Difference between revisions of "Step 2"

From Gender and Tech Resources

(How to set up a Twitter account to be used as a bot)
m (How can a bot battle a troll?)
 
(149 intermediate revisions by 5 users not shown)
Line 1: Line 1:
==='''Introduction: Safe Spaces as Feminist Practices'''===
 
 
Safe spaces have been used by groups marginalized in societies and communities for many decades now. Safe spaces have been a way to care for one-self and for a collective, to design and craft strategies and tactics of resistance and to create an oasis of peace in what sometimes can be a tiring struggle for resistance. Safe spaces have taken different meanings and bear different names depending on a variety of factors be it geographical, temporal, spatial, cultural and social, among others. The British author Virginia Woolf's has talked about a Room of One’s Own, a term often used by feminists to describe safe spaces.
 
 
===='''What is the Relationship between Offline and Online?'''====
 
 
The relationship between the online and offline worlds were addressed early on by cyberfeminist scholars and activists. In her book Zeroes + ones: digital women + the new technoculture, Sady Plant suggests that cyberspace has a feminist essence, and is therefore a natural space for women to inhabit. Rosi Braidotti, in her book Nomadic Subject, focuses on the fluidity and mobility aspects of online spaces that allows, she suggests, the creation of collective bonds among women. In other words, cyberspace makes global feminism possible in one's offline world as it is linked to the intimate, the immediate, the personal and the collective.  Donna Haraway, in her Cyborg Manifesto, framed the internet as a force that might help shift forms of gender power on the Internet in turn enabling feminists to somewhat escape patriarchal structures online. This utopian view of cyberspace has since then been tone down as escaping gender, race or other intersectional forms of oppression has been much harder than first thought. But safe spaces are one way to experience and enable forms of collective and individual empowerment both online and offline.
 
 
 
===='''What are Safe Spaces?'''====
 
===='''What are Safe Spaces?'''====
 +
Safe spaces can be understood as spaces that are created to share common values, whether explicit, through a community agreement, or implicit through the sharing of values. They enable members of a group to flourish, empower themselves and create community. Safe spaces have provided a safe environment for discussion and awareness raising in the women's liberation movement in the 60s and 70s. Safe spaces are also about pushing boundaries and confronting certain difficult issues among a group of people such as: Who can be part of a women's only group? And who can be defined as a woman? As these are important questions to be addressed, they need reflection, trust and the understanding of where our own assumptions come from.
  
A common understanding of safe spaces are that they share common values, whether explicit, through a community agreement, or implicit through the sharing of values and enable members of a group to flourish, empower themselves and create community. The concept of safe spaces as embodied in second wave feminism in the western world was “explicitly committed to safety for individuals or communities that are targets of oppression” (Newman 2011, 138)1. Safe spaces are known to have provided a safe speaking and awareness raising environment for women involved in the women's liberation movement in the 60s and 70s in many countries where women could discuss about their experience in a patriarchal environment. Safe spaces are also about pushing boundaries and confronting certain difficult issues among a group of people such as: Who can be part of a women's only group? Who can be define as a woman? As these are important questions to be addressed, they need reflection, trust and the understanding of where our own assumptions come. We will come back to those questions later on in the manual.
+
Safe space strategies have been used in many different contexts in recent times too. In Tahrir Square in Egypt, Operation Anti Sexual Harassment (OpAntiSH) was set up to react to an unsafe environment and as a way to protect women and/or confront harassers and support survivors of sexual abuse and harassment. In Kenya, the women-only Umoja village was created for women survivors of rape and sexual assaults, as a place where they could feel safe and secure, raise their kids, earn a living collectively, heal and reclaim their dignity. During the USA Occupy movements many women, queer and trans* persons did not feel safe to camp in the squares and parks. Some resorted to women-only tents, or women of colour-only affinity groups while others, mostly transwomen, opted for an online presence as putting their bodies on the line was deemed too dangerous.
 
+
Safe Space strategies have been used recently during the USA Occupy movements where many women, queer and trans did not feel safe to camp in the squares and parks. Some resorted to women-only tents, or women of color-only affinity groups while others mostly transwomen, opted for an online presence has putting their bodies on the line were deemed too dangerous. In Tahrir Square in Egypt, Operation Anti Sexual Harassment (OpAntiSH) was set up to react to a hostile environment and as a way to protect women and/or confront harassers and support survivors of sexual abuse and harassment. In Kenya, the women-only Umoja village was created for women survivors of rape and sexual assaults where they could feel safe and secure, raise their kids, earn a living collectively, heal and reclaim their dignity.  
+
 
+
1) Newman, E. (2011). “Safer Spaces of Decolonize/Occupy Oakland: Some Reflections on Mental Health and Anti-Oppression Work in Revolutionary Times.” <em>Journal for Social Action in Counseling and Psychology</em>, 3(2), 138-141.  
+
  
 
===='''Safe Space Online?'''====  
 
===='''Safe Space Online?'''====  
  
Digital spaces are unique in multiple ways. Many women have reported experiencing the internet as a safe space for resisting gender oppression that they encounter in their every-day life. Fereshteh Nouraie-Simone talks about the internet as Wings of Freedom for Iranian women.  Scholar Saskia Sassen argues that the internet allows women to be involved in new forms of contestations, build global community and potentially transform local women’s conditions.   While these emancipatory experiences exist, and cannot be undervalued, women can also experience cyberspace in very different ways. Anita Sarkeesian who is behind the Feminist Frequency web platform was in 2012 the target of an online harassment campaign following the launch of her Kickstarter project called Tropes vs. Women in Video Games. She was harassed online and still is because she highlights sexism in video gamesThis story is not a unique case, it happens over and over.
+
The internet is experienced by many as a safe space for resisting the gender oppression that they encounter in their everyday life. Fereshteh Nouraie-Simone talks about the internet as [https://books.google.es/books?id=exM4bIzF5IoC&pg=PA62&lpg=PA62&dq=Wings+of+Freedom+for+Iranian+women&source=bl&ots=tQgAni6g_K&sig=_VxBUJw6TbywQqeD7zw7YmSW_j4&hl=es&sa=X&ei=qiZkVfG0M4Tn7gaR0ICQBQ&ved=0CCcQ6AEwAA#v=onepage&q=Wings%20of%20Freedom%20for%20Iranian%20women&f=false Wings of Freedom] for Iranian women.  Scholar [http://www.saskiasassen.com/PDFs/publications/Towards-a-Sociology-of-Information-Technology.pdf Saskia Sassen] argues that the internet allows women and trans* persons to be involved in new forms of contestations, build global community and potentially transform conditions on the ground. However, at the same time many women and trans* people experience severe forms of violence and silencing online. There are countless stories now of women and trans* people facing harassment, threats and smear campaigns by anyone from a misogynist or transphobic reader of their blog to a state-sponsored attacker trying to hinder their advocacy work. See [https://www.takebackthetech.net/mapit/ Take Back the Tech] for an up-to-date list of reports.   
  
Using safe spaces tactics and strategies is a good way to start inhabiting online and offline spaces according to the boundaries we want to set for ourselves and for our friends. This manual intends to do just that. To provide you with concrete suggestions on how to create safe spaces online and offline. It is divided in three core parts. First, a set of tools will be highlighted to move forward with starting to build safe spaces for you and your collectives/organizations through online communication such as mailing list, pads, Internet Relay Chat (IRC), etc. Second, it will focus on how to build safe spaces in “hostile” environments such as howto organize Wikipedia storming, how to install bots against trolls, how to do feminist counter-speech and finally, how to build safe spaces off line such as through women-only/feminist-only space to learn and Do-it-Together.
+
Morever, we might assume that online communities such as the ones we take part in through social media, email discussion lists, phones and Internet Relay Chat (IRC) channels are inherently democratic, horizontal, participatory and relatively safe. This is not true. Online spaces often reproduce hierarchies, privileges and power relations that exist in society. We need to be mindful of this and to think through ways to mitigate and limit these downsides to get the best out of our spaces. Using such strategies is about caring for ourselves and for the communities we are part of. Making these issues explicit and visible is also about agency, social justice and feminism, and it will help better shape the spaces we care about, we organize in and in which we grow.  
  
==='''Building Online Safe Space for you and your collectives/organizations'''===
+
This step aims to provide concrete suggestions on how to create safe spaces online and offline. It is divided into three core parts. First, a set of tools will be highlighted to move forward with starting to build safe spaces for us and our collectives/organizations through online communication such as mailing lists, pads, Internet Relay Chat (IRC), etc. Second, it will focus on strategies of resistance in public spaces which are not inherently safe, such as Twitter and Wikipedia. Finally it will loop back to the offline and discuss ways to build safe spaces offline such as through women and trans* only spaces to learn and Do-it-Together.
  
We often assume that online communities such as the ones we take part in through social media, email discussion lists, phones and Internet Relay Chat (IRC) channels are inherently democratic, horizontal, participatory and relatively safe. It is true that the affordances of those technological tools may no doubt foster participation, a sense of emancipation and reach that was unimaginable two decades ago, but to be able to really harness the power of these tools and create a safe space for us and our collectives a few steps are recommended. We start with the premise that we should carefully think about the type of spaces we want and the type of behaviors we aim at fostering online and offline and make those visible and explicit.
+
===='''How to set up a Safe Space Mailing list'''====
  
As in the offline world, we need to remind ourselves that online spaces and online communities often reproduce hierarchies, privileges and power relations that exist in society and therefore thinking through ways to mitigate and limit these downsides to get the best out of our spaces is important. This is about caring for ourselves and for the communities we are part of. Making explicit and visible these issues is about agency, social justice and feminism, and it will help better shape the spaces we care about, we organize in and in which we grow.  
+
Mailing lists are one of the oldest forms of social networks. They allow you to discuss, organise, share information, exchange video, audio and pictures. The below section will help you in the steps to setting up a safe space mailing list.  
  
===='''What is Netiquette?'''====
+
====='''Choosing a mailing list'''=====
  
First, we need to think about the basics: netiquette. Netiquette is a concept that emerged in the 90s with the increase in communication technologies through the Internet. It is a portmanteau of network and etiquette. With the realization that the internet has brought us a cultural web that cut across all sort of boundaries be it legal, geographical, cultural, social, etc. there was an attempt to identify common standard of etiquette. Two authors came up with recommendations of how to behave online using the humoristic Ten Commandments format to do so. Brakeman came up with The Ten Commandments of Etiquette on the Internet while Rinaldi came up with The ten Commandments of Computer Ethics. The commandments were a humoristic way to address the distinctive features of the Internet where it was believed that there is a general lack of authority on who is able to regulate the behavior of online participants. The commandments highlighted for instance to “Never forget that the person on the other side is a human being” or that you should “Give back to the community”. Today, when we read these commandments, some are still very relevant, while others seem to somewhat go counter to the ways in which the Internet culture has developed and the strong presence of feminists online.  
+
You have decided that you need a communication channel for your collective and you do not want to use corporate services. There are in fact many alternative services to choose from that are recommended for use by human rights defenders. They are free but they still prioritise security and user privacy. For example: Riseup, Aktivix or Autistici/Inventati (A/I Collective).  
  
 +
Riseup is a tech collective which provides secure communication tools for people working on liberatory social change.  They have many feminist and queer oriented lists and therefore are a great collective to host your mailing list. To see some of the existing public mailing lists go to:  https://lists.riseup.net/www/ .
  
===='''What are Feminist Principles on the Internet?'''====
+
Other tech collectives also offer mailing-lists and email addresses. Autistici/Inventati (A/I Collective) and Aktivix are two other great examples, and the former also offers a dedicated newsletter service for groups that want to send regular news to a high number of recipients. To read about their services visit:  http://www.autistici.org/en/services/lists.html and/or https://lists.aktivix.org/mailman/listinfo
  
What is closer to today's feminist practice on the internet, which goes beyond simple politeness, are the Feminist Principles on the Internet. Those principles were developed in 2014, almost 20 years after the drafting of the above netiquette principles. The Association for Progressive Communications (APC) gathered a group of feminists to a Global Meeting on Gender, Sexuality and the Internet with the mandate to come up with a first list of principles. Their principles are about the ways in which the internet can be a transformative public and political space for feminists. It situates online violence and tech-related violence on the continuum of gender-based violence making clear the structural aspect of gender violence online and offline. The principles also highlight surveillance as a patriarchal tool whether it is used by the state, private individuals or corporation.
+
====='''Open or closed list?'''=====
  
===='''Why are these principles important?'''====
+
Once you are ready to create your mailing list you need to decide whether it will be an open or closed list. An open list allows anyone to subscribe and participate in the discussion. A closed list is limited to the subscribed email addresses that will have been approved by you or your collective. In deciding what is best, check if choosing to keep a list open to new subscriptions automatically implies that the archives of the list are available to anyone on the web and will eventually end up on search engines (such as Google). In some cases, the archives of a closed list are only accessible to those who have the subscription password while the archives of a closed list can be accessed by everybody. In other cases, as A/I's platform (which is unfortunately much more complex to use) you can choose whether you keep the archives public or not independently of your choice to keep your list open to new subscriptions.
 +
If you intend to talk about sensitive issues (talking about feminism is often a sensitive issue!) or if trust within the group is important for creating your safe space, you might want to set up a closed list and to keep your archives closed. If you do choose to leave your archives accessible, it is important to inform everyone subscribed to the list that any delicate topic or personal detail that pops up in your discussions will be potentially visible to anybody.
  
The Feminist Principles on the Internet are a good way to address the relationship between the online and offline world making for instance the link clear between online and offline violence. The goal behind these principles are two-fold. First, it is a tool for feminists to guide them in understanding the internet as a new public space and how this space can be informed by feminist principles. In other words, it is about reframing the conversation around gender, sexuality, sexual rights and the internet.  Second, it is a way to reclaim the Internet in creating spaces for feminists. In other words: safe spaces. If you want to contribute to the discussion join the hashtag #ImagineaFeministInternet.
+
====='''Publicizing your list or keeping it secret?'''=====
  
=== '''Tools''' ===
+
A list becomes really public when it is advertised to the world and anyone can request subscription. For example [http://femtechnet.newschool.edu/mailman/listinfo/femtechnet the mailing list] run by FemTechNet. But a list mustn't be necessarily publicized and can be run on a need-to-know basis. In other words, you can choose not to advertise your list publicly and to keep it invitation-only. You could have for instance a publicized list which is closed i.e. a list that people know about (literally everyone!), but which requires approval as mentioned above.
===='''How to set up a Safe Space Mailing list?'''====
+
  
Mailing lists are one of the oldest forms of social networks. They allow you to discuss, organise, share information, exchange video, audio and pictures. The below section will help you in the steps to setting up a safe space mailing list.
+
====='''Who should I invite?'''=====
  
===='''Choosing a mailing list'''====
+
Once you have your list set up, start inviting people you know to your mailing list. If friends are suggesting to add more people to the list, ask them to explain to the list the reasons why such and such person should be added. If you get a green light from your collective, add this person to your mailing list. Working through the web of trust is a good practice to follow when setting up a mailing list. Also, make sure you have a discussion on who can be part of this list. If you set up a feminist list, who can be part of this list? Do you for instance allow feminist men to be part of the list? If so, will you be setting up a policy for your list on the acceptable behavior? (See below for how to set up a policy) These are important questions that you need to discuss with your group. But don’t be too harsh on yourself and your group and know that you can always revisit these decisions if at some point you and your collective feel you want to change your collective mailing list agreement.
 
+
You have decided that you need a communication channel for your collective, well there are many alternative possibilities to choose from. For social justice activists oriented mailing lists you can look at Riseup, Aktivix or Autistici/Inventati (A/I Collective). They all provide services that are an alternative to corporate ones.
+
 
+
Riseup is a tech collective which provides secure communication tools for people working on liberatory social change.  They have many feminists and queer oriented lists and therefore are a great collective to host your mailing list. To see some of the existing public mailing lists go to:  https://lists.riseup.net/www/ Riseup also provides email addresses so if you are an activist and want to open an account it’s a great email address to have. The allocation of an email address is based on trust system. You can either get two invite codes from friends who already have riseup accounts or wait for Riseup to approve your detailed request. For more info visit: https://user.riseup.net/forms/new_user/first
+
 
+
Other tech collectives also offer activists’ mailing-lists and email addresses. Autistici/Inventati (A/I Collective) and Aktivix are two other great examples. To read about their services visit:  http://www.autistici.org/en/services/lists.html and/or https://lists.aktivix.org/mailman/listinfo
+
 
+
===='''Open or closed list?'''====
+
 
+
Once you are ready to create your mailing list you need to decide whether it will be an open or close list. An open list allows anyone to subscribe and participate in the list. A close list is limited to the subscribe email addresses that will have been approved by you or your collective. In deciding what is best, you should remember that on open lists archives are available to anyone on the web, whereas close list are limited to those who have the subscription password. If you intend to talk about sensitive issues (talking about feminism is often a sensitive issue!) you might want to set up a close list.  Also, if you choose to set up an open list the messages sent through it will eventually end up on search engines (such as google). This is a privacy and safe space issue and you should be mindful of this.
+
 
   
 
   
===='''Public or Private list?'''====  
+
====='''Who will administer the list?'''=====
  
A list is public when it is advertised to the world. For instance on the tech collective website such as Aktivix: https://lists.aktivix.org/mailman/listinfo . A private list on the other hand, is one which is run on a need-to-know basis. In other words, it is not advertised publicly, it is rather on invitation-only. You could have for instance a public list which is closed i.e. a list that people know about (literally everyone!), but which require approval as mentioned above.  
+
Administering the list involves handling subscriptions and moderating content. One person can be responsible for doing it but if your list suddenly becomes very chatty, this might be too demanding for just one person to do. You can also choose to have more than one administrator of the list. A list can even be collectively managed. As a case in point, the Spoon Collective, a discussion list active in the 90s, adopted a strategy of central collective "ownership".  Everyone on the list had administration rights and so the responsibility of managing the list could be shared amongst members. This is a strategy that can be best used when you are part of a close collective. It also requires trust that all members will care enough to manage it collectively.  
  
===='''Who should I invite?'''====
+
Before trying to figure out what best suits you, you should think about internet access and expectations from list members. Depending on where you are located, some people on the list might not have regular access to the internet and this needs to be factored in when taking the decision. Some tensions will inevitably arise from the collective administering process and therefore you and your collective need to think carefully about the ways in which you will handle these tensions. Are we ready to wait for a few days to have new members added to the list? If each message needs admin approval, are we ready to accept waiting for the message to be approved for a few days, a week, more? Since administering a list is a great way to learn, is it only those who are tech savvy that might manage it or should we rather allow for learning to happen? If your expectations are clear, the possibility for tensions and conflicts to emerge will be minimized.
  
Once you have your list set up, start inviting people you know to your mailing list. If friends are suggesting to add more people to the list, ask them to explain to the list the reasons why such and such person should be added. If you get a green light from your collective, add this person to your mailing list. Working through the web of trust is a good practice to follow when setting up a mailing list. Also, make sure you have a discussion on who can be part of this list. If you set up a feminist list, who can be part of this list? Do you for instance allow feminist men to be part of the list? If so, will you be setting up a policy for your list on the acceptable behavior? (See below for how to set up a policy) These are important questions that you need to discuss with your group. But don’t be too harsh on yourself and your group and know that you can always revisit these decisions if at some point you and your collective feel you want to change your collective mailing list agreement.
+
====='''Mailing list policies'''=====
+
===='''Who will administrator the list?'''====
+
  
Who will be administering the list? One person can be responsible for doing it, but depending on her/their time, availability and interest having only one administrator can be quite demanding. You can also choose to have more than one administrator of the list. It is really up to you and your collective to decide the ways in which you want it to be managed. A list can also be collectively managed. As a case in point, the Spoon Collective, a discussion list active in the 90s, had decided upon a strategy of central collective "ownership". This meant everyone had access to the administering of the list. In other words, the list was “owned” by all involved in the collective. The ways in which The Spoon Collective decided to operate was that all the people on the list would be responsible to manage it on the basis of a weekly rotation (adding new member, etc.). This is a strategy that can be best used when you are part of a close knit collective.  It also requires trust that all members will care enough for the list to manage it collectively.  
+
Agreeing on a mailing list policy from the start will save you a lot of time and difficult conversations. Publishing your policy and the ways in which to report violations of the policy, even if it is a closed list, might be helpful in creating the online safe space you want everyone to enjoy. The policy can provide guidelines for everyone using the list, on how to behave. It can address tensions like the fact that expression of emotion is an important feminist principle, but losing your temper and attacking someone you don't agree with on the list is not ok.  
  
Before trying to figure out what best suits you, you should think about internet access and expectations from list members. Depending on where you are located, some people on the list might not have regular access to the internet and this needs to be factored in when taking the decision. Some tensions will inevitably arise from the collective administering process and therefore you and your collective need to think carefully about the ways in which you will handle these tensions. Are we ready to wait for a few days to have new members added to the list? If each message needs admin approval, are we ready to accept waiting for the message to be approved for a few days, a week, more? Since administering a list is a great way to learn is it only those who are tech savvy that might manage it or should we rather allow for learning to happen? If your expectations are clear the possibility for tensions and conflicts to emerge will be minimized.  
+
Having a visible and explicit policy will send a strong signal of the value of creating a safe space on a mailing list. The geekfeminism wiki is a great example of a women-only policy for online communities (http://geekfeminism.wikia.com/wiki/Statement_of_purpose/Women-only_communities). They also have a similar policy or agreement for online communities that includes men: http://geekfeminism.wikia.com/wiki/Statement_of_purpose:_communities_including_men  Check them out and adapt them to your needs, beliefs and desires.  
  
===='''Mailing list policies'''====
+
To make sure that the policy does not get forgotten, you can regularly remind the subscribers. The Ada Initiative (https://adainitiative.org/) mailing list, for example, adds a link to each email sent on the list. Below is what you see:
 
+
Now that you have a mailing list and you are slowly getting started with it you might want to reflect about having a policy. Making visible your policy and the ways in which to report violation to the policy, even if it is a close list, might be helpful in creating the online safe space you want everyone to enjoy. Having a visible and explicit policy will send a strong signal of the importance of creating a safe space on a mailing list. The geekfeminism wiki as a great example of a women-only policy for online communities (http://geekfeminism.wikia.com/wiki/Statement_of_purpose/Women-only_communities). They also have a similar policy or agreement for online communities that includes men. http://geekfeminism.wikia.com/wiki/Statement_of_purpose:_communities_including_men  Check them out and adapt it to your needs, belief and desires.
+
 
+
To make your policy visible and remind everyone of its existence, Ada Initiative (https://adainitiative.org/) mailing list is an instructive example. They have decided to add to each email sent on the list a reminder that a policy is in place. Below is what you see at the end of each email message being received on the list.
+
 
   
 
   
 
 
''Policies for behavior on this list: http://geekfeminism.wikia.com/wiki/Statement_of_purpose/Women-only_communities
 
''Policies for behavior on this list: http://geekfeminism.wikia.com/wiki/Statement_of_purpose/Women-only_communities
 
http://sf.adacamp.org/attendee-information/policies/#ahp
 
http://sf.adacamp.org/attendee-information/policies/#ahp
Line 85: Line 58:
 
http://lists.adainitiative.org/listinfo.cgi/adacamp-alumni-adainitiative.org''
 
http://lists.adainitiative.org/listinfo.cgi/adacamp-alumni-adainitiative.org''
  
===='''Dos and don’ts on mailing list'''====
+
====='''Encrypting mailing lists'''=====
  
Mailing lists have a particular set of features. Since they are text-based, they are susceptible to interpretation. When you receive a message on a list, make sure you read carefully what is presented to you. Sometimes we read too fast and don’t fully understand what somebody is saying, especially if the list have members whose mother tongue is not the language(s) of the list. What do you do if after carefully reading a message you disagree with what someone has said on a mailing list? Disagreeing on statements and points of view is fine and can be a good learning experience for all provided it is done in a respectful manner. Starting your email on a positive note and highlighting something positive about what was said will be a great opening for a constructive criticism that will follow.  
+
If you want a high level of security, there is the possibility of encrypting mailing lists. However, it is important to understand that this requires every participants to the list to already use PGP (Pretty Good Privacy)/GPG. This type of list, based on a software named Schleuder and developed by the German Tech Collective Nadir.org, is designed to serve as a tool for group communication, but this time with a strong emphasis on security. Schleuder list is a GPG-enabled mailing list and the list takes care of all de- and encryption among others. If you and your group feel you are able to install software in a server or can ask help from your community and you are all ready to use an encrypted mailing list, visit: http://schleuder2.nadir.org/
  
If you are experimenting more stress than usual, you might be more sensitive to the ways in which a mail is worded. Try to recognize this in you. If you have read an email that affects you emotionally, instead of replying right away you might want to try to come back to it later as to calm down.  With the ubiquity of the instantaneity and immediacy afforded by social media, we have a tendency to want to reply right way even to a mailing list. Having said that as feminists we acknowledge that emotions and affect are important and ought to be made visible, so the suggestion to wait depend of course on the situation. You are the best judge of the practice you want to embrace and of the situation that you experiencing. 
+
===='''What is an etherpad?'''====
  
==='''What Are Other Good Online Collective Tools?'''===
+
Pads are a great way to collaborate in real-time on documents.  They are a good alternative to corporate services like Google Docs and more effective for co-editing text than mailing back and forth.  The main thing you need to look for in a pad is that it is hosted with an encrypted connection via SSL. A list of such pads can be found [https://github.com/ether/etherpad-lite/wiki/Sites-that-run-Etherpad-Lite here].
===='''What are Pads?'''====
+
  
Pads are a great way to collaborate in real-time on documents.  They are a good alternative to replace google docs or replacing the confusion that might arise from sending each other documents through emails or mailing lists. Pads can be used to collectively draft a mailing list policy, a statement that you want to release or else. A list of pads that are secure to use through encrypted connections via SSL can be found at: https://github.com/ether/etherpad-lite/wiki/Sites-that-run-Etherpad-Lite 
+
When you create a pad you decide on the name of the URL. Just like with creating passwords, you should make it long and inventive. For example: https://pad.riseup.net/p/feminists is not secure. You want to use a more complicated URL such as https://pad.riseup.net/p/FeministsRockAndTheyWillBeDoingGreatThingsToghetherOnce the pad is created you can send the URL to your friends and colleagues to start collaborating on a document. Remember whoever has the URL can access the pad, so don't share it in public spaces.  
Riseup is a great and secure provider of pads, but you have to know that they will be deleted after 30 days of inactivityIf you want your pad to last longer you can use other pads.  
+
  
When you create a pad you decide on the name of the URL. It is usually a good practice to use a long name for your pad. Having https://pad.riseup.net/p/feminists might not be the most secure name. You want to use a more complicated URL such as https://pad.riseup.net/p/FeministsRockAndTheyWillBeDoingGreatThingsToghether.  Once the pad is created you can send the URL to your friends and colleagues to start collaborating on a document. Avoid sharing the URL of pads in the public sphere such as on social media.
+
Pads allow you to choose to be anonymous, use a moniker or use your real name. There is a colour-based system that differentiates the contributions of each participants on the pad, so being anonymous will not bring too much confusion while writing. If are worried about your pad being found by others, you might consider a password protected pad. For this check out: https://www.protectedtext.com/
  
Pads allow you and your collective to be either anonymous, use a moniker or decide to use your real name. There is a color-based system (you can decide on the color you use) that differentiate the contributions of each participants on the pad, so being anonymous will not bring too much confusion while writing. If you want a more secure pad that is not open you can use a password protected pad. If you want to avoid your pad to be vandalized by trolls resorting to a password protected pad might be a good option. For this check out: https://www.protectedtext.com/
+
===='''What is Internet Relay Chat (IRC)?'''====
  
 +
IRC is a chat service, which can be hosted on different servers, and accessed from through different user clients. It provides the ability to set up channels or chatrooms where many people can discuss and gives you the option to encrypt your communication. You can’t embed video, audio or pictures, but you can link to them.
  
===='''What is Internet Relay Chat (IRC)?'''====
+
IRC can be used to facilitate collaboration in addition to decision-making processes. If you are thinking about starting a new project, are launching a campaign or just want to have a space for your group to ask each other questions, you can consider using IRC. IRC allows for real-time collaboration as long as you all have easy access to the Internet and can arrange your schedules to be available at the same time. If your group has individuals working from different timezones or from places where power outages regularly occur or some of you regularly get pulled away to look after kids or parents, a mailing list might be better for reaching decisions collectively.
  
IRC can be defined as a text-based social media that requires very little bandwidth. It’s like a multi-user chat and you have the option to encrypt if you want. But, you can’t embed video, audio or pictures, but you can link to them.  
+
IRC can take a little time to get used depending on the skills in your group. Regardless of your skills, developing relationships across a purely text-based channel such as IRC can be challenging. Try to be sensitive to how language can be interpreted and different styles of communication that exist between different people. You can always think of ways to overcome this challenge with your group. For example structuring introductions when you first start out, sharing links to articles, chatting about random news in your country or trying to develop a shared language.  
  
IRC can be used for multiple purposes. It can be used to facilitate collaboration in addition to decision-making processes. If you are thinking about starting a campaign or want to launch a project, IRC might be a good way to start discussing about these projects in a collaborative manner.  IRC allows for real-time collaboration provided of course that you have all easy access to the Internet. If access to the Internet is an issue you might want to consider using your mailing for better decision making process as it allows for asynchronous (delayed-time) communication.
+
====='''Setting up IRC'''=====
  
Also, when planning an international IRC session between many participants this means determining who would get up early and who would stay up late. This is an important issue for those of you who might have kids and older members of the family to take care of, or have to deal with power outages occurring at certain times, or other impediments that prevent you from being online at certain hours. This is why it is important to think about asynchronous (delayed-time conversation) and synchronous (same-time conversation) means of communication. You might want to ask yourself how same-time (synchronous) and delayed-time (asynchronous) communication technologies affect collaboration and decision-making. Internet is such a great medium since it allows you the opportunity to structure your interactions and practices as you wish and thus harnessing the affordances that the internet give you might be very empowering and allow to counter access barriers, language barriers, among others.  
+
There are several ways to chat through an IRC network. The easiest way to start out is to use a web browser application such as those provided by [https://irc.indymedia.nl/ Indymedia] or [https://webchat.freenode.net/ Freenode]. You can instantly create a nickname and a channel which you can give to your colleagues to connect with you.  
  
When you suggest to use IRC you should be mindful of the aforementioned. It is not because it is the tool used by many that it is the best tool for you. If you still decide to use IRC, be mindful that people in your collective might need time to understand this technology and to understand how to best collaborator on such platform. Depending on your skills, using IRC might appear to be fairly “easy” or a bit more difficult, but what is less tangible is the ways in which one develops interpersonal relationships and communicate socio-emotional content on IRC.  
+
Using a web application is however not the most secure option so if you are a more advanced user, or have already tested IRC out and think it will work for you, it is recommended you access your chosen IRC network from a client. There is advice and instructions on how to access an IRC network this way, provided by [https://freenode.net/using_the_network.shtml Freenode], [https://www.autistici.org/en/stuff/man_irc Autistici] and [http://docs.indymedia.org/view/Sysadmin/IrcHowTo Indymedia]. The last two also allow us to anonymise our connections through Tor.
  
====='''How it works?'''=====
+
There are several clients which you can choose from. For example Xchat for GNULinux and Windows and XChat Aqua/Azure for Mac OS, and many more. For more information on IRC chat clients, look at the [https://prism-break.org/en/protocols/irc/ Prism-Break web platform], a site that has been developed after the Snowden revelations which supports you to opt out of mass surveillance programs.
  
To choose an IRC client, we suggest you look at the Prism-Break web platform, a site that has been developed after the Snowden revelations which supports you in opt-outing of mass surveillance programs: https://prism-break.org/en/categories/os-x/#irc . If it's your first time on IRC and just want to try it, we suggest to use a web browser application such as Freenodes: https://webchat.freenode.net/ or Koumbit/Indymedia: https://chat.koumbit.net/ . You can instantly create a nickname and select a channel that your friends and colleagues will have shared with you.
+
====='''Basic rules of engagement'''=====
 
+
Once you start your meeting it is useful to appoint a facilitator that will keep track of time and topics to be discussed and which might ask participants to re-focus if the discussion goes off track.  When you start a conversation take time to say hi and greet people. It is particularly important to talk to new comers. If a group of you know each other over IRC, you might have a tendency to chat to one another and/or give more importance to what your friends say. In order to create a welcoming environment and a safe space acknowledging and valuing the voice of everyone will be key on IRC. 
+
  
While carrying on the discussion, let's remind ourselves that writing is not easy for everyone and/or that many might not be using their mother tongue. IRC can also go very fast, particularly if you are many in the discussion, so allowing everyone to slow down and let people read all the inputs might be important to have an empowering discussion. Deciding for instance of speaking turns might facilitate the meeting and allow for everyone to have their voices heard. Each people in the IRC meeting could be speaking in alphabetical order of nicknames (or any order you want to give) on all the points addressed. This will give more structure to the conversation and help diminish the possibilities of the domination of one or few people in the conversation. Also ending your intervention with “over” or “finish” or "done" might be a good practice. Make those methodologies visible and explicit, probably in the email where you will be asking people for an IRC meeting. Finally, IRC meeting can be very tiring so setting a time-limitation might be useful not to ware people out.
+
Once you start your meeting it is useful to appoint a facilitator that will keep track of time and topics to be discussed and who might ask participants to re-focus if the discussion goes off track.  When you start a conversation take time to say hi and greet people. It is particularly important to talk to newcomers. If a group of you know each other over IRC, you might have a tendency to chat to one another and/or give more importance to what your friends say. In order to create a welcoming environment and a safe space, acknowledging and valuing the voice of everyone will be key on IRC.
  
==='''Building safe spaces in “hostile” environments (do and don'ts supporting people subject to online violence, storming wikipedia and organising edit a thons, installing bots against trolls, feminist counterspeech – swarming together)'''===
+
While continuing the discussion, let's remind ourselves that writing is not easy for everyone and/or that many might not be using their mother tongue. IRC can also go very fast, particularly if you are many in the discussion, so allowing everyone to slow down and let people read all the inputs can help to facilitate an empowering discussion.  You might for instance decide that people should be given turns to speak in order to ensure that everyone has space to express themselves. You can simply assign turns in alphabetical order of nicknames (or any order you want to give) for each of the points addressed. This can help structure the conversation and stop one or a small group of people dominating the conversation. It can also be useful to end your conversation with “over” or “finish” or "done" so everyone knows when you have stopped speaking and because IRC meetings can be tiring, you can set a time limit beforehand. Whichever methods you choose to use, make them visible and explicit beforehand, in the email where you will be inviting people for the IRC meeting for example.
  
The Internet can feel as an unsafe space sometimes. However, there are ways to counter hostile environment and create collective responses to enable speaking up, agency and resistance. Organising online collective actions can be a very powerful exercise to resist what can be a hostile environment. They can also bring attention and visibility to certain issues and in turn help bring about transformation. Storming wikipedia collectively, using feminist counterspeech on Twitter and swarming together can all be important acts that have an impact at the discursive (written), psychological and material levels. And they are fun too ! Mostly because they are creative, bring about individual and collective agency and the feeling that you are not alone.
+
==== '''Tools for managing projects and groups: wikis, forums and Crabgrass''' ====
  
 +
Chat services and mailing lists will only take you so far. When it comes to managing collaboration between people living in different places, you will probably find yourself looking for something with more functionality.
  
===='''Dos and don'ts supporting people subject to online violence'''====
+
One of the oldest tools used for public discussions online is '''internet forums''',  where discussions can be hosted over time and are at least temporarily archived. What really distinguishes a forum from a mailing list or IRC chat is that it has a tree-like structure and can contain a number of sub discussions, each with a different topic.
  
When you or your friends are under attack online there are a few steps to follow to support you or them.
+
If you are looking for a tool to collaboratively write a text with many sections or even to create the initial structure and content for a website, a '''wiki''' can be useful. This is a web application that allows for hierarchical structuring of content and tracks the edits and additions of the users, easily allowing you to revert changes, move around and delete content.  
  
Try to be quick in bringing support. Though remember that knowing what to do and how to do it in such situation needs a lot of practice to become good at it. But as a general rule, you should tell yourself that gender-based violence and harassment online is unacceptable. This should be your main message if you don't have a lot of practice in dealing with such phenomenon.  
+
Both forums and wikis need to be installed in a web space, so will require the expertise of a website manager. However you will find these tools, together with many others, in one of the most versatile platforms for managing groups and collective projects, [https://we.riseup.net/crabgrass/about Crabgrass]. Crabgrass is hosted by the autonomous server '''Riseup''', [https://we.riseup.net/ we.riseup.net], the tech collective providing tools for activists, already mentioned above.  
  
If you are close to the person under attack offer immediate assistance. In the event of Doxxing, where confidential info has been released on the internet about the person, you might want to offer a safe space (a home) if the person does not feel safe to stay where she/they lives.
+
Crabgrass provides a secure HTTPS connection and encrypted data storage, and users and groups are free to choose which information they reveal about themselves. The offered tools include functionality for personal messaging, public or private forums, wikis, task lists, decision-making tools, and a system for uploading and managing images, audio, and documents. It is also possible to set up a customized public homepage where your group can publish your event calendar, blog posts, and other content. For more about how to use Crabgrass, read this [https://info.securityinabox.org/default/communities/01/crabgrass-online-collaboration how-to] in Tactical Tech's Security in-a-box
  
If you do not know (well) the person, you can speak out. Since collective actions are often more effective than individual actions,  make sure you gather a group of friends, and the friends of your friends for a Twitter storming for instance. Make visible the issue! This will show to the person under attack that you and others care and that such acts are not OK.  
+
Finally you can visit the [[Step_1#Alternative_social_networks|alternative social networks section]] in this manual if you want to use social networking platforms other than the dominant ones.
  
Depending on the nature and context of the attack, you might want to speak out to the media and highlight the gendered nature of online attacks. Using the media to bring light to a situation can be an important way to bring about visibility to such issue. As a best practice though, we recommend that you consult the persons under attack before speaking to the mainstream media. If you do not know her/they go through the web of trust. Also, we recommend you to contact a friendly and/or feminist media or journalist. Prior to doing so, we recommend that you form a group of people in opposition to such violence, draft a press release and explain what is gender-based violence and harassment online and why it exist. This will bring visibility to the issue and concentrate less on the person who has been or who is under attack. Thinking about the harm and added stress that the person can go through if she is made visible in the mainstream media is a feminist issue that you should carefully assess.   
+
=== Strategies for creating safe spaces in the public sphere ===
  
If you are part of an organisation or network you can write a solidarity statement that explicitly says you condemn online gender-based violence and harassment online. If it's a person from your organisation who has been under attack, make sure she/they read the solidarity statement before it is being released. The person will feel that her teammates care and respect her/they wishes. It will also allow the person to have agency over what is written. What is even better is to have an organisational policy on what to do when someone is under attack. If you have a policy and specific steps to follow when such situation occurs, chances are you will do less harm and be more effective in your strategy.  
+
There are ways to counter the vulnerability and intimidation we might feel online. This can be achieved by caring for our personal and collective safety, through using security and privacy enabling tools and techniques. This can also be achieved by resistance. Organising online collective actions can be a very powerful exercise to resist what can be an unsafe environment. They can also bring attention and visibility to certain issues and in turn help bring about transformation. Using feminist counterspeech, storming Wikipedia collectively and swarming together can all be important acts that have an impact for you and your group at the discursive (written), psychological and material levels. And they are fun too! Mostly because they are creative, bring about individual and collective agency and the feeling that you are not alone.  
  
As an ally, that is someone who want to support a disadvantage group, but who is not part of that group (e.g. men are allies when it women to women's rights issues), you ought to speak out and say “NO” to online harassment and violence. Speaking out ought to happen in the public spaces. This is very important. Do it all the time that you witness online violence! The culture of impunity to online harassment will continue. 
+
====='''Feminist Counterspeech'''=====
  
====What are some of the current platforms which document online violence?====
+
Feminist counterspeech has been used as a response to making sexism visible online, as a response to online attacks and harrassment, among others. Other forms of resistance include organized public shaming, advocacy and lobbying for public policies, etc. Feminist counterspeech can be an effective tactic to trigger a new narrative online, create a sense of belonging and make visible the effectiveness of collective feminist actions online. Feminist counterspeech is a form of discursive resistance that allows you to call out misogyny and sexism online and makes visible both weak and strong feminist networks online. There are many examples of these which you have probably seen and appreciated. For example the #yesallwomen hashtag which was created as a response to the #notallmen hashtag on Twitter and was used to document women's stories of harassment and abuse. Or the rapid and distributed sharing and uploading of the artist Rupi Kuar's photo showing menstrual blood, in response to the image-sharing tool Instagram censoring it.
  
Documenting instances of online violence and harassment is key to showing the extent of the problem and is very powerful as it make visible the structural aspect of violence in societies. A few initiative have started to document this process. We highlight a few examples below.
+
======'''Wikipedia?'''======
  
APC's Take back the Tech has collected more than 500 stories of women who have experienced violence online. These stories were collected using the open source platform called Ushahidi. The data visualisation can be see here: https://www.takebackthetech.net/mapit/  The overall results of those who have participated in this exercise show that women between 18 and 30 who are using Facebook are most likely to be under online threat. To read about the story visit: http://www.genderit.org/articles/mapping-strategy-disclose-online-violence-against-women
+
Feminists have criticised the way in which knowledge is produced, made and constructed on Wikipedia. The fact that Wikipedia’s contributors are mostly male (about 10% are women though this can vary between countries) in their twenties and thirties and disproportionately Western are important factors that influence content. Women who have played a significant role in history are often missing from Wikipedia and, at times, feminist, queer and trans content are not always easily accepted on the online encyclopedia. A notable example relates to an entry about Chelsea Manning, the United States Army soldier who was convicted in July 2013 of violations of the USA Espionage Act after releasing the largest set of classified documents to WikiLeaks. When Manning formally announced her gender transition, the English Wikipedia entry under her name was quickly amended to reflect this change. A week after intense discussions regarding this amendment took place, where a majority of Wikipedians disregarded experts on transgendered issues, the article was reverted back to Bradley Manning. The article has since then returned to Chelsea Manning (at least in the English language).
  
HarassMap was born as a response to the persistent problem of sexual harassment on the streets of Egypt. Since the crowdsourcing platform based on Ushahidi is anonymous, Harasmap allows to document instances of sexual harassment whether you are the victim or a witness (http://harassmap.org/en/).  To read about the effectiveness of crowdsourced data visit: http://harassmap.org/en/wp-content/uploads/2013/03/Towards-A-Safer-City_full-report_EN-.pdf Similar to HarrassMap is Hollaback an initiative that aims at stopping street harassment using technology all over the world (http://www.ihollaback.org/).
+
====== Wikistorming ======
 +
Storming Wikipedia or organising an Edit-a-thon is a tactic to respond to the lack of women, feminist, queer and trans* content on Wikipedia. These empower participants to learn collectively how to edit Wikipedia and to change content to better reflect their communities and histories. Learning to edit Wikipedia can seem daunting so collectively editing and creating pages about trans*, women and queers is a great way to confront fears, add feminist, queer and trans content on the online encyclopedia and Do-It-With-Others (DIWO) in a safe space.
  
HeartMob is a platform that aims at providing real-time support to individuals experiencing online harassment and empowers bystanders to act. This platform is being built and you should stay abreast of its development. It is an initiative of Hollaback.  Visit their Kickstarter project to know more about the initiative: https://www.kickstarter.com/projects/4096561/heartmob/description
+
======'''How to organise a Wikistorming'''======
  
   
+
There are always great reasons to organise a wikistorming on any day! However, if you are looking for broader impact and be connected to others such gatherings often happen on these two days: [http://findingada.com/about/faq/ Ada Lovelace Day] in mid-October and March 8 International Women's Day. Once you have decided on a date, gather a group of friends and friends of friends who want to learn or already know how to edit Wikipedia and identify a safe space where to hold the event. It can be held in someone’s home, in a community centre, at an art centre or at a community organisation. Make sure you find a place that is accessible and ideally that already has a feminist base. Wikistorming may last for a day or half a day. Before the wikistorming or as part of it, decide which Wikipedia entries you want create or which existing page you want to edit. Be realistic in your goals and don't put too many edits on your plate! To edit Wikipedia carefully it takes time. If you want to organise a wikistorming visit: http://femtechnet.newschool.edu/wikistorming/
===='''Installing Bots Against Trolls And Swarming Toghether'''====
+
  
[FAITH'S PART]
+
======'''Installing Bots Against Trolls And Swarming Together'''======
  
If you use Twitter, 4chan or any online forums where comments are allowed, you might have noticed that they tend to not be very safe spaces. Kathy Siera says there is a “koolaid point” for women and queers who start to gather a following and be listened online. At this point, a certain group of people may decide that you have too much influence, and make it their mission to silence you or discredit you. We have seen this in numerous high profile cases but also in constant reports from women and queer writers, activists and organisers.This is called trolling.
+
If you use Twitter, 4chan or any online forums where comments are allowed, you might have noticed that they tend to not be very safe spaces. [http://seriouspony.com/trouble-at-the-koolaid-point/ Kathy Siera says] there is a “koolaid point” for women and queers who start to gather a following and be listened online. At this point, a certain group of people may decide that you have too much influence, and make it their mission to silence you or discredit you. We have seen this in numerous high profile cases but also in constant reports from women and queer writers, activists and organisers.This is called trolling.
  
=====What is a troll?=====
+
======What is a troll?======
  
A troll was once just a mountain-dwelling monster in kids stories. Then a troll became the word for early internet users who intentionally sowed discord on IRC and chat forums, often targeting and singling out new users. But now the word is used more broadly to describe people who target and harass others online. This can include anything from constant derogatory and belittling messages to doctored images and even threats. Most often the subjects of this kind of abuse are marginalised groups like women, queers and people of colour. In recent years there have been more and more cases of women speaking out about how they are harassed. Steph Guthrie in a talk on TedX Toronto makes a good point that labelling people who are intentionally abusing women online, “trolls” ignores deep-seated problem of misogyny online.
+
A troll was once just a mountain-dwelling monster in kids stories. Then a troll became the word for early internet users who intentionally sowed discord on IRC and chat forums, often targeting and singling out new users. But now the word is used more broadly to describe people who target and harass others online. This can include anything from constant derogatory and belittling messages to edited images and even threats. Most often the subjects of this kind of abuse are marginalised groups like women, queers and people of colour. In recent years there have been more and more cases of people speaking out about how they are harassed.  
  
=====How should you deal with trolls?=====
+
======How should you deal with trolls?======
  
There are two key ways you can deal with trolls: one is to block them and report them to the platform you are using or to engage with them. This decision depends on what you want to achieve. Blocking them can definitely work and you can continue with your work unimpeded. A project like “Block Together” was developed to help people who are harassed share their blocklists with each other. Historically platforms like Twitter and Facebook have not handled reports of intimidation and violence very well however this is changing, as they recognise how severe this problem is and how it deters people with important voices from using their services. When blocking doesn't help is when users are really committed to trolling and create numerous different profiles (called “sock puppet accounts”) to continue the harassment. Then your blocking has to keep up with their new account generation and it becomes tedious. You might consider the alternative of engaging trolls. There are a few tactics for engaging trolls. One is to try and enter into rational arguments with them and interrogate their views. Another way is to try to shame them or use humor to deflate them.  
+
There are two key ways you can deal with trolls: one is to block them and report them to the platform you are using or to engage with them. This decision depends on what you want to achieve. Blocking them can definitely work and you can continue with your work unimpeded. A project like “Block Together” was developed to help people who are harassed share their blocklists with each other. Historically platforms like Twitter and Facebook have not handled reports of intimidation and violence very well. However this is changing, as they recognise how severe this problem is and how it deters people with important voices from using their services. When blocking doesn't help is when users are really committed to trolling and create numerous different profiles (called “sock puppet accounts”) to continue the harassment. Then your blocking has to keep up with their new account generation and it becomes tedious. You might consider the alternative of engaging trolls. There are a few tactics for engaging trolls. One is to try and enter into rational arguments with them and interrogate their views. Another way is to try to shame them or use humour to deflate them.  
  
Effective engagement with trolls can actually help to generate a debate and public interest around the act of harassment and involve others online in talking about safe spaces, violence, sexism and online behavior. It can also be a source of empowerment for the subjects of trolling: seeing others laugh at your harasser can be very uplifting.
+
Effective engagement with trolls can actually help to generate a debate and public interest around the act of harassment and involve others online in talking about safe spaces, violence, sexism and online behaviour. It can also be a source of empowerment for the subjects of trolling: seeing others laugh at your harasser can be very uplifting.
  
=====Swarming=====
+
======Swarming======
  
 
The method of swarming can be used to drown out harassers. This can be done in retro style by creating communities of support with your allies in social media spaces where you are likely to encounter harassment. When someone is being targeted, others can quickly be alerted and bombard the harasser with messages. The content of that message is up to you: it could be scolding, educational, or loving. Another option is: instead of directing messages towards the harasser, the swarm can fill the victim's content stream in order to quickly make the negative, violent content disappear into online history.
 
The method of swarming can be used to drown out harassers. This can be done in retro style by creating communities of support with your allies in social media spaces where you are likely to encounter harassment. When someone is being targeted, others can quickly be alerted and bombard the harasser with messages. The content of that message is up to you: it could be scolding, educational, or loving. Another option is: instead of directing messages towards the harasser, the swarm can fill the victim's content stream in order to quickly make the negative, violent content disappear into online history.
  
=====Do I have to use my own account?=====
+
======Do I have to use my own account?======
  
If you want to engage with trolls, and even if you consider using the “swarming” method, you might prefer to stay anonymous to avoid having your real identity trolled. Setting up a network of second accounts to do your troll-response work can be a good idea for your organisation or your community of friends. It might be easier too, psychologically, to say some of the things you want to trolls, than you would when it is linked to your main identity. And it is more performative, you can create any kind of identity you want and style it with avatar etc.
+
If you want to engage with trolls, and even if you consider using the “swarming” method, you might prefer to stay anonymous to avoid having your real identity trolled. Setting up a network of second accounts to do your troll-response work can be a good idea for your organisation or your community of friends. It might be easier too, psychologically, to say some of the things you want to trolls, than you would when it is linked to your main identity. And it is more performative: you can create any kind of identity you want and style it with an avatar, a funny name, a character etc. (see "'''Creating a new online identity'''" and the following chapters in '''Step 1''').
  
=====Automation=====
+
======Automation======
  
While battling the trolls the old-fashioned human way can be fun and eye-opening, it can be a time waster. Another option to consider is automation. For this you need someone who can do some coding to start from scratch or work with what is already freely available code already uploaded on Github.
+
While battling the trolls in the old-fashioned human way can be fun and eye-opening, it can also be a time waster. Another option to consider is automation. For this you need someone who can do some coding to start from scratch or work with freely available code someone already uploaded on Github.
  
=====What's a bot?=====
+
======What's a bot?======
  
A bot is a software application that runs an automated task over the internet. Bots perfom tasks at a greater velocity than humans can. There are many different breeds of bots: for example the spambot which harvests email addresses and contact information from or the attentionbot which fakes clicks on Youtube videos to make them look more popular than they actually are. They can post content, harvest information and click on things. Twitter is filled with bots which use algorithms to gather information and tweet things on Twitter. Many of these are humorous and random: like @twoheadlines which randomly grabs news headlines and combines them to create funny combinations. The below steps address Twitter mainly however some of these ideas can be used across other platforms too.
+
A bot is a software application that runs an automated task over the internet. Bots perfom tasks at a greater velocity than humans can. There are many different breeds of bots: for example the spambot which harvests email addresses and contact information or the attention bot which fakes clicks on Youtube videos to make them look more popular than they actually are. They can post content, gather information and click on things. Twitter is filled with bots which use algorithms to harvest information and tweet. Many of these are humorous and random: like @twoheadlines which randomly grabs news headlines and combines them to create funny combinations. The below steps address Twitter mainly. However some of these ideas can be used across other platforms too.
  
=====How can a bot battle a troll?=====
+
====== How can a bot battle a troll? ======
  
A bot can be programed to document trolls' activities or or talk to them, so that you don't have to. There are a few ways of doing this: the autotweet bot and a silent data-gathering bot in combination with the talking bot(s). The examples below speak specifcally about what is possible on Twitter however the ideas could be applied to other platforms.  
+
A bot can be programed to document trolls' activities or talk to them, so that you don't have to. There are a few ways of doing this: the autotweet bot and a silent data-gathering bot in combination with the talking bot(s). The examples below speak specifically about what is possible on Twitter. However the ideas could be applied to other platforms.  
  
 
1. The data-gathering bot  
 
1. The data-gathering bot  
  
The data-gathering bot, quietly scans the Twitter API gathering tweets, usernames and any other available information you program it to, and places this in a .csv file for you to analyze or use for further purposes outlined below. This first kind of bot can be useful just for understanding what kind of content is out there and maybe doing a first stage analysis of abuse.   
+
The data-gathering bot quietly scans Twitter gathering tweets, usernames and any other available information you program it to, and places this in a .csv file for you to analyse or use for further purposes outlined below. This first kind of bot can be useful just for understanding what kind of content is out there and maybe doing a first stage analysis of abuse.   
  
 
2. The simple tweeting bot  
 
2. The simple tweeting bot  
  
If you follow the #gamergate hashtag on Twitter, you will see a bot called @every ethics which tweets different humorous reasons for the #gamergate trolling, riffing off the claim that Gamergate was not about attacking women in gaming but about “ethics in game journalism”. While this bot could be seen as spam, it was actually clearly a strategy to undermine to make fun of the trolls.  
+
If you follow the #gamergate hashtag on Twitter, you will see a bot called @everyethics which tweets different humorous reasons for the #gamergate trolling, ridiculing of the claim that Gamergate was not about attacking women in gaming but about “ethics in game journalism”. While this bot could be seen as spam, it was actually clearly a strategy to undermine and make fun of the trolls.  
  
 
3. The retweet bot
 
3. The retweet bot
  
The retweet bot is programmed to scan the Twitter API for a list of words, phrases or hashtags defined by you, and to retweet those. This would be a strategy to document and publicise Twitter abuse.
+
The retweet bot is programmed to scan the Twitter API for a list of words, phrases or hashtags defined by you, and to retweet those. This would be a strategy to document and publicise Twitter abuse. Here's an [[Trolling#Retweeting_mined_tweets|example of such a bot]] you can download and install.  
 
+
Here's an example: https://lilithlela.cyberguerrilla.org/?p=17418
+
  
 
4. The autotweet bot  
 
4. The autotweet bot  
  
The “autotweet” bot is similar except that every time it finds a tweet with one of the words, phrases or hashtags you have programed it to to look for, it will tweet a prewritten tweet at that user. There are a number of examples of this in Twitter history: @stealthmountain which corrects any Twitter user who spells “sneak peek” wrong. These bots get shut down much quicker now as was shown by @fembot which responded to racists and sexist tweets that it spotted and was blocked after making only 75 tweets.  
+
The “autotweet” bot is similar except that every time it finds a tweet with one of the words, phrases or hashtags you have programmed it to look for, it will tweet a prewritten tweet to that user. There are a number of examples of this in Twitter history: @stealthmountain which corrects any Twitter user who spells “sneak peek” wrong. These bots get shut down much quicker now as was shown by @fembot which responded to racists and sexist tweets that it spotted and was blocked after making only 75 tweets. Unfortunately Twitter does not make it so easy to do this anymore.  
 
+
unfortunately Twitter does not make it so easy to do this anymore.  
+
  
 
5. The tweeting bot in combination with the data-gathering bot
 
5. The tweeting bot in combination with the data-gathering bot
Line 212: Line 179:
 
You can use a data-gathering bot to find the users tweeting violent things, compile them in a spreadsheet for you to read over and check for accuracy and remove any false positives. Alongside the data-gathering bot, you can have a talking bot or a team of talking bots which can tweet whatever you decide is useful information, to those users.
 
You can use a data-gathering bot to find the users tweeting violent things, compile them in a spreadsheet for you to read over and check for accuracy and remove any false positives. Alongside the data-gathering bot, you can have a talking bot or a team of talking bots which can tweet whatever you decide is useful information, to those users.
  
=====Things to watch out for=====
+
======Things to watch out for======
  
 
1. Language is slippery
 
1. Language is slippery
  
If you want to tackle violence against women online, you will have to be very careful about what kind of language you search for. For example, every time someone used the word “bitch” on Twitter to intimidate or harass a woman, there are probably at least five other people using it to tell their friend how much they love them or talk about the latest celebrity affair. The best way to figure out which language is used to harm women is to crowdsource it from people who have been harassed and then do a number of tests, pulling tweets from the Twitter API and then analyzing it yourself.  
+
If you want to tackle violence against women online, you will have to be very careful about what kind of language you search for. For example, every time someone uses the word “bitch” on Twitter to intimidate or harass a woman, there are probably at least five other people using it to tell their friend how much they love them or talk about the latest celebrity affair. The best way to figure out which language is used to harm women is to crowdsource it from people who have been harassed and then do a number of tests, pulling tweets from the Twitter API and then analysing it yourself.  
  
 
2. Twitter is smart (and strict)
 
2. Twitter is smart (and strict)
Line 222: Line 189:
 
Twitter is not against bots and if you just want to create a bot that scans information from Twitter for you to analyse, or a bot that just tweets out to no one in particular, you will not encounter any problems. However if you want to tweet @ other Twitter users, you have to take into account Twitter's policy against spam. See Twitter's guide to [https://support.twitter.com/articles/76915-automation-rules-and-best-practices# Automation Rules and Best Practices].
 
Twitter is not against bots and if you just want to create a bot that scans information from Twitter for you to analyse, or a bot that just tweets out to no one in particular, you will not encounter any problems. However if you want to tweet @ other Twitter users, you have to take into account Twitter's policy against spam. See Twitter's guide to [https://support.twitter.com/articles/76915-automation-rules-and-best-practices# Automation Rules and Best Practices].
  
=====Evading Twitter's spam filters=====
+
======Evading Twitter's spam filters======
  
 
There are a few things to keep in mind when trying to bypass Twitter's spam filters:
 
There are a few things to keep in mind when trying to bypass Twitter's spam filters:
Line 239: Line 206:
 
4. Location of the tweets
 
4. Location of the tweets
  
Use a VPN which gives you a new IP address every time you reconnect to fool Twitter into thinking that the accounts are being managed from different locations.
+
Use a VPN which gives you a new IP address every time you reconnect to fool Twitter into thinking that the accounts are being managed from different locations. To learn more about what a VPN is, read "'''Anonymising your connections'''" in Step 0.
  
=====How to set up a Twitter account to be used as a bot=====
+
======How to set up a Twitter account to be used as a bot======
  
You still need someone to write the script for you or to configure a script already created by someone else and downloaded from Github. But what is easy to do and what even volunteers might like to do is to help you set up all the Twitter accounts so that they can easily be controlled by the script.  
+
You still need to write the script for you or to configure a script already created by someone else and downloaded from Github, or to find someone else to do this for you. But what is easy to do and what even volunteers might like to do is to help you set up all the Twitter accounts so that they can be easily controlled by the script.  
  
 
1. Create a new account as you would normally and make sure to give it a photo, follow some people and do some tweeting (recently registered, faceless accounts with 0 followers will get blocked very quickly).  
 
1. Create a new account as you would normally and make sure to give it a photo, follow some people and do some tweeting (recently registered, faceless accounts with 0 followers will get blocked very quickly).  
2. In order to function as a bot the account needs to be verified with a valid phone number. To do this you can use your own phone number, volunteers numbers or buy a bulk of cheap sim cards. Don't use the same phone number for numerous accounts – again this will be a quick sign to Twitter that the accounts dodgy.  
+
2. In order to function as a bot the account needs to be verified with a valid phone number. To do this you can use your own phone number, volunteers numbers or buy a bulk of cheap sim cards. Don't use the same phone number for numerous accounts – again this will be a quick sign to Twitter that the account is dodgy.  
3. Now you need to register an application with the Twitter API which will allow your bot to make “calls” to the API, ie retrieve or send data. Go to https://apps.twitter.com/app/new and create a new application. You can provide any dummy content in the fields there and then you can set your permissions to “read and write” and generate the keys you will need.  
+
3. Now you need to register an application with the Twitter API which will allow your bot to make “calls” to the API, i.e. retrieve or send data. Go to [https://apps.twitter.com/app/new apps]  and create a new application. You can provide any dummy content in the fields there and then you can set your permissions to “read and write” and generate the keys you will need.  
  
More on these steps and some simple bots to download and test out at [https://lilithlela.cyberguerrilla.org/?p=9247 Cyber Guerilla].
+
More on these steps and some simple bots to download and test out at [[Trolling#Using_bots_to_troll_on_twitter|Using bots to troll on twitter]].
  
===='''Is There a Gendered Construction of Knowledge on Wikipedia?'''====
+
===='''Dos and dont's supporting people subject to online violence'''====  
  
Feminists have criticised the way in which knowledge is produced, made and constructed on Wikipedia. The fact that Wikipedia’s contributors are mostly male (about 10% are women though this can vary between countries) in their twenties and thirties and disproportionately Western are important factors that influence content. Women who have played a significant role in history are often missing from Wikipedia and, at times, feminist, queer and trans content are not always easily accepted on the online encyclopedia. A notable example relates to an entry about Chelsea Manning, the United States Army soldier who was convicted in July 2013 of violations of the USA Espionage Act after releasing the largest set of classified documents to WikiLeaks. When Manning formally announced her gender transition, the English Wikipedia entry under her name was quickly amended to reflect this change. A week after intense discussions regarding this amendment took place, where a majority of Wikipedians disregarded experts on transgendered issues, the article was reverted back to Bradley Manning. The article has since then returned to Chelsea Manning (at least in the English language).
+
When your friends are under attack online there are a few steps to follow to support them. 
  
[END FAITH'S PART]
+
Try to be quick in bringing support. But remember that knowing what to do and how to do it in such situations needs a lot of practice to become good at it. As a general rule, you should tell yourself that gender-based violence and harassment online are unacceptable.This should be your main message if you don't have a lot of practice in dealing with such cases.
  
===='''What does it mean to Storm Wikipedia?'''====
+
If you are close to the person under attack, offer immediate assistance. In the event of doxing, where confidential info has been released on the internet about the person, you might want to offer a safe space (a home) if the person does not feel safe to stay where she/they lives. You can also offer to moderate your friend's Twitter feed or blog comments to allow her/them to take a break in time of stress. 
  
“Storming Wikipedia” is a response to the lack of women, feminist, queer and trans content on wikipedia and as mentioned above the low percentage of women contributing to Wikipedia. Wikistroming, Storming Wikipedia or Edit-a-Thon focus on learning collectively how to edit Wikipedia. Women might have the impression that the barriers to entry to edit wikipedia are high. Therefore, editing and creating pages about women and feminist work, among others, is a great way to confront fears, add feminist, queer and trans content on the online encyclopedia and Do-It-With-Others (DIWO) in a safe space.
+
If you do not know (well) the person, you can still speak out. In fact, speaking out should be our collective responsibility! If you want to fight sexism and racism, to name just those two, you need to take responsibility for it. This is not only something women and minorities should think about -- everyone should.  If you witness sexism online don't simply send a private email or a tweet to the person who is under attack telling them that you think this kind of behaviour is despicable (sometimes, if the person under attack is being flooded with tweets and mails, it's even better not to write at all). Instead, speak out about it in your networks and raise your voice against such behaviour. You can for instance commend the work that the person under attack has been doing. Don't be silent, especially if you are a colleague or a team mate. Show your support. Make your voice resonate online, particularly if you are a man!  
  
===='''How to organise a Wikistorming?'''====
+
If you want to have more impact think about crafting a collective action. Collective actions are often more effective than individual actions. Make sure you gather a group of friends, and friends of friends, for a Twitter storming for instance. Make your point visible! This will show to the person under attack that you and others care and that such acts are not OK. 
  
There are always great reasons to organise a wikistorming on any day! However, if you are looking for broader impact and be connected to others such gatherings wikistorming often happen on these two days: Ada Lovelace Day on October 14 and March 8 International Women's Day. Once you have decided on a date, gather a group of friends and friends of friends who want to learn or already know how to edit wikipedia and identify a safe space where to hold the event. It can be held in someone’s home, in a community center, at an art center or a community organisation. Make sure you find a place that is accessible and ideally that already has a feminist base. Wikistorming may last for a day or half-a-day. Before the wikistorming or as part of it, decide which wikipedia entry you want create or which existing page you want to edit. Be realistic in your goals and don't put too much edits on your plate! To edit wikipedia carefully it takes time. If you want to organise a wikistorming visit: http://femtechnet.newschool.edu/wikistorming/
+
Depending on the nature and context of the attack, you might want to speak out to the media and highlight the gendered nature of online attacks. Using the media to bring light to a situation can be an important way to bring about visibility to such issue. As a best practice, though, we recommend that you consult the persons under attack before speaking to the mainstream media. If you do not know her/them, go through the web of trust. Also, we recommend you to contact a friendly and/or feminist media outlet or journalist. Prior to doing so, we recommend that you form a group of people opposed to such violence, draft a press release and explain what gender-based violence and harassment online are and why they exist. This will bring visibility to the issue and concentrate less on the person who has been or is under attack. Thinking about the harm and added stress that the person can go through if they are made visible in the mainstream media is an issue that you should carefully assess. Good intentions are not enough, you need to think about the impact your actions will have on her life. Make sure you have experienced feminists with you, and consider especially that this is not about you: this is about fighting sexism online!
  
===='''Feminist Counterspeech'''====
+
If you are part of an organisation or network, you can write a solidarity statement that explicitly says you condemn online gender-based violence and harassment. Having feminists review the statement of solidarity is a best practice: your good intentions are not enough. If it's a person from your organisation who has been under attack, make sure she/they read the solidarity statement before it is released. The person will feel that her team mates care and respect her/their wishes. It will also allow the person to have agency over what is written. What is even better is to have an organisational policy on what to do when someone is under attack. If you have a policy and specific steps to follow when such situation occurs, chances are you will do less harm and be more effective in your strategy. Have feminists review your statement, but also remember that if your organisation is not based solely on volunteer work, this is one of the activities that should be paid. This is crucial work and it should be valued!
  
Feminist counterspeech can be an effective tactic to trigger a new narrative online and make visible the effectiveness of collective feminist actions online. Feminist counterspeech is a form of discursive resistance that allow you to call out misogyny and sexism online in a humoristic way. Counterspeech important as it makes visible both weak and strong feminist networks online.  
+
As an ally, that is someone who wants to support a disadvantaged group but is not part of that group (e.g. men are allies when it comes to women's rights issues), you ought to speak out and say “no” to online harassment and violence. Speaking out ought to happen in the public spaces. This is very important. Do it all the time that you witness online violence! Otherwise, the culture of impunity to online harassment will continue. 
  
Despite the unprecedented speed and immediacy afforded to digital tools, and the affective responses it can engender in us for the better and for the worse, it is important to recognize that feminist counterspeech has no doubt impressive potentialities, but that there are also limitations particularly with its temporal aspect. As feminists we must always consider the extent to which our actions aim at reshaping the relationship between gender, intersectionality violence and power online and off.
+
Finally, if someone tells you you are sexist, or your comment was sexist, don't try to defend yourself. Try to understand where this comment comes from. Be open and ready to continue to learn, to inform yourself and read about feminism, sexism and patriarchy! As we all grow up in a sexist environment, we have internalized sexist and racist values over the years. Be ready tochallenge yourself! 
  
==='''Building safe spaces off line (code of conducts for camps and conferences, getting more women in developing technologies – coding – making – biolabs, Building your feminist hackerspace, tech to identify/rate not/safe spaces)'''===
+
You can read more about what can be done to Combat Online Sexism visit: http://leighalexander.net/but-what-can-be-done-dos-and-donts-to-combat-online-sexism/
 +
 
 +
====What are some of the current platforms which document online violence?====  
  
[PAULA's PART - Beginning]
+
Documenting instances of online violence and harassment is key to showing the extent of the problem and is very powerful as it makes visible the structural aspect of violence in societies. A few initiatives have started to document this process. We highlight a few examples below.
  
 +
APC's '''Take back the Tech''' has collected more than 500 stories of women who have experienced violence online. These stories were collected using the open source platform called Ushahidi. The data visualisation can be see here: https://www.takebackthetech.net/mapit/ . The overall results of those who have participated in this exercise show that women between 18 and 30 who are using Facebook are most likely to be under online threat. To read about the story visit: http://www.genderit.org/articles/mapping-strategy-disclose-online-violence-against-women
  
The most difficult thing about building 'safe spaces' offline for women is that there is so little agreement about what a safe space might look like and whether, indeed, it's a useful concept for women in tech anyway. I'm drawing on discussions and issues which have arisen in women's tech conferences and skills workshops I have been involved in, including Flossie.org, Fossbox, Autonomous Tech Fetish (ATF), and Eclectic Tech Carnival (ETC) to explore some of these differences, how to facilitate discussion of them, and how to arrive at a shared idea of an appropriate space for women to engage with tech.  
+
'''HarassMap''' was born as a response to the persistent problem of sexual harassment on the streets of Egypt. Since the crowdsourcing platform based on Ushahidi is anonymous, Harassmap allows to document instances of sexual harassment whether you are the victim or a witness (http://harassmap.org/en/). To read about the effectiveness of crowdsourced data visit: http://harassmap.org/en/wp-content/uploads/2013/03/Towards-A-Safer-City_full-report_EN-.pdf [PDF]. Similar to HarrassMap is Hollaback, an initiative that aims at stopping street harassment using technology all over the world (http://www.ihollaback.org/).
  
Every group has to work out its own idea of an appropriate space for women. Once you have arrived at a shared ideal, it's time to look at the practicalities of implementing these ideas in material, offline, spaces. This will include thinking about how much formality you want, what kind of formalities, how you will accommodate diversity, how you will facilitate participation for all the women attending both in terms of your practical arrangements and in the way you formalise the social space.
+
HeartMob is a platform that aims at providing real-time support to individuals experiencing online harassment and empowers bystanders to act. This platform is being built and you should stay abreast of its development. It is an initiative of Hollaback.  Visit their Kickstarter project to know more about the initiative: https://www.kickstarter.com/projects/4096561/heartmob/description
  
==== You are a woman in tech and want to build an offline 'safe space'? Here is how you do it? ====
+
=== Building our safe spaces offline ===  
  
The difficulties in defining what a 'safe space' should look like arise from the enormous diversity among women themselves and the many different ways of articulating a feminist identity. Women's idea of what might be experienced as politically, socially or personally threatening varies and women may face very different levels of threat from state agencies or socio-economic environments which also affect how shared spaces should be organised. There are other pragmatic considerations. Taking into account all of these competing narrations of feminism, contexts, practical issues and potential consequences it is no small task to create a safe space for women to engage with technology!
+
All the ideas about creating and maintaining safe spaces detailed so far can of course also be applied offline when you think about bringing women and trans* persons together to network, learn and collaborate. In the case of security and privacy training, you also need to consider how your participants might learn skills to protect themselves when the topics themselves can very easily be frightening or overwhelming.  
  
Perhaps the first thing I would like to make as clear as I can is that it can never be possible to create a space which will be experienced the same way by everyone because everyone brings their own  contexts and histories with them. It is important to be aware of the danger that in struggling to perfect a feminist safe space one always runs the risk of creating, instead, yet another form of social control and pressure to conform to a particular image of what a woman is.  
+
Ideas have arisen in women and trans* tech conferences and skills workshops as how best to build safe spaces. Groups such as Flossie.org, Fossbox, Autonomous Tech Fetish (ATF), and Eclectic Tech Carnival (ETC) have each used a different set of principles to build safe spaces and are thus good examples to explore to highlight some of the differences, how to facilitate discussion about them, and how to arrive at a shared idea of an appropriate space for women and trans* persons to engage with tech.  
  
So, overall, the most important thing to remember is that every woman is different, every woman has her own experience, history, context and needs. Emotions themselves are often not safe, there is always risk and vulnerability in opening yourself to new experience. The more diverse the environment, the more emotional risk we open ourselves to as ideas and ways of being may be fundamentally challenged. So we are not aiming for the avoidance of any kind of conflict or emotional risk but, instead, to provide buffers, understanding, reciprocation, support, love, and care for each other and for our shared endeavour. We must take every possible step to ensure that practical needs are met (protecting anonymity, respecting diversity, dealing with harassment, providing appropriate living space etc), and on collaboration, facilitation and mediation.  
+
Every group has to work out their own idea of an appropriate space for their participants. Once you have arrived at a shared ideal, it's time to look at the practicalities of implementing these ideas in material, offline, spaces. This will include thinking about how much formality you want, what kind of formalities, how you will accommodate diversity, how you will facilitate participation for all the participants both in terms of your practical arrangements and in the way you formalise the social space.
  
==== Women only? ====
+
==== How do you create a safe space? ====
  
This question can be one of the most divisive as it will often touch on women's strongly held sense of their political, personal, sexual and social identities. It can raise up issues of sexual orientation and gender identity as well as mobilising all kinds of other loyalties. Some will prefer a women-only environment, some will feel that this opens up an opportunity for external attacks on the whole project by anti-feminist tech men whilst some will feel that male friends and colleagues will be unfairly excluded and resentful. Discussion can sometimes divide along lines of sexual orientation or of feminist conviction - or just between women who regularly work alongside men in the tech industry and women who would like to learn tech but find learning alongside men challenging. These divisions will also never be clearly defined - individuals don't take neat 'sides' as they probably have multiple modes of identification.  
+
The difficulties in defining what a "safe space" should look like are inherent in the fact that you are bringing a diversity of people together, who might be considered to be part of the same community but all have different histories, contexts and needs. What one person might find politically, socially or personally threatening, might mean very little to another. And everyone will of course also come with different experiences and levels of knowledge and skills in technology.  
  
Declaring an event women-only will often also raise a bitterly divisive question on the status of transgendered women. Some will not accept transitioned identities as 'authentic' whilst others will argue that there is no such thing as an authentic gender identity and it is up to women to decide for themselves how they identify their own gender. In my experience it's best to be flexible on all these questions as rigidity can easily disrupt collectives or cause individual women to become distressed and even leave the group.  
+
We need to remind ourselves then that whenever we create a space, even a safe space, it will never be experienced in the same way by the people involved. It is important to be aware that, in struggling to perfect a feminist safe space, one always runs the risk of creating, instead, yet another form of social control and pressure to conform to a particular image of what a woman or trans* identified person is.
  
At Eclectic Tech, it was decided that the Carnivals would be women-only and this would include all women who identify themselves as women. Flossie.org began on the same basis but changed its policy to women-only as speakers or facilitators whilst sympathetic men could attend as participants. Fossbox varies its gender policy according to the aims and contexts of each individual workshop whilst ATF welcomes all women, trans, queers and sympathisers.  
+
So, overall, the most important thing to remember is that everyone is different, with their own set of experiences, history, context and needs. There is always risk and vulnerability in opening yourself to new experiences. The more diverse the environment, the more emotional risk we open ourselves to as ideas and ways of being may be fundamentally challenged. So we are not aiming for the avoidance of any kind of conflict or emotional risk but, instead, to provide buffers, understanding, reciprocation, support, love, and care for each other and for our shared endeavour. We must take every possible step to ensure that practical needs are met (protecting anonymity, respecting diversity, dealing with harassment, providing appropriate living space, etc.), and focus on collaboration, facilitation and mediation.
  
These variations take into account all kinds of issues including the balance of positions within feminism represented among the group, aims and objectives, and practical issues. Some of the things to consider are:
+
==== Women and trans* only? ====
  
* Think about boundaries for the debate -- agreed framework, rules of engagement? How do we define 'woman'? How do we define 'safe'?
+
This question can be one of the most divisive as it will often touch on people's strongly held sense of their political, personal, sexual and social identities. It can raise up issues of sexual orientation and gender identity as well as mobilising all kinds of other loyalties. Some will prefer a women and trans* only environment, some will feel that this opens up an opportunity for external attacks on the whole project by adversarial forces, whilst some will feel that cis-men friends and colleagues will be unfairly excluded and resentful. Discussion can sometimes divide along lines of sexual orientation or of feminist conviction - or just between women who regularly work alongside cis-men in the tech industry and women who would like to learn tech but find learning alongside cis-men challenging. These divisions will also never be clearly defined - individuals don't take neat "sides" as they probably have multiple modes of identification.
* Who do we want to include or influence, specifically women or also potential sympathisers? 
+
* What is the balance of positions within feminism present in the group, is there a prevalent 'flow' of opinion? 
+
* How important versus how contentious? Is it worth alienating some women from the group? How can we frame the debate to avoid alienating women who don't agree with the decision?
+
* How will the decision affect the actual experience of women within the space?
+
* Do we have all the skills we need to deliver this project among our feminist networks or will we need specific additional skills, where will we get them?
+
* How will the space be formalised to promote equal participation, especially if men are included?
+
  
Take your time to decide these questions, it's probably a good idea to record them somewhere so they can be referred to in future. If you use chat channels (IRC, pads, etc.) you can probably take a log of the discussion, if not, some form of minutes will be useful. You can then use this record as a basis for any formal codes of conduct or policies you want to draft later and to avoid getting stuck in endless arguments by having something clear to refer back to and for new participants to catch up.
+
If you need to have a debate about this, some things to consider are:
 +
 
 +
* Think about boundaries for the debate -- agreed framework, rules of engagement? How do we define "woman" and "trans*"? How do we define "safe"?
 +
* Who do we want to include or influence, specifically women and trans* or also potential sympathisers? 
 +
* What is the balance of positions on feminism present in the group, is there a prevalent "flow" of opinion? 
 +
* How important versus how contentious? Is it worth alienating some people from the group? How can we frame the debate to avoid alienating people who don't agree with the decision?
 +
* How will the decision affect the actual experience of people within the space?
 +
* Do we have all the skills we need to deliver this project among our networks or will we need specific additional skills? Where will we get them?
 +
* How will the space be formalised to promote equal participation, especially if cis-men are included?
 +
 
 +
Take your time to decide these questions. It's probably a good idea to record them somewhere so they can be referred to in future. If you use chat channels (IRC, pads, etc.) you can probably take a log of the discussion. If not, some form of minutes will be useful. You can then use this record as a basis for any formal codes of conduct or policies you want to draft later and to avoid getting stuck in endless arguments by having something clear to refer back to and for new participants to catch up.
  
 
==== What are you trying to do? ====
 
==== What are you trying to do? ====
  
For some groups, discussion and reflection is a key activity which renders the whole group activity meaningful. For others, discussion is a source of vexation and obstruction from practical objectives. Again, this is a somewhat false divide as everyone needs to reflect and everyone needs to be practical. Nevertheless, there may be important differences in emphasis and these may be based on what you are actually trying to do. It's all too easy to become engrossed in the feminist politics and to neglect to make sure there's enough discussion on the specific aims of the project itself and on the experience of diverse participants.  
+
For some groups, discussion and reflection is a key activity which renders the whole group activity meaningful. For others, discussion is a source of vexation and obstruction from practical objectives. Again, this is a somewhat false divide as everyone needs to reflect and everyone needs to be practical. Nevertheless, there may be important differences in emphasis and these may be based on what you are actually trying to do. It's all too easy to become engrossed in politics and to neglect to make sure there's enough discussion on the specific aims of the project itself and on the experience of diverse participants.  
  
 
Building offline spaces is easiest and most successful when you're clear about what you're trying to do and how you plan to go about it. Being clear about what you're trying to do can also shift debate through less painful channels and provide very clear, practical arguments for specific choices, making the discussion feel less emotive.  
 
Building offline spaces is easiest and most successful when you're clear about what you're trying to do and how you plan to go about it. Being clear about what you're trying to do can also shift debate through less painful channels and provide very clear, practical arguments for specific choices, making the discussion feel less emotive.  
  
The first thing which must be considered is exactly what the event is intended to achieve. Women and tech events can probably be categorised something like this (again, this abstract division may not reflect the 'messiness' of practical activism):  
+
The first thing which must be considered is exactly what the event is intended to achieve. Women and trans* and tech events can probably be categorised something like this (again, this abstract division may not reflect the 'messiness' of practical activism):  
  
* Advocacy: How do we change the culture of tech sectors to be more amenable for women, and/or let the world know that women are great at tech, and/or get more women involved?  
+
* Advocacy: How do we change the culture of tech sectors to be more amenable for women and trans* persons, and/or let the world know that they are great at tech, and/or get more women involved?  
 
* Skills: How can we learn to do xyz?  
 
* Skills: How can we learn to do xyz?  
* Support, networking and boundary-crossing: What does it mean to be a woman in tech? How can women from different places or sectors come together to spark off new ideas and practices? How can we support each other as women in tech?  
+
* Support, networking and boundary-crossing: What does it mean to be a woman or trans* person in tech? How can women from different places or sectors come together to spark off new ideas and practices? How can we support each other as women and trans* persons in tech?  
  
I think you can see right away how these different types of event might develop different gender policies even if the same group of women were organising them? For example, it's difficult advocating change in the male culture of tech sectors if you haven't invited men to hear what you want to say - but you might prefer to discuss *how* to do this in a women-only environment first. Or are you advocating engagement with technology to women and mainly want free, frank and mutually supportive discussion or skills-sharing? In this case, a women-only environment suggests itself.  
+
We can see right away how these different types of event might develop different gender policies even if the same group of people were organising them. For example, it's difficult advocating change in the male culture of tech sectors if you haven't invited cis-men to hear what you want to say - but you might prefer to discuss *how* to do this in a women and trans*-only environment first. Or are you advocating engagement with technology to women and trans* and mainly want free, frank and mutually supportive discussion or skills-sharing? In this case, a women and trans* environment suggests itself.  
  
With skills workshops, research generally shows that women learn tech skills best in women-only environments so these workshops have a very clear and communicable reason for being women-only. But you may still hear male allies grumbling that they also wanted to learn that skill and it isn't fair. So, in that case, we can either explain the benefits of women-only learning environments and recommend that a man step forward to run an open workshop, or we might consider compromising with women-only as facilitators but inviting open participation. Or, at Fossbox, we sometimes run the workshop twice, once for women-only and once for open participation - this way we can maximise women's learning spaces but avoid resentment. As a side-effect, it also gives male supporters a chance to experience the benefits of tech workshops run by women as 'safe spaces'. Men often feed back that they have changed their own practice because they found the experience so positive - which brings an advocacy as well as skills outcome!
+
With skills workshops, there is research to suggest that women and trans* persons learn tech skills best with each other so these workshops have a very clear and communicable reason for being exclusive. But you may still hear cis-men allies grumbling that they also wanted to learn that skill and it isn't fair. So, in that case, we can either explain the benefits of exclusive learning environments and recommend that a cis-man step forward to run an open workshop, or we might consider compromising with women and trans*-only as facilitators but inviting open participation. Another possibility is to run an event twice, once for women and trans* participants and once for open participation. As a side-effect, this can help others to experience the safe space methodology and change their own practice.
  
It's also important to remember that building offline spaces is resource- and labour- intensive and often many compromises have to be made. It may be a good idea to try to identify as early as possible which values are shared, important, and relevant to the event so that you can constantly remember to prioritise those and de-prioritise less important or potentially divisive issues.  
+
It's also important to remember that building offline spaces is resource- and labour-intensive and often many compromises have to be made. It may be a good idea to try to identify as early as possible which values are shared, important, and relevant to the event so that you can constantly remember to prioritise those and de-prioritise less important or potentially divisive issues.
  
==== The ''Brick and Motar'' of an offline Safe Space ====
+
==== Choosing a format that fits ====
  
Once you have settled the basic questions about what your event is *for* and who you want to invite, it's time to think about formalities - but let's not start by re-inventing the wheel. There are many different ways of organising different kinds of spaces, I'm not going to go over all of them here but just outline a few of those most popular with FLOSS communities.  
+
Once you have settled the basic questions about what your event is *for* and who you want to invite, it's time to think about the format you will use for your event. There are many different ways of organising different kinds of spaces, the following is just an outline of a few of those most popular with FLOSS communities.  
  
* Temporary Autonomous Zone: An alternative to traditional models of revolution, the T.A.Z is an uprising that creates free, ephemeral enclaves of autonomy in the here-and-now. [[http://beautifultrouble.org/theory/temporary-autonomous-zone/ | Beautiful Trouble]]  
+
* Temporary Autonomous Zone: An alternative to traditional models of revolution, the T.A.Z is an uprising that creates free, ephemeral enclaves of autonomy in the here-and-now. [[http://beautifultrouble.org/theory/temporary-autonomous-zone/ | Beautiful Trouble]]
  
* Un-Conference: creating a space that helps people make connections, share knowledge, collaborate and create brainchildren. To take part, attendees are encouraged to give a presentation, create a discussion, or even chair a debate [[http://lanyrd.com/blog/2012/unconference-howto/ | Lanyrd on running an unconference]] and [[http://openspaceworld.org/wp2/what-is/ | Open Space]]. Pros: relatively egalitarian (watch out for tyranny of structurelessness) and relatively easy to organise (no messing about with programmes, scheduling and advanced prep). Cons: can be extremely intimidating and therefore exclusionary towards less experienced or skilled women and stressful if you need to organise tech or other resources for specific activities in advance.   
+
* Un-Conference: creating a space that helps people make connections, share knowledge, collaborate and create brainchildren. To take part, attendees are encouraged to give a presentation, create a discussion, or even chair a debate [[http://lanyrd.com/blog/2012/unconference-howto/ | Lanyrd on running an unconference]] and [[http://openspaceworld.org/wp2/what-is/ | Open Space]]. Pros: relatively egalitarian (watch out for tyranny of structurelessness) and relatively easy to organise (no messing about with programmes, scheduling and advanced prep). Cons: can be extremely intimidating and therefore exclusionary towards less experienced or skilled participants and stressful if you need to organise tech or other resources for specific activities in advance.   
  
* Workshop: transferring skills or knowledge in an interactive session - there are thousands upon thousands of workshop methodologies so selecting a workshop format is very much about being clear about what you want to achieve. Workshops are a good format for building skills or for maker and design activities.  
+
* Workshop: transferring skills or knowledge in an interactive session - there are thousands upon thousands of workshop methodologies, so selecting a workshop format is very much about being clear about what you want to achieve. Workshops are a good format for building skills or for maker and design activities.  
  
* Makerspace: makerspaces are community spaces with tools [[http://makerspace.com/ | Makerspace Community]] - great for women to 'get their hands dirty', you can mess about with anything from taking computers apart to making music with bananas or even building a WWII PoW radio out of razorblades and copper wire!
+
* Hacklab/Hackerspace/Makerspace: Hacklabs, hackerspaces and [[http://makerspace.com/ | makerspaces]] are community spaces with hardware and/or tools - great for people to "get their hands dirty", you can mess about with anything from taking computers apart to installing Linux to making music with bananas or even building a WWII PoW radio out of razorblades and copper wire! To learn more about hacklabs and hackerspaces, read Maxigas' article "Hacklabs and Hackerspaces: Shared Machine Workshops", in: http://www.coredem.info/IMG/pdf/pass11_an-2.pdf [PDF]
  
* Sprint: A sprint is a get-together of people involved in a project to further a focused development of some aspect of the project such as working on sections of code, writing manuals or books etc. [[https://en.wikipedia.org/wiki/Sprint_%28software_development%29 | Wikipedia on sprints]] and [http://www.flossmanuals.org/service/booksprints | Flossmanuals Booksprints]]. These are effective at getting a lot done quickly for code and manuals (less so for other forms of writing) but very exhausting and emotionally demanding - make sure you keep food and drink coming!
+
* Sprint: A sprint is a get-together of people involved in a project to further a focused development of some aspect of the project such as working on sections of code, writing manuals or books, etc. These are effective at getting a lot done quickly for code and manuals (less so for other forms of writing) but very exhausting and emotionally demanding - make sure you keep food and drink coming! To read more about sprints, visit: [[https://en.wikipedia.org/wiki/Sprint_%28software_development%29 | Wikipedia on sprints]] and [http://www.flossmanuals.org/service/booksprints | Flossmanuals Booksprints]].
  
* Hackathon: "programming till someone drops from exhaustion" [[http://globalvoicesonline.org/2012/11/23/hackathons-in-droves-how-is-a-hackathon-organised/ | Global Voices on how to run a hackathon]]. Hack events can also mix different groups like NGOs with hackers to come up with new approaches to building tech for that group.  
+
* Hackathon: with their motto "programming till someone drops from exhaustion", hack events can also mix different groups like NGOs with hackers to come up with new approaches to building tech for that group. To learn more about hackatons, read:  [[http://globalvoicesonline.org/2012/11/23/hackathons-in-droves-how-is-a-hackathon-organised/ | Global Voices on how to run a hackathon]].
  
* Seminar: bringing together small groups for recurring meetings focusing on a particular subject, in which everyone present actively participates, or offering information or training on specific topics [[https://en.wikipedia.org/wiki/Seminar | Wikipedia on Seminars]]. Pros: structured activity supports women with less experience or confidence, planning for tech/resource support is easier, people know what to expect. Cons: can be overly structured and lacking spontaneity for more experience women, more 'carnivalised' or 'top-down', more organisational effort in advance.  
+
* Seminar: bringing together small groups for recurring meetings focusing on a particular subject, in which everyone present actively participates, or offering information or training on specific topics. Pros: structured activity supports women with less experience or confidence, planning for tech/resource support is easier, people know what to expect. Cons: can be overly structured and lacking spontaneity for more experience participants , more 'carnivalised' or 'top-down', more organisational effort in advance. Read [[https://en.wikipedia.org/wiki/Seminar | the page of Wikipedia on Seminars]].
  
 
Your choice of format is going to be about:
 
Your choice of format is going to be about:
  
* what you're trying to do - ask yourself which format will support this activity best?
+
* what you're trying to do - ask yourself which format will support this activity best
 
* participants' needs, existing skills, experience and preferences
 
* participants' needs, existing skills, experience and preferences
* practical considerations - what physical spaces are available, what will they allow you to do, what resources do you have etc?
+
* practical considerations - what physical spaces are available, what will they allow you to do, what resources do you have, etc.?
 
* Your organisational resources - how much can you take on?  
 
* Your organisational resources - how much can you take on?  
  
Choice of workshop or seminar format is obvious for skills sharing, it can get more difficult to decide for advocacy and networking events. Advocacy events can be some of the most challenging as it's easy to spend the entire day 're-inventing the wheel' with male participants who're new to the questions. If inviting men to advocacy events it's probably best to go with a more structured format. This also applies to any very culturally mixed environment (eg background, sector, educational level, gender, generation, etc rather than culture of national or linguistic origin) - unconferencing and hacking works best with activists or experienced practitioners who are used to a high level of self-determination and with a shared understanding of implied rules and structures. Having said that, it can work well to try more open formats anyway but be prepared for some skilled facilitating to make it safe and fun for less experienced participants as well as the more experienced.  
+
Choice of workshop or seminar format is obvious for skills sharing, but it can get more difficult to decide for advocacy and networking events. Advocacy events can be some of the most challenging as it's easy to spend the entire day "re-inventing the wheel" with people who are new to the questions. If you have participants from diverse backgrounds in your advocacy event, it's probably best to go with a more structured format. Unconferencing and hacking works best with activists or experienced practitioners who are used to a high level of self-determination and with a shared understanding of implied rules and structures. Having said that, it can work well to try more open formats anyway, but be prepared for some skilled facilitating to make it safe and fun for less experienced participants as well as the more experienced.  
  
It's perfectly fine to mix and match approaches to suit what you're trying to do and whom you're doing it with - so go ahead and experiment. All the groups I work with mish-mash different formats together - whatever works!
+
It's perfectly fine to mix and match approaches to suit what you're trying to do and whom you're doing it with - so go ahead and experiment.
  
==== Formalising the space ====
+
==== Codes of conduct ====
  
 
It's important, especially in mixed environments, to think about what's acceptable behaviour in the space and what isn't. In order for this to have any practical effect, you also have to think about what you'll do if individuals breach this - or when things go wrong generally.  
 
It's important, especially in mixed environments, to think about what's acceptable behaviour in the space and what isn't. In order for this to have any practical effect, you also have to think about what you'll do if individuals breach this - or when things go wrong generally.  
Line 361: Line 335:
 
You can find plenty of information and example policies on the [[http://geekfeminism.wikia.com/wiki/Conference_anti-harassment/Adoption | Geek Feminism Conference anti-harassment/Adoption page]]
 
You can find plenty of information and example policies on the [[http://geekfeminism.wikia.com/wiki/Conference_anti-harassment/Adoption | Geek Feminism Conference anti-harassment/Adoption page]]
  
It should be obvious if your event will bring together women from diverse backgrounds that practical issues such as dietary requirements will need to be addressed at offline events. However, there may be other significant considerations which are more difficult to foresee. Keep an open mind and to avoid escalating conflicts unnecessarily. It's important to remember that "one woman's wine is another woman's poison" and your policy should be about preventing aggressive behaviour and not about trying to 'police' how women identify, communicate or present themselves as long as this is not creating a serious threat to other women.  
+
Make sure your participants understand your policy and how that relates to their behaviour. It can be useful to make time in your schedule at the beginning of the event to share your policy, and reach consensus with the group on how to maintain a safe space over the days of the event.  
  
It's also worth remembering that women who are struggling in a culturally unfamiliar environment can become confrontational more easily than they usually would. Some cultures are also more comfortable with confrontation than others. There's probably a higher representation of women with aspergers in tech environments who will have difficulty in coping with social or other aspects of the environment. There may be many reasons why a woman might be struggling to communicate positively at any given moment. It's key to remain calm and to give women space to experience their emotions and express even negative feelings of anger or frustration without being judged or escalated. We are different, let's celebrate it, even when it's difficult to do!  
+
Your policy should at the base be about preventing aggressive behaviour and not about trying to "police" how people identify, communicate or present themselves as long as this is not creating a serious threat to other participants. It's also worth remembering that people who are struggling in a culturally unfamiliar environment can become confrontational more easily than they usually would. There may be many reasons why a participant might be struggling to communicate positively at any given moment. It's key to remain calm and to provide a non-judgemental space for the expression of emotions like anger or frustration. We are different, let's celebrate it, even when it's difficult to do!
  
 
==== Respecting Privacy ====
 
==== Respecting Privacy ====
Line 373: Line 347:
 
* Don't share details of anyone's participation, speech or actions on social media without their express permission.   
 
* Don't share details of anyone's participation, speech or actions on social media without their express permission.   
  
* Refer to Infrastructure sections to understand how to set up secure networks  
+
* Refer to Infrastructure sections to understand how to set up secure networks.
  
 
==== Case Studies ====
 
==== Case Studies ====
  
I'm going to look at two women-and-tech spaces to see how their aims, participants and context influenced their format.  
+
In the following, two women-and-tech spaces will help illustrate what was covered until now in this section of the manual, which pertains to the aims, participants and context which influence format.  
  
 
===== Eclectic Tech Carnival (ETC) =====
 
===== Eclectic Tech Carnival (ETC) =====
  
ETC was organised on an 'unconference' model using a combination of university spaces, art centres and community centres. It is relatively well-funded and so is able to bring women in from all over the world. It is located in a different city each time and organised by a group from that city in collaboration with the core ETC collective. It provides 'full board' space for participants and also partners with additional arts events located in the host city.  
+
ETC was organised on an "unconference" model using a combination of university spaces, art centres and community centres. It is relatively well-funded and so is able to bring participants in from all over the world. It is located in a different city each time and organised by a group from that city in collaboration with the core ETC collective. It provides "full board" space for participants and also partners with additional arts events located in the host city.  
  
ETC made the decision to be for women-only: "Imagine you are alone and traveling in a country where you don't know the language and cultural intricacies. Do you remember how it felt when you bumped into someone just like yourself?". It was also generally agreed that women should decide their own gender and sexual orientation.  
+
ETC made the decision to be for women-only. Participants are culturally diverse but mostly from arts, academic, non-profit and related tech backgrounds. This means that they have a lot of experience in self-organising and thrive in a relatively unstructured environment. The code of conduct tends to be implicit rather than stated.  
  
Participants are culturally diverse but mostly from arts, academic, non-profit and related tech backgrounds. This means that they have a lot of experience in self-organising and thrive in a relatively unstructured environment. The code of conduct tends to be implicit rather than stated.
+
Eclectic Tech Carnival spawned [[http://transhackfeminist.noblogs.org/ | Transhack 2014]] and also Flossie.org. ETC and Transhack's relatively coherent culture has fostered the development of a strong focus on reflection and feminist practice. It has been an influential and much-loved space for more than a decade.
 
+
Eclectic Tech Carnival spawned [[http://transhackfeminist.noblogs.org/ | Transhack 2014]] and also Flossie.org. ETC and Transhack's relatively coherent culture has fostered the development of a strong focus on reflection and feminist practice. It has been an influential and much-loved space for more than a decade.  
+
  
 
===== Flossie =====
 
===== Flossie =====
  
Flossie runs a conference and also skills workshops and was based on the ETC format. It is intended to combine advocacy, boundary-crossing, support and skills-sharing bringing together women involved in digital arts with coders, artists, and makers. There are various problems with trying to bring the ETC format to the UK which has an extremely marketised academic/arts/non-profit sector and is outside of the Schengen area making it very difficult for non-EU women to attend in person. Eventually, we decided to do something a little different. We had a small amount of funding from Google which didn't cover 'full board' and, in any case, it's impossible to find spaces such as the schools used in ETC in Austria in the marketised UK public sector. We were able to make video links for women outside of EU to contribute and London is a highly diverse city in any case. We weren't able to stream the whole event publicly because of bandwidth problems at the university which hosted us.
+
Flossie runs a conference and also skills workshops and was based on the ETC format. It is intended to combine advocacy, boundary-crossing, support and skills-sharing bringing together women involved in digital arts with coders, artists, and makers. There are various problems with trying to bring the ETC format to the UK, which has an extremely marketised academic/arts/non-profit sector and is outside of the Schengen area, making it very difficult for non-EU participants to attend in person. Eventually, it was decided to do something a little different. There was a small amount of funding from Google which didn't cover "full board" and, in any case, it was impossible to find spaces such as the schools used in ETC in Austria in the marketised UK public sector. Videos were made and the links were available for women outside of EU to contribute. The whole event was not streamed publicly because of bandwidth problems at the university which hosted the event.  
 
+
In the end the biggest difference came from involving more women from pure tech and engineering sectors. We had worked with Ubuntu Women and the Women's and Open Source Groups at the British Computer Society to involve women from purely technological backgrounds as well as digital artists, activists and makers in order to foster wider skills sharing and open up access to high-level computer skills for women. This was very popular but also opened out all kinds of communication difficulties as the groups had quite different cultures and backgrounds.
+
 
+
The first issue raised by this was that many of the students who joined the collective wanted a more structured environment as they didn't feel confident in self-organising and more experienced organisers also felt the unconference structure could be a problem given the diversity of backgrounds and interests. The second was that a reflective approach became more difficult. In the first year, we held a panel to consider how we should go about building a positive representation of women in technology. This quickly became very dislocated and adversarial because, as we began to realise, there were many different models of feminism *and* of technology between women who were primarily tech/engineering, academics, and women who were primarily activists or artists. We decided to focus on the basic value we all shared - supporting more women to make better use of open technology and to move from being consumers to being producers. We had to deprioritise feminist reflection or debates about practice. This proved very effective in holding together these very different groups and building lasting networks with a positive and collaborative atmosphere.  
+
  
[PAULA's PART - END]
+
In the end the biggest difference came from involving more women from pure tech and engineering sectors. Flossie worked with Ubuntu Women and the Women's and Open Source Groups at the British Computer Society to involve women from purely technological backgrounds as well as digital artists, activists and makers in order to foster wider skills sharing and open up access to high-level computer skills for women. This was very popular but also opened out all kinds of communication difficulties as the groups had quite different cultures and backgrounds.
  
 +
The first issue raised by this was that many of the students who joined the collective wanted a more structured environment as they didn't feel confident in self-organising and more experienced organisers also felt the unconference structure could be a problem given the diversity of backgrounds and interests. The second was that a reflective approach became more difficult. In the first year, a panel was held to consider how to go about building a positive representation of women in technology. This quickly became very dislocated and adversarial because, as the group began to realise, there were many different models of feminism ''and'' of technology between women who were primarily tech/engineering, academics, and women who were primarily activists or artists. It was decided that the group would focus on the basic value that all shared - supporting more women to make better use of open technology and to move from being consumers to being producers. The group had to deprioritise feminist reflection or debates about practice. This proved very effective in holding together these very different groups and building lasting networks with a positive and collaborative atmosphere.
  
 
===='''What is a Feminist Hackerspace?'''====
 
===='''What is a Feminist Hackerspace?'''====
Line 404: Line 373:
 
Building a feminist hackerspace is another way of creating a safe space offline for women in tech in addition to reach out to women activists and artists who might not be drawn to traditional hackerspaces.   
 
Building a feminist hackerspace is another way of creating a safe space offline for women in tech in addition to reach out to women activists and artists who might not be drawn to traditional hackerspaces.   
  
But first what is a hackerspace? Hackerspaces are often volunteer-run spaces based on the concept of openness, where in theory, anyone who is interested in learning about and playing with technology (software, hardware, etc.) can go. However, throughout the world women have remained underrepresented in these spaces despite the attempts to proposed remedial strategies in certain space, such as women-only hack nights and the adoption of codes of conduct. The women-only hack night particularly has been met with controversy in many spaces since it is deemed to go against the principle of openness.  
+
But first what is a hackerspace? Hackerspaces are often volunteer-run spaces based on the concept of openness, where in theory anyone who is interested in learning about and playing with technology (software, hardware, etc.) can go. However, throughout the world women have remained underrepresented in these spaces despite the attempts to proposed remedial strategies in certain space, such as women-only hack nights and the adoption of codes of conduct. The women-only hack night particularly has been met with controversy in many spaces since it is deemed to go against the principle of openness.  
  
Other reasons have been highlighted to explain the emergence of feminist hackerspaces such as the difficulties in recognizing and acknowledging privileges along the lines of gender, race, ethnicity and class in addition to the patriarchal behaviors that many women recognise as prevalent in hackerspaces. To change the aforementioned state of affair, feminist geeks, makers, artists and hackers have decided to start feminist hackerspaces. This shows that women are interested in technology, want to learn, improve their skills, look for a like-minded community and want to share their skills with others. And it is fun too!   
+
Other reasons have been highlighted to explain the emergence of feminist hackerspaces such as the difficulties in recognizing and acknowledging privileges along the lines of gender, race, ethnicity and class in addition to the patriarchal behaviours that many women recognise as prevalent in hackerspaces. To change the aforementioned state of affair, feminist geeks, makers, artists and hackers have decided to start feminist hackerspaces. This shows that women are interested in technology, want to learn, improve their skills, look for a like-minded community and want to share their skills with others. And it is fun too!   
  
Feminist hackerspaces are not all the same. They vary in form, shape and size. What seems to unite them though is a set of boundaries that they decide collectively (who can be a member, who can be a guest, what are the policies, etc.) and an explicit belief in feminist principles. Feminist hackerspaces provide a place to work on individual and collective projects in a supportive envrionment.   
+
Feminist hackerspaces are not all the same. They vary in form, shape and size. What seems to unite them though is a set of boundaries that they decide collectively (who can be a member, who can be a guest, what are the policies, etc.) and an explicit belief in feminist principles. Feminist hackerspaces provide a place to work on individual and collective projects in a supportive environment.   
  
To know more about feminist hackerspaces you might want to visit the website of: the Mz Baltazar’s Laboratory in Vienna (http://www.mzbaltazarslaboratory.org/), The Mothership Hackermoms in Berkley (http://mothership.hackermoms.org/), Double Union in San Francisco (https://www.doubleunion.org/) and FemHack in Montreal (http://foufem.wiki.orangeseeds.org/).
+
To know more about feminist hackerspaces you might want to visit the website of: the Mz Baltazar’s Laboratory in Vienna (http://www.mzbaltazarslaboratory.org/), The Mothership Hackermoms in Berkeley (http://mothership.hackermoms.org/), Double Union in San Francisco (https://www.doubleunion.org/) and FemHack in Montreal (http://foufem.wiki.orangeseeds.org/).
  
 
===='''Which Criteria Do I Use to Assess Whether a Space is Safe or Not? '''====
 
===='''Which Criteria Do I Use to Assess Whether a Space is Safe or Not? '''====
Line 434: Line 403:
 
- Do you know people who you trust in the space or do you know friends of friends? The web of trust can be very useful here.  
 
- Do you know people who you trust in the space or do you know friends of friends? The web of trust can be very useful here.  
  
- Is it an accessible space? In which part of town it is located? Are there bathrooms? What are the opening hours? Who has access to the keys of the space?  
+
- Is it an accessible space? In which part of town is it located? Are there bathrooms? What are the opening hours? Who has access to the keys of the space?  
  
- How much does it cost to become a members? Is there a sliding scale policy?
+
- How much does it cost to become a member? Is there a sliding scale policy?
  
 
No space is a perfect space, even a safe space is not perfect. But safe spaces should at least provide an environment and a set of boundaries to talk, meet, address and raise difficult issues, among others. If you feel the space has potential and you want to get involved, don't be shy!
 
No space is a perfect space, even a safe space is not perfect. But safe spaces should at least provide an environment and a set of boundaries to talk, meet, address and raise difficult issues, among others. If you feel the space has potential and you want to get involved, don't be shy!
  
 
[[Category:Resources]]
 
[[Category:Resources]]

Latest revision as of 14:58, 15 June 2015

Contents

What are Safe Spaces?

Safe spaces can be understood as spaces that are created to share common values, whether explicit, through a community agreement, or implicit through the sharing of values. They enable members of a group to flourish, empower themselves and create community. Safe spaces have provided a safe environment for discussion and awareness raising in the women's liberation movement in the 60s and 70s. Safe spaces are also about pushing boundaries and confronting certain difficult issues among a group of people such as: Who can be part of a women's only group? And who can be defined as a woman? As these are important questions to be addressed, they need reflection, trust and the understanding of where our own assumptions come from.

Safe space strategies have been used in many different contexts in recent times too. In Tahrir Square in Egypt, Operation Anti Sexual Harassment (OpAntiSH) was set up to react to an unsafe environment and as a way to protect women and/or confront harassers and support survivors of sexual abuse and harassment. In Kenya, the women-only Umoja village was created for women survivors of rape and sexual assaults, as a place where they could feel safe and secure, raise their kids, earn a living collectively, heal and reclaim their dignity. During the USA Occupy movements many women, queer and trans* persons did not feel safe to camp in the squares and parks. Some resorted to women-only tents, or women of colour-only affinity groups while others, mostly transwomen, opted for an online presence as putting their bodies on the line was deemed too dangerous.

Safe Space Online?

The internet is experienced by many as a safe space for resisting the gender oppression that they encounter in their everyday life. Fereshteh Nouraie-Simone talks about the internet as Wings of Freedom for Iranian women. Scholar Saskia Sassen argues that the internet allows women and trans* persons to be involved in new forms of contestations, build global community and potentially transform conditions on the ground. However, at the same time many women and trans* people experience severe forms of violence and silencing online. There are countless stories now of women and trans* people facing harassment, threats and smear campaigns by anyone from a misogynist or transphobic reader of their blog to a state-sponsored attacker trying to hinder their advocacy work. See Take Back the Tech for an up-to-date list of reports.

Morever, we might assume that online communities such as the ones we take part in through social media, email discussion lists, phones and Internet Relay Chat (IRC) channels are inherently democratic, horizontal, participatory and relatively safe. This is not true. Online spaces often reproduce hierarchies, privileges and power relations that exist in society. We need to be mindful of this and to think through ways to mitigate and limit these downsides to get the best out of our spaces. Using such strategies is about caring for ourselves and for the communities we are part of. Making these issues explicit and visible is also about agency, social justice and feminism, and it will help better shape the spaces we care about, we organize in and in which we grow.

This step aims to provide concrete suggestions on how to create safe spaces online and offline. It is divided into three core parts. First, a set of tools will be highlighted to move forward with starting to build safe spaces for us and our collectives/organizations through online communication such as mailing lists, pads, Internet Relay Chat (IRC), etc. Second, it will focus on strategies of resistance in public spaces which are not inherently safe, such as Twitter and Wikipedia. Finally it will loop back to the offline and discuss ways to build safe spaces offline such as through women and trans* only spaces to learn and Do-it-Together.

How to set up a Safe Space Mailing list

Mailing lists are one of the oldest forms of social networks. They allow you to discuss, organise, share information, exchange video, audio and pictures. The below section will help you in the steps to setting up a safe space mailing list.

Choosing a mailing list

You have decided that you need a communication channel for your collective and you do not want to use corporate services. There are in fact many alternative services to choose from that are recommended for use by human rights defenders. They are free but they still prioritise security and user privacy. For example: Riseup, Aktivix or Autistici/Inventati (A/I Collective).

Riseup is a tech collective which provides secure communication tools for people working on liberatory social change. They have many feminist and queer oriented lists and therefore are a great collective to host your mailing list. To see some of the existing public mailing lists go to: https://lists.riseup.net/www/ .

Other tech collectives also offer mailing-lists and email addresses. Autistici/Inventati (A/I Collective) and Aktivix are two other great examples, and the former also offers a dedicated newsletter service for groups that want to send regular news to a high number of recipients. To read about their services visit: http://www.autistici.org/en/services/lists.html and/or https://lists.aktivix.org/mailman/listinfo

Open or closed list?

Once you are ready to create your mailing list you need to decide whether it will be an open or closed list. An open list allows anyone to subscribe and participate in the discussion. A closed list is limited to the subscribed email addresses that will have been approved by you or your collective. In deciding what is best, check if choosing to keep a list open to new subscriptions automatically implies that the archives of the list are available to anyone on the web and will eventually end up on search engines (such as Google). In some cases, the archives of a closed list are only accessible to those who have the subscription password while the archives of a closed list can be accessed by everybody. In other cases, as A/I's platform (which is unfortunately much more complex to use) you can choose whether you keep the archives public or not independently of your choice to keep your list open to new subscriptions. If you intend to talk about sensitive issues (talking about feminism is often a sensitive issue!) or if trust within the group is important for creating your safe space, you might want to set up a closed list and to keep your archives closed. If you do choose to leave your archives accessible, it is important to inform everyone subscribed to the list that any delicate topic or personal detail that pops up in your discussions will be potentially visible to anybody.

Publicizing your list or keeping it secret?

A list becomes really public when it is advertised to the world and anyone can request subscription. For example the mailing list run by FemTechNet. But a list mustn't be necessarily publicized and can be run on a need-to-know basis. In other words, you can choose not to advertise your list publicly and to keep it invitation-only. You could have for instance a publicized list which is closed i.e. a list that people know about (literally everyone!), but which requires approval as mentioned above.

Who should I invite?

Once you have your list set up, start inviting people you know to your mailing list. If friends are suggesting to add more people to the list, ask them to explain to the list the reasons why such and such person should be added. If you get a green light from your collective, add this person to your mailing list. Working through the web of trust is a good practice to follow when setting up a mailing list. Also, make sure you have a discussion on who can be part of this list. If you set up a feminist list, who can be part of this list? Do you for instance allow feminist men to be part of the list? If so, will you be setting up a policy for your list on the acceptable behavior? (See below for how to set up a policy) These are important questions that you need to discuss with your group. But don’t be too harsh on yourself and your group and know that you can always revisit these decisions if at some point you and your collective feel you want to change your collective mailing list agreement.

Who will administer the list?

Administering the list involves handling subscriptions and moderating content. One person can be responsible for doing it but if your list suddenly becomes very chatty, this might be too demanding for just one person to do. You can also choose to have more than one administrator of the list. A list can even be collectively managed. As a case in point, the Spoon Collective, a discussion list active in the 90s, adopted a strategy of central collective "ownership". Everyone on the list had administration rights and so the responsibility of managing the list could be shared amongst members. This is a strategy that can be best used when you are part of a close collective. It also requires trust that all members will care enough to manage it collectively.

Before trying to figure out what best suits you, you should think about internet access and expectations from list members. Depending on where you are located, some people on the list might not have regular access to the internet and this needs to be factored in when taking the decision. Some tensions will inevitably arise from the collective administering process and therefore you and your collective need to think carefully about the ways in which you will handle these tensions. Are we ready to wait for a few days to have new members added to the list? If each message needs admin approval, are we ready to accept waiting for the message to be approved for a few days, a week, more? Since administering a list is a great way to learn, is it only those who are tech savvy that might manage it or should we rather allow for learning to happen? If your expectations are clear, the possibility for tensions and conflicts to emerge will be minimized.

Mailing list policies

Agreeing on a mailing list policy from the start will save you a lot of time and difficult conversations. Publishing your policy and the ways in which to report violations of the policy, even if it is a closed list, might be helpful in creating the online safe space you want everyone to enjoy. The policy can provide guidelines for everyone using the list, on how to behave. It can address tensions like the fact that expression of emotion is an important feminist principle, but losing your temper and attacking someone you don't agree with on the list is not ok.

Having a visible and explicit policy will send a strong signal of the value of creating a safe space on a mailing list. The geekfeminism wiki is a great example of a women-only policy for online communities (http://geekfeminism.wikia.com/wiki/Statement_of_purpose/Women-only_communities). They also have a similar policy or agreement for online communities that includes men: http://geekfeminism.wikia.com/wiki/Statement_of_purpose:_communities_including_men Check them out and adapt them to your needs, beliefs and desires.

To make sure that the policy does not get forgotten, you can regularly remind the subscribers. The Ada Initiative (https://adainitiative.org/) mailing list, for example, adds a link to each email sent on the list. Below is what you see:

Policies for behavior on this list: http://geekfeminism.wikia.com/wiki/Statement_of_purpose/Women-only_communities http://sf.adacamp.org/attendee-information/policies/#ahp Contact Adacamp-alumni-owner@lists.adainitiative.org to report violations Please avoid gendered assumptions and language about the list as a whole (eg "XX", "ovaries", "ladies") To unsubscribe, go to: http://lists.adainitiative.org/listinfo.cgi/adacamp-alumni-adainitiative.org

Encrypting mailing lists

If you want a high level of security, there is the possibility of encrypting mailing lists. However, it is important to understand that this requires every participants to the list to already use PGP (Pretty Good Privacy)/GPG. This type of list, based on a software named Schleuder and developed by the German Tech Collective Nadir.org, is designed to serve as a tool for group communication, but this time with a strong emphasis on security. Schleuder list is a GPG-enabled mailing list and the list takes care of all de- and encryption among others. If you and your group feel you are able to install software in a server or can ask help from your community and you are all ready to use an encrypted mailing list, visit: http://schleuder2.nadir.org/

What is an etherpad?

Pads are a great way to collaborate in real-time on documents. They are a good alternative to corporate services like Google Docs and more effective for co-editing text than mailing back and forth. The main thing you need to look for in a pad is that it is hosted with an encrypted connection via SSL. A list of such pads can be found here.

When you create a pad you decide on the name of the URL. Just like with creating passwords, you should make it long and inventive. For example: https://pad.riseup.net/p/feminists is not secure. You want to use a more complicated URL such as https://pad.riseup.net/p/FeministsRockAndTheyWillBeDoingGreatThingsToghether. Once the pad is created you can send the URL to your friends and colleagues to start collaborating on a document. Remember whoever has the URL can access the pad, so don't share it in public spaces.

Pads allow you to choose to be anonymous, use a moniker or use your real name. There is a colour-based system that differentiates the contributions of each participants on the pad, so being anonymous will not bring too much confusion while writing. If are worried about your pad being found by others, you might consider a password protected pad. For this check out: https://www.protectedtext.com/

What is Internet Relay Chat (IRC)?

IRC is a chat service, which can be hosted on different servers, and accessed from through different user clients. It provides the ability to set up channels or chatrooms where many people can discuss and gives you the option to encrypt your communication. You can’t embed video, audio or pictures, but you can link to them.

IRC can be used to facilitate collaboration in addition to decision-making processes. If you are thinking about starting a new project, are launching a campaign or just want to have a space for your group to ask each other questions, you can consider using IRC. IRC allows for real-time collaboration as long as you all have easy access to the Internet and can arrange your schedules to be available at the same time. If your group has individuals working from different timezones or from places where power outages regularly occur or some of you regularly get pulled away to look after kids or parents, a mailing list might be better for reaching decisions collectively.

IRC can take a little time to get used depending on the skills in your group. Regardless of your skills, developing relationships across a purely text-based channel such as IRC can be challenging. Try to be sensitive to how language can be interpreted and different styles of communication that exist between different people. You can always think of ways to overcome this challenge with your group. For example structuring introductions when you first start out, sharing links to articles, chatting about random news in your country or trying to develop a shared language.

Setting up IRC

There are several ways to chat through an IRC network. The easiest way to start out is to use a web browser application such as those provided by Indymedia or Freenode. You can instantly create a nickname and a channel which you can give to your colleagues to connect with you.

Using a web application is however not the most secure option so if you are a more advanced user, or have already tested IRC out and think it will work for you, it is recommended you access your chosen IRC network from a client. There is advice and instructions on how to access an IRC network this way, provided by Freenode, Autistici and Indymedia. The last two also allow us to anonymise our connections through Tor.

There are several clients which you can choose from. For example Xchat for GNULinux and Windows and XChat Aqua/Azure for Mac OS, and many more. For more information on IRC chat clients, look at the Prism-Break web platform, a site that has been developed after the Snowden revelations which supports you to opt out of mass surveillance programs.

Basic rules of engagement

Once you start your meeting it is useful to appoint a facilitator that will keep track of time and topics to be discussed and who might ask participants to re-focus if the discussion goes off track. When you start a conversation take time to say hi and greet people. It is particularly important to talk to newcomers. If a group of you know each other over IRC, you might have a tendency to chat to one another and/or give more importance to what your friends say. In order to create a welcoming environment and a safe space, acknowledging and valuing the voice of everyone will be key on IRC.

While continuing the discussion, let's remind ourselves that writing is not easy for everyone and/or that many might not be using their mother tongue. IRC can also go very fast, particularly if you are many in the discussion, so allowing everyone to slow down and let people read all the inputs can help to facilitate an empowering discussion. You might for instance decide that people should be given turns to speak in order to ensure that everyone has space to express themselves. You can simply assign turns in alphabetical order of nicknames (or any order you want to give) for each of the points addressed. This can help structure the conversation and stop one or a small group of people dominating the conversation. It can also be useful to end your conversation with “over” or “finish” or "done" so everyone knows when you have stopped speaking and because IRC meetings can be tiring, you can set a time limit beforehand. Whichever methods you choose to use, make them visible and explicit beforehand, in the email where you will be inviting people for the IRC meeting for example.

Tools for managing projects and groups: wikis, forums and Crabgrass

Chat services and mailing lists will only take you so far. When it comes to managing collaboration between people living in different places, you will probably find yourself looking for something with more functionality.

One of the oldest tools used for public discussions online is internet forums, where discussions can be hosted over time and are at least temporarily archived. What really distinguishes a forum from a mailing list or IRC chat is that it has a tree-like structure and can contain a number of sub discussions, each with a different topic.

If you are looking for a tool to collaboratively write a text with many sections or even to create the initial structure and content for a website, a wiki can be useful. This is a web application that allows for hierarchical structuring of content and tracks the edits and additions of the users, easily allowing you to revert changes, move around and delete content.

Both forums and wikis need to be installed in a web space, so will require the expertise of a website manager. However you will find these tools, together with many others, in one of the most versatile platforms for managing groups and collective projects, Crabgrass. Crabgrass is hosted by the autonomous server Riseup, we.riseup.net, the tech collective providing tools for activists, already mentioned above.

Crabgrass provides a secure HTTPS connection and encrypted data storage, and users and groups are free to choose which information they reveal about themselves. The offered tools include functionality for personal messaging, public or private forums, wikis, task lists, decision-making tools, and a system for uploading and managing images, audio, and documents. It is also possible to set up a customized public homepage where your group can publish your event calendar, blog posts, and other content. For more about how to use Crabgrass, read this how-to in Tactical Tech's Security in-a-box

Finally you can visit the alternative social networks section in this manual if you want to use social networking platforms other than the dominant ones.

Strategies for creating safe spaces in the public sphere

There are ways to counter the vulnerability and intimidation we might feel online. This can be achieved by caring for our personal and collective safety, through using security and privacy enabling tools and techniques. This can also be achieved by resistance. Organising online collective actions can be a very powerful exercise to resist what can be an unsafe environment. They can also bring attention and visibility to certain issues and in turn help bring about transformation. Using feminist counterspeech, storming Wikipedia collectively and swarming together can all be important acts that have an impact for you and your group at the discursive (written), psychological and material levels. And they are fun too! Mostly because they are creative, bring about individual and collective agency and the feeling that you are not alone.

Feminist Counterspeech

Feminist counterspeech has been used as a response to making sexism visible online, as a response to online attacks and harrassment, among others. Other forms of resistance include organized public shaming, advocacy and lobbying for public policies, etc. Feminist counterspeech can be an effective tactic to trigger a new narrative online, create a sense of belonging and make visible the effectiveness of collective feminist actions online. Feminist counterspeech is a form of discursive resistance that allows you to call out misogyny and sexism online and makes visible both weak and strong feminist networks online. There are many examples of these which you have probably seen and appreciated. For example the #yesallwomen hashtag which was created as a response to the #notallmen hashtag on Twitter and was used to document women's stories of harassment and abuse. Or the rapid and distributed sharing and uploading of the artist Rupi Kuar's photo showing menstrual blood, in response to the image-sharing tool Instagram censoring it.

Wikipedia?

Feminists have criticised the way in which knowledge is produced, made and constructed on Wikipedia. The fact that Wikipedia’s contributors are mostly male (about 10% are women though this can vary between countries) in their twenties and thirties and disproportionately Western are important factors that influence content. Women who have played a significant role in history are often missing from Wikipedia and, at times, feminist, queer and trans content are not always easily accepted on the online encyclopedia. A notable example relates to an entry about Chelsea Manning, the United States Army soldier who was convicted in July 2013 of violations of the USA Espionage Act after releasing the largest set of classified documents to WikiLeaks. When Manning formally announced her gender transition, the English Wikipedia entry under her name was quickly amended to reflect this change. A week after intense discussions regarding this amendment took place, where a majority of Wikipedians disregarded experts on transgendered issues, the article was reverted back to Bradley Manning. The article has since then returned to Chelsea Manning (at least in the English language).

Wikistorming

Storming Wikipedia or organising an Edit-a-thon is a tactic to respond to the lack of women, feminist, queer and trans* content on Wikipedia. These empower participants to learn collectively how to edit Wikipedia and to change content to better reflect their communities and histories. Learning to edit Wikipedia can seem daunting so collectively editing and creating pages about trans*, women and queers is a great way to confront fears, add feminist, queer and trans content on the online encyclopedia and Do-It-With-Others (DIWO) in a safe space.

How to organise a Wikistorming

There are always great reasons to organise a wikistorming on any day! However, if you are looking for broader impact and be connected to others such gatherings often happen on these two days: Ada Lovelace Day in mid-October and March 8 International Women's Day. Once you have decided on a date, gather a group of friends and friends of friends who want to learn or already know how to edit Wikipedia and identify a safe space where to hold the event. It can be held in someone’s home, in a community centre, at an art centre or at a community organisation. Make sure you find a place that is accessible and ideally that already has a feminist base. Wikistorming may last for a day or half a day. Before the wikistorming or as part of it, decide which Wikipedia entries you want create or which existing page you want to edit. Be realistic in your goals and don't put too many edits on your plate! To edit Wikipedia carefully it takes time. If you want to organise a wikistorming visit: http://femtechnet.newschool.edu/wikistorming/

Installing Bots Against Trolls And Swarming Together

If you use Twitter, 4chan or any online forums where comments are allowed, you might have noticed that they tend to not be very safe spaces. Kathy Siera says there is a “koolaid point” for women and queers who start to gather a following and be listened online. At this point, a certain group of people may decide that you have too much influence, and make it their mission to silence you or discredit you. We have seen this in numerous high profile cases but also in constant reports from women and queer writers, activists and organisers.This is called trolling.

What is a troll?

A troll was once just a mountain-dwelling monster in kids stories. Then a troll became the word for early internet users who intentionally sowed discord on IRC and chat forums, often targeting and singling out new users. But now the word is used more broadly to describe people who target and harass others online. This can include anything from constant derogatory and belittling messages to edited images and even threats. Most often the subjects of this kind of abuse are marginalised groups like women, queers and people of colour. In recent years there have been more and more cases of people speaking out about how they are harassed.

How should you deal with trolls?

There are two key ways you can deal with trolls: one is to block them and report them to the platform you are using or to engage with them. This decision depends on what you want to achieve. Blocking them can definitely work and you can continue with your work unimpeded. A project like “Block Together” was developed to help people who are harassed share their blocklists with each other. Historically platforms like Twitter and Facebook have not handled reports of intimidation and violence very well. However this is changing, as they recognise how severe this problem is and how it deters people with important voices from using their services. When blocking doesn't help is when users are really committed to trolling and create numerous different profiles (called “sock puppet accounts”) to continue the harassment. Then your blocking has to keep up with their new account generation and it becomes tedious. You might consider the alternative of engaging trolls. There are a few tactics for engaging trolls. One is to try and enter into rational arguments with them and interrogate their views. Another way is to try to shame them or use humour to deflate them.

Effective engagement with trolls can actually help to generate a debate and public interest around the act of harassment and involve others online in talking about safe spaces, violence, sexism and online behaviour. It can also be a source of empowerment for the subjects of trolling: seeing others laugh at your harasser can be very uplifting.

Swarming

The method of swarming can be used to drown out harassers. This can be done in retro style by creating communities of support with your allies in social media spaces where you are likely to encounter harassment. When someone is being targeted, others can quickly be alerted and bombard the harasser with messages. The content of that message is up to you: it could be scolding, educational, or loving. Another option is: instead of directing messages towards the harasser, the swarm can fill the victim's content stream in order to quickly make the negative, violent content disappear into online history.

Do I have to use my own account?

If you want to engage with trolls, and even if you consider using the “swarming” method, you might prefer to stay anonymous to avoid having your real identity trolled. Setting up a network of second accounts to do your troll-response work can be a good idea for your organisation or your community of friends. It might be easier too, psychologically, to say some of the things you want to trolls, than you would when it is linked to your main identity. And it is more performative: you can create any kind of identity you want and style it with an avatar, a funny name, a character etc. (see "Creating a new online identity" and the following chapters in Step 1).

Automation

While battling the trolls in the old-fashioned human way can be fun and eye-opening, it can also be a time waster. Another option to consider is automation. For this you need someone who can do some coding to start from scratch or work with freely available code someone already uploaded on Github.

What's a bot?

A bot is a software application that runs an automated task over the internet. Bots perfom tasks at a greater velocity than humans can. There are many different breeds of bots: for example the spambot which harvests email addresses and contact information or the attention bot which fakes clicks on Youtube videos to make them look more popular than they actually are. They can post content, gather information and click on things. Twitter is filled with bots which use algorithms to harvest information and tweet. Many of these are humorous and random: like @twoheadlines which randomly grabs news headlines and combines them to create funny combinations. The below steps address Twitter mainly. However some of these ideas can be used across other platforms too.

How can a bot battle a troll?

A bot can be programed to document trolls' activities or talk to them, so that you don't have to. There are a few ways of doing this: the autotweet bot and a silent data-gathering bot in combination with the talking bot(s). The examples below speak specifically about what is possible on Twitter. However the ideas could be applied to other platforms.

1. The data-gathering bot

The data-gathering bot quietly scans Twitter gathering tweets, usernames and any other available information you program it to, and places this in a .csv file for you to analyse or use for further purposes outlined below. This first kind of bot can be useful just for understanding what kind of content is out there and maybe doing a first stage analysis of abuse.

2. The simple tweeting bot

If you follow the #gamergate hashtag on Twitter, you will see a bot called @everyethics which tweets different humorous reasons for the #gamergate trolling, ridiculing of the claim that Gamergate was not about attacking women in gaming but about “ethics in game journalism”. While this bot could be seen as spam, it was actually clearly a strategy to undermine and make fun of the trolls.

3. The retweet bot

The retweet bot is programmed to scan the Twitter API for a list of words, phrases or hashtags defined by you, and to retweet those. This would be a strategy to document and publicise Twitter abuse. Here's an example of such a bot you can download and install.

4. The autotweet bot

The “autotweet” bot is similar except that every time it finds a tweet with one of the words, phrases or hashtags you have programmed it to look for, it will tweet a prewritten tweet to that user. There are a number of examples of this in Twitter history: @stealthmountain which corrects any Twitter user who spells “sneak peek” wrong. These bots get shut down much quicker now as was shown by @fembot which responded to racists and sexist tweets that it spotted and was blocked after making only 75 tweets. Unfortunately Twitter does not make it so easy to do this anymore.

5. The tweeting bot in combination with the data-gathering bot

You can use a data-gathering bot to find the users tweeting violent things, compile them in a spreadsheet for you to read over and check for accuracy and remove any false positives. Alongside the data-gathering bot, you can have a talking bot or a team of talking bots which can tweet whatever you decide is useful information, to those users.

Things to watch out for

1. Language is slippery

If you want to tackle violence against women online, you will have to be very careful about what kind of language you search for. For example, every time someone uses the word “bitch” on Twitter to intimidate or harass a woman, there are probably at least five other people using it to tell their friend how much they love them or talk about the latest celebrity affair. The best way to figure out which language is used to harm women is to crowdsource it from people who have been harassed and then do a number of tests, pulling tweets from the Twitter API and then analysing it yourself.

2. Twitter is smart (and strict)

Twitter is not against bots and if you just want to create a bot that scans information from Twitter for you to analyse, or a bot that just tweets out to no one in particular, you will not encounter any problems. However if you want to tweet @ other Twitter users, you have to take into account Twitter's policy against spam. See Twitter's guide to Automation Rules and Best Practices.

Evading Twitter's spam filters

There are a few things to keep in mind when trying to bypass Twitter's spam filters:

1. Safety in numbers The more bots you have to distribute the work amongst, the more successful you will be. The group Peng! Collective did such an action in 2015 which they called “Zero Trollerance”. They ran a silent data-gathering bot to identify trolls through a long list of keyword combinations, hashtags and phrases. They then ran 160 bots which tweeted at the database of 3000 trolls, sending them new messages daily for an entire week. They were for the most part able to avoid being blocked by Twitter or users because they had so many bots and they rotated the tweeting across the bots.

2. Rate Limit

Twitter monitors each account's activity and has a “rate limit” that limits your number of tweets, to ensure that no one floods the content stream. This is also the way that they figure out which accounts might be spambots. If the frequency of tweeting looks like it doesn't come from a human, Twitter will block the account. If you try to tweet the same tweet, many times right after each other, you will receive a message telling you that your tweet looks like spam and that Twitter is blocking you in order to protect their users. At the time of writing, tests were done with tweeting 15 times with 8 minute intervals and this passed under the radar.

3. Content

If you are tweeting the exact same tweet over and over again, this is also a red flag to Twitter's spam filters. How to avoid this is to pad every tweet with a random word from a readable language that is not the same as the language you are tweeting in. The easiest way to do this is a compile a long list of these words, and program your script to draw from this list randomly for every tweet.

4. Location of the tweets

Use a VPN which gives you a new IP address every time you reconnect to fool Twitter into thinking that the accounts are being managed from different locations. To learn more about what a VPN is, read "Anonymising your connections" in Step 0.

How to set up a Twitter account to be used as a bot

You still need to write the script for you or to configure a script already created by someone else and downloaded from Github, or to find someone else to do this for you. But what is easy to do and what even volunteers might like to do is to help you set up all the Twitter accounts so that they can be easily controlled by the script.

1. Create a new account as you would normally and make sure to give it a photo, follow some people and do some tweeting (recently registered, faceless accounts with 0 followers will get blocked very quickly). 2. In order to function as a bot the account needs to be verified with a valid phone number. To do this you can use your own phone number, volunteers numbers or buy a bulk of cheap sim cards. Don't use the same phone number for numerous accounts – again this will be a quick sign to Twitter that the account is dodgy. 3. Now you need to register an application with the Twitter API which will allow your bot to make “calls” to the API, i.e. retrieve or send data. Go to apps and create a new application. You can provide any dummy content in the fields there and then you can set your permissions to “read and write” and generate the keys you will need.

More on these steps and some simple bots to download and test out at Using bots to troll on twitter.

Dos and dont's supporting people subject to online violence

When your friends are under attack online there are a few steps to follow to support them. 

Try to be quick in bringing support. But remember that knowing what to do and how to do it in such situations needs a lot of practice to become good at it. As a general rule, you should tell yourself that gender-based violence and harassment online are unacceptable.This should be your main message if you don't have a lot of practice in dealing with such cases.

If you are close to the person under attack, offer immediate assistance. In the event of doxing, where confidential info has been released on the internet about the person, you might want to offer a safe space (a home) if the person does not feel safe to stay where she/they lives. You can also offer to moderate your friend's Twitter feed or blog comments to allow her/them to take a break in time of stress. 

If you do not know (well) the person, you can still speak out. In fact, speaking out should be our collective responsibility! If you want to fight sexism and racism, to name just those two, you need to take responsibility for it. This is not only something women and minorities should think about -- everyone should.  If you witness sexism online don't simply send a private email or a tweet to the person who is under attack telling them that you think this kind of behaviour is despicable (sometimes, if the person under attack is being flooded with tweets and mails, it's even better not to write at all). Instead, speak out about it in your networks and raise your voice against such behaviour. You can for instance commend the work that the person under attack has been doing. Don't be silent, especially if you are a colleague or a team mate. Show your support. Make your voice resonate online, particularly if you are a man!  

If you want to have more impact think about crafting a collective action. Collective actions are often more effective than individual actions. Make sure you gather a group of friends, and friends of friends, for a Twitter storming for instance. Make your point visible! This will show to the person under attack that you and others care and that such acts are not OK. 

Depending on the nature and context of the attack, you might want to speak out to the media and highlight the gendered nature of online attacks. Using the media to bring light to a situation can be an important way to bring about visibility to such issue. As a best practice, though, we recommend that you consult the persons under attack before speaking to the mainstream media. If you do not know her/them, go through the web of trust. Also, we recommend you to contact a friendly and/or feminist media outlet or journalist. Prior to doing so, we recommend that you form a group of people opposed to such violence, draft a press release and explain what gender-based violence and harassment online are and why they exist. This will bring visibility to the issue and concentrate less on the person who has been or is under attack. Thinking about the harm and added stress that the person can go through if they are made visible in the mainstream media is an issue that you should carefully assess. Good intentions are not enough, you need to think about the impact your actions will have on her life. Make sure you have experienced feminists with you, and consider especially that this is not about you: this is about fighting sexism online!

If you are part of an organisation or network, you can write a solidarity statement that explicitly says you condemn online gender-based violence and harassment. Having feminists review the statement of solidarity is a best practice: your good intentions are not enough. If it's a person from your organisation who has been under attack, make sure she/they read the solidarity statement before it is released. The person will feel that her team mates care and respect her/their wishes. It will also allow the person to have agency over what is written. What is even better is to have an organisational policy on what to do when someone is under attack. If you have a policy and specific steps to follow when such situation occurs, chances are you will do less harm and be more effective in your strategy. Have feminists review your statement, but also remember that if your organisation is not based solely on volunteer work, this is one of the activities that should be paid. This is crucial work and it should be valued!

As an ally, that is someone who wants to support a disadvantaged group but is not part of that group (e.g. men are allies when it comes to women's rights issues), you ought to speak out and say “no” to online harassment and violence. Speaking out ought to happen in the public spaces. This is very important. Do it all the time that you witness online violence! Otherwise, the culture of impunity to online harassment will continue. 

Finally, if someone tells you you are sexist, or your comment was sexist, don't try to defend yourself. Try to understand where this comment comes from. Be open and ready to continue to learn, to inform yourself and read about feminism, sexism and patriarchy! As we all grow up in a sexist environment, we have internalized sexist and racist values over the years. Be ready tochallenge yourself! 

You can read more about what can be done to Combat Online Sexism visit: http://leighalexander.net/but-what-can-be-done-dos-and-donts-to-combat-online-sexism/

What are some of the current platforms which document online violence?

Documenting instances of online violence and harassment is key to showing the extent of the problem and is very powerful as it makes visible the structural aspect of violence in societies. A few initiatives have started to document this process. We highlight a few examples below.

APC's Take back the Tech has collected more than 500 stories of women who have experienced violence online. These stories were collected using the open source platform called Ushahidi. The data visualisation can be see here: https://www.takebackthetech.net/mapit/ . The overall results of those who have participated in this exercise show that women between 18 and 30 who are using Facebook are most likely to be under online threat. To read about the story visit: http://www.genderit.org/articles/mapping-strategy-disclose-online-violence-against-women

HarassMap was born as a response to the persistent problem of sexual harassment on the streets of Egypt. Since the crowdsourcing platform based on Ushahidi is anonymous, Harassmap allows to document instances of sexual harassment whether you are the victim or a witness (http://harassmap.org/en/). To read about the effectiveness of crowdsourced data visit: http://harassmap.org/en/wp-content/uploads/2013/03/Towards-A-Safer-City_full-report_EN-.pdf [PDF]. Similar to HarrassMap is Hollaback, an initiative that aims at stopping street harassment using technology all over the world (http://www.ihollaback.org/).

HeartMob is a platform that aims at providing real-time support to individuals experiencing online harassment and empowers bystanders to act. This platform is being built and you should stay abreast of its development. It is an initiative of Hollaback. Visit their Kickstarter project to know more about the initiative: https://www.kickstarter.com/projects/4096561/heartmob/description

Building our safe spaces offline

All the ideas about creating and maintaining safe spaces detailed so far can of course also be applied offline when you think about bringing women and trans* persons together to network, learn and collaborate. In the case of security and privacy training, you also need to consider how your participants might learn skills to protect themselves when the topics themselves can very easily be frightening or overwhelming.

Ideas have arisen in women and trans* tech conferences and skills workshops as how best to build safe spaces. Groups such as Flossie.org, Fossbox, Autonomous Tech Fetish (ATF), and Eclectic Tech Carnival (ETC) have each used a different set of principles to build safe spaces and are thus good examples to explore to highlight some of the differences, how to facilitate discussion about them, and how to arrive at a shared idea of an appropriate space for women and trans* persons to engage with tech.

Every group has to work out their own idea of an appropriate space for their participants. Once you have arrived at a shared ideal, it's time to look at the practicalities of implementing these ideas in material, offline, spaces. This will include thinking about how much formality you want, what kind of formalities, how you will accommodate diversity, how you will facilitate participation for all the participants both in terms of your practical arrangements and in the way you formalise the social space.

How do you create a safe space?

The difficulties in defining what a "safe space" should look like are inherent in the fact that you are bringing a diversity of people together, who might be considered to be part of the same community but all have different histories, contexts and needs. What one person might find politically, socially or personally threatening, might mean very little to another. And everyone will of course also come with different experiences and levels of knowledge and skills in technology.

We need to remind ourselves then that whenever we create a space, even a safe space, it will never be experienced in the same way by the people involved. It is important to be aware that, in struggling to perfect a feminist safe space, one always runs the risk of creating, instead, yet another form of social control and pressure to conform to a particular image of what a woman or trans* identified person is.

So, overall, the most important thing to remember is that everyone is different, with their own set of experiences, history, context and needs. There is always risk and vulnerability in opening yourself to new experiences. The more diverse the environment, the more emotional risk we open ourselves to as ideas and ways of being may be fundamentally challenged. So we are not aiming for the avoidance of any kind of conflict or emotional risk but, instead, to provide buffers, understanding, reciprocation, support, love, and care for each other and for our shared endeavour. We must take every possible step to ensure that practical needs are met (protecting anonymity, respecting diversity, dealing with harassment, providing appropriate living space, etc.), and focus on collaboration, facilitation and mediation.

Women and trans* only?

This question can be one of the most divisive as it will often touch on people's strongly held sense of their political, personal, sexual and social identities. It can raise up issues of sexual orientation and gender identity as well as mobilising all kinds of other loyalties. Some will prefer a women and trans* only environment, some will feel that this opens up an opportunity for external attacks on the whole project by adversarial forces, whilst some will feel that cis-men friends and colleagues will be unfairly excluded and resentful. Discussion can sometimes divide along lines of sexual orientation or of feminist conviction - or just between women who regularly work alongside cis-men in the tech industry and women who would like to learn tech but find learning alongside cis-men challenging. These divisions will also never be clearly defined - individuals don't take neat "sides" as they probably have multiple modes of identification.

If you need to have a debate about this, some things to consider are:

  • Think about boundaries for the debate -- agreed framework, rules of engagement? How do we define "woman" and "trans*"? How do we define "safe"?
  • Who do we want to include or influence, specifically women and trans* or also potential sympathisers?
  • What is the balance of positions on feminism present in the group, is there a prevalent "flow" of opinion?
  • How important versus how contentious? Is it worth alienating some people from the group? How can we frame the debate to avoid alienating people who don't agree with the decision?
  • How will the decision affect the actual experience of people within the space?
  • Do we have all the skills we need to deliver this project among our networks or will we need specific additional skills? Where will we get them?
  • How will the space be formalised to promote equal participation, especially if cis-men are included?

Take your time to decide these questions. It's probably a good idea to record them somewhere so they can be referred to in future. If you use chat channels (IRC, pads, etc.) you can probably take a log of the discussion. If not, some form of minutes will be useful. You can then use this record as a basis for any formal codes of conduct or policies you want to draft later and to avoid getting stuck in endless arguments by having something clear to refer back to and for new participants to catch up.

What are you trying to do?

For some groups, discussion and reflection is a key activity which renders the whole group activity meaningful. For others, discussion is a source of vexation and obstruction from practical objectives. Again, this is a somewhat false divide as everyone needs to reflect and everyone needs to be practical. Nevertheless, there may be important differences in emphasis and these may be based on what you are actually trying to do. It's all too easy to become engrossed in politics and to neglect to make sure there's enough discussion on the specific aims of the project itself and on the experience of diverse participants.

Building offline spaces is easiest and most successful when you're clear about what you're trying to do and how you plan to go about it. Being clear about what you're trying to do can also shift debate through less painful channels and provide very clear, practical arguments for specific choices, making the discussion feel less emotive.

The first thing which must be considered is exactly what the event is intended to achieve. Women and trans* and tech events can probably be categorised something like this (again, this abstract division may not reflect the 'messiness' of practical activism):

  • Advocacy: How do we change the culture of tech sectors to be more amenable for women and trans* persons, and/or let the world know that they are great at tech, and/or get more women involved?
  • Skills: How can we learn to do xyz?
  • Support, networking and boundary-crossing: What does it mean to be a woman or trans* person in tech? How can women from different places or sectors come together to spark off new ideas and practices? How can we support each other as women and trans* persons in tech?

We can see right away how these different types of event might develop different gender policies even if the same group of people were organising them. For example, it's difficult advocating change in the male culture of tech sectors if you haven't invited cis-men to hear what you want to say - but you might prefer to discuss *how* to do this in a women and trans*-only environment first. Or are you advocating engagement with technology to women and trans* and mainly want free, frank and mutually supportive discussion or skills-sharing? In this case, a women and trans* environment suggests itself.

With skills workshops, there is research to suggest that women and trans* persons learn tech skills best with each other so these workshops have a very clear and communicable reason for being exclusive. But you may still hear cis-men allies grumbling that they also wanted to learn that skill and it isn't fair. So, in that case, we can either explain the benefits of exclusive learning environments and recommend that a cis-man step forward to run an open workshop, or we might consider compromising with women and trans*-only as facilitators but inviting open participation. Another possibility is to run an event twice, once for women and trans* participants and once for open participation. As a side-effect, this can help others to experience the safe space methodology and change their own practice.

It's also important to remember that building offline spaces is resource- and labour-intensive and often many compromises have to be made. It may be a good idea to try to identify as early as possible which values are shared, important, and relevant to the event so that you can constantly remember to prioritise those and de-prioritise less important or potentially divisive issues.

Choosing a format that fits

Once you have settled the basic questions about what your event is *for* and who you want to invite, it's time to think about the format you will use for your event. There are many different ways of organising different kinds of spaces, the following is just an outline of a few of those most popular with FLOSS communities.

  • Temporary Autonomous Zone: An alternative to traditional models of revolution, the T.A.Z is an uprising that creates free, ephemeral enclaves of autonomy in the here-and-now. [| Beautiful Trouble]
  • Un-Conference: creating a space that helps people make connections, share knowledge, collaborate and create brainchildren. To take part, attendees are encouraged to give a presentation, create a discussion, or even chair a debate [| Lanyrd on running an unconference] and [| Open Space]. Pros: relatively egalitarian (watch out for tyranny of structurelessness) and relatively easy to organise (no messing about with programmes, scheduling and advanced prep). Cons: can be extremely intimidating and therefore exclusionary towards less experienced or skilled participants and stressful if you need to organise tech or other resources for specific activities in advance.
  • Workshop: transferring skills or knowledge in an interactive session - there are thousands upon thousands of workshop methodologies, so selecting a workshop format is very much about being clear about what you want to achieve. Workshops are a good format for building skills or for maker and design activities.
  • Hacklab/Hackerspace/Makerspace: Hacklabs, hackerspaces and [| makerspaces] are community spaces with hardware and/or tools - great for people to "get their hands dirty", you can mess about with anything from taking computers apart to installing Linux to making music with bananas or even building a WWII PoW radio out of razorblades and copper wire! To learn more about hacklabs and hackerspaces, read Maxigas' article "Hacklabs and Hackerspaces: Shared Machine Workshops", in: http://www.coredem.info/IMG/pdf/pass11_an-2.pdf [PDF]
  • Sprint: A sprint is a get-together of people involved in a project to further a focused development of some aspect of the project such as working on sections of code, writing manuals or books, etc. These are effective at getting a lot done quickly for code and manuals (less so for other forms of writing) but very exhausting and emotionally demanding - make sure you keep food and drink coming! To read more about sprints, visit: [| Wikipedia on sprints] and | Flossmanuals Booksprints].
  • Hackathon: with their motto "programming till someone drops from exhaustion", hack events can also mix different groups like NGOs with hackers to come up with new approaches to building tech for that group. To learn more about hackatons, read: [| Global Voices on how to run a hackathon].
  • Seminar: bringing together small groups for recurring meetings focusing on a particular subject, in which everyone present actively participates, or offering information or training on specific topics. Pros: structured activity supports women with less experience or confidence, planning for tech/resource support is easier, people know what to expect. Cons: can be overly structured and lacking spontaneity for more experience participants , more 'carnivalised' or 'top-down', more organisational effort in advance. Read [| the page of Wikipedia on Seminars].

Your choice of format is going to be about:

  • what you're trying to do - ask yourself which format will support this activity best
  • participants' needs, existing skills, experience and preferences
  • practical considerations - what physical spaces are available, what will they allow you to do, what resources do you have, etc.?
  • Your organisational resources - how much can you take on?

Choice of workshop or seminar format is obvious for skills sharing, but it can get more difficult to decide for advocacy and networking events. Advocacy events can be some of the most challenging as it's easy to spend the entire day "re-inventing the wheel" with people who are new to the questions. If you have participants from diverse backgrounds in your advocacy event, it's probably best to go with a more structured format. Unconferencing and hacking works best with activists or experienced practitioners who are used to a high level of self-determination and with a shared understanding of implied rules and structures. Having said that, it can work well to try more open formats anyway, but be prepared for some skilled facilitating to make it safe and fun for less experienced participants as well as the more experienced.

It's perfectly fine to mix and match approaches to suit what you're trying to do and whom you're doing it with - so go ahead and experiment.

Codes of conduct

It's important, especially in mixed environments, to think about what's acceptable behaviour in the space and what isn't. In order for this to have any practical effect, you also have to think about what you'll do if individuals breach this - or when things go wrong generally.

You can find plenty of information and example policies on the [| Geek Feminism Conference anti-harassment/Adoption page]

Make sure your participants understand your policy and how that relates to their behaviour. It can be useful to make time in your schedule at the beginning of the event to share your policy, and reach consensus with the group on how to maintain a safe space over the days of the event.

Your policy should at the base be about preventing aggressive behaviour and not about trying to "police" how people identify, communicate or present themselves as long as this is not creating a serious threat to other participants. It's also worth remembering that people who are struggling in a culturally unfamiliar environment can become confrontational more easily than they usually would. There may be many reasons why a participant might be struggling to communicate positively at any given moment. It's key to remain calm and to provide a non-judgemental space for the expression of emotions like anger or frustration. We are different, let's celebrate it, even when it's difficult to do!

Respecting Privacy

  • Don't take or circulate sound, video or photos without permission - if anyone present faces significant external risk then don't take photos at all unless participants have given express permission and an opportunity to cover their identity.
  • If you wish to record the event, prepare formal consent forms telling people exactly what audio-visual records are being made and how they will be stored and used and ask for clear consent with a signature.
  • Don't share details of anyone's participation, speech or actions on social media without their express permission.
  • Refer to Infrastructure sections to understand how to set up secure networks.

Case Studies

In the following, two women-and-tech spaces will help illustrate what was covered until now in this section of the manual, which pertains to the aims, participants and context which influence format.

Eclectic Tech Carnival (ETC)

ETC was organised on an "unconference" model using a combination of university spaces, art centres and community centres. It is relatively well-funded and so is able to bring participants in from all over the world. It is located in a different city each time and organised by a group from that city in collaboration with the core ETC collective. It provides "full board" space for participants and also partners with additional arts events located in the host city.

ETC made the decision to be for women-only. Participants are culturally diverse but mostly from arts, academic, non-profit and related tech backgrounds. This means that they have a lot of experience in self-organising and thrive in a relatively unstructured environment. The code of conduct tends to be implicit rather than stated.

Eclectic Tech Carnival spawned [| Transhack 2014] and also Flossie.org. ETC and Transhack's relatively coherent culture has fostered the development of a strong focus on reflection and feminist practice. It has been an influential and much-loved space for more than a decade.

Flossie

Flossie runs a conference and also skills workshops and was based on the ETC format. It is intended to combine advocacy, boundary-crossing, support and skills-sharing bringing together women involved in digital arts with coders, artists, and makers. There are various problems with trying to bring the ETC format to the UK, which has an extremely marketised academic/arts/non-profit sector and is outside of the Schengen area, making it very difficult for non-EU participants to attend in person. Eventually, it was decided to do something a little different. There was a small amount of funding from Google which didn't cover "full board" and, in any case, it was impossible to find spaces such as the schools used in ETC in Austria in the marketised UK public sector. Videos were made and the links were available for women outside of EU to contribute. The whole event was not streamed publicly because of bandwidth problems at the university which hosted the event.

In the end the biggest difference came from involving more women from pure tech and engineering sectors. Flossie worked with Ubuntu Women and the Women's and Open Source Groups at the British Computer Society to involve women from purely technological backgrounds as well as digital artists, activists and makers in order to foster wider skills sharing and open up access to high-level computer skills for women. This was very popular but also opened out all kinds of communication difficulties as the groups had quite different cultures and backgrounds.

The first issue raised by this was that many of the students who joined the collective wanted a more structured environment as they didn't feel confident in self-organising and more experienced organisers also felt the unconference structure could be a problem given the diversity of backgrounds and interests. The second was that a reflective approach became more difficult. In the first year, a panel was held to consider how to go about building a positive representation of women in technology. This quickly became very dislocated and adversarial because, as the group began to realise, there were many different models of feminism and of technology between women who were primarily tech/engineering, academics, and women who were primarily activists or artists. It was decided that the group would focus on the basic value that all shared - supporting more women to make better use of open technology and to move from being consumers to being producers. The group had to deprioritise feminist reflection or debates about practice. This proved very effective in holding together these very different groups and building lasting networks with a positive and collaborative atmosphere.

What is a Feminist Hackerspace?

Building a feminist hackerspace is another way of creating a safe space offline for women in tech in addition to reach out to women activists and artists who might not be drawn to traditional hackerspaces.

But first what is a hackerspace? Hackerspaces are often volunteer-run spaces based on the concept of openness, where in theory anyone who is interested in learning about and playing with technology (software, hardware, etc.) can go. However, throughout the world women have remained underrepresented in these spaces despite the attempts to proposed remedial strategies in certain space, such as women-only hack nights and the adoption of codes of conduct. The women-only hack night particularly has been met with controversy in many spaces since it is deemed to go against the principle of openness.

Other reasons have been highlighted to explain the emergence of feminist hackerspaces such as the difficulties in recognizing and acknowledging privileges along the lines of gender, race, ethnicity and class in addition to the patriarchal behaviours that many women recognise as prevalent in hackerspaces. To change the aforementioned state of affair, feminist geeks, makers, artists and hackers have decided to start feminist hackerspaces. This shows that women are interested in technology, want to learn, improve their skills, look for a like-minded community and want to share their skills with others. And it is fun too!

Feminist hackerspaces are not all the same. They vary in form, shape and size. What seems to unite them though is a set of boundaries that they decide collectively (who can be a member, who can be a guest, what are the policies, etc.) and an explicit belief in feminist principles. Feminist hackerspaces provide a place to work on individual and collective projects in a supportive environment.

To know more about feminist hackerspaces you might want to visit the website of: the Mz Baltazar’s Laboratory in Vienna (http://www.mzbaltazarslaboratory.org/), The Mothership Hackermoms in Berkeley (http://mothership.hackermoms.org/), Double Union in San Francisco (https://www.doubleunion.org/) and FemHack in Montreal (http://foufem.wiki.orangeseeds.org/).

Which Criteria Do I Use to Assess Whether a Space is Safe or Not?

As a summary and check-list, you will find below the criteria (or rather questions) by which to assess whether a space is safe or not. These questions will be useful when you are assessing whether a space can be considered a safe space.

- What is the history of the space? Why was it decided to start this space and who started it? How many women are/were involved? Documenting yourself about a space is very important. Asking questions is always relevant.

- Who has left the space since the beginning and for which reasons? Is it mostly women who have left the space?

- Does the space has policies? If so, what kind? Go and read it.

- Are the policies regularly put in practice? Ask members in the space, particularly women.

- How do they welcome new comers? The first time you went to the space did you get a tour? Did people say hello? Were the people in the space friendly?

- Are there regular meetings (assemblies) that you can attend to raise issues of concerns, to suggest collective projects, to suggest the organisation of workshops, to discuss the space (its cleanliness, etc.), to present yourself, etc.?

- Is the language and vocabulary used on the website and in the space explicitly feminist? Read the website carefully, or go and see for yourself how the space looks like.

- Who can go in the space and under which condition? This should be made explicit on the website, otherwise ask.

- Do you know people who you trust in the space or do you know friends of friends? The web of trust can be very useful here.

- Is it an accessible space? In which part of town is it located? Are there bathrooms? What are the opening hours? Who has access to the keys of the space?

- How much does it cost to become a member? Is there a sliding scale policy?

No space is a perfect space, even a safe space is not perfect. But safe spaces should at least provide an environment and a set of boundaries to talk, meet, address and raise difficult issues, among others. If you feel the space has potential and you want to get involved, don't be shy!