''
9:30 / 10:00 - Introduction/morning circle
10:00 / 11:30 - Session 1
Introduction to history of social networks and social media - going through basic notions of social networs and social networking platforms, terms of service (read the small print)
Understanding your digital traces and digital shadow - people will assess their digital shadow using different platforms such as my shadow
Self-doxing - what means doxing and which methodologies can help you to understand what information exists about you on the internet. Participants group in three teams and investigate three profiles which have volunteer (people from the facilitators team), they have 20 minutes to find as much information as possible, then they present to the rest of te group waht they found.
Break
Creating profiles (anonymous/pseudonymous/collective name)and strategies online. Participants team up in three groups and need to develop a campaign in a context where members of the collective want to hide their real name and still make their message ressonate on different platforms. One group will make a strategy to open a campaign in facebook and will list privacy and security dimensions they need to take into account in that specific platform. Another group does the same using a blog, the last group develop a strategy on snapchat and instagram.
They have 30 minutes to develop the strategy and present the security and privacy dimension they should take into account to remain safe.
13:30 / 14:30 - Lunch
Privacy and security settings (FB, Twitter, others by participants)
Gender-based online violence VS feminist campaigns
We share about what is online harassment, our perspectives and experiences of it and what is the current situation in bosnia. The we share about current succesful and inspiring campaigns.
17:00 Closure - Closing circle and Evaluation 00 Closure - Closing circle and Evaluation +
|
End when | 8 December 2015 + |
Existing toolkits and resources |
Ženskaposla.ba (feminist portal)
http://ze … Ženskaposla.ba (feminist portal)
http://zenskaposla.ba/
TakeBackTheTech campaing
https://www.takebackthetech.net/
Safety Road map
https://www.takebackthetech.net/know-more
GenderIt - Changing the way you see ICT (feminist reflections on interent policies
http://www.genderit.org/
ICTs for Feminist Movement Building: Activist Toolkit
https://www.apc.org/en/pubs/icts-feminist-movement-building-activist-toolkit
One World Platform
http://oneworldplatform.net/
APC - Association for Progressive Communication
https://www.apc.org/
Privacy and digital security ->
Security in a box:
https://securityinabox.org/
Me and my shadow:
https://myshadow.org/trace-my-shadow
Gender and technology Institute:
http://tacticaltech.org/genderandtechnologyinstitute
Manual for social media + safe spaces with gender perspective
ttc.io/zenmanual
Manuals for security and privacy with a gender perspective:
https://gendersec.tacticaltech.org/wiki/index.php/Manuals_with_a_gender_perspective
Public digital libraries:
https://www.memoryoftheworld.org/blog/2014/11/06/a-public-library-of-my-own/
Feminist public library:
http://feminism.memoryoftheworld.org/
Documentary Donestech, women and tech (spanish sub eng):
https://www.youtube.com/watch?time_continue=37&v=KTaxQZbcL1g
Install Calibre for viewing, organising, transforming ebooks (like the calibre feminist you have in your USB key)ː http://calibre-ebook.com/ n your USB key)ː http://calibre-ebook.com/ +
|
Feedbacks | Review of participants evaluation showed that all participants felt this training had empowered them and enable them to better understand links between gender, feminism, tech related violence, privacy and digital security. + |
Feelings |
The participants were very heterogeneous a … The participants were very heterogeneous and provide a lot of diversity and richness in the room. They bound a lot among them because in general they felt alone in relation to their interests in technology and gender-related topics. They felt they had meet new friends and were eager to stay in touch.
During the evening sessions we screen a documentary on internet meme culture and in the second day we had a small party where we play collective games. That worked very well and participants were happy to see facilitators joining them. We also provided them with an USB key with SIAB selected software and also documentation such as guides on security with a gender perspective (zen manual among others) and participants appreciate that material a lot.
Finally, we felt that the rhythm and pace of the agenda worked very well as the first day we concentrate more on the links between gender, feminism and technology enabling the participants to share about their own personal experience. On the second day we concentrate more on notions around anonymity, circumvention and encryption going then to hands on session on a selection of tools. The third day we address in-depth social media platforms as participants were all very intensive users of those and were not aware of many of their privacy and security flaws. By treating them as experts of those platforms and enabling them to pull together their own tactics, they realise that they knew a lot and could develop strategies to make their voices heard without exposing their real identity. That was felt as a very empowering moment. That was felt as a very empowering moment. +
|
For whom is it organized | Young women interested in gender social justice, feminism, privacy and digital security + |
Gender and tech tutorials used | Gender Tech Herstory Exhibition + , Gender Tech Personal Memories + , Hands On How the internet works + , Hands On Understanding the group – Spectrogram + , Holistic security - A day in your life + , Holistic Security - Demonstrating the interconnectedness + , Threat analysis - Information Mapping I + , Threat analysis - Information Mapping II + |
Geo-localization of the activity |
43° 52' 29", 18° 17' 52"Latitude: 43.874666026815 Longitude: 18.298095613718 + |
How many people trained | 17 + |
KEEP | First memories about something technological. + |
Links about the activity | Articles, videos, photos on-line, ... + |
Methodologies for training |
'''DAY 1'''
SESSION 1 - Intro/Speedgeekin … '''DAY 1'''
SESSION 1 - Intro/Speedgeeking
https://en.wikipedia.org/wiki/Speed_geeking
SESSION 2 - My cyber body
https://www.coursera.org/ (free online courses Higher Education)
SESSION 3 - Barbie
Feminist Hacker Barbie
https://computer-engineer-barbie.herokuapp.com/
Fair Use Barbie: Changing the narrative & the legality of remix
http://caseyfiesler.com/2014/11/24/fair-use-barbie/
http://www.tampabay.com/news/business/retail/privacy-advocates-try-to-keep-hello-barbie-from-hitting-shelves/2220896
What does Barbie says:
http://hellobarbiefaq.mattel.com/wp-content/uploads/2015/11/hellobarbie-lines-v2.pdf
Campaign against Hello Barbie:
http://www.commercialfreechildhood.org/action/hell-no-barbie-8-reasons-leave-hello-barbie-shelf
Hacking Hello Barbie:
http://www.theguardian.com/technology/2015/nov/26/hackers-can-hijack-wi-fi-hello-barbie-to-spy-on-your-children
Pleasure and Privacy
The online terrain for women’s rights
https://www.giswatch.org/en/report-introduction/online-terrain-women-s-rights
Gender at Work Matrix
http://www.genderatwork.org/OurWork/OurApproach/GWFramework.aspx
SESSION 4 - Wall of fame
Time to come out!: Pioneering women in history of technology
http://www.genderit.org/feminist-talk/time-come-out-pioneering-women-history-technology
From string theory to clothes wringers: A historical map of women shaping science and technology
http://www.genderit.org/resources/string-theory-clothes-wringers-historical-map-women-shaping-science-and-technology
The computers (ENIAC PROGRAMMERS PROJECT)
http://eniacprogrammers.org/
Lelacoders, interviews with women hackers (spanish, englis, catalan):
https://vimeo.com/user8966514
online group:https://n-1.cc/g/donestech+lelacoders
Animation about the HerStory in Sciences and Computer Sciences:
https://vimeo.com/107858829
'''DAY 2'''
SESSION 1 - Feminist Principle of the internetː
http://www.genderit.org/articles/feminist-principles-internet
http://www.genderit.org/sites/default/upload/fpi_v3.pdf
http://zenskaposla.ba/content/feministicki-principi-interneta (bhs prevod)
How technology issues impact women’s rights: 10 points on Section J
http://www.genderit.org/articles/how-technology-issues-impact-women-s-rights-10-points-section-j
Zašto je feminizam važan za internet
http://oneworldplatform.net/category/zenska-prava/page/2/
Why feminism matters to Internet?
http://oneworldplatform.net/en/why-feminism-matters-to-internet/
In the continuum of privacy and data
http://hvale.me/2015/01/in-the-continuum-of-privacy-and-data/
A feminist internet and its reflection on privacy, security, policy and violence against Women
https://gendersec.tacticaltech.org/wiki/index.php/A_feminist_internet_and_its_reflection_on_privacy,_security,_policy_and_violence_against_Women
2013 - Women's rights, gender and ICTs
https://www.giswatch.org/2013-womens-rights-gender-and-icts
2015 - Sexual rights and the internet
https://www.giswatch.org/2015-sexual-rights-and-internet
SESSION 2
WHAT IS NSA? https://en.wikipedia.org/wiki/National_Security_Agency
WHAT IS TOR AND WHAT IS TOR PROJECT? https://www.torproject.org/
Virtual rasicm campaign - http://www.racismovirtual.com.br/
Session 4 - Tech bazar
Antivirus sessionː
Visualiation malware: https://cybermap.kaspersky.com/
Folder and devices encryption (Veracrypt):
How to Create and Use a VeraCrypt Container:
https://veracrypt.codeplex.com/wikipage?title=Beginner%27s%20Tutorial
Hidden volumes with Veracrypt:
https://veracrypt.codeplex.com/wikipage?title=Hidden%20Volume
Protect hidden volumes from damage:
https://veracrypt.codeplex.com/wikipage?title=Protection%20of%20Hidden%20Volumes
'''DAY 3'''
https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual
https://donottrack-doc.com/en/intro/
http://digitalshadow.com/
https://myshadow.org/lost-in-small-print/
https://myshadow.org/trace-my-shadow
https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual#Self-doxing
Session Doxxing - Self doxxing
https://startpage.com/
https://duckduckgo.com/
http://www.whois-search.com/
http://yacy.net/en/index.html
Searching for information using a post or discussion:
http://omgili.com/
Searching for information using an image:
https://tineye.com
Bosnia specific
https://www.bhtelecom.ba/imenik.html
http://www.europronet.ba/imenik/index.php/imenik/fizickalica
http://www.hteronet.ba/telefonski-imenik
http://www.telemach.ba/Privatni+korisnici/980/Telefonski+imenik.shtml
http://www.mtel.ba/single-article/879
Looking for profile(s) of (a) person(s):
Check Usernames: http://checkusernames.com/
Lullar: http://com.lullar.com
Peek You: http://www.peekyou.com
Pipl:https://pipl.com/
Recorded Future: https://www.recordedfuture.com/
Social Mention: http://socialmention.com/
WebMii: http://webmii.com/
Whos Talkin: http://www.whostalkin.com/
Domain tools /Who is?
http://www.faqs.org/rfcs/rfc1834.html
http://www.faqs.org/rfcs/rfc954.html
Europe
http://www.archivesportaleurope.net/directory
http://www.wayp.com/eng/europa3.shtml tory
http://www.wayp.com/eng/europa3.shtml +
|
Motivations for organizing training |
Cyberbullying and online harassment are us … Cyberbullying and online harassment are used massively worldwide to control, manipulate, build up fear and ultimately remove girls and women and non-conforming transgender individuals from online spaces, whether we talk about gaming world or political campaigns run by female politician, the rules of unbalanced power relations between men and women in the offline world, remain and amplify in the virtual one. Sadly, but not surprisingly, Bosnia and Herzegovina is keeping up with this „trend“ too. Institutional reaction in terms of protection are slow and almost not existent. This year we intend to integrate the learning of the tools with the thinking and planning of coordinated response to attacks.
Starting from this year experience of the attacks on #takebackthetech, and of similar attack against Balkan activists and groups we intend to go one step further and while continuing to provide capacity to individuals start the conversation of new practices of concerted online solidarity and response groups, envisioning a solidarity network that can support the victim during the attack and generate reverse positive content.
One of the most efficient and successful activities that we have been conducting for past 5 years are digital security trainings for girls, women leaders and women's rights organisations in Bosnia and Herzegovina. Trainings on privacy and security online are a big eye-opener for girls and women and lead to actual changes in the way they think about their own security and how they should use technology and Internet accordingly in their daily lives, professionally and personally. aily lives, professionally and personally. +
|
START | Screening related documentaries in the evening. + |
STOP | Training to enigmail. + |
Start when | 5 December 2015 + |
Title of the activity | Digital security for Women, Bosnia + |
Topics addressed | Information Communication Technologies (ICT), Sexuality, Violence against Girls and Women, online harassment, feminisms, privacy, digital security + |
Where is located the activity | Bosnia-Herzegovina + |
Who organize it | Gender and tech organisation + |
Categories | Pages with a map rendered by the Maps extension , Activities |
Modification date This property is a special property in this wiki.
|
6 January 2016 14:22:12 + |
hide properties that link here |
No properties link to this page. |