Special

Search by property

This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.

Search by property

A list of all pages that have property "Detailed schedule and contents" with value "The four day training included multiple sessions based on three themes:". Since there have been only a few results, also nearby values are displayed.

Showing below up to 19 results starting with #1.

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)


    

List of results

  • AWID, Mediactivismo, nuevas narrativas feministas, Brasil  + (Nuevas narrativas feministas latinoamericanas en internet Seguridad digital Redes sociales y uso crítico y feminista)
  • SEGUNDO CAMPAMENTO FEMINISTA PARA MUJERES JÓVENES, Oaxaca, Mexico  + (Objetivo: Generar un proceso de formación,
    Objetivo: Generar un proceso de formación, autoconocimiento, acercamiento al feminismo y deconstrucción de ideas patriarcales a través de la aproximación y reflexión de conceptos, prácticas y expresiones del movimiento feminista. Dirigido a: un grupo de mujeres jóvenes entre 14 y 19 años de edad, radicadas en la ciudad de Oaxaca de Juárez, Valles Centrales y Mixteca de Oaxaca, que tienen un potencial liderazgo en sus comunidades. Temas: Género y feminismo Deconstruyendo el amor romántico Autonomía corporal y autocuidado: deconstruyendo estereotipos de belleza Derechos sexuales y reproductivos Violencias machistas: en el espacio público y la web Sororidad Actividades: Presentación Acuerdos de convivencia y expectativas Cine debate Mesas de diálogo Taller de elaboración de jabones terapéuticos para nuestro autocuidado Juegos grupales sobre acoso sexual callejero y ciberviolencias Sesión de básicos de autodefensa feminista Taller de pintura de espejos de Santa Ana Zegach
    de pintura de espejos de Santa Ana Zegach)
  • Workshop, Architectures of online harassment, Berlin  + (On January 3, Caroline Sinders and I condu
    On January 3, Caroline Sinders and I conducted a workshop at Tactical Tech about applying design-thinking approaches to understanding and addressing online and offline harassment. I write about the results of this workshop in two parts, the first, this one, dealing with the framing of online harassment in the context of speech, and why this needs to be reconsidered. The second documents how we applied a design-thinking approach to understanding how online and offline harassment occurs.
    how online and offline harassment occurs.)
  • Panel Including Gender - Re-publica conference, Berlin  + (Online hate speech, harassment, stalking a
    Online hate speech, harassment, stalking and death threats are trapping too many vocal women and LGTBI persons into a contradictory situation where in one hand, as Internet is crucial for their work, in order to coordinate actions or enable a wider reach out, they are also increasingly expose to surveillance and/or punitive actions. All those factors have driven to a situation where Internet is not a safe space and where it is common to see feminist and activist work being deleted, (self)censored, and actively prevented of being seen, heard or read. Logically, those trends diminish the freedom of expression and privacy rights of the people targeted. Tackling those dangers has become higher in the agenda of many feminist and LGTBI organizations and networks and has driven to an active panorama of initiatives, collective strategies and new approaches to privacy and digital security including a gender and cultural diversity perspective. Building upon past events such as the TransHackFeminist convergence, Autonomy (im)possible, Darmstadt delegation, the Feminist Server Summit, Ministry of hacking and the Gender and technology Institute, our invited participants will discuss from a cyberfeminist perspective what is happening online and how we can reclaim and reshape a feminist internet.
    n reclaim and reshape a feminist internet.)
  • Formacion Seguridad Digital, El Salvador  + (PRIMER DIA 8:00-8:15 Saludo y bienvenida
    PRIMER DIA 8:00-8:15 Saludo y bienvenida 8:15-9:00 Dinámica de presentación 9:00-9:30 Lluvia de ideas 9:30-10:30 Buen uso de datos móviles, riesgos virtuales 10:30-11:30 Uso de redes sociales (Facebook, wasap) 11:30-12:00 Instagram, twiter 12:00-1:00 almuerzo 1:00-1:30 Uso de TAILS 1:30-2:00 Uso de TOR 2:00-2:30 Dinámica de ambientación 2:30-3:30 Trabajo grupal 3:30-4:00 plenaria SEGUNDO DIA 8:00-8:15 Saludo y bienvenida 8:15-9:00 Dinámica de ambientación 9:00-9:30 retroalimentacion 9:30-10:30 Imágenes que sostienen las formas de violencia y estereotipos patriarcales 10:30-11:30 Trabajo individual 11:30-12:00 Uso seguro de telefonía celular y aplicaciones: conceptos básicos, desmitificación de dicha tecnología, a asegurar sus dispositivos móviles y configurar sus opciones para aumentar la protección de sus datos, navegar la red de manera segura desde sus móviles. 12:00-1:00 almuerzo 1:00-1:30 Presentación” Herramientas, procesos y metodologías analógicas y digitales para almacenar o editar información por parte de diferentes personas partes de una misma colectiva/organizacion/comunidad.” 1:30-2:00 Dinámica de ambientación 2:00-2:45 Panel de experiencias personales 2:45-3:30 Trabajo grupal “ Emociones y adiciones cuando accedemos a plataformas y medios sociales (discutir contextos, imaginarios y realidades de las mujeres en el uso y diseño de campañas en redes sociales, Quien la crea, quien las patenta,” 3:30-4:00 plenaria TERCER DIA 8:00-8:15 Saludo y bienvenida 8:15-9:9.45 Ritual de inicio dinámica de los desapegos 9:45-10:15 Lluvia de ideas 10:15-11:15 Exposición “imágenes y contenidos de los imaginarios que tenemos las mujeres, amor romántico, estereotipos patriarcales, trabajo del cuidado” 11:15-12:00 exposición “impactos tiene el uso de plataformas sociales en el cuerpo de las mujeres jóvenes, emociones, cuerpo cansados, roles impuestos, trabajo del cuidado reforzado en las plataformas sociales.” 12:00-1:00 almuerzo 1:00-1:30 Trabajo grupal 1:30-2:00 plenaria 2:00-2:45 Construcción de estrategias colectivas 2:30-4:00 Dinámica de concentración, armonización Consideramos que esta información puede ser como referencia no solo para este tipo de actividades si no para otras como es la seguridad holística, y violencia así como uso y meno de mecanismo de seguridad para las mujeres cuando las mismas acceden a plataformas virtuales.
    as mismas acceden a plataformas virtuales.)
  • Conference Global Tech Women Voices, Internet  + (Panel participants: Servane Mouazan, The
    Panel participants: Servane Mouazan, The Womanity Foundation Ann Demarle, Champlain College Emergent Media Centre Nancy Glass, Johns Hopkins School of Nursing Alex Hache, Tactical Tech Collective Hera Hussain, Chayn Jac Sm Kee, Association for Progressive Communications
    Association for Progressive Communications)
  • Violencias Conectadas, Nicaragua  + (Para hacer visible cómo opera la violencia
    Para hacer visible cómo opera la violencia en la era digital, EnRedadas, tecnología para la igualdad, en el marco de la conmemoración del 25 de Noviembre y los 16 Días de Activismo Contra la Violencia Hacia las Mujeres, lanza la campaña ViolenciasConectadas, de donde se desprende esta exposición. La exposición pone la mirada en la violencia que se genera con la emergencia de los nuevos medios, donde se expresan las viejas violencias. Está compuesta por 16 testimonios, que mujeres nicaragüenses, de diversas edades, contextos y situaciones, compartieron de manera anónima; con el objetivo de denunciar y alertar. Esta exposición cuenta con el apoyo del Fondo Centroamericano de Mujeres y se desarrolla en coordinación con Time Travellers, Galería Códice, El Faro, Mama Yamna y Mará Mará.
    a Códice, El Faro, Mama Yamna y Mará Mará.)
  • Reunión Introductoria a la Protección Integral y Digital para Defensoras del Territorio, Ecuador  + (Presentación Ritual de inicio Enfoque de p
    Presentación Ritual de inicio Enfoque de protección integral Impactos de la defensora en nuestros cuerpos y nuestras relaciones Prácticas de auto-cuidado y bienestar Segunda parte (2 horas y medias) ¿Con quiénes nos comunicamos? ¿Cómo nos comunicamos? ¿Qué comunicamos? ¿Cómo funciona la telefonía celular? Experiencias de telefonía celular autónoma Aplicaciones de comunicación segura Preguntas y comentarios
    omunicación segura Preguntas y comentarios)
  • Workshop, Manuals with a gender perspective, IFF, Valencia  + (Presentation and introduction should not t
    Presentation and introduction should not take more than 25 mins: Coordinators of the session introduce the objectives of the session, agenda and how we will work (methodological steps) + Quick round of introduction people in the room: Mapping knowledge and experiences in the room with production of guides (need to think about a good dynamic to do that) In order to make the most of the session, we will work in 4 or 5 small groups (between 4 or 5 persons) around different exercise and/or common guideline and will then share all together – 45 mins
    and will then share all together – 45 mins)
  • AWID, Coming Back to Tech, Brazil  + (Presentation of the research idea, presentation of the objectives of the session and break out groups, break out groups and feedback to the general group.)
  • Digital security workshop - Les Degommeuses  + (Program : * Issues about Security, Privacy
    Program : * Issues about Security, Privacy, Anonymity * Mapping activities and risks * Draw your tech day * Ask yourself good questions * Secure your devices and data * What is Internet ? * How the data are circulating in the network * Reduce your digital shadow * Use emails in a safer way * Preserve your anonymity, circumvent censorship * Social network, safe space, online identities * Téléphone mobile / intelligent * Specific questions * Good practices, a synthesis * Identifying good resources
    , a synthesis * Identifying good resources)
  • Asesoria, Seguridad interna, Chile  + (Realicé una asesoría a una radio y a su re
    Realicé una asesoría a una radio y a su red de reporteras a nivel nacional en torno a seguridad digital, esto en el mes de noviembre en la cual realizamos la actualización de claves y sistemas, unificación de criterios y nuevos protocolos de seguridad basados en las contingencias nacionales y relacionadas al actuar de otras colectivas. En ambas actividades se abordó tanto seguridad a nivel de navegadores y celulares.
    uridad a nivel de navegadores y celulares.)
  • Europarlament, Digitale Revolution Feminist, Brussels  + (Sichtbarkeit von Frauen* Unumstritten ist
    Sichtbarkeit von Frauen* Unumstritten ist, dass die digitale Revolution neue Möglichkeiten geschaffen hat am gesellschaftlichen Diskurs teilzunehmen – und das gerade für diejenigen, die nicht in den Mainstream Medien vertreten sind. IMG_0879 Gleichzeitig muss der Zugang für Frauen*, das Internet mit gestalten zu können, erleichtert werden. Deshalb braucht es finanzielle Förderungen von Frauen, die im digitalen Sektor tätig sind oder tätig sein wollen, und die deutliche Erhöhung des Frauen*anteils im bisher männlich dominierten ICT Sektor. Um die Sichtbarkeit von Frauen* zu fördern, fordern wir, dass sich in ganz alltäglichen Praktiken strikte Regeln etablieren, ein Beispiel wäre: kein(e) Frau(en)* im Panel, kein Panel. Feministische Netzwerke stärken Für alle Teilnehmer*innen stand fest: Es braucht gemeinsame Plattformen und Netzwerke. Um sich zu vernetzen und zu unterstützen, um Erfahrungen auszutauschen, neuen Input zu bekommen und gemeinsame Ideen weiterzuentwickeln. IMG_0831 Misogynie wird im Internet in erschreckenden Dimensionen praktiziert. Dem dürfen wir keinen Raum geben. Put the shame where it belongs! Cyber Harassment, Revenge Porn und viele andere Tools von Anti-Feminists müssen enttarnt werden: Als abscheuliche Formen von Gewalt gegen Frauen*. Darauf müssen wir politische Antworten entwickeln. Sexistische Kommentare und Kampagnen haben in einer emanzipierten Gesellschaft keinen Platz. Aber wir müssen auch strukturelle Diskriminierungen in der Gesellschaft bekämpfen und für die Rechte von Frauen einstehen. Ein freies, inklusives und gleichberechtigtes Internet braucht eine freie, inklusive und gleichberechtigte Gesellschaft. Den Initiativbericht von Terry, den sie für den FEMM Ausschuss verfasst hat, könnt ihr hier lesen.
    schuss verfasst hat, könnt ihr hier lesen.)
  • Panel Gender and Surveillance, Circumvention Tech Festival, Spain  + (Some of the cases and initiatives presented during the panelː http://policespiesoutoflives.org.uk/ http://www.theguardian.com/uk/undercover-police-and-policing)
  • TransHackFeminist Convergence 2, Mexico  + (Sábado 25 Julio 2015 10:00 AM – 12:00
    Sábado 25 Julio 2015 10:00 AM – 12:00 PM *Asamblea inicial THF* 12:00 PM – 03:00 PM *Preparación de alimentos y comida* 03:00 PM – 06:00 PM *Autodefensa Hackfeminista y Cuidados Colectivos Digitales* 06:00 PM – 08:00 PM *AUTOEDITORAS: Hacemos Femzines* 08:15 PM – 11:00 PM *Fiesta de bienvenida* Domingo 26 Julio 2015 09:30 AM – 10:30 AM *Desayuno* 10:30 AM – 01:30 PM *Autodefensa Hackfeminista y Cuidados Colectivos Digitales* 01:30 PM – 03:00 PM *Comida* 03:00 PM – 05:00 PM *Autodefensa Hackfeminista y Cuidados Colectivos Digitales* 05:00 PM – 7:00 PM *Acompañamiento seguro a interrupción de embarazo* Lunes 27 Julio 2015 08:00 AM – 10:00 AM *Clase Lucha libre* 09:30 AM – 10:30 AM *Desayuno* 11:00 AM – 02:00 PM *Edición de audio con Ardour* 01:30 PM – 03:00 PM *Comida* 03:00 PM – 05:00 PM *Danza Butoh* 05:00 PM – 6:00 PM *Presentación de la Red de Radios Comunitarias y Software Libre* 06:00 PM – 08:00 PM *Armando campañas en red 1 Interviniendo youtube* Martes 28 Julio 2015 08:00 AM – 10:00 AM *Clase Lucha libre* 09:30 AM – 10:30 AM *Desayuno* 10:45 AM – 01:30 PM *Mesa Los otros trabajos* 01:30 PM – 03:00 PM *Comida* 05:00 PM – 08:00 PM *Armando campañas en red 2. Redes sociales* Miércoles 29 Julio 2015 08:00 AM – 10:00 AM *Clase Lucha libre* 09:30 AM – 10:30 AM *Desayuno* 10:30 AM – 01:30 PM *Mesa ecofeminismo* 01:30 PM – 03:00 PM *Comida* 05:00 PM – 07:00 PM *Mesa: Autodefensa ciudadana* 07:00 PM – 9:00 PM *Performance Vociferación* Jueves 30 Julio 2015 08:00 AM – 10:00 AM *Clase Lucha libre* 09:30 AM – 10:30 AM *Desayuno* 10:30 AM – 01:30 PM *Haciendo cápsulas de radio con audacity* 10:30 AM – 01:30 PM *Autodefensa antipatriarcal entre mujeres* 01:30 PM – 03:00 PM *Comida* 05:00 PM – 06:30 PM *Charla Crypto Wars* 06:30 PM – 09:00 PM *Taller Autodefensa digital* Viernes 31 Julio 2015 08:00 AM – 10:00 AM *Clase Lucha libre* 09:30 AM – 10:30 AM *Desayuno* 10:30 AM – 01:30 PM *Autodefensa antipatriarcal entre mujeres* 01:30 PM – 03:00 PM *Comida* 03:00 PM – 08:00 PM *Taller autodefensa digital* 08:00 PM – 09:45 PM *Asamblea de cierre*
    08:00 PM – 09:45 PM *Asamblea de cierre*)
  • Talk Online Misoginy, Pakistan  + (The Last Word bookshop and Digital Rights
    The Last Word bookshop and Digital Rights Foundation recently collaborated on a discussion session held at the Last Word in Lahore, Pakistan, to help develop an understanding – and increase awareness of – the dangers of unchecked online harassment. The session, “A Call To Action: Online Misogyny in Pakistan, and How to Combat it”, was announced in response to a disturbing rise in online misogyny and gender-based cyber-harassment. According to Pakistan's Federal Investigation Agency, 3,027 cases of cybercrime were reported in the the period between August 2014 and August 2015, with 45% of the cases being related to cyber-harassment on social media against women. Aysha Raja, owner of the Last Word, compering the event. On her right are Nabiha Meher Shaikh and Susan Benesch The recent misogyny and hyper-jingoism on display last week (http://www.dawn.com/news/1203410) highlighted how important it is to tackle misogyny, and to examine the behaviours that give rise to it. The alarming frequency with which online harassment (which often bleeds out into real world “offline” harassment, or worse) has led to much needed public discourse – not just on recognising that the danger is real, but also to come up with proactive solutions to counter such behaviour. There are signs of understanding – the DRF/Last Word session, for example, saw a good turnout, with many men not only in attendance, but also contributing to the discussion in a mostly positive manner. Susan Benesch of The Berkman Center for Internet and Society, at Harvard University, and founder of the Dangerous Speech Project, “to find ways of diminishing inflammatory speech – and its capacity to inspire violence - while protecting freedom of expression.” http://www.voicesthatpoison.org/ https://twitter.com/dangerousspeech Nabiha Meher Sheikh, Co-founder of Pakistan Feminist Watch, and an instructor in Critical Thinking https://twitter.com/pakfemwatch http://pakistanfeministwatch.blogspot.com/ Jahanzaib Haque, Chief Digital Strategist and Editor at Dawn.com https://twitter.com/jhaque_ https://www.dawn.com Nighat Dad, Executive Director of Digital Rights Foundation https://twitter.com/nighatdad http://digitalrightsfoundation.pk/ Links We have collected the live-tweets of the session in Storify, for those unable to attend. The link can be found here. http://www.dawn.com/news/1205235 Dawn's coverage of the session.
    ws/1205235 Dawn's coverage of the session.)
  • Seguridad digial para defensores de derechos humanos en contextos mineros 2  + (The conversation started with an expositio
    The conversation started with an exposition about our data and the Internet, analyzing the infrastructure of the Internet and examples of ho companies use information of their users, as well as the techno-political context. During the conversation we talked on the importance of starting a digital security process within the organization that includes a critical vision of the necessities and adopted on the conditions in which the organization works.
    onditions in which the organization works.)
  • Conversation, Coffee Chat at ARROW HQ Malaysia  + (The feedback focused on the following topi
    The feedback focused on the following topics: - How the internet works - we re-enacted the flow of sending emails, how the messages can be intercepted at the respective points and the need to encrypt our emails (especially in relation to sensitive messages). - From that session, we introduced some practical actions (& solutions) towards digital security - email encryption; KeyPass; using Signal & Tor browsers; exploring mobile safety apps etc. - We concluded with the sharing of the 8-day Data Detox Kit and encouraged staff to undertake the data detox
    couraged staff to undertake the data detox)
  • Gender and Technology Institute Asia  + (The four day training included multiple se
    The four day training included multiple sessions based on three themes: Holistic Security, Politics of Data and Gender and Tech. Sessions included: Feminist Principles of the Internet, How the internet works, risk assessment and Online Gender Based violence to name a few.
    nline Gender Based violence to name a few.)
 (The four day training included multiple sessions based on three themes:)
  • Womanity award, Oui Share Festival, Paris, France  + (The four finalist pairs of organisations t
    The four finalist pairs of organisations that will compete for this award in May are: TAKE BACK THE TECH! Innovation Partner finalist: Association for Progressive Communications (South Africa) Scale-Up Partner finalist: La Sandia Digital (Mexico) and their project Luchadoras Take Back the Tech! is a campaign to counter and build awareness of the problem of online and other tech-related violence against women. Since inception in 2006, it has supported local campaigns in over 30 countries. In 2011 TBTT! adapted the free Ushahidi software, enabling victims to report instances of online VAW, and build a global map of personal testimonies to help women’s rights organisations use evidence-based data to find solutions and speak out on the topic. The Award would enable the Partners to produce internet TV programmes to increase awareness of the campaign (particularly in Spanish-speaking South America), use online and traditional media to communicate tools and strategies for dealing with tech-related VAW, and build a network of feminist activists and media producers. THE GENDER AND TECH INSTITUTE Innovation Partner finalist: Tactical Tech Collective (Germany) Scale-Up Partner finalist: Just Associates (JASS) Mesoamerica (Mexico / Costa Rica) Whilst internet use is crucial to feminist activists, it can also be a space where women suffer harassment and surveillance. This can result in women’s voices being silenced as they censor themselves online in fear for their safety. This programme offers digital training in the field of internet security and privacy for leaders of organisations tackling VAW. The toolkits designed by the course participants serve to further train members of their own teams and networks. The Award would enable the training programme to have a far greater reach through JASS Associates’ global network. BREAKAWAY GAME Innovation Partner finalist: Champlain College, Emergent Media Centre (USA) Scale-Up Partner finalist: Grassroot Soccer (South Africa) Breakaway is a soccer-themed video game, encouraging players to move away from behaviour that promotes VAW, towards behaviour promoting mutual respect. Young players meet in camps where they role-play scenarios that create environments of gender equality. The game has been played in 185 countries with over 5,000 registered users. The Award would enable Grassroot Soccer to adapt the Breakaway programme to their location and its needs. The organisation has successfully used soccer as a means to address HIV-prevention with young people in South Africa and further afield. MYPLAN APP Innovation Partner finalist: Johns Hopkins School of Nursing (USA) Scale-Up Partner finalist: Il Comitato Internazionale per lo Sviluppo dei Popoli (CISP) (Kenya / Somalia) Abused women often have little formal support or resources available to them, and cannot openly get help without further endangering themselves or their children. MyPlan is a free, online and smart phone decision-making app that helps women to consider the severity of violence in their relationship, along with other risk factors, to decide whether to leave an abusive partner, and to create a tailored, safe action plan for doing so, linking into resources available locally. Since its release in January 2014, the app has already been downloaded over 9,000 times. The Award would enable the app to be adapted to help women in refugee settings in Nairobi and Mogadishu, make safe action plans in partnership with health professionals. ICT for Womanity Network Womanity is excited to announce that the resulting partnerships will also connect with existing Tech-for-Gender projects, creating a global network of activists and practitioners already using these technologies to tackle VAW. This collaborative network will be called the ICT for Womanity network. This network will: Increase the two Award winners’ learning opportunities; Provide a safe space to exchange information and knowledge on how ICTs can prevent violence against women; Collect and analyse data to assess the effectiveness of ICTs improving women’s safety; Increase awareness in the mainstream media of how ICT is proven to prevent violence against women.
    proven to prevent violence against women.)
  • Gender and Technology Institute Asia, Start up Meeting, Colombo, Skri Lanka  + (The meeting took place over three days. Du
    The meeting took place over three days. During those days we worked with the participants on mapping out the key risks and threats in their respective countries, their needs as activists, WHRDs, journalists and lawyers. Beyond that we focused on what type of content, sessions and participants that should be a part of the Asian GTI.
    ts that should be a part of the Asian GTI.)
  • FemH3ck - Round table Privacy and security in the Open IT Space, Serbia  + (The organization of the Round Table with t
    The organization of the Round Table with the workshop took place in several phases: -The First phase was the conclusion of a contract with the Media Centre Nis in order to provide space for holding events, and technical support. -The Second phase included the agreements with educational institutions dealing with education in the field of Information Technology 'IT Centre' and the Technical High School in Nis, in order to provide expert trainers on training and agree on topics that will be covered in the educational process, as well as ways their presentations to the participants and wider audiences. - The third phase involved the selection, calling and informing participants of the round table and workshops. -The Fourth phase has been informing and inviting the media to be actively involved in the work of the round table and workshops. - The fifth phase was the maintenance of the event with all the planned activities. Meanwhile, in the performance of all of the above mentioned phases in the process of organizing the event is done visually designing, preparing for and printing of supporting educational and promotional materials, as well as procurement of workshop materials. Agenda of the event: ROUNDTABLE WITH WORKSHOP TO RAISING AWARENESS, UNDERSTANDING AND DEVELOPMENT OF PRIVACY AND DIGITAL SECURITY FOR WOMEN activists and representatives of civil society organizations to fight for human rights Media & Reform CENTER NIS, Obrenovićeva 38 Monday, May 25th, 2015. – Introductory presentation on the concept of IT security and the press - Valentina Aleksandrovic, Chairwoman of the Association of Women's Development Center and participant of GPS Camp -Impact of the Internet and IT technology on privacy and security in communication- Valentina Aleandrovic, Chairwoman of the Association of Women's Development Center and participant of GPS Camp Topics: Risk assessment What are the 'digital shadow' What is' Metadata '' Tracking Endangering other Discussion Coffee brake – Mechanisms and tools to achieve a greater level of security on the Internet –IT Education Center Nis –Miloš Perić, dipl. inž. elektronike – sistem inženjer u IT centru;Aleksandar Petrović – student Visoke tehničke škole u Nišu Topics: -Protection from malware and hackers -Data protection from physical threats -Creating safe access codes (paswords) -How to protect privacy in online communication - How to safely use smartphones - Discussion - Lunch
    ly use smartphones - Discussion - Lunch)
  • Digital Trainers Summit - Circumvention Tech Festival, Spain  + (The summit will start with a public event
    The summit will start with a public event where the col laboratory project Level-Up will be presented and you will have an opportunity to talk with the contributors of this digital security resource for trainers in smaller break out sessions, where there is an opportunity to ask questions, try things and learn more. The rest of the Trainer Summit will be closed to participation only by digital security trainers. For the remaining 3 days digital security trainers from all over the world will come together to share experiences and practices on training, talk about how to best train in specific regions and tools, hunt for bugs in tools with developers and strengthen a global network or trainers that in turn will strengthen the assistance we can provide to human rights defenders in every corner of the globe.
    ts defenders in every corner of the globe.)
  • Seguridad digial para defensores de derechos humanos en contextos mineros  + (The training was divided in three parts. D
    The training was divided in three parts. During the first part we worked on the general aspects of privacy and digital security in the Latin-American context. In the second part we worked on threats for cellphones. During the third part we worked on secure communication through e-mail and encryption of folders to protect sensitive information. During the training all participants configured a Wire account, analyzed the security of their cellphone devices, create a secure mail account in a secure server and use veracrypt to encrypt their folders.
    nd use veracrypt to encrypt their folders.)
  • Holistic digital security training for women journalists, Mexico  + (The workshop consisted of the use of encrypted email, encrypted instant messaging, anonymous surfing with Tails and use of VPN. And a monitoring process for two months.)
  • Workshop, Regional networks for tackling gender-based online violence, IFF, Valencia  + (This session will last two hours and its p
    This session will last two hours and its principal aims are to brainstorm together in order to imagine how we can build regional networks for tackling tech-related violence and create networks of support and solidarity. This entrails from thinking what type of training and curricula such networks would required in order to blossom, but also what could be their needs in relation to autonomous infrastructure, low tech and/or privacy and security oriented tools of communication. We will try to make the best of the time we have in our hands, this is why we would ask you to think about one good example of community/network of support (does not have to be gender oriented) and to carefully think about it is successful (impact, resilience, sustainability, etc). The workshop will be participative and we hope that ideas and exchanges that will take place during the session will inspire all of us in our own practices. Brainstorm about how practices taking place in those networks could be boosted in our own training activities to privacy and digital security? How do we transform training in seeds for change inside regional territories? What are the basic elements for a training to create a network of support that remains over time? (hotline, information on time when under attack, psychosocial counseling at distance, regional and local aspects of tech-related violence and tactics to mitigate and overcome it, etc.) Which dimensions should be taken into account for an appropriate curricula and training methodologies that would have those objectives in mind? Are they any requirements in relation to collective and participants which are trained? What should be the technical infrastructure? Etc Quick round of introduction people in the room: By families maybe (gender, holistic, training, tech development, documentation, etc To be decided) – 10 mins maximum Presentation and introduction should not take more than 20 mins In order to make the most of the session, we will work in 4 or 5 small groups (between 4 or 5 persons) around a common guideline and will then share all together – 30 to 45 mins Put in common: 20 mins / Debate and synthesis: 20 mins
    : 20 mins / Debate and synthesis: 20 mins)
  • Gender and Technology Institute, Uruguay  + (Through the event, the participants attend
    Through the event, the participants attended different sessions distributed in the following big topics: digital security, security in mobiles, privacy, data politics, gender and technology, replication and training. They were developed across the following sessions: - Digital security: basic concepts about security, how to take control of the browser, malware’s attacks, server’s attacks, web hosting, anonymity, encryption, TOR, TAILS and deep web. - Mobile security: Understand infrastructure and mobiles, security and privacy settings for mobiles, telephony alternatives with VOIP. - Data politics: Metadata, create and protect databases, free mapping processes, technology sovereignty, collective memory. - Campaigns: Creative uses of social media, planning of campaign considering privacy and security, search engine optimization, push profiles of land right defenders under risk, hate speech and feminist counter-speech. - Holistic security: Technology in demonstrations, documenting violence, preparing an event or training in an unknown context, emotions and addictions using social media. And at the end of the day there were two labs that people could attend: the feminist hackerspace and the self-care lab. We noticed that many of the participants went to the hackerspace, even when that activity was not required for the institute. It shows us that digital security, privacy and self-learning are activities that they understand are relevant for their own work. Some of them didn’t have any previous experience with free software and privacy tools, but they were looking to learn about this options and use them as soon as they could. In the self-care lab, one facilitator was providing methodologies to deal with stress and anxiety as well as to learn to relax and ground in front of fear and trauma. She provided a space to share methods of collective and individual care. About the schedule, the first day we worked with all the participants to clarify the goals of the GTI, the shared agreements, media protocols and documentation, as well as all important logistic information. There was also a symbolic action to begin the institute and connect between all of us. In the afternoon the participants shared in small groups about knowledge that comes from their ancestors and their first memories of technology as well as how their relationship with technology has been influenced by their gender as well as other intersectional dimensions like geographic origin, social class, access to education, opportunities to education and so on. Based on those conversations we moved on into a first collective session about what integral security means, detailing many areas that can be protected as well as strategies of mitigation that exist. The participants shared some of their security strategies linking the relationship between physical integrity, digital security and psychosocial well-being. The last session allowed us all to visibilize the diversity of knowledge and security practices that the participants and their networks already have. It also let us see that the participants were already applying security practices that we also use in digital environments, strategies known like “fortification”, “reduction”, “obfuscation” and "compartmentalization". That first day allowed the participants to understand that technologies are diverse and broad and that ancestral technologies are valuable technical knowledge that we need to reclaim, showing how all of them have an expert relationship with many technical knowledges. It also allowed us to all of us to start from a shared vocabulary as well as to have a better understanding of the diversity of contexts, challenges and strategies. About the schedule during the GTI, it usually was 3 different sessions in parallel that allowed the participants to find the session that better accommodate their interests. All the sessions were facilitated by 2 or 3 facilitators and one additional person was taking notes. Finally, all the facilitators were meeting at the end of the day to evaluate how everything went, what was the evaluation of their sessions by the participants and which changes they needed to implement the next day. The last day was designed for the participants to have strategical conversations about topics they needed to go deep in. And at the end we had a closing session where we discussed next steps after the GTI, which activities, trainings, or facilitations they were planning, how they wanted to keep in touch and how to manage the documentation of the sessions. The next steps will be to create a mailing list for participants, share reviewed documentation, update the curricula as well as to create this document. We will also do a follow up of each participant to understand which are the trainings and awareness raising activities they are planning in their own networks and communities, and see what is the best way that we can support their efforts.
    est way that we can support their efforts.)
  • Gender and Technology Institute, Panama  + (Throughout this event, participants were i
    Throughout this event, participants were involved in different tracks such as digital security, mobiles security, politics of data, gender and technology and training which were complemented with three different labs. Each track encompassed the following sessions: - Digital Security: Security basics, Browser control, Malware attacks, Server attacks and hosting solutions, Anonymity, Encryption, TAILS and Deep web. - Mobiles security: Understanding of infrastructure and mobiles, Security and privacy configuration for mobiles, Alternatives for telephony over VOIP. - Politics of data: Metadata, Criteria for selecting and developing apps, Creating and protecting databases, SEO and positioning your contents. - Gender and technology: Creative uses of social networks, Feminist campaigning taking into account privacy and security, Reporting and documenting gender based online violence, Hacking hate speech, Big data and sexual surveillance. - Training skills: ADIDS for education to technologies, Create safe spaces. Besides those sessions, there were three labs at the end of the day that people could attend: the feminist hackerspace, a science fiction lab and a self care lab. We can note that lots of participants engaged in the hackerspace even if it was not a mandatory activity. It shows that digital security and privacy are concepts that they understood as relevant for their activity. Some didn't have any experience with free software and privacy tools before, but they were clearly in search for learning and using immediately or as soon as possible those in their routines. The other most attended lab was the self care one where the facilitator provided methodologies for dealing with stress and anxiety, how to relax and rebalance when facing fear and trauma, and provided space for exchanging on methods for collective and individual self care. The science fiction lab was also attended by some participants during the first two days but was dropped in the last two days as participants felt it was more urgent to attend the hackerspace or the self care lab. Anyhow it enabled to work on the issue of creativity and how to develop methodologies that easy the process of collective creation of imaginaries, narratives and desires in relation to our technologies and activisms.
    elation to our technologies and activisms.)
  • Training, Digital Security and Online Safety Training Philippines  + (Topics include How Internet Works, History of Internet from global to Philippines context, Risk Assessment, Managing Identities Online, Building Strategies to counter online gender-based violence and mobile security.)
  • Herramientas comunicacionales para la protección del territorio y naturaleza, Ecuador  + (Viernes – 07 de diciembre Hora Actividad R
    Viernes – 07 de diciembre Hora Actividad Responsable Materiales 12h30 Llegada y almuerzo en Hostal Casa Kolping CEDHU 14h00-14h30 Bienvenida al curso, presentación de objetivos del módulo y explicación de temas logísticos. CEDHU Presentación de lxs participantes y equipo de facilitación. Reglas durante el taller. CEDHU 14h30-16h00 Recuento del módulo anterior y revisión de tareas Facilitadora: CEDHU Presentación de resultados del trabajo con las herramientas cartográficas usadas el módulo III Facilitadora: CEDHU 16h00-18h00 Presentación de herramientas jurídicas: Derechos colectivos y mecanismos de exigibilidad Facilitadora: Nathy Yépez 18h00-19h00 Cena Casa Kolping Sábado 08 de diciembre Hora Actividad Metodología Responsable 7:30 – 8:30 Desayuno 8:45 – 9:00 Inicio Dinámicas de inicio jornada Jorge 9:00 – 9:15 Presentación de taller comunicación Facilitadoras dan la bienvenida Presentación de agenda – taller Jorge 9:15 – 9:30 Presentación grupal Cada persona hace una presentación corta:
nombre, de qué organización, comunidad viene, qué actividad realiza y qué comida le gusta. Jorge 9:30 – 9:45 Establecimiento de acuerdos Escribimos en un papelote los acuerdos a los que llegamos para el taller a partir de dos preguntas generadoras. ¿Qué quiero aprender en el taller? ¿Qué saber puedo compartir en el taller? Jorge 9:45 – 10:30 El Árbol Vital: Comunicar como defensor de Derechos Humanos y de la Naturaleza Ejercicio de reconocimiento como defensor/a Este árbol soy yo Ahora vamos a dibujar en la cartulina A4 el árbol que encontramos en nuestro paseo imaginario. En el tronco del árbol escribamos nuestro nombre. A continuación relacionamos cada parte del árbol con nuestra vida comunitaria, así: La Raíz, Hojas, Flores, Frutos Jorge 10:30 11:00 Plenaria JOrge 11:00 11:30 Lluvia de ideas Se pide a los y las participantes que realicen una lluvia de ideas con pocas palabras sobre la palabra comunicación y que la escriban en una cartulina. Cada uno deberá leer su cartulina al grupo y pagarla en el papelote. Jorge 11:30 – 11:45 Trabajo de cooperación, dialogo y organización Ejercicio de organización por grupos de la torre de sorbetes Jorge 11:45 12:45 ¿Qué quiero comunicar? Mapa de la comunicación y defensa del territorio Se organizan en grupos a partir de su cercanía territorial. Cada grupo deberá dibujar un mapa donde represente a su comunidad, organización, barrio, ciudad. (se dividen por regiones) JOrge 12:45 – 13:00 Plenaria Plenaria sobre dialogo y construcción colectiva Jorge 13:00 – 14:00 Almuerzo Barriga llena corazón contento Módulo IV, Segunda parte: Protección y Seguridad para defensoras y defensores del territorio. Seguridad Digital: telefonía celular e internet. Hora Actividad Metodología Responsable 14:00 – 14:10 Introducción al Análisis de Riesgos y la protección integral Breve introducción al enfoque integral de la protección a defensoras. En trabajo en grupos (los mismos que en la mañana) se deben contestar preguntas en un papelografo. Maka 14:10 – 14:20 Mapa de Actividades - ¿Cuáles son todas las actividades de defensa y promoción de los derechos humanos que realiza la defensora y/o su organización? ¿Algunas son más riesgosas? ¿Los riesgos son de ataques a nuestra integridad física y digital o también emocional y riesgos por desgaste? Maka 14:20 – 14:30 Análisis de contexto ¿Cuál es el contexto económico, político, jurídico, social en el que nos desempeñamos? ¿Existen actores agresores que no sean actores estatales? Califica el contexto psicosocial: ¿existe temor, miedo, frustración social por un contexto de violencia política? ¿Cómo impacta en la labor? Maka 14:30 – 14:40 Mapa de Actores ¿Quién son los actores susceptibles de atacarnos por nuestra labor? ¿Qué tan fuertes y amplias son nuestras alianzas con actores a nivel local, estatal, nacional e internacional? ¿Cuál es la cadena de mando? ¿Existe manera de incidir en ellos? ¿Qué actores tienen más o menos poder? ¿De qué manera se pueden movilizar lox aliadxs? ¿Qué apoyo podrían brindar? Maka 14:40 – 15:00 Identificar riesgos Incidente de Seguridad Un evento fuera de lo común que afecta a la seguridad física, digital y/o emocional de la defensora y/o de su familia, organización, entorno. Amenaza Una amenaza es un incidente de seguridad que tiene un impacto alto en la integridad física, digital y/o emocional de la defensora, y del cual recuperarse es más difícil. No todos los incidentes de seguridad son amenazas, pero todas las amenazas son incidentes de seguridad. Ataque Un ataque es un incidente de seguridad que tiene un impacto alto en la integridad física, digital y/o emocional de la defensora, y del cual recuperarse es más difícil. El ataque es directamente dirigido en contra de la persona defensora o su familia o aliados estratégicos. Maka 15:00 – 15:30 Diseño de planes de protección digital Planes de prevención y mitigación poniendo énfasis en la comunicación y el bienestar colectivo. Maka 15:30 – 17:00 Herramientas de seguridad digital ¿Cómo funciona la telefonía celular e Internet? Maka 17:00-18:00 Comunicación móvil Conocer nuestro celular, revisar la configuración de cuentas Googles y conocer algunas aplicaciones seguras de comunicación Maka Domingo 9 de Diciembre Hora Actividad Metodología Responsable 8:00 – 9:00 Continuidad Herramientas de mensajería Cuáles son los criterios para escoger una aplicación de mensajería segura Maka 9:00 – 10:00 Correo Seguro Cómo funciona el correo electrónico Maka 10:00 – 11:00 Contraseñas seguras Cuáles son los criterios para crear una contraseña segura Maka 11:00 – 12:00 Evaluación y preguntas Cierre CEDHU
    12:00 Evaluación y preguntas Cierre CEDHU)
  • Acompanamiento, Seguridad Digital Activistas Derecho a Decidir, Ecuador  + (Vimos los básicos: contraseñas seguras, co
    Vimos los básicos: contraseñas seguras, correo seguro, como compartir archivos de manera segura, como usar las herramientas de documentos compartidos seguros, como guardar información. Por otro lado celulares, uso de aplicaciones seguras, signal y telegrama chat secreto.
    seguras, signal y telegrama chat secreto.)
  • FemH3ck - How the internet works for WHRD, Mexico  + (Voces de Mujeres (Women's Voices) was a 3
    Voces de Mujeres (Women's Voices) was a 3 days training on multimedia production with WHRD in Amecameca, Estado de Mexico. During this 3 days we covered: Narrative - How to tell a story How to conduct an ethic and secure interview Video, photo, text and audio production Digital security: How the Internet works? - What do we use Internet for? - What type of information do we exchange through Internet? - Exercise with the cards: giving each person a card (router, computer, ISP, Google..) - Looking at the risks - What could go wrong on each stage? - What can we do or which tools can we use to solve this? - Questions
    we use to solve this? - Questions)
  • Feminist Internet Meeting, Malaysia  + (We began with stories. Personal and collec
    We began with stories. Personal and collective stories of our struggles that form as bookmarks and knots to the long thread of feminist organising and movement building in issues as diverse as queer rights in Aceh, to sex work in Uganda, funding women's rights organisations in Georgia, and building autonomous feminist internet radio networks in Brazil. We brought artefacts from our movements – photographs, posters, publications, stickers, protest banners, anti-surveillance toolkits, bottles of healing elixirs and more – and threaded our stories through them. How we became involved, why this mattered, how we lost people whom we were loving inspired by and through that, building relationships of care and solidarity, and how our presence and action ruptured the normality of discrimination. This was important not just to locate ourselves in our collective history of movement building, but to also to recognise that we've got this. That as a movement, or as movements, we have encountered innumerable challenges and worked together in different ways to figure things out and respond with shared political commitment. To also know that we have much to build from, and that this is a moment in a long trajectory of feminist organising in creative and resilient ways all over the world. And that memory is resistance, especially when our histories and contribution have been and are actively being rendered invisible. The act of recalling, of naming, is to also make visible our claim in shaping the world we are in. The act of recalling, of naming, is to also make visible our claim in shaping the world we are in. Discourse as a site of activism Digitally networked technologies have seeded and enabled the proliferation of feminist expression in multiple spaces, from online journals to podcasts, digital archives, the humble comments section, digital storytelling projects, social media engagement and more. This has contributed to the most stubborn and invisible quadrant of change in the classic framework of how change happens: that of culture and norms, and in behaviour, thoughts and attitudes. There were many activists at the MFI who were engaged in content and discourse related initiatives, such as the Kohl Journal that surfaces critical analysis on gender and sexuality in the MENA region, Skin Stories that provides deep reflection on the many dimensions of disabilities and sexuality in India, and Bnt Al Masarwa, an independent feminist band that transformed conversations with women across three villages in Egypt into lyrics that provoke further conversation. This does not yet include the many people present who engage on social media as a political site of their everyday activism in pushing back against patriarchal discourse and norms, and face serious and critical backlash in response. This has contributed to the most stubborn and invisible quadrant of change in the classic framework of how change happens: that of culture and norms, and in behaviour, thoughts and attitudes. Yet, women's movements tend to instrumentalise our engagement with digitally networked technologies. There is an approach of “using social media to reach out to more people,” instead of seeing it as a space of activism in and of itself. Perhaps this is understandable due to the milestones achieved in engagement with policy and legal reform in recent decades, but in an age of unprecedented circulation of information, discourse, visuals and knowledge – there is a need to reimagine and understand better discourse as a site of activism, in and of itself, and its potential for deep transformative change. Constellation of actors, leadership & accountability In particular, discourse as a site for activism is important to also see new and emerging actors who are part of feminist organising, but remain outside of the more familiar format of organisations. Some of them are content creators, some are social media activists, some are part of interest-driven collectives, some are feminist techies, and some are what I like to call “free radicals” - nodes that connect between formal organising and informal networks who act as key bridge builders and interlocutors of different actors and different spaces. The internet and its capacity for anonymity and distance has also enabled actors who are diffident of visibility for various reasons (e.g. risk, introverts etc) to participate actively and expressively in organising for change. Some of them are content creators, some are social media activists, some are part of interest-driven collectives, some are feminist techies, and some are what I like to call “free radicals” - nodes that connect between formal organising and informal networks who act as key bridge builders and interlocutors of different actors and different spaces. This is significant for several reasons. First, to appreciate the actual breadth and diversity of the movement. Even as there are valid concerns about the sustainability of organisations in terms of new leadership, it is both pivotal and reassuring the recognise that the movement is in fact, much more diverse and broader than imagined. This brings with it some key questions compel attention as we think through how to contribute to building stronger movements. For example, the backlash and attacks that are being faced by those who agitate patriarchy with feminist narratives in the public-private domain online. Without a recognition and an effort to forge connections, we are coming up short in our efforts at solidarity and resilience. Another question is on leadership and accountability, where we have placed our investment on this, and the challenges that arise from it. One instance is on addressing sexual harassment in the movement – a conversation that is currently alive and having the potency of upturning the quiet toxic culture of sexualised power in our everyday engagement. We have thought through and provided for this through the model of institutions. But where we have different and informal lines of accountability to each other through shared political commitment, there is a discernible lacuna. Much of this is being taken up online, by individuals and collectives, that brings with it both possibilities and challenges. One instance is on addressing sexual harassment in the movement – a conversation that is currently alive and having the potency of upturning the quiet toxic culture of sexualised power in our everyday engagement. How do we think through accountability in a movement where there is a diversity in terms of constellation of actors and how we relate to each other? Who do we see as leaders and custodians of the principles that matter to us in our work for change? And is it possible to reframe the question of intergenerational leadership to one that is perhaps more about intersection of actors, spaces and ways of organising? Documentation of MFI meeting 2017, Malaysia. Museum of Movements, photograph by Fungai Machirori Pace, sustainability and ways of organising Another cluster of issues discussed at the convening was on the pace and sustainability of our organising. This is relevant not just in terms of resource mobilisation – although facets for consideration of that are many, ranging from supporting actors who are involved in informal ways of organising, to greater restrictions placed by the state to funds that can be received by NGOs – but also in terms of the rhythms of our movement. There appears to be campaigns, protests and threats in rapid succession, creating a hectic cadence that result in several things. One is burn out and an increasing sense of fatigue that requires serious consideration as we reflect on what it means to practice the politics of self and collective care. Another is rendering moments of abeyances invisible. The everyday labour of organising that happens in the in-between times. What do we see, and not, in our activism? In an age where internet technologies run on the logic capital of visibility and eyeballs, how are we resisting this by reclaiming our pace, and privileging the everyday work, and the people who do them? How does the everyday work look like in the evolving and nebulous ecosystem of our movements in a digital age? One is burn out and an increasing sense of fatigue that requires serious consideration as we reflect on what it means to practice the politics of self and collective care. It was also recognised that the steps in which we understood movement building to happen is no longer as clear and linear (perception of injustice > leadership > critical analysis > building shared political agenda > organising & building constituency > identify actions, strategies & priorities > act for change > visibility/backlash > gains > analysis > expansion of membership base). While this may have always been true to an extent, the distribution of leadership, actors and ways of organising enabled through digitally networked relationships and sites of organising have troubled this in significant ways. In particular, the building of a shared political agenda and the development of strategies and actions. This is happening at multiple sites, through the leadership of multiple nodes, that may or may not be in relationship with each other. A visible conversation online could be the start, rather than an outcome, of taking action for change and the building of a constituency. Perhaps what is more important than consideration of which steps come first, is the shifting terrain of each component. One is the notion of constituency in a digital age. This was discussed in terms of the more familiar question of who is representing whom, particularly in unstructured formats that lie outside of institutional structures, as well as the critical question of access to the internet. Access to what kind of internet was a key issue at the MFI. Recognising that access is not just about connectivity and devices, but also skills, online communications culture and dominant languages played a role in terms of who can be seen, heard and included in particular moments in the movement. This conversation had many complex layers – from thinking about current disparity in internet access between and within geographical locations and people; to the commodification of our narratives and political actions as we rely on privatised online spaces for our organising; to the need to think about feminist digital infrastructures not just as technical responses, but a response that subverts the current logic capital of technology and access; to the ability of multiple connections and the forging of global political solidarities; as well as enabling muted voices within feminist movements as well as in the larger public to find kin and amplify their realities. We discussed in terms of the more familiar question of who is representing whom, particularly in unstructured formats that lie outside of institutional structures, as well as the critical question of access to the internet. What became evident to me throughout the four days, is also the need for an exchange of movement building skills, capacities and strategies that can integrate lessons and questions from onground and online organising. On how we understand leadership, accountability, constituency building, representation, issues, ways of organising, sites of activism, pace, change and impact. Breaking the binary: Feminist Principles of the Internet Perhaps the most important point of conversation at the MFI was the urgent need to break the binary between what is perceived as online and onground. Rather than see them as distinct, to understand the flow and impact between one and the other, and where embodiment lies as a site of this intersection. This is not just in terms of the ways in which we recognise and understand the shape and form of our movements, but also the intersection of issues that we need to take into account as we continue in our work to critically analyse power structures towards imagining transformative futures. The collectively developed Feminist Principle of the Internet can act as a seed and a framework for the conversation. To recognise that first, feminists and women's movements have always been part of the history of the internet for social justice and change, and have played a pivotal role in its development. And that we need to apply a feminist lens of deconstructing power in understanding and engaging with an increasingly digitally networked world. From issues of access, to expression, the economy, governance, embodiment and public participation. And when we begin the conversation with our political framework, and grounded through the diverse realities of our contexts, then we locate ourselves as critical stakeholders, articulators, shapers, dreamers and political actors of our unfolding past, present and future. When we begin the conversation with our political framework of feminism, and grounded through the diverse realities of our contexts, then we locate ourselves as critical stakeholders, articulators, shapers, dreamers and political actors of our unfolding past, present and future.
    of our unfolding past, present and future.)
  • Workshop, Other than women: Exploring harassment and difference online, Rightscon, Belgium  + (We have a number of questions we would lik
    We have a number of questions we would like to address through this newer line of work and these will inform the framing of the session: What can and cannot be learned about online harassment through the approaches, tools, and responses we've developed globally in response to harassment faced by women? What do we know about the contexts and shapes of harassment faced by different communities/groups of people marginalised because of their religion, ethnicity, gender identity or race? Is it problematic to think about harassment along identity categories? What might it afford us, what in turn prevent? What are the spaces and forms that identity-based harassment takes (f.ex. Reddit threads, Twitter abuse, images, memes, fanfiction)? How is online hate speech and harassment directed at specific religious, ethnic, linguistic, or political communities experienced? How might an intersectional lens affect our working definition of online harassment? How does expanding our focus beyond women affect our thinking about responses to online harassment (f.ex. in terms of design, tools, policy, research methodologies, activism, etc.)? We see this session as an opportunity for discussion and reflection, and to contribute to an agenda that is more specific and contextual with respect to responding to targeted online attacks. We invite people working on online harassment, advocates of freedom of expression and participation online, those working on human rights, as well as interested technologists, activists, and researchers to attend this session. We especially welcome civil society organisations based in Brussels. This session will consist of an introductory presentation to frame the issues and the terms of the debate, a plenary brainstorming session to collaboratively identify further relevant topics/question around online harassment, breakout group discussions, and conclude with a plenary discussion to consolidate the outcomes of our work as a group.
    idate the outcomes of our work as a group.)
  • Digital security training for antimining activists, Mexico  + (Workshop for a grassroot organization in t
    Workshop for a grassroot organization in the North Sierra of Puebla (Mexico) The workshop was held in a village about an hour from the capital Puebla, it took place in a center to teach and learn crafts with mud that also counts with a computer room. The computers were installed with Windows and the Internet connection was only working if there was no more than two computers connected at the same time (sounds familiar? ;-). Most of the attendees brought their personal computers with Windows but there was also two persons using Ubuntu. About 12 people attended, mostly men aged between 19 years - 60 years. The level of education and occupation was variable. The workshop gave an introduction to technopolitical aspects of surveillance, digital security and digital tools. The possibility of using TAILS was discussed and I brought some USB installed with me but we did not have enough time to work on that topic. The workshop consisted in mail encryption using Thunderbird and Enigmail. It took place on Saturday, which is the most appropriate day for the community and lasted from 10AM to 6 PM with an hour break for lunch.
    10AM to 6 PM with an hour break for lunch.)
  • Gender and Technology Institute, Ecuador  + (You can read about the evaluation and agenda of the GTI in Ecuador here: https://gendersec.tacticaltech.org/wiki/images/7/72/Documentacion_Evaluacion_IGT.pdf The document is available in Spanish so far.)
  • International Journalism Festival - Perugia  + (http://www.journalismfestival.com/programme/2016)
  • Taller Autodefensa Digital, Encuentro LBT Feminista, Ecuador  + (la agenda de trabajo contempló los siguientes temas: Marco jurídico y ejercicio de derechos; salud sexual lésbica; kuerpas disientes y espacio público; autodefensa digital; arte como expresión de contracultura (serigrafía, poesía, música); gordofobia.)