Difference between revisions of "Manuals with a gender perspective"
From Gender and Tech Resources
(27 intermediate revisions by 2 users not shown) | |||
Line 4: | Line 4: | ||
== Manuals produced by collectives/organisations == | == Manuals produced by collectives/organisations == | ||
+ | |||
+ | * '''Access Now - 'A first look at Digital Security'''' | ||
+ | |||
+ | Linkː https://www.accessnow.org/your-spring-welcoming-gift-is-here-the-freshest-version-of-a-first-look-at-digital-security/ | ||
+ | |||
+ | Licenseː Creative Commons Attribution NonCommercial 4.0 International License | ||
+ | |||
+ | Languageː English | ||
+ | |||
+ | We created “A First Look at Digital Security” — an open-source booklet — to help you take the first steps toward improving your digital security online, and we continue to update it online at Github to make sure it remains accessible for anyone who needs it. The guide uses five user archetypes to introduce the concept of threat modeling, and there is a glossary to explain the most difficult terms and ideas. If you are a digital security trainer, you can use and further develop the user archetypes that we present as scenarios for your teaching activities, and we have now added space — a blank persona building page — that your students can use to create their own threat model, based concretely on their particular situation and needs. | ||
+ | |||
+ | * '''Access Now - 'Digital Security Helpline Community Documentation'''' | ||
+ | |||
+ | Linkː https://accessnowhelpline.gitlab.io/community-documentation/index.html | ||
+ | |||
+ | Licenseː (CC BY 3.0 US) 2019 Access Now. | ||
+ | |||
+ | Languageː English | ||
+ | |||
+ | In this website you will find guides we use at Access Now Digital Security Helpline to handle different kinds of cases during our 24/7 operations. If you run a digital security helpdesk or are just advising your friends about how to secure their online activities or respond to a digital security incident, you can find some useful tips and procedures in these guides. | ||
+ | |||
+ | * '''Acoso.online - 'Guía práctica para tratar casos de pornografía no consentida en recintos educacionales bajo estándares de derechos humanos y equidad de género''' | ||
+ | |||
+ | Linkː https://acoso.online/wp-content/uploads/2018/12/Guia-Practica-Establecimientos-Educacionales_AcosoOnline_2018.pdf | ||
+ | |||
+ | Licenseː ? | ||
+ | |||
+ | Languageː Castellano | ||
+ | |||
+ | Esta guía es un recurso para que establecimientos educacionales establezcan parámetros base para lidiar con casos de difusión no consentida de imágenes y videos íntimos (también conocida como pornografía no consentida) en un marco de derechos humanos y equidad de género. Ha sido elaborado por Acoso.Online, un proyecto colaborativo e independiente que busca dar orientaciones concretas a las víctimas de pornografía no consentida en Latino América y el Caribe. | ||
+ | La necesidad de entregar esta guía nace debido a dos razonamientos principales: por un lado, la abrumadora mayoría de casos que ocurren en contextos estudiantiles y, por otro, el silenciamiento y naturalización de este tipo de agresión. En esa combinación, esta guía pretende ser orientadora para todo institución educacional y comunidad relacionada y, en general, toda persona que quiera proponer estándares de acción para respetar los derechos humanos de las víctimas de esta agresión. | ||
+ | |||
+ | * '''Ancestra - 'Guía de recursos digitales para mujeres rurales'''' | ||
+ | |||
+ | Linkː https://ancestraguia.wordpress.com/2018/02/06/descarga-la-guia-de-recursos-digitales-para-mujeres-rurales/ | ||
+ | |||
+ | Licenseː Licencia Creative Commons Atribución Compartir Igual 2.5 Colombia | ||
+ | |||
+ | Languageː Castellano | ||
+ | |||
+ | Ancestra es una guía básica sobre tus derechos como mujer y las posibilidades y recursos digitales disponibles en internet para potenciar tu desarrollo emocional, físico, educativo, laboral, familiar y comunitario. Ser mujer campesina no te excluye de internet ni de ningún otro ámbito de comunicación y participación, a pesar de las grandes diferencias que existen en el acceso a Internet entre hogares urbanos y rurales colombianos. | ||
+ | |||
+ | Si una vez al día, a la semana o al mes puedes conectarte a través de un computador, tablet o teléfono celular, Ancestra quiere entregarte algunas ideas para que se enriquezca tu experiencia de navegar e interactuar en internet. | ||
+ | |||
+ | * '''Aluna Acompañamiento Psicosocial y Jass Mesoamérica''' | ||
+ | |||
+ | Linkː https://docs.wixstatic.com/ugd/536db9_b0f243eefe5e4b4190fbe1e71424e1f7.pdf | ||
+ | |||
+ | Licenseː ? | ||
+ | |||
+ | Languageː Castellano | ||
+ | |||
+ | Esta publicacion recopila diferentes reflexiones de defensoras de Mesoamérica sobre el miedo desde sus propias historias y | ||
+ | experiencias. | ||
+ | |||
+ | A lo largo del diálogo surgieron muchas preguntas sobre qué es el miedo y sobre cómo lo afrontan las defensoras, especialmente cuando lo ubicamos en una sociedad patriarcal, en un contexto de violencia socio-política y cuando las sujetas que afrontan ese miedo son mujeres defensoras que, por su condición de género, además de esa violencia generalizada tienen que enfrentar las violencias cotidianas contra su ser femenino y feminista. En respuesta a ello, a través de este documento se intentó crear un tejido de ideas y testimonios sobre sus miedos, con el objetivo de verse reflejadas en ellos y así poder | ||
+ | continuar construyendo caminos de resistencia y esperanza. | ||
* '''Association for Progressive Communications - 'Take back the tech'''' | * '''Association for Progressive Communications - 'Take back the tech'''' | ||
Line 59: | Line 116: | ||
* '''Ciberfeministas Guatemala'''' | * '''Ciberfeministas Guatemala'''' | ||
− | Linkː http://www.ciberfeministas.or.gt/fanzines-libres/ | + | Linkː http://www.ciberfeministas.or.gt/fanzines-libres/ (March 2018: website is down) |
Licenseː Copyleft | Licenseː Copyleft | ||
Line 78: | Line 135: | ||
que interactuamos por vía telefónica. Proteger la información de nuestro teléfono es también proteger a nuestrxs amigxs. | que interactuamos por vía telefónica. Proteger la información de nuestro teléfono es también proteger a nuestrxs amigxs. | ||
Cuando hacemos una llamada telefónica o enviamos mensajes, se registran al menos la ubicación geográfica de quien llama y quien contesta, sus números de teléfono, la hora y duración de la comunicación y los números de serie de los dispositivos utilizados. De igual manera pueden ser capturados los datos de nuestras comunicaciones por medio de alguna aplicación del smartphone. En un mismo aparato se vinculan los datos del número telefónico, correo, contactos, actividad en redes sociales, SMS, fotografías, archivos, datos de GPS y a veces la sincronización con otros dispositivos. | Cuando hacemos una llamada telefónica o enviamos mensajes, se registran al menos la ubicación geográfica de quien llama y quien contesta, sus números de teléfono, la hora y duración de la comunicación y los números de serie de los dispositivos utilizados. De igual manera pueden ser capturados los datos de nuestras comunicaciones por medio de alguna aplicación del smartphone. En un mismo aparato se vinculan los datos del número telefónico, correo, contactos, actividad en redes sociales, SMS, fotografías, archivos, datos de GPS y a veces la sincronización con otros dispositivos. | ||
+ | |||
+ | * ''' Ciberseguras''' | ||
+ | |||
+ | Linkː https://ciberseguras.org/ | ||
+ | |||
+ | Licenseː CC BY | ||
+ | |||
+ | Languageː Spanish | ||
+ | |||
+ | Somos varias, cada una con distintos poderes, venimos de diferentes galaxias pero constelamos juntas. Nuestro espacio compartido es la red y nos unimos para ahuyentar a las fuerzas ocultas que nos atacan. Para hacerles frente, conspiramos en aquelarres ciberfeministas. Ciberseguras es el fuego que nos reúne en un círculo de goce, baile y encuentro. Aquí aprendemos juntas. | ||
+ | Ciberseguras somos Clandestina (Brasil) , Ciberfeministas GT (Guatemala), Derechos Digitales (Chile-México), Dominemos la tecnología - APC, Luchadoras (México), Nodo Común (Bolivia), SocialTIC (México). | ||
* '''Coding Rights - Send nudes'''' | * '''Coding Rights - Send nudes'''' | ||
Line 88: | Line 156: | ||
Digital security can also be fun. By apropriation of the meme “send nudes!”, this small project has the goal to spread the word about digital security for the average user, who relies on digital media for their communication, but are not necessarily tuned with the specifics of digital security debate. Also discussing post-porn aesthetics and strategies for combating gender inequalities in the web, it was thought to be more appealing to women and sexual minorities, since they are more easily exposed to online haressment, by practices such as revenge “porn”, doxxing, cyberbulling, etc. | Digital security can also be fun. By apropriation of the meme “send nudes!”, this small project has the goal to spread the word about digital security for the average user, who relies on digital media for their communication, but are not necessarily tuned with the specifics of digital security debate. Also discussing post-porn aesthetics and strategies for combating gender inequalities in the web, it was thought to be more appealing to women and sexual minorities, since they are more easily exposed to online haressment, by practices such as revenge “porn”, doxxing, cyberbulling, etc. | ||
+ | |||
+ | * '''Coding Rights - SaferSisters: Feminist Digital Security Hints in gifs!'''' | ||
+ | |||
+ | Linkː https://medium.com/read-write-participate/safersisters-online-security-tips-in-gifs-222589166ed8 | ||
+ | https://medium.com/codingrights/safermanas-dicas-de-seguran%C3%A7a-digital-em-gifs-bf270086eb66 | ||
+ | https://medium.com/@codingrights/safermanas-tips-de-seguridad-digital-en-gifs-4453cf18d985 | ||
+ | |||
+ | Licenseː ? | ||
+ | |||
+ | Languageː English, Spanish, Portuguese | ||
+ | |||
+ | Coding Rights will publish a new themed gif per week under the hash #SaferSisters. The ones to follow will explain how to protect nude photos, how to prevent the misuse of location data by creepy stalkers, how to choose a period-tracking app that does not leak the inners of our wombs to the cyber world, what to think when we use dating or taxi apps and even how to escape sexist ads that haunt us for days. All gifs will be produced in Portuguese, English and Spanish. | ||
* '''Coding Rights - Chupadados''' | * '''Coding Rights - Chupadados''' | ||
Line 99: | Line 179: | ||
Estos dispositivos son bonitos, gentiles, nos hacen compañía y nos hacen sentir atractivos y amparados. Nos apasionamos por ellos y depositamos en ellos toda nuestra confianza, desde los gestos más cotidianos hasta los secretos más íntimos. Ellos son nuestros objetos de deseo y sueños de consumo. Hasta el día en que nos damos cuenta de que controlan lo que hacemos, monitorean con quiénes nos encontramos y comparten nuestra intimidad con gente que no tiene nada que ver con eso. A partir de conceptos como "Big Data", "Smart Cities" e "Internet de las Cosas", creemos que la abundancia de datos, sumada a la alta capacidad de procesamiento de las computadoras con algoritmos inteligentes, facilitan y proporcionan más eficiencia a las ventas, la economía, el combate al crimen, la movilidad, la protección del medio ambiente, la garantía de la seguridad, de la salud y muchos de los problemas que enfrentamos globalmente. Pero ¿cómo funcionan estas tecnologías y al servicio de qué intereses trabajan? | Estos dispositivos son bonitos, gentiles, nos hacen compañía y nos hacen sentir atractivos y amparados. Nos apasionamos por ellos y depositamos en ellos toda nuestra confianza, desde los gestos más cotidianos hasta los secretos más íntimos. Ellos son nuestros objetos de deseo y sueños de consumo. Hasta el día en que nos damos cuenta de que controlan lo que hacemos, monitorean con quiénes nos encontramos y comparten nuestra intimidad con gente que no tiene nada que ver con eso. A partir de conceptos como "Big Data", "Smart Cities" e "Internet de las Cosas", creemos que la abundancia de datos, sumada a la alta capacidad de procesamiento de las computadoras con algoritmos inteligentes, facilitan y proporcionan más eficiencia a las ventas, la economía, el combate al crimen, la movilidad, la protección del medio ambiente, la garantía de la seguridad, de la salud y muchos de los problemas que enfrentamos globalmente. Pero ¿cómo funcionan estas tecnologías y al servicio de qué intereses trabajan? | ||
[https://chupadados.codingrights.org/es/menstruapps-como-transformar-sua-menstruacao-em-dinheiro-para-os-outros/ Vean por ejemplo la seccion sobre Cuerpos y su analisis de aplicaciones para control menstrual], aplicaciones deportivas, aplicaciones de salud, dildos, termómetros y colectores menstruales conectados a internet. Gracias a esos dispositivos hoy podemos convertir enfermedades, sexualidades, calorías y sangre menstrual en información, números y valor. El Chupadatos interpreta esas informaciones como mejor le parece. Con su mente oscura, te impone patrones normativos sobre tu peso, tu salud y tu vida sexual, e incluso comparte tu información íntima por ahí. Molesto, ¿no? | [https://chupadados.codingrights.org/es/menstruapps-como-transformar-sua-menstruacao-em-dinheiro-para-os-outros/ Vean por ejemplo la seccion sobre Cuerpos y su analisis de aplicaciones para control menstrual], aplicaciones deportivas, aplicaciones de salud, dildos, termómetros y colectores menstruales conectados a internet. Gracias a esos dispositivos hoy podemos convertir enfermedades, sexualidades, calorías y sangre menstrual en información, números y valor. El Chupadatos interpreta esas informaciones como mejor le parece. Con su mente oscura, te impone patrones normativos sobre tu peso, tu salud y tu vida sexual, e incluso comparte tu información íntima por ahí. Molesto, ¿no? | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
* '''Consorcio para el Diálogo Parlamentario y la Equidad Oaxaca A.C. - 'Lineamientos para la construcción de planes integrales de protección con enfoque feminista'''' | * '''Consorcio para el Diálogo Parlamentario y la Equidad Oaxaca A.C. - 'Lineamientos para la construcción de planes integrales de protección con enfoque feminista'''' | ||
Line 119: | Line 189: | ||
En el marco de la Campaña de los 16 días de Activismo contra la Violencia de Género, Consorcio Oaxaca presentó el Folleto “Lineamientos para la Construcción de Planes Integrales de Protección con Enfoque Feminista”. Frente al grado de falta de acción por parte del Gobierno para garantizar la labor, la vida y la seguridad de defensoras, defensores y periodistas, resulta necesario dicho instrumento. | En el marco de la Campaña de los 16 días de Activismo contra la Violencia de Género, Consorcio Oaxaca presentó el Folleto “Lineamientos para la Construcción de Planes Integrales de Protección con Enfoque Feminista”. Frente al grado de falta de acción por parte del Gobierno para garantizar la labor, la vida y la seguridad de defensoras, defensores y periodistas, resulta necesario dicho instrumento. | ||
+ | |||
+ | * '''CMI-Rio - Centro de Mídia Independente Rio de Janeiro e gaivotas.- 'Tem Boi na Linha?''' | ||
+ | |||
+ | Linkː https://temboinalinha.org/index.html | ||
+ | |||
+ | Licenseː Creative Commons Attribution NonCommercial 4.0 International License | ||
+ | |||
+ | Languageː Portuguese | ||
+ | |||
+ | Esse site parou de ser atualizado em 2015. Algumas recomendações de ferramentas podem estar desatualizadas. | ||
+ | Para os movimentos sociais, a comunicação rápida e segura entre membros de um coletivo, entre coletivos, ou entre ativistas independentes é fundamental tanto para o planejamento e a eficácia das ações, como também para o fortalecimento do próprio movimento de resistência. | ||
+ | Na era analógica, espionar as comunicações de um indivíduo ou grupo e apreender documentos sensíveis, eram ações bastante comuns, apesar de serem dirigidas a alvos específicos e um tanto difíceis de serem camufladas. Com a internet, essa prática se tornou mais discreta, silenciosa e ainda mais comum, sendo utilizada em larga escala, para a espionagem em massa, e por motivos que ultrapassam os estritamente políticos. | ||
+ | |||
+ | * '''Cyber Civil Rights Initiative - 'ONLINE REMOVAL GUIDE'''' | ||
+ | |||
+ | Linkː https://www.cybercivilrights.org/online-removal/ | ||
+ | |||
+ | Licenseː Copyright | ||
+ | |||
+ | Languageː English | ||
+ | |||
+ | At the Cyber Civil Rights Initiative, we know how traumatic and distressing it can be to find your intimate images online when you didn’t consent to them being shared. We worked with all of the major social media and tech companies to come up with the following document to provide you with a list of how to report this violation on all of their platforms. | ||
* '''Crash Override network - 'Various'''' | * '''Crash Override network - 'Various'''' | ||
Line 147: | Line 239: | ||
Languageː Spanish | Languageː Spanish | ||
− | Recursos para descargar e imprimir: Cyborg Feminismo por Adriana Peralta; Sexting por Regi Rivas; Iconos de super mujeres por Florencia Aguirre. | + | Recursos para descargar e imprimir: Cyborg Feminismo por Adriana Peralta; Sexting por Regi Rivas; Iconos de super mujeres por Florencia Aguirre + Toolkits de Seguridad Digital: Serie de Fanzines |
+ | |||
+ | * '''Data Society - Best Practices for Conducting Risky Research and Protecting Yourself from Online Harassment'''' | ||
+ | |||
+ | Linkː https://datasociety.net/pubs/res/Best_Practices_for_Conducting_Risky_Research-Oct-2016.pdf | ||
+ | |||
+ | Licenseː Creative Commons Attribution 3.0 Unported license. | ||
+ | |||
+ | Languageː English | ||
+ | |||
+ | Researchers who investigate sensitive topics may face online harassment, social shaming, or other networked forms of abuse. In addition to potential impacts on the researcher’s reputation and mental health, fear of harassment may have a chilling effect on the type of research that is conducted and the capabilities of individual researchers. | ||
+ | |||
+ | This document is a set of best practices for researchers – especially junior researchers – who wish to engage in research that may make them susceptible to online harassment. We provide recommendations for academic institutions, supervisors, and individuals, including cyber-security guidelines and links to other resources. | ||
+ | |||
+ | The authors welcome feedback about this document. Please send suggestions and edits to risky research at datasociety dot net. | ||
* '''Digital Rights Foundation - 'The art of digital security for pakistani women'''' | * '''Digital Rights Foundation - 'The art of digital security for pakistani women'''' | ||
Line 158: | Line 264: | ||
This guidebook has been specially made for Pakistani women and is available in Urdu and English. | This guidebook has been specially made for Pakistani women and is available in Urdu and English. | ||
+ | |||
+ | * '''Donestech.net - 'KIT contra les violències masclistes on-line'''' | ||
+ | |||
+ | Linkː | ||
+ | Cat: https://donestech.net/files/kitcontraviolenciesmasclistesonline2018.pdf | ||
+ | Spa: https://donestech.net/files/kitviolencies2019_cast.pdf | ||
+ | |||
+ | Licenseː Creative Commons Attribution - Share Alike - No Commercial | ||
+ | |||
+ | Languageː Catalan, Spanish | ||
+ | |||
+ | Des d’una posició crítica i feminista, introduïm les violències masclistes on-line i, sobretot, posem a la vostra disposició una sèrie de propostes, recursos i iniciatives per a que ens cuidem, ens defensem, contrarestem i alteractuem davant d’aquestes violències. | ||
+ | |||
+ | Aquest KIT creiem que resultarà molt útil per a les dones i persones LGTBIQ*, especialment per aquelles dones violentades, però també les destacades, les feministes i dissidents sexuals i de gènere que es veuen afectades per aquestes violències on-line de forma creixent. Us animem a utilitzar aquest KIT tant de forma preventiva com reactiva i esperem que us sigui d’utilitat. | ||
+ | |||
+ | * '''Donestech.net - 'Redes Sociales en perspectiva de género: Guía para conocer y contrarrestar las violencias de género on-line'''' | ||
+ | |||
+ | Linkː https://donestech.net/files/redessociales.pdf | ||
+ | |||
+ | Licenseː Creative Commons Attribution - Share Alike - No Commercial | ||
+ | |||
+ | Languageː Spanish | ||
+ | |||
+ | Dentro de ese entramado de redes sociales que se despliegan en nuestras vidas conectadas y fuera de Internet operan una multitud de posibilidades que se entrelazan fuertemente. Por todo ello, es cada vez más importante entender dónde y cómo nos movemos por los espacios conectados, para poder saber cómo operar e influenciar cambios positivos, así como para poder cuidar y cuidarnos entre nosotras para contrarrestar y sobrepasar estas violencias, agresiones y vulnerabilidades que pueden amplificar, complementar o, incluso, cambiar las que ya se experimentan en la vida física. Por todo ello esta publicación incluye, en una primera parte, la presentación de algunas de las características de las redes sociales en general y de las plataformas de redes sociales on-line. Lo abordamos de forma crítica y con perspectiva de género, así como relacionamos internet, las identidades, la privacidad y la seguridad con el género. Seguidamente nos adentramos en las violencias de género y, específicamente, las violencias de género on-line. Partimos de un análisis del panorama de datos cuantitativos y cualitativos existentes para, en la medida de lo posible, visibilizar qué está pasando si nos preguntamos sobre este tipo de violencias. Después, en una segunda parte, exponemos en detalle las violencias de género on-line, así como las posibilidades de hacerles frente. En este sentido, identificamos y definimos un conjunto de violencias de género que están ocurriendo en las redes sociales on-line y presentamos, a la vez, pistas, recomendaciones e iniciativas para profundizar en ellas y lograr autodefendernos, así como contrarrestarlas. | ||
+ | |||
+ | Esta publicación pues, está pensada para que pueda utilizarse también como guía y manual para entender mejor cuales son los componentes de género que atraviesan las redes sociales on-line. Sin embargo, y sobre todo, buscamos contribuir a que desde una posición más informada, crítica y feminista se puedan detectar y conocer las violencias de género on-line y,en la medida de lo posible y en un futuro próximo, se puedan sobrepasar. Por ello, esta publicación puede resultar muy útil a las mujeres, especialmente a las mujeres vocales, feministas y disidentes sexuales y de género, que de forma creciente se ven afectadas por las violencias de género on-line. Además, por el idioma utilizado, las autorías, voces y miradas, así como la mayoría de datos y referencias utilizadas, esta guía resulta especialmente interesante para las mujeres latinas e iberoamericanas. | ||
* '''Donestech.net - 'Various'''' | * '''Donestech.net - 'Various'''' | ||
Line 167: | Line 299: | ||
Languageː Spanish, Catalan, English | Languageː Spanish, Catalan, English | ||
− | - Comic Lela: A comic for kids and grown ups available in spanish, catalan, english about free software and free culture ( | + | - Comic Lela: A comic for kids and grown ups available in spanish, catalan, english about free software and free culture (https://www.donestech.net/comic-lela) |
- Kit de formacion Genero, Tic y Activismoː A compilation of articles in Spanish about how to link gender, activism and a tactical use of ICT (https://donestech.net/files/kit_cast_5.pdf) | - Kit de formacion Genero, Tic y Activismoː A compilation of articles in Spanish about how to link gender, activism and a tactical use of ICT (https://donestech.net/files/kit_cast_5.pdf) | ||
Line 194: | Line 326: | ||
The Center for Solutions to Online Violence is both a digital resource space, hosted in perpetuity by FemTechNet, and a community of people working to address the ever-evolving risks faced by women and feminists online. Going forward, the project will be co-facilitated by T.L. Cowan and Moya Bailey, who have been essential to the work this year. They, in turn, are supported by a committee of volunteers and the broader FemTechNet network. In the coming year, CSOV will continue to connect survivors of online violence to resources and communities who can help. It will also continue the hard work of making visible the violences that women of color, queer and trans-creators, and other marginalized communities experience – too often at the hands of those who purport to want to help. Trust is partially about understanding the risks that others face and demonstrating that you are willing to address those risks before doing any additional work. This is the foundation of the Center for Solutions to Online Violence | The Center for Solutions to Online Violence is both a digital resource space, hosted in perpetuity by FemTechNet, and a community of people working to address the ever-evolving risks faced by women and feminists online. Going forward, the project will be co-facilitated by T.L. Cowan and Moya Bailey, who have been essential to the work this year. They, in turn, are supported by a committee of volunteers and the broader FemTechNet network. In the coming year, CSOV will continue to connect survivors of online violence to resources and communities who can help. It will also continue the hard work of making visible the violences that women of color, queer and trans-creators, and other marginalized communities experience – too often at the hands of those who purport to want to help. Trust is partially about understanding the risks that others face and demonstrating that you are willing to address those risks before doing any additional work. This is the foundation of the Center for Solutions to Online Violence | ||
+ | |||
+ | * '''Fight Cyberstalking'''' | ||
+ | |||
+ | Linkː https://www.fightcyberstalking.org | ||
+ | |||
+ | Licenseː Copyright | ||
+ | |||
+ | Languageː English | ||
+ | |||
+ | FightCyberstalking.org is an online resource site for cyberstalking victims: information on reporting a cyberstalker, online privacy tips, and tips for safer socializing online on social media sites, such as Twitter, Facebook, Instagram and YouTube. FightCyberstalking.org was launched and created in 2010 after the founder, Lisa Woeller, become a victim of a cyber stalker in 2006. If you find this site helpful, please feel free to share our website, like, and follow us on the web. | ||
* '''Fundacion Karisma'''' | * '''Fundacion Karisma'''' | ||
Line 204: | Line 346: | ||
Seguridad, privacidad y proteccion en Twitter, una guia para personas sobrevivientes de acoso y abuso. Esta publicación está basada en Safety, Privacy on Twitter. A guide for survivors of harassment and abuse, elaborada por la National Network to End Domestic Violence (NNEDV) con el apoyo de Twitter. La traducción y adaptación para América Latina ha sido posible gracias al apoyo de Twitter. | Seguridad, privacidad y proteccion en Twitter, una guia para personas sobrevivientes de acoso y abuso. Esta publicación está basada en Safety, Privacy on Twitter. A guide for survivors of harassment and abuse, elaborada por la National Network to End Domestic Violence (NNEDV) con el apoyo de Twitter. La traducción y adaptación para América Latina ha sido posible gracias al apoyo de Twitter. | ||
+ | |||
+ | * '''Hiperderechos- 'Tecnoresistencias'''' | ||
+ | |||
+ | Linkː https://hiperderecho.org/tecnoresistencias/ | ||
+ | |||
+ | Licenseː Creative Commons Atribución 4.0. | ||
+ | |||
+ | Languageː Spanish | ||
+ | |||
+ | tecnoresistencias es un espacio donde encontrarás información para tu autodefensa digital desarrollado por Hiperderecho, una organización peruana que defiende el derecho de todas y todos a participar de espacios digitales con libertad y seguridad. | ||
+ | |||
+ | Esta página es el resultado de nuestra investigación sobre violencia de género en línea donde participaron activistas, defensorxs de derechos humanos, personas de la comunidad LGBTIQ+, feministas y personas quienes han enfrentado este tipo de violencia. A cada una de ellas les agradecemos por su tiempo, interés y ganas de seguir luchando por espacios digitales seguros. Ahora, te invitamos a seguir descubriendo Tecnoresistencias. En las siguientes secciones detallamos los tipos de violencia que hemos encontrado, cómo denunciarlos y los talleres de #AutoDefensaDigital que ofreceremos este año. Esperamos esta información sea útil y que te sirva para disfrutar de internet sin violencia. | ||
+ | |||
+ | * ''Instituto Patrícia Galvão' - 'Dossiê Violência contra as Mulheres'''' | ||
+ | |||
+ | Linkː https://dossies.agenciapatriciagalvao.org.br/violencia/ | ||
+ | |||
+ | Licenseː ? | ||
+ | |||
+ | Languageː Portuguese | ||
+ | |||
+ | Este é um dossiê digital feito para contribuir com a divulgação de informações e o debate sobre a violência contra as mulheres. Para isso, conta com um banco de fontes de especialistas e também com um banco de pesquisas que reúne dados e estudos atuais sobre a violência de gênero no Brasil. O dossiê também dispõe de uma seção de conteúdos especiais, que compilam informações, dados e análises. | ||
+ | |||
+ | * '''Luchadoras- 'La clicka libres en linea'''' | ||
+ | |||
+ | Linkː https://www.libresenlinea.mx/ | ||
+ | |||
+ | Licenseː Creative Commons Attribution NonCommercial | ||
+ | |||
+ | Languageː Spanish | ||
+ | |||
+ | Libres en línea es una campaña de La Sandía digital y Luchadoras como parte de Dominemos la tecnología. | ||
+ | |||
+ | * '''Marialab, Blogueiras Negras, Universidade Livre Feminista e Cfemea '''GUIA PRÁTICA DE ESTRATÉGIAS E TÁTICAS PARA A SEGURANÇA DIGITAL FEMINISTA''' | ||
+ | |||
+ | Linkːhttp://feminismo.org.br/guia/guia-pratica-seguranca-cfemea.pdf | ||
+ | |||
+ | Licenseː Licencia Creative Commons Reconocimiento-Compartir Igual 4.0. | ||
+ | |||
+ | Languageː Português | ||
+ | |||
+ | Esta Guia Prática de Estratégias e Táticas para a Segurança Digital Feminista tem o objetivo de proporcionar às mulheres maior autonomia e segurança na internet, apresentando estratégias e táticas de defesa digital para feministas. Os conteúdos são dirigidos para o público de mulheres da América Latina e foram elaborados considerando diferentes mulheres: negras, trans, lésbicas, ativistas/militantes de movimentos organizados de mulheres ou que atuam individualmente na rede, sendo de periferias urbanas, rurais, com distintos níveis de acesso à tecnologia nas suas abordagens | ||
* '''HACK*BLOSSOM - `DIY Cybersecurity for Domestic Violence: A resource of privacy + compassion'''' | * '''HACK*BLOSSOM - `DIY Cybersecurity for Domestic Violence: A resource of privacy + compassion'''' | ||
Line 299: | Line 483: | ||
In this three-part series learners focus on understanding the impact of cyber violence against women and girls, creating safer places online, knowing how to address bullying or attacks when they happen, and participating in online communities in a supportive manner. | In this three-part series learners focus on understanding the impact of cyber violence against women and girls, creating safer places online, knowing how to address bullying or attacks when they happen, and participating in online communities in a supportive manner. | ||
Activities will take young women and girls from understanding online violence to actively advocating against it. This module was created for women and girls in emerging countries where internet adoption for women is at the utmost highest, along with a concern for security and harassment, but can be adapted for audiences everywhere. | Activities will take young women and girls from understanding online violence to actively advocating against it. This module was created for women and girls in emerging countries where internet adoption for women is at the utmost highest, along with a concern for security and harassment, but can be adapted for audiences everywhere. | ||
+ | |||
+ | * '''National Network to End Domestic Violence'''' | ||
+ | |||
+ | Linkː https://www.techsafety.org/documentationtips/ | ||
+ | |||
+ | Licenseː ? | ||
+ | |||
+ | Languageː English | ||
+ | |||
+ | Abusers and perpetrators will often misuse technology to further abuse and control victims. Misuse of technology could include monitoring technology use, including computers or cell phones, sending multiple unwanted or threatening text messages or voicemail messages, or posting negative comments or images of the survivor online. In some cases, how technology is misused to harass and control may seem unbelievable. However, it is important to trust your instincts. If you believe that you are being monitored or stalked via technology, you might be. Narrowing down what is happening, including the tactic and the technology used, can help to determine if stalking is occurring and if so, how to address is. | ||
+ | |||
+ | * '''Pen America - ONLINE HARASSMENT FIELD MANUAL'''' | ||
+ | |||
+ | Linkː https://onlineharassmentfieldmanual.pen.org | ||
+ | |||
+ | Licenseː Copyright. | ||
+ | |||
+ | Languageː English | ||
+ | |||
+ | For years, online harassment was dismissed in some quarters as less real, or less harmful, than harassment in the “real world.” More recently, after sustained efforts and pressure from those who bear the brunt of this harassment—women, people of color, LGBTQ+ individuals and people identifying with other marginalized or threatened groups—social media companies and the broader public have begun to take this issue seriously. There is now a growing recognition that online harassment can affect its targets’ freedom to express themselves, their livelihoods, and their mental and physical health. It is also clear that online harassment can extend to the offline world, especially for those who receive direct, specific threats of sexual violence, bodily harm, and even death, and who have their personal information published without their consent (known as “doxing”). | ||
+ | |||
+ | As an organization of writers, PEN America is particularly concerned about the ways in which online harassment affects writers’ work. Our 2017 Online Harassment Survey of over 230 journalists and writers found that 67 percent of respondents had experienced a severe reaction to being targeted by online harassment, including refraining from publishing their work, permanently deleting their social media accounts, and/or fearing for their safety or the safety of their loved ones. More than one-third of respondents reported avoiding certain topics in their writing due to online harassment, 16 percent reported permanently deleting a social media account, and 37 percent felt that online harassment had damaged their reputations. These survey findings align with years of reports from writers, journalists, and activists that experiencing harassment and hateful speech online can drive people offline entirely or lead them to avoid speaking or writing about topics that they fear will lead to further harassment. | ||
+ | |||
+ | * '''Protection International- 'Protection of LGBTI Defenders''' | ||
+ | |||
+ | Linkː https://protectioninternational.org/wp-content/uploads/2012/04/LGBTI_PMD_2nd_Ed_English.pdf | ||
+ | |||
+ | Licenseː Copyright | ||
+ | |||
+ | Languageː English | ||
+ | |||
+ | For the purposes of this manual the authors tried to avoid using any definitions of the terms lesbian, gay, bisexual, transgender and intersex. However on developing the manual and in conversations with various defenders working on a wide range of rights it became evident that some form of definition was needed in order to increase a general understanding of the issues at stake and improve the security enjoyed by defenders working on sexual orientation and sex/gender identity and gender expression issues and the rights to equality and non-discrimination of the LGBTI community. | ||
* '''Small Media - Jensat: Graphic Novel Illustrates Cybersecurity, Gender, and Sexuality in Contemporary Iran'''' | * '''Small Media - Jensat: Graphic Novel Illustrates Cybersecurity, Gender, and Sexuality in Contemporary Iran'''' | ||
Line 321: | Line 537: | ||
Compartimos un compilado de tácticas para el combate de la violencia relacionada con la tecnología. Este compilado incluye varias formas en las que mujeres han respondido ante diferentes tipos de agresiones, varias de estas respuesta cuentan con notas y ejemplos. | Compartimos un compilado de tácticas para el combate de la violencia relacionada con la tecnología. Este compilado incluye varias formas en las que mujeres han respondido ante diferentes tipos de agresiones, varias de estas respuesta cuentan con notas y ejemplos. | ||
Al compartirlo, buscamos que más mujeres que enfrentan este tipo de violencia puedan usarlo para trazar una estrategia de respuesta y también que quienes acompañamos a mujeres en estas situaciones encontremos una herramienta útil de consulta. | Al compartirlo, buscamos que más mujeres que enfrentan este tipo de violencia puedan usarlo para trazar una estrategia de respuesta y también que quienes acompañamos a mujeres en estas situaciones encontremos una herramienta útil de consulta. | ||
+ | |||
+ | * '''Stalking Resource Center'' National Center for Victims of Crime '' | ||
+ | |||
+ | Linkː http://victimsofcrime.org/our-programs/stalking-resource-center | ||
+ | |||
+ | Licenseː Copyright | ||
+ | |||
+ | Languageː English | ||
+ | |||
+ | The mission of the Stalking Resource Center is to enhance the ability of professionals, organizations, and systems to effectively respond to stalking. The Stalking Resource Center envisions a future in which the criminal justice system and its many allied community partners will have the best tools to effectively collaborate and respond to stalking, improve victim safety and well-being, and hold offenders accountable. | ||
+ | |||
+ | |||
+ | * '''Tactical technology collective - 'Gendersec Curricula'''' | ||
+ | |||
+ | Linkː | ||
+ | ENG: https://en.gendersec.train.tacticaltech.org/ | ||
+ | SPA: https://es.gendersec.train.tacticaltech.org/ | ||
+ | |||
+ | Licenseː CC BY SA NC | ||
+ | |||
+ | Languageː English and Spanish | ||
+ | |||
+ | The Gendersec Curricula introduces a feminist perspective to privacy and digital security trainings. Informed by our experience organising Gender and Technology Institutes for women and trans activists around the world, this free resource is available in English and Spanish and covers over 20 topics including Hacking Hate Speech, Risks and Strategies when Using Dating Platforms, Creative Uses of Social Media, Handling Stress and Strategies of Resistance. Trainers, facilitators, defenders can access these workshops and adapt them to their communities to support Women Human Rights Defenders in protecting themselves from online and offline threats. | ||
+ | |||
+ | * '''Tactical technology collective - 'Data Detox Dating apps'''' | ||
+ | |||
+ | Linkː https://datadetox.myshadow.org/en/bonus/dating | ||
+ | |||
+ | Licenseː CC BY SA NC | ||
+ | |||
+ | Languageː English, Spanish, Deutsch, French, Portuguese | ||
+ | |||
+ | Tinder, Grindr, Happn, OkCupid, Match, eHarmony... there are so many dating services out there. This Data Detox Extra will introduce you to the third wheel in your dating life and give you tips on how to share less and keep more secrets. | ||
+ | |||
+ | * '''Tactical technology collective - 'My Shadow Curricula + Materials'''' | ||
+ | |||
+ | Linkː https://myshadow.org/train + https://myshadow.org/materials | ||
+ | |||
+ | Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0) | ||
+ | |||
+ | Languageː English and Spanish | ||
+ | |||
+ | Session outlines for trainers. WORKSHOP outlines can be used to run longer, structured sessions; these often pull in multiple activities. Stand-alone ACTIVITIES can be used to illustrate a single issue. | ||
* '''Tactical technology collective - 'Zen and the art of making tech work for you'''' | * '''Tactical technology collective - 'Zen and the art of making tech work for you'''' | ||
Line 376: | Line 635: | ||
Launching DatNav: a guide designed to help you navigate and integrate digital data into your human rights research. DatNav is the result of a collaboration between Amnesty International, Benetech, and The Engine Room which began in late 2015 culminating in an intense four day writing sprint facilitated by Chris Michael and Collaborations for Change in May 2016. Security relates to physical safety, health, finances, discrimination, privacy, etc. Security threats vary from person to person and group to group. For some their religion or sexual orientation may pose the greatest safety risk. Understanding these concerns from the perspective of everyone involved in your work is the first step in fostering a productive and safe environment. | Launching DatNav: a guide designed to help you navigate and integrate digital data into your human rights research. DatNav is the result of a collaboration between Amnesty International, Benetech, and The Engine Room which began in late 2015 culminating in an intense four day writing sprint facilitated by Chris Michael and Collaborations for Change in May 2016. Security relates to physical safety, health, finances, discrimination, privacy, etc. Security threats vary from person to person and group to group. For some their religion or sexual orientation may pose the greatest safety risk. Understanding these concerns from the perspective of everyone involved in your work is the first step in fostering a productive and safe environment. | ||
+ | |||
+ | * '''Trollbusters - 'Digital Hygiene Course'''' | ||
+ | |||
+ | Linkː https://yoursosteam.wordpress.com/digital-hygiene-course/ | ||
+ | |||
+ | Licenseː ? | ||
+ | |||
+ | Languageː English | ||
+ | |||
+ | Prevent online harassment before it starts. Each lesson takes 5-10 minutes to complete. Start now by keeping harassment from migrating offline. | ||
* '''Web we wantː Recipes for a Digital Revolution''' | * '''Web we wantː Recipes for a Digital Revolution''' | ||
Line 386: | Line 655: | ||
10 delicious recipes for digital rights activism from Latin America that will make you want to stir up your own ideas and serve them to your friends. | 10 delicious recipes for digital rights activism from Latin America that will make you want to stir up your own ideas and serve them to your friends. | ||
+ | |||
+ | * '''Without My Consent: Tools to fight online harassment'''' | ||
+ | |||
+ | Linkː https://withoutmyconsent.org/resources | ||
+ | |||
+ | Licenseː Copyright. | ||
+ | |||
+ | Languageː English | ||
+ | |||
+ | If you’re reading this because someone has distributed nude photos or videos of you online, without your consent or in breach of your trust, there’s good news: you have many tools available to get control back. These resources are part of WMC’s Something Can Be Done! guide, and have been developed by the country’s top digital abuse lawyers. However, lawyers do not make decisions in a vacuum. Every case is different and the preferred strategy for your case should be tailored to the behavior of the particular people involved and the circumstances of each case. We are not your attorneys and the information presented here is not legal advice. However, if you follow these directions and take this information to your legal counsel, police precinct, domestic violence clinic, or family court self-help center, the answer will no longer be “nothing can be done.” WMC wants victims and their supporters to know everything that can be done on every level to combat nonconsensual porn. | ||
* ''' Women Human Rights Defenders International Coalition (WHRD IC)ː Gendering Documentation : A Manual for and about Women Human Rights Defenders''' | * ''' Women Human Rights Defenders International Coalition (WHRD IC)ː Gendering Documentation : A Manual for and about Women Human Rights Defenders''' | ||
Line 474: | Line 753: | ||
El Desarmador es una iniciativa de La Imilla Hacker (https://imillahacker.sdf.org). Imilla es la voz quechua/aymara que quiere decir niña o mujer joven. Somos un colectivo enfocado en la producción de contenidos alternativos sobre tecnopolítica y sociedad; con la intención de abrir las puertas al análisis de varios temas como la privacidad, el anonimato, la vigilancia, la gobernanza de internet, la violencia en línea contra las mujeres, y la apropiación de la infraestructura de las telecomunicaciones. | El Desarmador es una iniciativa de La Imilla Hacker (https://imillahacker.sdf.org). Imilla es la voz quechua/aymara que quiere decir niña o mujer joven. Somos un colectivo enfocado en la producción de contenidos alternativos sobre tecnopolítica y sociedad; con la intención de abrir las puertas al análisis de varios temas como la privacidad, el anonimato, la vigilancia, la gobernanza de internet, la violencia en línea contra las mujeres, y la apropiación de la infraestructura de las telecomunicaciones. | ||
+ | * '''Podcasts Señoras de internet'''' | ||
+ | |||
+ | Linkː https://soundcloud.com/tristanaproducciones/sets/senoras-de-internet | ||
+ | |||
+ | Licenseː ? | ||
+ | |||
+ | Languageː Spanish | ||
+ | |||
+ | Señoras de internet es un podcast ciberfeminista acerca de los futuros porvenires tecnológicos. Es, también, una invitación en formato de podcast a un té radial en el que se degustan las agridulces contradicciones del presente tecnopolítico. | ||
+ | |||
+ | Ladies of the Internet is a cyberfeminist podcast about future technological achievements. It is also an invitation in podcast format to a radio tea in which the bittersweet contradictions of the technopolitical present are tasted. | ||
== Before producing a manual == | == Before producing a manual == | ||
Latest revision as of 08:02, 8 March 2019
This HowTo is still largely Work In Progress.
A list of manuals about privacy and digital security from a gender perspective
Manuals produced by collectives/organisations
- Access Now - 'A first look at Digital Security'
Licenseː Creative Commons Attribution NonCommercial 4.0 International License
Languageː English
We created “A First Look at Digital Security” — an open-source booklet — to help you take the first steps toward improving your digital security online, and we continue to update it online at Github to make sure it remains accessible for anyone who needs it. The guide uses five user archetypes to introduce the concept of threat modeling, and there is a glossary to explain the most difficult terms and ideas. If you are a digital security trainer, you can use and further develop the user archetypes that we present as scenarios for your teaching activities, and we have now added space — a blank persona building page — that your students can use to create their own threat model, based concretely on their particular situation and needs.
- Access Now - 'Digital Security Helpline Community Documentation'
Linkː https://accessnowhelpline.gitlab.io/community-documentation/index.html
Licenseː (CC BY 3.0 US) 2019 Access Now.
Languageː English
In this website you will find guides we use at Access Now Digital Security Helpline to handle different kinds of cases during our 24/7 operations. If you run a digital security helpdesk or are just advising your friends about how to secure their online activities or respond to a digital security incident, you can find some useful tips and procedures in these guides.
- Acoso.online - 'Guía práctica para tratar casos de pornografía no consentida en recintos educacionales bajo estándares de derechos humanos y equidad de género
Licenseː ?
Languageː Castellano
Esta guía es un recurso para que establecimientos educacionales establezcan parámetros base para lidiar con casos de difusión no consentida de imágenes y videos íntimos (también conocida como pornografía no consentida) en un marco de derechos humanos y equidad de género. Ha sido elaborado por Acoso.Online, un proyecto colaborativo e independiente que busca dar orientaciones concretas a las víctimas de pornografía no consentida en Latino América y el Caribe. La necesidad de entregar esta guía nace debido a dos razonamientos principales: por un lado, la abrumadora mayoría de casos que ocurren en contextos estudiantiles y, por otro, el silenciamiento y naturalización de este tipo de agresión. En esa combinación, esta guía pretende ser orientadora para todo institución educacional y comunidad relacionada y, en general, toda persona que quiera proponer estándares de acción para respetar los derechos humanos de las víctimas de esta agresión.
- Ancestra - 'Guía de recursos digitales para mujeres rurales'
Licenseː Licencia Creative Commons Atribución Compartir Igual 2.5 Colombia
Languageː Castellano
Ancestra es una guía básica sobre tus derechos como mujer y las posibilidades y recursos digitales disponibles en internet para potenciar tu desarrollo emocional, físico, educativo, laboral, familiar y comunitario. Ser mujer campesina no te excluye de internet ni de ningún otro ámbito de comunicación y participación, a pesar de las grandes diferencias que existen en el acceso a Internet entre hogares urbanos y rurales colombianos.
Si una vez al día, a la semana o al mes puedes conectarte a través de un computador, tablet o teléfono celular, Ancestra quiere entregarte algunas ideas para que se enriquezca tu experiencia de navegar e interactuar en internet.
- Aluna Acompañamiento Psicosocial y Jass Mesoamérica
Linkː https://docs.wixstatic.com/ugd/536db9_b0f243eefe5e4b4190fbe1e71424e1f7.pdf
Licenseː ?
Languageː Castellano
Esta publicacion recopila diferentes reflexiones de defensoras de Mesoamérica sobre el miedo desde sus propias historias y experiencias.
A lo largo del diálogo surgieron muchas preguntas sobre qué es el miedo y sobre cómo lo afrontan las defensoras, especialmente cuando lo ubicamos en una sociedad patriarcal, en un contexto de violencia socio-política y cuando las sujetas que afrontan ese miedo son mujeres defensoras que, por su condición de género, además de esa violencia generalizada tienen que enfrentar las violencias cotidianas contra su ser femenino y feminista. En respuesta a ello, a través de este documento se intentó crear un tejido de ideas y testimonios sobre sus miedos, con el objetivo de verse reflejadas en ellos y así poder continuar construyendo caminos de resistencia y esperanza.
- Association for Progressive Communications - 'Take back the tech'
Linkː https://www.takebackthetech.net/
Licenseː Copyleft
Languageː English, French, Spanish
Take Back The Tech is a global campaign that connects the issue of violence against women and information and communications technology (ICT). It aims to raise awareness on the way violence against women is occurring on ICT platforms such as the Internet and mobile phones, and to call for people to use ICT in activism to end violence against women. It was initiated by the Association for Progressive Communications, Women's Networking Support Programme, in 2006. Since then, the campaign has been taken up and organised by individuals, collectives and non-governmental organizations in at least 24 countries. The platform includes various manuals and howtos such asː
- The "know more section" which list specific information regarding types of Violence Against Women such as Black mail, cyberstalking and hate speech.
- In 2015 they have released with Just Associates (JASS) Southern Africa and Women's Net the following manualː ICTs for Feminist Movement Building: Activist Toolkit
How do we tell our own stories and make ourselves heard? How do we tell stories that empower and inspire, and challenge mainstream stories that tend to silence, erase women’s lives, experiences and voices? How do we communicate with each other and with people beyond our movements? What is the best way to develop messages that reach out to people and make our movements bigger? What tools make the most sense for our context and capacity? How can we communicate safely and securely in a world that has become increasingly risky for activists and women’s rights activists online and offline?
- Akelarre Ciberfeminista - Kit de autodefensa ciberfeminista #uno'
Linkː https://akelarreciberfeminista.noblogs.org/category/kits/
https://ia801502.us.archive.org/2/items/santoral_digital/santoral_digital.pdf
Licenseː Creative Commons Reconocimiento-CompartirIgual 4.0 Internacional
Languageː Spanish
Este fanzine se cocina durante los encuentros, físicos y virtuales, del #AkelarreCiberfeminista. Surge de una propuesta presentada por Virginia Díez y Lyann Quartas para la convocatoria de “Narrativas digitales en tiempo real” de Medialab-prado. Dicha convocatoria se enmarca en el proyecto de investigación sobre stream y procesos creativos con software y tecnologías libres, que coordina Julián Pérez. #Akelarreciberfeminista (que se colectiviza a través de una convocatoria pública más para formar un grupo de investigación diverso) se trata de empoderarnos y diseñar juntxs un kit de autodefensa feminista en la red. Durante casi tres meses, hemos analizado el activismo digital, con sus nuevas narrativas y performatividades, desde una perspectiva de género y con el objetivo de realizar una guía de seguridad digital feminista.
- Akelarre Subversiva - Taller de seguridad digital feminista Mis dispositivos, mis cuentas, mis reglas
Linkː https://aquelarresubversiva.net/theme/pdf/taller-manual-aquelarre.pdf
Licenseː Creative Commons Reconocimiento-CompartirIgual - No Comercial
Languageː Spanish
Manual de seguridad desarrollado por Imilla Hacker para el Encuentro Aquelarre Subversiva, Espacio Autónomo Feminista Autogestionado de Bolivia
- Chayn.org - 'Do It Yourself Online Safety'
Linkː http://chayn.co/safety/
Licenseː Creative Commons Attribution 4.0 license
Languageː English, Arabic, Spanish, French, Farsi, Pashto, Urdu and Russian.
CHAYN is an open-source project that leverages technology to empower women against violence and oppression so they can live happier and healthier lives. Running solely on the passion of skilled volunteers, Chayn leverages technology to address the problems women face today. They are also a pro bono service to charities who work with vulnerable women. Written in simple language, the guide will teach you everything you need to know about how you can be tracked – and how to hide your tracks on email, browsers, facebook and other platforms. This guide can be useful irrespective of your gender, location or situation.
- How to build your own domestic violence case without a lawyer is based on their experience from working with survivors of domestic abuse and their realisation that women can often not have access to legal aid/help because they are either very depressed, it’s too difficult for them to think their way around the legal jargon, they cannot physically approach a lawyer and increasingly, there is no legal aid or counsel is too expensive. Irrespective of whether someone wants to take legal action (criminal, divorce, child custody or asylum) – collecting and presenting evidence is critical.
- Ciberfeministas Guatemala'
Linkː http://www.ciberfeministas.or.gt/fanzines-libres/ (March 2018: website is down)
Licenseː Copyleft
Languageː Spanish
Hicimos unas pequeñas publicaciones, fanzines, revistitas o folletitos, como quieran llamarlos, para compartir entre todas. Compartimos acá los PDF, para imprimir en hoja oficio, y los editables en .svg para que puedas adaptarlos. Encontraran fanzines acerca de la Privacidad, Violencia machista en línea, Ciberactivismo feminista, Empoderamiento de las mujeres a través de las TIC, Acoso callejero.
- Ciberfeminismos-Ciberbrujeria - 'GUÍA BÁSICA DE AUTODEFENSA DIGITAL PARA CELULARES'
Linkː https://archive.org/details/guiaautodefensatelefonos
Licenseː Copyleft
Languageː Spanish
Editado para el 32° ENCUENTRO NACIONAL DE MUJERES, TRANS TRAVAS Y LESBIANAS en CHACO, 2017. Nuestros teléfonos no solo son ventanas abiertas en nuestras vidas, sinotambién en las vidas de nuestrxs amigxs, familias, compas...y cualquiera d e nuestrxs contactos. Quizás se piense que no hay nada para ocultar pero no podemos asegurar lo mismo por todxs los contactos con lxs que interactuamos por vía telefónica. Proteger la información de nuestro teléfono es también proteger a nuestrxs amigxs. Cuando hacemos una llamada telefónica o enviamos mensajes, se registran al menos la ubicación geográfica de quien llama y quien contesta, sus números de teléfono, la hora y duración de la comunicación y los números de serie de los dispositivos utilizados. De igual manera pueden ser capturados los datos de nuestras comunicaciones por medio de alguna aplicación del smartphone. En un mismo aparato se vinculan los datos del número telefónico, correo, contactos, actividad en redes sociales, SMS, fotografías, archivos, datos de GPS y a veces la sincronización con otros dispositivos.
- Ciberseguras
Linkː https://ciberseguras.org/
Licenseː CC BY
Languageː Spanish
Somos varias, cada una con distintos poderes, venimos de diferentes galaxias pero constelamos juntas. Nuestro espacio compartido es la red y nos unimos para ahuyentar a las fuerzas ocultas que nos atacan. Para hacerles frente, conspiramos en aquelarres ciberfeministas. Ciberseguras es el fuego que nos reúne en un círculo de goce, baile y encuentro. Aquí aprendemos juntas. Ciberseguras somos Clandestina (Brasil) , Ciberfeministas GT (Guatemala), Derechos Digitales (Chile-México), Dominemos la tecnología - APC, Luchadoras (México), Nodo Común (Bolivia), SocialTIC (México).
- Coding Rights - Send nudes'
Linkː http://www.codingrights.org/send-nudes/
Licenseː Creative Commons Attribution-ShareAlike 3.0 Unported (CC BY-SA 3.0)
Languageː Brasilian, English
Digital security can also be fun. By apropriation of the meme “send nudes!”, this small project has the goal to spread the word about digital security for the average user, who relies on digital media for their communication, but are not necessarily tuned with the specifics of digital security debate. Also discussing post-porn aesthetics and strategies for combating gender inequalities in the web, it was thought to be more appealing to women and sexual minorities, since they are more easily exposed to online haressment, by practices such as revenge “porn”, doxxing, cyberbulling, etc.
- Coding Rights - SaferSisters: Feminist Digital Security Hints in gifs!'
Linkː https://medium.com/read-write-participate/safersisters-online-security-tips-in-gifs-222589166ed8 https://medium.com/codingrights/safermanas-dicas-de-seguran%C3%A7a-digital-em-gifs-bf270086eb66 https://medium.com/@codingrights/safermanas-tips-de-seguridad-digital-en-gifs-4453cf18d985
Licenseː ?
Languageː English, Spanish, Portuguese
Coding Rights will publish a new themed gif per week under the hash #SaferSisters. The ones to follow will explain how to protect nude photos, how to prevent the misuse of location data by creepy stalkers, how to choose a period-tracking app that does not leak the inners of our wombs to the cyber world, what to think when we use dating or taxi apps and even how to escape sexist ads that haunt us for days. All gifs will be produced in Portuguese, English and Spanish.
- Coding Rights - Chupadados
Linkː https://chupadados.codingrights.org/
Licenseː Creative Commons Attribution-ShareAlike 3.0 Unported (CC BY-SA 3.0)
Languageː Brasilian, Spanish
Estos dispositivos son bonitos, gentiles, nos hacen compañía y nos hacen sentir atractivos y amparados. Nos apasionamos por ellos y depositamos en ellos toda nuestra confianza, desde los gestos más cotidianos hasta los secretos más íntimos. Ellos son nuestros objetos de deseo y sueños de consumo. Hasta el día en que nos damos cuenta de que controlan lo que hacemos, monitorean con quiénes nos encontramos y comparten nuestra intimidad con gente que no tiene nada que ver con eso. A partir de conceptos como "Big Data", "Smart Cities" e "Internet de las Cosas", creemos que la abundancia de datos, sumada a la alta capacidad de procesamiento de las computadoras con algoritmos inteligentes, facilitan y proporcionan más eficiencia a las ventas, la economía, el combate al crimen, la movilidad, la protección del medio ambiente, la garantía de la seguridad, de la salud y muchos de los problemas que enfrentamos globalmente. Pero ¿cómo funcionan estas tecnologías y al servicio de qué intereses trabajan? Vean por ejemplo la seccion sobre Cuerpos y su analisis de aplicaciones para control menstrual, aplicaciones deportivas, aplicaciones de salud, dildos, termómetros y colectores menstruales conectados a internet. Gracias a esos dispositivos hoy podemos convertir enfermedades, sexualidades, calorías y sangre menstrual en información, números y valor. El Chupadatos interpreta esas informaciones como mejor le parece. Con su mente oscura, te impone patrones normativos sobre tu peso, tu salud y tu vida sexual, e incluso comparte tu información íntima por ahí. Molesto, ¿no?
- Consorcio para el Diálogo Parlamentario y la Equidad Oaxaca A.C. - 'Lineamientos para la construcción de planes integrales de protección con enfoque feminista'
Linkː https://gendersec.tacticaltech.org/wiki/images/5/5a/MANUAL_web.pdf
Licenseː Está permitido compartir, copiar y redistribuir los contenidos siempre que se cite la fuente y sea sin fines de lucro.
Languageː Spanish
En el marco de la Campaña de los 16 días de Activismo contra la Violencia de Género, Consorcio Oaxaca presentó el Folleto “Lineamientos para la Construcción de Planes Integrales de Protección con Enfoque Feminista”. Frente al grado de falta de acción por parte del Gobierno para garantizar la labor, la vida y la seguridad de defensoras, defensores y periodistas, resulta necesario dicho instrumento.
- CMI-Rio - Centro de Mídia Independente Rio de Janeiro e gaivotas.- 'Tem Boi na Linha?
Linkː https://temboinalinha.org/index.html
Licenseː Creative Commons Attribution NonCommercial 4.0 International License
Languageː Portuguese
Esse site parou de ser atualizado em 2015. Algumas recomendações de ferramentas podem estar desatualizadas. Para os movimentos sociais, a comunicação rápida e segura entre membros de um coletivo, entre coletivos, ou entre ativistas independentes é fundamental tanto para o planejamento e a eficácia das ações, como também para o fortalecimento do próprio movimento de resistência. Na era analógica, espionar as comunicações de um indivíduo ou grupo e apreender documentos sensíveis, eram ações bastante comuns, apesar de serem dirigidas a alvos específicos e um tanto difíceis de serem camufladas. Com a internet, essa prática se tornou mais discreta, silenciosa e ainda mais comum, sendo utilizada em larga escala, para a espionagem em massa, e por motivos que ultrapassam os estritamente políticos.
- Cyber Civil Rights Initiative - 'ONLINE REMOVAL GUIDE'
Linkː https://www.cybercivilrights.org/online-removal/
Licenseː Copyright
Languageː English
At the Cyber Civil Rights Initiative, we know how traumatic and distressing it can be to find your intimate images online when you didn’t consent to them being shared. We worked with all of the major social media and tech companies to come up with the following document to provide you with a list of how to report this violation on all of their platforms.
- Crash Override network - 'Various'
Licenseː Not specified
Languageː English
This anti-online hate task force, staffed by former targets, provides resources, outreach, and support to combat mob hatred and harassment. They have drafted a manual for everyone, including those curious about doxing and those who have already been targeted, the following is a primer on the realities, pathology, and personal solutions for this particularly nasty form of online harassment.
Preventing Doxing: “Doxing” is a common first-stage tactic of mobs abusers looking to intimidate their targets and start digging up information on their life. Learn some tricks to help prevent it here. Link: http://www.crashoverridenetwork.com/preventingdoxing.html
Guide: Talking to Family and Police: We’ve assembled a few basic tips that we’ve found help the less tech-savvy people in our lives understand the very real toll of internet harassment, as well as some basic tips to get on the same page with the people in your life and law enforcement, in the event that you unfortunately need it. Link: http://www.crashoverridenetwork.com/familyandpolice.html
So You’ve Been Doxed: A Guide to Best Practices: A primer on the realities, pathology, and personal solutions for this particularly nasty form of online harassment. Link: http://www.crashoverridenetwork.com/soyouvebeendoxed.html
- Cyborg Feministas - Recursos'
Linkː https://cyborgfeminista.tedic.org/inicio/recursos/
Licenseː Creative Commons Reconocimiento-CompartirIgual 4.0 Internacional
Languageː Spanish
Recursos para descargar e imprimir: Cyborg Feminismo por Adriana Peralta; Sexting por Regi Rivas; Iconos de super mujeres por Florencia Aguirre + Toolkits de Seguridad Digital: Serie de Fanzines
- Data Society - Best Practices for Conducting Risky Research and Protecting Yourself from Online Harassment'
Linkː https://datasociety.net/pubs/res/Best_Practices_for_Conducting_Risky_Research-Oct-2016.pdf
Licenseː Creative Commons Attribution 3.0 Unported license.
Languageː English
Researchers who investigate sensitive topics may face online harassment, social shaming, or other networked forms of abuse. In addition to potential impacts on the researcher’s reputation and mental health, fear of harassment may have a chilling effect on the type of research that is conducted and the capabilities of individual researchers.
This document is a set of best practices for researchers – especially junior researchers – who wish to engage in research that may make them susceptible to online harassment. We provide recommendations for academic institutions, supervisors, and individuals, including cyber-security guidelines and links to other resources.
The authors welcome feedback about this document. Please send suggestions and edits to risky research at datasociety dot net.
- Digital Rights Foundation - 'The art of digital security for pakistani women'
Licenseː Creative Commons Attribution-ShareAlike (CC BY·SA) license.
Languageː English, Urdu
This guidebook has been specially made for Pakistani women and is available in Urdu and English.
- Donestech.net - 'KIT contra les violències masclistes on-line'
Linkː Cat: https://donestech.net/files/kitcontraviolenciesmasclistesonline2018.pdf Spa: https://donestech.net/files/kitviolencies2019_cast.pdf
Licenseː Creative Commons Attribution - Share Alike - No Commercial
Languageː Catalan, Spanish
Des d’una posició crítica i feminista, introduïm les violències masclistes on-line i, sobretot, posem a la vostra disposició una sèrie de propostes, recursos i iniciatives per a que ens cuidem, ens defensem, contrarestem i alteractuem davant d’aquestes violències.
Aquest KIT creiem que resultarà molt útil per a les dones i persones LGTBIQ*, especialment per aquelles dones violentades, però també les destacades, les feministes i dissidents sexuals i de gènere que es veuen afectades per aquestes violències on-line de forma creixent. Us animem a utilitzar aquest KIT tant de forma preventiva com reactiva i esperem que us sigui d’utilitat.
- Donestech.net - 'Redes Sociales en perspectiva de género: Guía para conocer y contrarrestar las violencias de género on-line'
Linkː https://donestech.net/files/redessociales.pdf
Licenseː Creative Commons Attribution - Share Alike - No Commercial
Languageː Spanish
Dentro de ese entramado de redes sociales que se despliegan en nuestras vidas conectadas y fuera de Internet operan una multitud de posibilidades que se entrelazan fuertemente. Por todo ello, es cada vez más importante entender dónde y cómo nos movemos por los espacios conectados, para poder saber cómo operar e influenciar cambios positivos, así como para poder cuidar y cuidarnos entre nosotras para contrarrestar y sobrepasar estas violencias, agresiones y vulnerabilidades que pueden amplificar, complementar o, incluso, cambiar las que ya se experimentan en la vida física. Por todo ello esta publicación incluye, en una primera parte, la presentación de algunas de las características de las redes sociales en general y de las plataformas de redes sociales on-line. Lo abordamos de forma crítica y con perspectiva de género, así como relacionamos internet, las identidades, la privacidad y la seguridad con el género. Seguidamente nos adentramos en las violencias de género y, específicamente, las violencias de género on-line. Partimos de un análisis del panorama de datos cuantitativos y cualitativos existentes para, en la medida de lo posible, visibilizar qué está pasando si nos preguntamos sobre este tipo de violencias. Después, en una segunda parte, exponemos en detalle las violencias de género on-line, así como las posibilidades de hacerles frente. En este sentido, identificamos y definimos un conjunto de violencias de género que están ocurriendo en las redes sociales on-line y presentamos, a la vez, pistas, recomendaciones e iniciativas para profundizar en ellas y lograr autodefendernos, así como contrarrestarlas.
Esta publicación pues, está pensada para que pueda utilizarse también como guía y manual para entender mejor cuales son los componentes de género que atraviesan las redes sociales on-line. Sin embargo, y sobre todo, buscamos contribuir a que desde una posición más informada, crítica y feminista se puedan detectar y conocer las violencias de género on-line y,en la medida de lo posible y en un futuro próximo, se puedan sobrepasar. Por ello, esta publicación puede resultar muy útil a las mujeres, especialmente a las mujeres vocales, feministas y disidentes sexuales y de género, que de forma creciente se ven afectadas por las violencias de género on-line. Además, por el idioma utilizado, las autorías, voces y miradas, así como la mayoría de datos y referencias utilizadas, esta guía resulta especialmente interesante para las mujeres latinas e iberoamericanas.
- Donestech.net - 'Various'
Linkː http://donestech.net/
Licenseː Creative Commons Attribution - Share Alike - No Commercial
Languageː Spanish, Catalan, English
- Comic Lela: A comic for kids and grown ups available in spanish, catalan, english about free software and free culture (https://www.donestech.net/comic-lela)
- Kit de formacion Genero, Tic y Activismoː A compilation of articles in Spanish about how to link gender, activism and a tactical use of ICT (https://donestech.net/files/kit_cast_5.pdf)
- Guia didàctica per a la formació en perspectiva de gènere i interculturalitat: A toolkit in catalan for telecentres about how to provide trainings to ICT that take into account gender and cultural diversityː (http://www.donestech.net/ca/guia_didactica)
Donestech.net is a cyberfeminist activist research and action collective that investigates the specificities of the relations of women in/with ICT, enhance access of women to technology, creates networks and incorporate/experiment technologies in their research processes and in their technoactivist practices. Comic Lela wants to be a teaching resource, artistic, media and awareness to promote sustainable and radical use of technologies by women.
- Feminist Frequency - Countering Online Harassment Safety and Support Guide'
Linkː https://onlinesafety.feministfrequency.com/
Licenseː ?
Languageː English, Spanish, Arabic
This guide contains things we’ve learned about how to keep yourself safe from individuals, loosely organized groups & cybermobs online.
- FemTechNet - 'Center for solutions to online violence'
Linkː http://femtechnet.org/csov/
Licenseː Not specified
Languageː English
The Center for Solutions to Online Violence is both a digital resource space, hosted in perpetuity by FemTechNet, and a community of people working to address the ever-evolving risks faced by women and feminists online. Going forward, the project will be co-facilitated by T.L. Cowan and Moya Bailey, who have been essential to the work this year. They, in turn, are supported by a committee of volunteers and the broader FemTechNet network. In the coming year, CSOV will continue to connect survivors of online violence to resources and communities who can help. It will also continue the hard work of making visible the violences that women of color, queer and trans-creators, and other marginalized communities experience – too often at the hands of those who purport to want to help. Trust is partially about understanding the risks that others face and demonstrating that you are willing to address those risks before doing any additional work. This is the foundation of the Center for Solutions to Online Violence
- Fight Cyberstalking'
Linkː https://www.fightcyberstalking.org
Licenseː Copyright
Languageː English
FightCyberstalking.org is an online resource site for cyberstalking victims: information on reporting a cyberstalker, online privacy tips, and tips for safer socializing online on social media sites, such as Twitter, Facebook, Instagram and YouTube. FightCyberstalking.org was launched and created in 2010 after the founder, Lisa Woeller, become a victim of a cyber stalker in 2006. If you find this site helpful, please feel free to share our website, like, and follow us on the web.
- Fundacion Karisma'
Linkː https://karisma.org.co/?wpdmdl=7174
Licenseː Licencia Creative Commons Reconocimiento-Compartir Igual 4.0.
Languageː Spanish
Seguridad, privacidad y proteccion en Twitter, una guia para personas sobrevivientes de acoso y abuso. Esta publicación está basada en Safety, Privacy on Twitter. A guide for survivors of harassment and abuse, elaborada por la National Network to End Domestic Violence (NNEDV) con el apoyo de Twitter. La traducción y adaptación para América Latina ha sido posible gracias al apoyo de Twitter.
- Hiperderechos- 'Tecnoresistencias'
Linkː https://hiperderecho.org/tecnoresistencias/
Licenseː Creative Commons Atribución 4.0.
Languageː Spanish
tecnoresistencias es un espacio donde encontrarás información para tu autodefensa digital desarrollado por Hiperderecho, una organización peruana que defiende el derecho de todas y todos a participar de espacios digitales con libertad y seguridad.
Esta página es el resultado de nuestra investigación sobre violencia de género en línea donde participaron activistas, defensorxs de derechos humanos, personas de la comunidad LGBTIQ+, feministas y personas quienes han enfrentado este tipo de violencia. A cada una de ellas les agradecemos por su tiempo, interés y ganas de seguir luchando por espacios digitales seguros. Ahora, te invitamos a seguir descubriendo Tecnoresistencias. En las siguientes secciones detallamos los tipos de violencia que hemos encontrado, cómo denunciarlos y los talleres de #AutoDefensaDigital que ofreceremos este año. Esperamos esta información sea útil y que te sirva para disfrutar de internet sin violencia.
- Instituto Patrícia Galvão' - 'Dossiê Violência contra as Mulheres''
Linkː https://dossies.agenciapatriciagalvao.org.br/violencia/
Licenseː ?
Languageː Portuguese
Este é um dossiê digital feito para contribuir com a divulgação de informações e o debate sobre a violência contra as mulheres. Para isso, conta com um banco de fontes de especialistas e também com um banco de pesquisas que reúne dados e estudos atuais sobre a violência de gênero no Brasil. O dossiê também dispõe de uma seção de conteúdos especiais, que compilam informações, dados e análises.
- Luchadoras- 'La clicka libres en linea'
Linkː https://www.libresenlinea.mx/
Licenseː Creative Commons Attribution NonCommercial
Languageː Spanish
Libres en línea es una campaña de La Sandía digital y Luchadoras como parte de Dominemos la tecnología.
- Marialab, Blogueiras Negras, Universidade Livre Feminista e Cfemea GUIA PRÁTICA DE ESTRATÉGIAS E TÁTICAS PARA A SEGURANÇA DIGITAL FEMINISTA
Linkːhttp://feminismo.org.br/guia/guia-pratica-seguranca-cfemea.pdf
Licenseː Licencia Creative Commons Reconocimiento-Compartir Igual 4.0.
Languageː Português
Esta Guia Prática de Estratégias e Táticas para a Segurança Digital Feminista tem o objetivo de proporcionar às mulheres maior autonomia e segurança na internet, apresentando estratégias e táticas de defesa digital para feministas. Os conteúdos são dirigidos para o público de mulheres da América Latina e foram elaborados considerando diferentes mulheres: negras, trans, lésbicas, ativistas/militantes de movimentos organizados de mulheres ou que atuam individualmente na rede, sendo de periferias urbanas, rurais, com distintos níveis de acesso à tecnologia nas suas abordagens
- HACK*BLOSSOM - `DIY Cybersecurity for Domestic Violence: A resource of privacy + compassion'
Linkː https://hackblossom.org/domestic-violence/
Licenseː CC BY-NC-SA
Languageː English
Why Cybersecurity? Domestic violence isn't always physical. Many intimate partners exert control using the technologies we rely on everyday. Being intimidated by constant phone-calls, stalked by location-sharing apps, humiliated on social media, forced to share sensitive texts and passwords: each of these experiences is a violation of privacy that affects your freedom to make decisions about your life. Being deprived of your autonomy is no less painful when it's digital. DIY Cybersecurity asserts your privacy online. When you're threatened by your partner, you can always reach out to a domestic violence professional. But whenever you need to protect yourself online, you're not alone. Our Threat Scenarios explore, in-depth, how to resist a controlling partner. Each guide is accessible and empathetic: you're not obliged to follow any of our suggestions if you don't feel they're right for you. We also have Defense Strategies for proactively securing your digital life. There's a quick exit button in the sidebar in case you need to suddenly leave the site. If you want to make sure there's no history of your visit, please read our guide on Private Web Browsing.
- HACK*BLOSSOM - `A DIY Guide to Feminist Cybersecurity'
Linkː https://hackblossom.org/cybersecurity/
Licenseː CC BY-NC-SA
Languageː English, Spanish, German
You have a right to exist safely in digital spaces. Although we have to rely on outside parties for technology to access these spaces, there are tons of helpful tools and strategies that allow you to take greater control of your digital life and mitigate the risk of malicious threats. We’ll walk through common areas of digital life such as web browsing, private data, and smartphones to show you different ways that you can implement as much or little security as you’re comfortable with. You have power to set boundaries and protections in your digital spaces as you see fit: we hope that this guide will help you to make informed, personal decisions on what is right for you.
- Hacking with care'
Linkː http://hackingwithcare.in/ http://hackingwithcare.in/wiki/doku.php/start#welcome_to_hacking_with_care_wiki http://hackingwithcare.in/by/ressources/
Licenseː CC Attribution-Noncommercial-Share Alike 3.0 Unported
Languageː English
Hacking With Care is collective composed of hackers-activists, caregivers, artists, sociologist, growing quite literally by contact and affinity. Together we imagine, circulate, put in common resources and tools for care in accordance with hackers ethics and peer-to-peer philosophy. We create occasions for body & soul rejuvenation and collective (re)appropriation of care. We work with an understanding of the needs and requirements of specific contexts, as can be found in hacking and activism. Similarly, we like to transmit to caregivers some hackers-activists tools and best practices, for example in relation to privacy/data protection, technological independence, operational security. Other aspects we like are creativity in care, access to knowledge, interdisciplinarity, questioning of norms…
Our actions evolve around two principal axis that could be (but not limited to): Care for hackers-activists and Hackers ethics and tools for caregivers. They include care corners at hackers-activists events, pop-up massage sessions at the quarters of activists organizations, massage and well-being workshops and tutorials, compilation of resources and creation of original resources, research, news watch….
- Hollaback - Tehcnical safety guides and Social Media Safety Guides'
Linkː https://iheartmob.org/resources
Licenseː Copright
Languageː English
- Technical Safety Guide: Chances are, you’ve either been harassed online or you might be in the future. We partnered with Take Back the Tech! to design a guide that will walk you through the immediate steps you need to take to feel safe and give you the information you need to make informed decisions.
- Social Media Safety Guides: We have worked hard alongside each of these platforms to make the process of understanding online safety a priority. Every guide gives user friendly information on how to best use reporting and privacy tools on each platform, and for the very first time all of this information is located in one location!
- Self-Care Guide: Experiencing online harassment can be overwhelming. You may feel a whole host of (totally valid) emotions. You could even be experiencing physical symptoms such as a pounding heart, nausea, or difficulty sleeping. You might simply feel numb. In these situations, it’s really important to take time out to take care of yourself.
- Online Harassment: A Comparative Policy Analysis [pdf]: This November 2016 report from DLA Piper offers a comparative analysis on law and policy addressing online harassment in Canada, the UK, the US, and Australia.
- Know Your Rights: Trying to understand what your rights are on the internet and when they’ve been crossed is tricky. This guide offers US-based readers insight into the federal laws that are meant to protect us; others vary from state to state. It also details several avenues for response.
- How to Spot Fake News and Recognize Harassment: Brought to you by HeartMob, this resource in comic-form explains how fake news is used to harass and silence – and how to tell whether news is legit.
- Supportive Organizations: This is a list of organizations with resources for people experiencing online harassment.
- Internet Democracy Project - Gendering surveillance'
Linkː https://genderingsurveillance.internetdemocracy.in/
Licenseː Creative Commons BY 4.0 (unless otherwise specified).
Languageː English
The Gendering surveillance project aims at showing how the digital age may have further deepened the scrutiny to which women are subjected, women have always been under stringent surveillance - by actors ranging from partners and parents to the state. And this has shaped, and harmed, women’s lives in multiple ways. What can be learned about surveillance from gendering it, then? And what do these insights imply for the fight for stronger human rights protections in the face of surveillance more broadly? See for instance their review and analysis of safety apps, phone bans, or the use of CCTV in garment factories.
- Institute for War and Peace Reporting- 'Cyber women'
Linkː https://cyber-women.com/en/
Licenseː Creative Commons BY - SA- NC
Languageː English, Spanish, Arabic
Cyberwomen is a digital security curriculum with a holistic and gender perspective, aimed at offering in-person learning experiences to women human right defenders and journalists work in high-risk environments. The guide is geared towards both professional trainers and persons who want to learn how to train others on their digital protection, and include gender considerations as they do so. It is made up of training modules, interactive games, recommendations for evaluating the training, as well as audio-visual and graphic materials as instructional aids. There are some recommendations about which modules to use for different learning levels, time and contexts. You can browse the guide online or download the full version from the site. The creation of CyberWomen was a collaborative process between many devoted people and partner organizations.
- Institute for War and Peace Reporting- 'Hacks de vida'
Linkː https://archive.org/details/DocumentoHacksdeVida_201803
Licenseː CC BY-ND, Atribución-SinDerivadas Estrella Soria y Luisa Ortiz Pérez
Languageː Spanish
Hacks de vida: Entrevistas con mujeres que ayudan a otras mujeres a enfrentarse a las violencias de género
Este documento es el resultado de más de 20 entrevistas con mujeres que ayudan a otras mujeres a enfrentarse a las violencias de género en línea con valentía, ingenio y esperanza. Contiene consejos, ideas, reflexiones para entender mejor la forma de ayudar y enfrentar la violencia juntxs. Además cuenta con una revisión de la bibliografía más reciente sobre del tema en la región y un poster con consejos prácticos para personas que dan apoyo tecnológico a lxs que enfrentan violencias de género en línea. Con mucho gusto, orgullo y agradecimiento les informamos que está disponible en línea la primera edición de Hacks de Vida: https://archive.org/details/DocumentoHacksdeVida_201803 Los stickers y posters están en archive si los necesitan o los quieren replicar: https://archive.org/details/@hacks_de_vida
- Mozzila Foundation - 'Teaching Kit: Combatting Cyber Violence Against Women and Girls'
Linkː https://d157rqmxrxj6ey.cloudfront.net/amira/33977/
Licenseː Creative Commons By Share Alike
Languageː English
In this three-part series learners focus on understanding the impact of cyber violence against women and girls, creating safer places online, knowing how to address bullying or attacks when they happen, and participating in online communities in a supportive manner. Activities will take young women and girls from understanding online violence to actively advocating against it. This module was created for women and girls in emerging countries where internet adoption for women is at the utmost highest, along with a concern for security and harassment, but can be adapted for audiences everywhere.
- National Network to End Domestic Violence'
Linkː https://www.techsafety.org/documentationtips/
Licenseː ?
Languageː English
Abusers and perpetrators will often misuse technology to further abuse and control victims. Misuse of technology could include monitoring technology use, including computers or cell phones, sending multiple unwanted or threatening text messages or voicemail messages, or posting negative comments or images of the survivor online. In some cases, how technology is misused to harass and control may seem unbelievable. However, it is important to trust your instincts. If you believe that you are being monitored or stalked via technology, you might be. Narrowing down what is happening, including the tactic and the technology used, can help to determine if stalking is occurring and if so, how to address is.
- Pen America - ONLINE HARASSMENT FIELD MANUAL'
Linkː https://onlineharassmentfieldmanual.pen.org
Licenseː Copyright.
Languageː English
For years, online harassment was dismissed in some quarters as less real, or less harmful, than harassment in the “real world.” More recently, after sustained efforts and pressure from those who bear the brunt of this harassment—women, people of color, LGBTQ+ individuals and people identifying with other marginalized or threatened groups—social media companies and the broader public have begun to take this issue seriously. There is now a growing recognition that online harassment can affect its targets’ freedom to express themselves, their livelihoods, and their mental and physical health. It is also clear that online harassment can extend to the offline world, especially for those who receive direct, specific threats of sexual violence, bodily harm, and even death, and who have their personal information published without their consent (known as “doxing”).
As an organization of writers, PEN America is particularly concerned about the ways in which online harassment affects writers’ work. Our 2017 Online Harassment Survey of over 230 journalists and writers found that 67 percent of respondents had experienced a severe reaction to being targeted by online harassment, including refraining from publishing their work, permanently deleting their social media accounts, and/or fearing for their safety or the safety of their loved ones. More than one-third of respondents reported avoiding certain topics in their writing due to online harassment, 16 percent reported permanently deleting a social media account, and 37 percent felt that online harassment had damaged their reputations. These survey findings align with years of reports from writers, journalists, and activists that experiencing harassment and hateful speech online can drive people offline entirely or lead them to avoid speaking or writing about topics that they fear will lead to further harassment.
- Protection International- 'Protection of LGBTI Defenders
Linkː https://protectioninternational.org/wp-content/uploads/2012/04/LGBTI_PMD_2nd_Ed_English.pdf
Licenseː Copyright
Languageː English
For the purposes of this manual the authors tried to avoid using any definitions of the terms lesbian, gay, bisexual, transgender and intersex. However on developing the manual and in conversations with various defenders working on a wide range of rights it became evident that some form of definition was needed in order to increase a general understanding of the issues at stake and improve the security enjoyed by defenders working on sexual orientation and sex/gender identity and gender expression issues and the rights to equality and non-discrimination of the LGBTI community.
- Small Media - Jensat: Graphic Novel Illustrates Cybersecurity, Gender, and Sexuality in Contemporary Iran'
Linkː https://jensiat.io/ https://thecreatorsproject.vice.com/blog/iranian-graphic-novel-cybersecurity-gender-sexuality
Licenseː CC Attribution-NonCommercial 2.5 Generic
Languageː Farsi
Jensiat is a newly launched online graphic novel addressing cybersecurity, gender, and sexuality in contemporary Iran. The site, designed and developed by UK-based Small Media, is the combined effort of a team of journalists, writers, and artists seeking to bring light to these issues through a story any young Iranian can relate to.
- Social TIC/Ciberseguras - 'Violencia contra las mujeres y tecnología: Estrategias de respuesta'
Linkː https://socialtic.org/blog/violencia-contra-las-mujeres-y-tecnologia-estrategias-de-respuesta/
Licenseː CC BY SA NC
Languageː Spanish
Compartimos un compilado de tácticas para el combate de la violencia relacionada con la tecnología. Este compilado incluye varias formas en las que mujeres han respondido ante diferentes tipos de agresiones, varias de estas respuesta cuentan con notas y ejemplos. Al compartirlo, buscamos que más mujeres que enfrentan este tipo de violencia puedan usarlo para trazar una estrategia de respuesta y también que quienes acompañamos a mujeres en estas situaciones encontremos una herramienta útil de consulta.
- Stalking Resource Center National Center for Victims of Crime
Linkː http://victimsofcrime.org/our-programs/stalking-resource-center
Licenseː Copyright
Languageː English
The mission of the Stalking Resource Center is to enhance the ability of professionals, organizations, and systems to effectively respond to stalking. The Stalking Resource Center envisions a future in which the criminal justice system and its many allied community partners will have the best tools to effectively collaborate and respond to stalking, improve victim safety and well-being, and hold offenders accountable.
- Tactical technology collective - 'Gendersec Curricula'
Linkː ENG: https://en.gendersec.train.tacticaltech.org/ SPA: https://es.gendersec.train.tacticaltech.org/
Licenseː CC BY SA NC
Languageː English and Spanish
The Gendersec Curricula introduces a feminist perspective to privacy and digital security trainings. Informed by our experience organising Gender and Technology Institutes for women and trans activists around the world, this free resource is available in English and Spanish and covers over 20 topics including Hacking Hate Speech, Risks and Strategies when Using Dating Platforms, Creative Uses of Social Media, Handling Stress and Strategies of Resistance. Trainers, facilitators, defenders can access these workshops and adapt them to their communities to support Women Human Rights Defenders in protecting themselves from online and offline threats.
- Tactical technology collective - 'Data Detox Dating apps'
Linkː https://datadetox.myshadow.org/en/bonus/dating
Licenseː CC BY SA NC
Languageː English, Spanish, Deutsch, French, Portuguese
Tinder, Grindr, Happn, OkCupid, Match, eHarmony... there are so many dating services out there. This Data Detox Extra will introduce you to the third wheel in your dating life and give you tips on how to share less and keep more secrets.
- Tactical technology collective - 'My Shadow Curricula + Materials'
Linkː https://myshadow.org/train + https://myshadow.org/materials
Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)
Languageː English and Spanish
Session outlines for trainers. WORKSHOP outlines can be used to run longer, structured sessions; these often pull in multiple activities. Stand-alone ACTIVITIES can be used to illustrate a single issue.
- Tactical technology collective - 'Zen and the art of making tech work for you'
Linkː https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual/es
Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)
Languageː English and Spanish
Tactical Technology Collective (in the framework of its one year project “Securing Online and Offline Freedoms for Women: Expression, Privacy and Digital Inclusion”) has released in September 2015 a manual tackling some privacy and security issues from a gender perspective. It is the result of a collaborative effort that has involved our growing community of women and trans* activists, human rights defenders and technologists. The manual was created in response to our community’s requests for ideas and guidance on topics they needed, but couldn’t find elsewhere and has been written and reviewed by over 20 women coming from 19 different countries. The current content focuses on two overlapping issues: First, how can we craft appropriate online presences (or a series of them) that strengthen our ability to communicate and work online safely?; Secondly, how can we collaboratively create safe online and offline spaces that enable our communities to share, collaborate, and communicate safely?
The manual grew out of the 2014 Gender and Technology Institute, organised by Tactical Technology Collective and the Association for Progressive Communications (APC). Until next January 2016, we hope to achieve a better understanding of the readers audience, their background and needs and also to gather through this extended community more feed back about the manual in order to get a better grasp of the dimensions that are missing and which are the other tools, processes, readings and cases studies that should be added. We hope to have it translated, edited and printed in 2016.
- Tactical technology collective - Digital Security tools and tactics for the LGBTI community in the Middle East and North Africa
Linkː https://securityinabox.org/en/lgbti-mena
Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)
Languageː English
̟̇̇̇̇̇̇̇̇̆̈Digital Security tools and tactics for the LGBTI community in the Middle East and North Africa was designed and written in collaboration with LGBTI human rights defenders from the region. The guide serves as a contextualised introduction to the Security in-a-Box toolkit for human rights defenders, produced by Tactical Technology Collective and Front Line Defenders, expanding on its content to include important information, tools and tips particularly relevant to the LGBTI community in this region region, as identified by members of the community in workshops carried out in 2012.
- Tactical technology collective - Women's Rights Campaigning Info-activism Toolkit
Linkː https://womensrights.informationactivism.org/
Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)
Languageː English, Hindi, Arabic and Swahili.
The Women's Rights Campaigning: Info-Activism Toolkit is a guide for women's rights activists, advocates, NGOs and community-based organisations who want to use technology tools and practices in their campaigning.
- Tecnicas Rudas - 'Digital Security Assessment for Human Rights Organizations: A guide for facilitators'
Licenseː CC BY SA NC
Languageː English, Spanish
This guide is directed primarily at the digital security training community, but may also prove useful for an organization that chooses to initiate a digital security process on its own. The activities and structure proposed herein can and should be adapted to the specific circumstances and needs of the organization. The guide can also be a useful reference for facilitators throughout the implementation of the diagnostic. The methodology can also be applied to individual assessments with minimal adjustments.
- The Engine room - 'DATNAV: NEW GUIDE TO NAVIGATE AND INTEGRATE DIGITAL DATA IN HUMAN RIGHTS RESEARCH'
Linkː https://www.theengineroom.org/datnav-digital-data-in-human-rights-research/
Licenseː Commons Attribution-ShareAlike 4.0 International
Languageː English, Spanish, Arabic
Launching DatNav: a guide designed to help you navigate and integrate digital data into your human rights research. DatNav is the result of a collaboration between Amnesty International, Benetech, and The Engine Room which began in late 2015 culminating in an intense four day writing sprint facilitated by Chris Michael and Collaborations for Change in May 2016. Security relates to physical safety, health, finances, discrimination, privacy, etc. Security threats vary from person to person and group to group. For some their religion or sexual orientation may pose the greatest safety risk. Understanding these concerns from the perspective of everyone involved in your work is the first step in fostering a productive and safe environment.
- Trollbusters - 'Digital Hygiene Course'
Linkː https://yoursosteam.wordpress.com/digital-hygiene-course/
Licenseː ?
Languageː English
Prevent online harassment before it starts. Each lesson takes 5-10 minutes to complete. Start now by keeping harassment from migrating offline.
- Web we wantː Recipes for a Digital Revolution
Linkː http://www.scribd.com/doc/283942238/Recipes-for-a-Digital-Revolution
Licenseː Copyright
Languageː English
10 delicious recipes for digital rights activism from Latin America that will make you want to stir up your own ideas and serve them to your friends.
- Without My Consent: Tools to fight online harassment'
Linkː https://withoutmyconsent.org/resources
Licenseː Copyright.
Languageː English
If you’re reading this because someone has distributed nude photos or videos of you online, without your consent or in breach of your trust, there’s good news: you have many tools available to get control back. These resources are part of WMC’s Something Can Be Done! guide, and have been developed by the country’s top digital abuse lawyers. However, lawyers do not make decisions in a vacuum. Every case is different and the preferred strategy for your case should be tailored to the behavior of the particular people involved and the circumstances of each case. We are not your attorneys and the information presented here is not legal advice. However, if you follow these directions and take this information to your legal counsel, police precinct, domestic violence clinic, or family court self-help center, the answer will no longer be “nothing can be done.” WMC wants victims and their supporters to know everything that can be done on every level to combat nonconsensual porn.
- Women Human Rights Defenders International Coalition (WHRD IC)ː Gendering Documentation : A Manual for and about Women Human Rights Defenders
Licenseː Creative Commons BY (Creative Commons Attribution 4.0 International Licence)
Languageː English
Gendering Documentation: A Manual For and About Women Human Rights Defenders goes beyond traditional human rights documentation guides to provide a unique tool for capturing the specific nature of contexts facing, advocacy of and violations against WHRDs. It explores abuses related to gender, their gendered consequences, the many purposes of documenting WHRDs’ lives, various forms of WHRD advocacy with documentation, and steps to take to create documentation processes and products that are both gender-sensitive and gender-responsive.
- Women's Media Center - 'Speech project'
Linkː http://wmcspeechproject.com/online-abuse-101/
Licenseː Copyright
Languageː English
The WMC Speech Project is dedicated to raising public and media awareness about online harassment. The past several years have seen an increase in news, as well as a growing understanding that online harassment is a social, civil rights and workplace issue. However, many people, and institutions, think of harassment as “bullying,” instead of its much more complex and dynamic reality. While online abuse can and does happen to anyone, the focus of this project is on the ways in which women’s rights and expression are affected by intersectional harassment related to their gender, class, race, sexuality and more.
Manuals produced by individuals
- How to Survive the Internet: Strategies for Staying Safer Online by Yael Grauer'
Linkː https://yaelwrites.com/wp-content/uploads/2014/11/saferonline.pdf
Licenseː ?
Languageː English
Being subjected to threats, unwanted contact, compromised accounts, hacked websites, or having sensitive information shared online is an awful experience. In the midst of this, it can be confusing to know how to react and which steps to take to protect yourself. You’re likely to get conflicting advice on whether to take incidents seriously or ignore them, and trying to get up to speed on online security strategies with limited technical knowledge can make an already stressful situation more overwhelming. It’s not always obvious who’s responsible for ongoing harassment or how many people are involved, and trying to address a threat with limited information can be difficult. Please remember that you are not alone. If you were, this guide wouldn't be here. You will get through this.
- Necesito Privacidad para la autonomia de mi deseo by Lucía Egaña y Julieta Rodríguez (Platohedro)'
Linkː http://lucysombra.org/TXT/Fanzine_necesito_privacidad.pdf https://archive.org/details/FanzineNecesitoPrivacidad
Licenseː CC Attribution-Noncommercial-Share Alike 3.0
Languageː Spanish
Nos planteamos pensar la seguridad feminista de forma expandida hacia diversas áreas de nuestra vida aprendiendo herramientas concretas para fortalecer la seguridad y privacidad digital. A través de estas herramientas y sus funcionalidades buscamos pensar en las vulnerabilidades cotidianas y cómo éstas se comportan atravesadas por el género.
- Smart Girl's Guide to Privacy by Violet Blue'
Linkː https://www.nostarch.com/smartgirlsguide
You can download chapter 2ː But this is just my phoneǃ (https://www.nostarch.com/download/Smart%20Girls%20Guide%20to%20Privacy_Chapter2.pdf)
Licenseː Copyright
Languageː English
In The Smart Girl’s Guide to Privacy, award-winning author and investigative journalist Violet Blue shows you how women are targeted online and how to keep yourself safe. Blue’s practical, user-friendly advice will teach you how to: Delete personal content from websites; Use website and browser privacy controls effectively; Recover from and prevent identity theft; Figure out where the law protects you—and where it doesn’t; Set up safe online profiles; Remove yourself from people-finder websites.
- Twenty ways to help someone who's being bullied online..... by Laurie Penny'
Linkː https://www.patreon.com/posts/12240673
Licenseː Copyright
Languageː English
Online abuse is real, and it sucks, and facing it down has nothing to do with 'strength.' If someone you know is experiencing online harassment, it can be very hard to know what to do or say. Here's a working list of suggestions for how to behave and how not to behave, based on extensive personal experience - mine and other people's. Mainly it boils down to everyone being a bit bloody braver. I hope this helps.
- So, you’re getting harassed on the Internet. What do you do now? by Deanna Zandt'
Linkː https://medium.com/@deanna/so-you-re-getting-harassed-on-the-internet-what-do-you-do-now-c30207cae0c
Licenseː Copyright
Languageː English
The past year or so has seen an incredible intense ramp-up around online harassment and abuse. It’s as if everyone who ever had a sadistic digital thought ever looked at the #gamergate mess and said, “Yeah! That’s what I want to do!” Many people feel helpless in the face of such attacks. But there ARE things you can do, right now, to protect yourself. Read on.
- Programas de radio El Desarmador por Imilla hacker'
Linkː https://archive.org/details/@imilla_hacker&tab=uploads and http://www.eldesarmador.org/
You can download chapter 2ː But this is just my phoneǃ (https://www.nostarch.com/download/Smart%20Girls%20Guide%20to%20Privacy_Chapter2.pdf)
Licenseː Creative Commons Attribution-NonCommercial 4.0 International
Languageː Spanish
El Desarmador es una iniciativa de La Imilla Hacker (https://imillahacker.sdf.org). Imilla es la voz quechua/aymara que quiere decir niña o mujer joven. Somos un colectivo enfocado en la producción de contenidos alternativos sobre tecnopolítica y sociedad; con la intención de abrir las puertas al análisis de varios temas como la privacidad, el anonimato, la vigilancia, la gobernanza de internet, la violencia en línea contra las mujeres, y la apropiación de la infraestructura de las telecomunicaciones.
- Podcasts Señoras de internet'
Linkː https://soundcloud.com/tristanaproducciones/sets/senoras-de-internet
Licenseː ?
Languageː Spanish
Señoras de internet es un podcast ciberfeminista acerca de los futuros porvenires tecnológicos. Es, también, una invitación en formato de podcast a un té radial en el que se degustan las agridulces contradicciones del presente tecnopolítico.
Ladies of the Internet is a cyberfeminist podcast about future technological achievements. It is also an invitation in podcast format to a radio tea in which the bittersweet contradictions of the technopolitical present are tasted.
Before producing a manual
Before producing a new manual some questions we should askː
- Don't reinvent the wheelǃ Are you duplicating upstream work?
- If a similar manual is already available Who's behind it? Is it a long-term project or a one shot one? Can you continue or complement their work?
- Who's the public and what are the objectives ? What are their security & technical levels? What are their comprehension about feminism?
- Who will produce/develop it and for whom (generational gap, geographical location, socio-demographic dimension)?
- Will your manual will be more about tools and how to configure those, or will it be more about threat modelling and/or behavioural processes?
- Under which license will you distribute it and which rights will you grant third parties (access, use, copy, remix, etc)?
- Credits your reviewers and experts that have provided you with feed back!!
- How will you maintain it? This encompass questions about frequency of updates needs depending of the tools and processes you will detail, and about processes you will run to engage your community in updating contents with you.
- How will you get feedback and peer review from readers? Will you be able to include all the feed back? (Some criteria will deal with correctness, completeness, up to date). Remember to always indicate the last date the manual has been updated/released.
- How will you achieve or not translation & translatability of your manual? Which type of platforms will you use for achieving the translation? Will you achieve also cultural translation for instance?
- Accessible for disable people
- Will you provide further support to the readers such as a contact mail or a hotline?
- How will you ensure that your contents are ethical, inclusive and trans-queer-feminist "approved"?
- How will we monitor the impact of our self learning resources/Impact Assessment methodologies?
- How the distribution will be done? What is the target public?
- Think about potential partnerships (researchers, academia, volunteer translators etc)