Special

Search by property

This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.

Search by property

A list of values that have the property "Methodology" assigned.

Showing below up to 46 results starting with #1.

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)


    

List of results

  • #Crea contraseñas que tengan más de 10 díg
    #Crea contraseñas que tengan más de 10 dígitos No se valen nombres de mascotas. Sí como yo, estudiaste en un colegio con influencia religiosa: Nabucodonosor es bastante predecible. No usen: números de cédula, nombres de parientes, fechas de cumpleaños. Diez dígitos es bastante; pero para eso pueden usar el siguiente truco: deconstruir frases. # Deconstruir frases Piensen en una frase: de una canción, de un libro, un dicho, o incluso un chiste de pepito. Voy a ser pretenciosa aquí y voy a usar: “Ser o no ser, he ahí el dilema”. Lo primero sería juntar todas las letras: seronoserheahieldilema Ahora viene la deconstrucción, una opción sería reemplazar las vocales por números. Lo más común es hacer las siguientes equivalencias: e= 3, i=1, o= 0. No estoy segura de cuáles serían los números equivalentes para a y u. En este caso, voy a usar a=4. En fin, nos quedaría algo como esto: s3r0n0s3rh34h13ld1l3mm4. Pero cada quien puede hacer las equivalencias que quiera, por ejemplo, podría usar e=8. Ahora, voy a incorporar signos: de puntuación, numerales, porcentajes. Para que no se me olvide, voy a hacer equivalencias, como hice con las vocales: claro que para este caso, no voy a hacer equivalencias de todas las consonantes. Voy a usar: s=%, h=& y m=! Y mi contraseña sería: %3r0n0%3r&34&13ld1l3!!4 # No anotes tu contraseña en un papel o archivo de texto con el título: CONTRASEÑA Ok. Ya tenemos nuestra contraseña, ahora sólo tenemos que recordarla. Sí hicimos las equivalencias, no debería ser TAN difícil recordar la contraseña. Pero ya sabemos que todas tenemos malos hábitos y confieso que en más de una ocasión he hecho un archivo .txt para recordar una contraseña en particular. Lo que creo que es inaceptable es andar las contraseñas anotadas en la última hoja de un cuaderno, en la agenda o en una hoja suelta, que vaga libremente en nuestros bolsos. Y por supuesto que no podemos tener un archivo llamado contraseñas.txt o contraseñas.doc en nuestros archivos digitales. # No utilices la misma contraseña para sitios distintos Si, yo sé que Google nos lo hace todo muy fácil y que con sólo abrir mi correo tengo un blog, un perfil de Google+ y un canal de YouTube. Pero no hay ninguna razón por la que tu contraseña para Facebook, Twitter y tu correo sean la misma. Sí una página te pide que abras una cuenta o que vincules la página con tu cuenta de Facebook: no la vincules. Te toma unos minutos más y dar un montón de vueltas entre tu correo y los links de confirmación: lo sé. Y en esa línea: no crees cuentas en páginas que no vas a volver a usar. Ya me ha pasado, que estoy tan ansiosa por descargar un libro que hago una cuenta en libros.com y luego no vuelvo a entrar a la página y sólo recuerdo que tengo una cuenta cuando me llega un correo para que actualice los datos. Cuando una de tus cuentas es violentada; por lo menos podes tener la seguridad que las otras cuentas están seguras. '''No le des tu contraseña a nadie:''' Ya sea tu pareja, que agarro la última fiebre machista e insiste en que saber tu contraseña es señal de amor y confianza; ya sea la persona que le hace chequeo técnico a la computadora, porque a veces necesitan reiniciar la computadora y para acceder al usuario tenés clave de acceso; o ya sea a tu mama que necesita enviar un correo a una tía que vive fuera del país, o porque vos estás en Xanadú y no podes revisar sí te llego la notificación de una beca que estabas esperando.
    icación de una beca que estabas esperando.  +
  • '''Actividad #1 Bienvenida''' (10 min) En
    '''Actividad #1 Bienvenida''' (10 min) En un post it cada participante escribe: * ¿Qué edad teníamos cuando tuvimos un celular por primera vez en nuestras manos? ¿Qué marca? * ¿Cuanto tiempo hace que tiene el celular que usa actualmente? * Enumera los tres usos principales que le das en la actualidad Compartir en plenaria.- Mural de las respuestas. Análisis de los resultados: ¿Está la navegación entre las respuestas que más se repiten? '''Actividad #2 Visibilización''' (20 minutos) * ¿Qué recorrido o ruta tienen nuestros datos cuando navegamos a través del teléfono móvil? * ¿Por qué es importante la navegación segura desde el teléfono móvil? Herramientas para sondear el rastreo: Trackography http://trackography.org/ Una participante elige uno de los países que aparecen en el mapa en color azul y luego selecciona el medio de comunicación que acostumbra a consultar a través de su teléfono móvil y luego puede identificar el tipo de rastreo que las compañías terciarias hacen de los datos de la participante. Lightbeam https://www.mozilla.org/es-ES/lightbeam/ Es un complemento de Firefox que permite identificar que empresas están rastreando la navegación en el momento real de la navegación. Panopticlick https://panopticlick.eff.org/ Esta herramienta permite analizar que tan bien configurados están los complementos de seguridad del navegador. - Discusión con las participantes: Sí accedemos a la internet a través de nuestros teléfonos móviles, ¿qué información puede ser rastreada? (Lluvia de ideas en el papelografo) - Explicación: Niveles de rastreo * IMEI-SIM-Documentos oficiales (Credencial de identidad) * Servidores donde están hospedados los sitios webs que visitamos * Empresas terciarias * Metadatos de los navegadores - Perfil de usuarias * Fingerprinting (huella digital) '''Actividad #3''' (20 minutos) Revisemos las aplicaciones que tenemos en nuestro teléfono móvil. Identifiquemos en porcentajes (%) en una hoja. Ejercicio personal. (10 minutos) * ¿Cuántas aplicaciones tienes? * ¿Cuantas son redes sociales? * ¿Cuantas son predeterminadas? (vienen por defecto con el teléfono móvil) * ¿Cuantas aplicaciones son de manejo de contenidos multimedia? (foto, vídeo, audio) * ¿Cuantas aplicaciones son de entretenimiento? (juegos) * ¿Sabemos que accesos le otorgamos a las aplicaciones cuando las instalamos voluntariamente? - Discusión con las participantes: ¿Qué características debemos tomar en cuenta al momento de instalar una aplicación en un dispositivo? (10 minutos) * Permisos de acceso * Vinculación con empresas de rastreo de datos * Uso comercial de nuestros datos * Tipo de empresa que desarrolla la aplicación (Comercial o no, historial de incidentes de privacidad) '''Actividad #4''' (45 minutos) Dividir a las personas participantes en grupos según el SO de su teléfono móvil: Android, iPhone ¿Cómo navegar en internet de forma segura desde el teléfono móvil? Instala Orbot y Orfox (Android) ¿Cómo instalar y usar diferentes complementos para la navegación segura desde el teléfono móvil? Instala complementos para el navegador Cambia la configuración del teléfono móvil: ¿Cuáles aplicaciones tienen acceso a tus datos? * Elegir entre Tor (Android) o VPN (Android y iPhone) * Borra las aplicaciones que no usas * Cifra tu teléfono (Android) * Coloca una contraseña de bloqueo a tu teléfono móvil y a las aplicaciones que te lo permiten * Apaga el wifi, bluetooth y GPS cuando no lo necesitas usar * Utiliza una cuenta de correo diferente para configurar tu teléfono '''Actividad #5 Estrategias''' De las actividades realizadas durante el taller, identifica cuales pertenecen a las siguientes estrategias de mitigación: * Reducción * Fortificación * Compartimentación * Camuflaje Actividad #6 ¿Qué criterios debemos considerar al momento de elegir un teléfono móvil o un servicio que asegure la privacidad? Lluvia de ideas en un papelógrafo * Se puede extraer la batería * Se puede acceder como root (o es rooteable) * Se puede cifrar el teléfono * Sistema Operativo que usa ¡EVALUACIÓN! ¿Que te gusto? ¿Qué te sorprendio? ¿Que suguieres cambiar para la próxima vez?
    Que suguieres cambiar para la próxima vez?  +
  • '''Actividad #1''' ¿Cuáles son las partes
    '''Actividad #1''' ¿Cuáles son las partes de un teléfono móvil? Las participantes hacen una "lluvia de ideas" listando los diferentes componentes físicos de un teléfono móvil: * Pantalla * Antena * Micrófono * Bocinas o parlantes * Cámara * Batería * Tarjeta de memoria micro SD * Tarjeta SIM * Carcasa * Circuito procesador * Banda base (IMEI) * Botón de encendido y apagado * Botón de menú * Botón de volumen * Linterna / Flash * Entrada de mini plug (3.5mm) para audífonos * Entrada micro USB para cargador * Antena GPS * Sensor de posición * Reloj * Bluetooth * Sensor ambiental * NFC Una vez hecha la lista se reflexiona sobre lo familiar que es esta tecnología que a veces parece misteriosa porque no siempre sabemos como funciona. '''Actividad #2''' * ¿Cómo funciona la infraestructura de la telefonía móvil? Explicación construida de forma colectiva con la participación de todas. Las facilitadoras van reflejando las ideas en un dibujo o gráfica que permite visualizar las ideas. Se dibuja una persona con un teléfono móvil en un espacio determinado, luego se dibuja una antena cercana al lugar donde se encuentra la persona. La antena y el teléfono están conectados por una señal inalámbrica (no es visible). Las facilitadoras preguntan: * ¿Qué pasa cuando esa persona se mueve de ese espacio? si la persona esta en una llamada ¿cómo es posible que la llamada no se corte? * ¿Cómo puede el teléfono móvil seguir teniendo señal cuando se aleja de la antena? Se dibujan dos antenas más y se explica como funciona la triangulación de las antenas. Vídeo "Balthazar (video 00:35 - 01:33) Cando el teléfono móvil esta encendido (no en modo avión) están buscando señal de una antena y si no encuentran una señal lo que hacen es subir la potencia de su pequeño transmisor (algunos no tan pequeños de hasta 4 o 5 Watts) para ver si encuentran la señal de una antena. Esta es la razón por la cual cuando un teléfono móvil no encuentra señal su batería se descarga rápido porque al subir su potencia hace un uso mayor de ella. La triangulación de antenas permite identificar de forma aproximada la ubicación de un teléfono móvil (el GPS es más preciso) Basta con que la compañía de telefonía celular apague una antena para que las personas en esa área queden incomunicadas. Es sabida la colaboración que existe entre compañías y gobiernos en algunos países. Las facilitadoras explican: * ¿Qué es el IMEI? Identidad Internacional del equipo Móvil. Es un número que identifica al aparato de forma exclusiva a nivel mundial. Este numero es transmitido por el aparato a la red con la cual se conecta. El IMEI es distinto al número de teléfono que te proporciona el SIM de la compañía con que contratas el servicio. Para conocer el IMEI de tu aparato de teléfono sólo debes marcar *#06# El IMEI esta en lo que se conoce como la banda base del teléfono móvil * ¿Por qué usamos una tarjeta SIM? A diferencia del IMEI el SIM es una tarjeta desmontable que permite identificar a la persona que suscribe el servicio de una red de telefonía. El SIM es la tarjeta que te permite tener un número identificador en la red de telefonía celular. Es tu número de teléfono con el cual recibes llamdas. * ¿Cuáles son las diferentes formas en que el teléfono móvil puede acceder a infraestructura para la transferencia de datos y cómo esto se relaciona con la privacidad y seguridad? # 3G/4G: son protocolos de telefonía móvil que corresponden a diferentes generaciones que van aumentando la velocidad y calidad en la transmisión de datos. El método de triangulación permite identificar el área geográfica donde se encuentra el teléfono móvil. # Wifi: por lo general el servicio de internet lo provee una compañía diferente a la de telefonía móvil. Para acceder a internet el teléfono móvil se conecta con un punto de acceso que provee la compañía de internet. este punto de acceso esta asociado a una línea telefónica o una antena micro ondas, con lo cual es fácil identificar el área geográfica donde se encuentra el teléfono móvil pues un punto de acceso tiene un rango de aproximadamente 20 metros de cobertura en áreas cerradas y un poco más en áreas abiertas. Cada vez que un teléfono móvil conecta con un punto de acceso wifi queda guardado en el historial del teléfono y cuando llega a otra red ese historial es compartido como una base de datos que permite identificar si se trata de una red nueva o una red donde ya ha estado conectado. El problema es que revela todos los puntos de acceso a los que han conectado y eso representa un punto de vulnerabilidad. # Bluetooth: es un componente que permite crear un enlace entre diferentes dispositivos, a través de radiofrecuencia, posibilitando la transmisión de voz y datos. Tiene un rango menor de cobertura que el wifi. Para poder conectar con otro dispositivo electrónico vía Bluetooth es necesario estar a poco metros de distancia, además si mantienes tu teléfono móvil con el Bluetooth activado corres el riesgo de que una persona tenga acceso a tu información (fotos, archivos, contactos, vídeos, etc) sin tu consentimiento. # GPS: Es un sistema de geoposicionamiento global que funciona a través de la triangulación de señales satelitales. La ubicación geográfica de un teléfono móvil es más precisa. Si mantienes el GPS activado es muy fácil que tu ubicación sea localizada por terceras personas sin tu consentimiento. # Datos de Internet: A partir de la 3ra generación de protocolo de telefonía móvil (3G) los dispositivos GSM tienen acceso a la transmisión de datos de internet a través del servicio de telefonía que ofrece la compañía. Para que un teléfono móvil tenga acceso a datos por medio de la compañía telefónica debe tener señal de una antena con lo cual el sistema de triangulación también permite la ubicación geográfica, además del rastreo que se logra através de la navegación en internet. ''Actividad #3'' Jugando con las tarjetas de teléfono móvil. Las facilitadoras piden a las participantes que se dividan en 4 grupos. Cada grupo tiene un juego de tarjetas. Cada tarjeta corresponde a una capa del teléfono móvil. Cada grupo trabaja con una tarjeta diferente y debe contestar un conjunto de preguntas: Preguntas para todos los grupos: * ¿Cuáles son los tres formas en que puede ser rastreada tu localización? * ¿Quién es dueño de tu "baseband? * ¿Cuáles son los datos trazados por la infraestructura de telefonía móvil? * ¿Cuáles son los datos trazados creados por las usuarias? Preguntas específicas por grupo: * Grupo 1: Tarjeta 1 ¿Qué pueden hacer para tener un mayor control de lo que hace nuestro teléfono móvil? * Grupo 2: Tarjeta 2 ¿Qué pueden hacer para tener un mayor control de lo que hace nuestro teléfono móvil? * Grupo 3: Tarjeta 3 ¿Qué pueden hacer para tener un mayor control de lo que hace nuestro teléfono móvil * Grupo 4: Tarjeta 4 ¿Cuáles son los riegos de conectar datos? Plenaria Cada grupo debe presentar la respuesta a la pregunta específica '''Actividad #4''' Evaluación * ¿Qué fue lo qué te sorprendió? * ¿Que fue lo que te gustaría mejorar? Sugerencias * ¿Que fue lo que te gusto? Dejemos el espacio mejor de lo que lo encontramos Gracias!
    io mejor de lo que lo encontramos Gracias!  +
  • '''Actividad''' Vídeo: https://www.youtu
    '''Actividad''' Vídeo: https://www.youtube.com/watch?v=6UDnZ_flLHQ '''Demostración''' Presentación de 10 estrategias para posicionar tu contenido sin vender tu alma al diablo. https://archive.org/details/10Estrategias * Politizar nuestra necesidad de posicionarnos en Google Nuestra presencia en Internet es política. Es un espacio del que tenemos que apropiarnos y que facilita que otras mujeres se acerquen a nosotras. * Motores de búsqueda Son plataformas y páginas a las que se accede a través del navegador y que leen lo que hay en la parte indexada de internet (de las páginas web). Funcionan por algoritmos, donde hay variables ante las que reaccionan a las búsquedas. El orden de los resultados depende deː palabras clave, enlaces, contenido de pago y contenido orgánico: * SEO Buenas prácticas necesarias para optimizar tu espacio web y que te harán ganar relevancia de manera natural de cara a los buscadores * Tips de posicionamiento por contenido 1) Audiencia: Pensar primero en a quiénes nos dirigimos, qué quieren saber de nosotras y qué buscan de nosotras, qué necesidades resolvemos. Hay que considerar el tipo de lenguaje que usan ellas. Abandonar el mal hábito de usar el lenguaje de la cooperación, de los proyectos, de las financiadoras, etc. 2) Enlacesː Tener más enlaces significa tener mejor reputación, y me dan un aval de confianza. Asi mismo se pueden incluir nuestros enlaces a otros sitios porque da un aval de confianza a las otras 3) Crear imágenes propiasː Con nombres propios, para que el buscador la reconozca y que sea descriptivo de la imagen (no dejar el nombre que la cámara deja al archivo). Compartir con licencias libres 4) Frecuencia de publicaciónː Mantener el sitio actualizado, así dar motivos para que las mujeres regresen al sitio y crear fidelización. 5) Multiformatosː Que no sea únicamente textos si no que haya textos, audios, videos, gifs. Construir relaciones de reciprocidad en el marco de las dinámicas que se da en internet, porque hay distintas formas de aproximarse a los contenidos. 6) Originalidadː No se vale cortar y pegar. Importancia de citar. Crear contenidos propios implica dedicar tiempo. 7) Generar comunidadː Es importante vincular a la gente, pensar cómo las usuarias se pueden vincular con nosotras y desarrollar estrategias de involucramiento para que las mujeres se sientan parte de nuestra propuesta. 8) La estructura del sitioː A veces menos es más. no es necesario meterle 135 fotos a la portada, demasiada información, audio automático, etc. OJO con los botones de redes sociales, porque esos botones dan nuestra autorización a estas plataformas para acceder a la información de las mujeres que nos visitan. 9) Palabras Clavesː El uso reiterativo de palabras clave es importante para posicionar también un discurso político en internet. ¿Qué palabras usadas por las usuarias nos caracterizan? (no las nuestras, sino las de ellas) Usar categorías y etiquetas facilita la navegación 10) Planificar los contenidosː Sin planificación no se puede evaluar ¿qué elementos son necesarios para crear contenidos? ¿qué tipo de contenidos voy a crear? '''INPUT''' Ejercicio práctico: 1.-Identifica 5 palabras que describan el trabajo de tu colectiva. Ej. Ciberfeminismo, Arte, Tecnología, Violencia, Feminismo 2.- Identifica un tema para la creación de un contenido digital y los elementos complementarios. Ej. Legislaciones contra la violencia digital en Latinoamérica. Elementos: Investigación sobre legislaciones digitales, informes internacionales, enlaces a organizaciones que trabajan esta temática, vídeo sobre la violencia digital, imagen del congreso de mi país. '''Profundización''' PLENARIA '''Síntesis''' Pedir a dos voluntarias que recuerden a las participantes dos de las 10 recomendaciones. Evaluación
    os de las 10 recomendaciones. Evaluación  +
  • '''Ejercicios 1''' Diversos ejercicios de
    '''Ejercicios 1''' Diversos ejercicios de estiramiento y soltar tensiones en manos / espalda / brazos Se puede encontrar el vídeo explicativo en el siguiente link: https://archive.org/details/BOOTSEQUENCE '''Ejercicios: 2''' Descansar los ojos Cerrando los ojos realizamos un ejercicio para concentrarnos y descansar los ojos. Las mujeres activistas que trabajamos mucho tiempo en la computadora sufrimos muchas veces de trastornos del sueño, de la concentración y/o vista por la sobre exposición a pantallas de computadora. Este ejercicio ayuda a bajar latensión y afectación en los ojos. Con los ojos cerrados, en una meditación guiada, vamos recorriendo con nuestros ojos un reloj imaginario: 1. Primero recorremos el reloj iniciando por el punto 12, pasando al punto 3, al punto 6,al punto 9 y regresamos al punto 12. Nos detenemos un minuto para cada punto, Repetimos el ejercicio dos veces 2. Ahora recorremos el reloj deteniéndonos en todos los números del reloj: iniciamos en el 12 y recorremos: 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11 y regresamos al 12. Nos detenemos un minuto para cada punto. 3. Nos mantenemos dos minutos en silencio con los ojos cerrados y con suavidad vamos abriendo los ojos. '''Ejercicios: 3. Soltar tensiones en el cuello y espalda''' Basándonos en la técnica de la acupresión, vamos a ayudar a que la energía acumulada en la espalda y en el cuello fluya, vamos a presionar ligeramente con nuestros dedos índice puntos de acupresión. A través de esta técnica se hace una conexión directa con la energía de otra persona, por lo tanto es necesario estar muy centradas tranquila y consciente de que vamos a compartir nuestra energia con nuestra compañera. Antes de empezar, nos tenemos que concentrar conuna pequeña meditación de dos minutos con los ojos cerrados, este también es el momento para protegerse. Pasos 1. Presiona ligeramente con tus dedos índices los puntos ubicados en el hoyito al lado de los omoplatos. 2. Presiona ligeramente con tus dedos índices los puntos ubicados en la base del cuello 3. Presiona ligeramente con tus dedos índices los puntos ubicados en el cuello justo debajo de donde empieza el cuello cabelludo 4. Después de soltar la energía, las personas que trabajaron juntas se agradecen.. '''Discusión:¿De que me di cuenta? ¿Que construí y que necesito?''' Compartimos las diversas emociones con las que nos conectaron los ejercicios. Varias compañeras pudieron soltar emociones con las que no podían conectarte hace años. Cerramos agradeciéndonos la confianza las unas a las otras y rifamos unos aceites de masaje.
    as otras y rifamos unos aceites de masaje.  +
  • '''Exercises 1''' Various stretching and
    '''Exercises 1''' Various stretching and tension exercises on hands / back / arms The explanatory video can be found at the following link: https://archive.org/details/BOOTSEQUENCE '''Exercises: 2''' Rest your eyes Firstly, we close our eyes so we can perform an exercise to concentrate and rest our eyes. Women activists who work with computers for long hours often suffer from sleep disorders, concentration problems and other issues caused by prolonged-exposure to computer screens. This exercise helps to rest and relieve your eyes if you suffer from these problems. In a guided meditation with our eyes closed, we are walking with our eyes around an imaginary clock: 1. First we walk the clock starting with point 12, going to point 3, point 6, point 9 and we return to point 12. We stop one minute for each point. Repeat the exercise twice 2. Now we go through the clock and stop at all the numbers on the clock: we start at 12 and we run: 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11 and back to 12. We stop Minute for each point. 3. We remain silent for two minutes with our eyes closed and we gently open our eyes. '' 'Exercises: 3. Release tensions in the neck and back' '' Based on the technique of acupressure, we are going to help the energy accumulated in the back and neck flow freely; we will press lightly with our index finger on acupressure points. Through this technique we make a direct connection with the energy of another person, so it is necessary to be very focused, calm and to be ready to share our energy with our partner. Before we begin, we have to concentrate with a small two-minute meditation with our eyes closed. This is also the time to protect ourselves. Steps 1. Lightly press with your index fingers on the points located on the dimple next to the shoulder blades. 2. Press lightly with your index fingers on the points located at the base of the neck. 3. Press lightly with your index fingers on the points located in the neck just below where the neck begins. 4. After releasing energy, the people who worked together thank each other .. '' 'Discussion: What did I notice? What did I build and need? We shared the different emotions with which we connected the exercises. Several companions were able to release emotions that they could not connect with years ago. We closed by thanking each other for our shared trust and we shared some happy moments together.
    and we shared some happy moments together.  +
  • '''Step 1: Introductions (10 min''')
    '''Step 1: Introductions (10 min''') Briefly introduce yourself and the session, then ask participants to introduce themselves and answer the following questions: What do you use your phone for? What do you want to learn in this session? Taking expectations into account, give a brief overview of the session, including objectives, what will be covered (and what not), and how much time is available. '''Step 2: The basics of mobile communication (45 min)''' The following activity allows participants to see how mobile communication actually works, and what information third parties have access to along the way. Activity: "How Mobile Communication Works" Preparation Choose whether you are going to explain 'How mobile communication works' using (1) Mobile Communication Cards or using (2) paper and pen. For either option, be prepared to demonstrate how mobile communication works in at least two scenarios: through cellular networks (voice/sms, chat apps) through Wi-Fi (eg chat apps or browsing) If not already covered, also be prepared to draw the infrastructure of the internet, including how it works when using a VPN, proxy, and Tor. It could be useful to have a diagram at hand as a guide. Cards: If you're running the Cards version of this activity, print out ready-made cards from the materials page on MyShadow.org, or create your own. You will need at least two sets: Mobile Infrastructure cards, and Internet Infrastructure cards. If the group if big, you may need to print out multiple sets. Ideally there should be one card per person. Paper and pen: If you are running this activity without cards, Make sure you have enough paper, pens and markers. There should be multiple pieces of paper per participant. Option 1 - CARDS (40 min) What does the cellular network infrastructure look like? Depending on numbers, this exercise can be done in one group or multiple groups. Give each group one set of cards and ask them to put the cards in the correct order, showing how a mobile phone connects to another mobile phone through a cellular network. Compare results and then go through the order together. Ask participants if there are specific concepts that are unclear, and clarify. How does a mobile phone connect to the internet? Using the cards, get participants to demonstrate the difference between (1) connecting to the internet through a cellular network - cell phone towers, 3G/4G - and (2) connecting through Wi-Fi. What parts of the mobile phone and mobile communications infrastructure are involved? Who has, or could have, access to what information, at which points along the way? Option 2 - PAPER AND PEN (40 min) Draw the cellular network infrastructure Hand out paper and pens to each participant, and write up some key words on the flip chart: cell phone tower, 3G/4G, telco, triangulation. Ask participants to draw what the mobile communications infrastructure looks like, showing how a text message (SMS) travels from their phone to a friend's phone. Break participants into small groups. to present their drawings to each other and discuss differences and similarities. On the flipchart, draw how how mobile communication works. This should include the baseband, 3G/4G, Cell phone towers, mobile phone provider, triangulation. Draw how a mobile phone connects to the internet Ask participants to get into small groups and together draw how a mobile phone connects to the internet (give a specific case study, eg 'connecting to a website') Groups come back together, and compare their drawings. On the flipchart, draw two ways in which a mobile phone can connect to the internet: Through the baseband, 3G/4G, Cell phone towers Through Wi-Fi Receiver, Router, internet provider, internet infrastructure. Discuss: Who has, or could have, access to what information, at which points along the way? Key concepts to cover Mobile phone infrastructure and triangulation Internet infrastructure The difference between connecting over 3G/4G (cellular networks) and Wi-Fi (internet). '''Step 3: How does a phone work? What third parties have access, to which parts? (40 min)''' The following activity looks at how a mobile phone works, and how different parts of the mobile phone are used for information collection and tracking. Activity: "Your Mobile Phone - A breakdown in 4 Layers" Preparation Make sure you have the Mobiles Reference Document. Download the pdf What is a Mobile Phone? and either print out one copy per 4-6 participants, or project the pdf onto a screen. (If you have not downloaded these from the Materials Needed section, you can find them here. Intro: What's a mobile phone? From the group, elicit components of a mobile phone and write them up on a flipchart. Possible answers could include: keyboard screen antennae SIM card microphone speaker microphone battery baseband If participants hesitate, ask targeted questions like How does the phone record your voice? (It has a microphone) How does the phone store your contacts? (It has memory, like a PC hard drive). A mobile phone in 4 layers Walk the group through each page of the pdf and clarify any terms or aspects of the mobile phone that are unclear. A detailed breakdown can be found in the Mobiles Reference Document. Focus on one layer Set the following questions for group discussion (each group only needs to answer the questions relevant to their own page): What data is created? (Only pages "Core", "Smart", "Operating System") What are the risk involved with sharing this data? (Only page "Data Traces") Who has access to this data? (All pages) What are different actions you can take to increase your privacy and security? (All pages) Bring the group together for feedback, clarifying anything that's unclear. Data traces Get particpants back into the same groups and set the following questions: For the groups with Core, Smart, and Operating System: Focusing on the items on your page, what can you do to increase your privacy and get more control over your mobile phone? For the group with Data Traces: What are the risks involved in creating and sharing these data traces? (Also think about these traces being connected together) Feedback Each group presents their findings. After each presentation, ask the other groups if there is anything they can add, and offer clarification/information where needed. Step 4: What can you do? Tips on managing your traces (20 min) Walk participants through the Hands-On Checklist of the Mobiles Reference Document. Since this is not a hands-on session, run through these as a general overview. Step 6: Mobile Communication: Consolidation Quiz (10 min) Download the Mobile Communication Quiz. The quiz can be done using a projector or by reading out the questions, or it can be done individually with printed-out forms. Step 06: Wrap up (10 min) See if anything is unclear, and answer questions Direct participants to resources Hand out Tactical Tech's Pocket Privacy for Mobiles if you have them.
    cket Privacy for Mobiles if you have them.  +
  • '''Step 1: Introductions (10 min)'''
    '''Step 1: Introductions (10 min)''' Briefly introduce yourself and the session, then ask participants to introduce themselves and to answer the following questions: What browsers do you use on your mobile, and why do you use these specific browsers? What do you want to learn in this session? Taking expectations into account, give a brief overview of the session, including objectives, what will be covered (and what not), and how much time is available. '''Step 2: The browser as two-way street (30 min)''' While the browser allows us to access the internet, it also allows others to access lots of information about us. The following activity gives an overview of how the internet works, showing shows what information third parties can see when you browse the web or send email. It then shows what others can see when you use the internet via https and via Tor. Activity: "Https and Tor" Preparation If some participants have computers (one per group), write the URL up for EFF's diagram for HTTPS and Tor: https://www.eff.org/pages/tor-and-https Alternatively, print out the diagram in each 'mode' (HTTP, HTTPS, Tor) - one set for each group. Explore HTTPS and Tor (10 min) Break participants into small groups Give the groups some time to explore the 'Tor and HTTPS' diagram, and let them discuss their findings. Feedback and discussion (20 min) Groups report back on their findings. Discussion should cover: Who has access to your data traces? What is the difference between HTTP and HTTPS? What is Tor? How does Tor anonymise your browsing and block online tracking? '''Step 3: Tracking in the browser (30 min)''' Tracking in the browser is often invisible. The following activity gives participants the chance to see how tracking works. Activity: "Visualising tracking in the browser" Preparation Make sure you are familiar with Trackography and Lightbeam. More info can be found in the Reference Document for Browsers. Make sure you have enough computers available - one per small group. Lightbeam can't be installed on a mobile phone, and Trackography only works on larger screen. On the board, write up the links for Trackography and Lightbeam, or project these onto a screen. If there is limited internet, download the Trackography movie and screen-cast Lightbeam. Explore Trackography & Lightbeam (15 min) Divide participants between Trackography and Lightbeam, breaking into smaller groups if necessary. Participants should explore the two tools, and discuss their findings. Feedback and discussion (15 min) Groups report back on what was discovered. Fill in gaps and offer explanations as needed. The following concepts should be covered: What is tracking? What type of data is being collected, and by whom? What is Profiling? How can companies track me across website? What is browser fingerprinting? (Demo EFF's Panopticlick.) Trace-routes: how data travels across the internet. Go over how the internet works, if needed. '''Step 4: Browsing on your mobile: Hands- On Session (60 min)''' Run a hands-on session that covers the following: (find detailed information in the Mobiles Reference Document) Compare, choose, and customise Go through an overview of the different browsers available for the OS you're focusing on, and then: Android: Install and customise Firefox (only browser on Android where settings can be adjusted). iPhone: Customise Safari (only browser on iPhone where settings can be adjusted). Install a VPN or Tor Android Install Orfox and Orbot Discuss alternative app stores and help participants configure their phone settings to accept apps from other sources if they want to use these alternatives. iPhone: Since Tor (via Orfox and Orbot) can not be used via an iPhone, a VPN is the next best option. Show participants how to install a VPN, and have them set one up if possible. Tips: "How to run a Hands-On Session" Preparation Test out all the tools and settings you'll be installing and/or using in the session. Find or create resources to help participants self-learn along the way. Steps Break the group according to size, number of trainers and, if relevant, operating system (e.g. Android or iPhone). Each group should have at least one trainer. Walk each group through the steps involved, in an interactive way, with step-by-step instructions or guidance projected on the wall or printed out. '''Step 5: Search engines (20 min)''' Use the following activity to help participants understand important differences between commercial and 'alternative' tools, with a focus on Search Engines. Activity: "Choosing Tools" Preparation Print a "Choosing Tools" grid for each participant - make sure it's blank! Download a grid that's been filled in already with specific tools (some can be downloaded from the Materials page at MyShadow.org), or fill in a grid yourself, depending on what tools and services you're focusing on. (eg. search engines or messaging apps). You can either print this out for participants, or project it on the wall. Brainstorm apps and tools (5 min) Briefly introduce the activity, and give each participant a blank "Choosing Tools" grid. Focusing on a specific type of service (search engines, messaging apps, etc), put participants into pairs and ask them to fill in the first column with the names of some services/apps they can think of (e.g. for messaging apps: Whatsapp, Snapchat, Signal) Go through the Evaluation Framework (20 min) Using one services/app (eg Whatsapp) as an example, walk the group through each category step by step, explaining concepts and answering questions as they arise. Get participants back into pairs and give them time to fill in the rest of the grid. Give them a filled-in grid to compare their own against, and answer any questions. Discuss: How do you decide which tool best suits your own needs? (10 min) Lead a discussion that covers the following: When choosing a tool, it's important to think about what data you want to "protect". It can be useful to think about this within four broad categories: identity, social networks, content, and location. A tool might, for example, protect your content with encryption, but might also require access to specific information like your phone number, making it impossible to use pseudonymously or anonymously. If pseudonymity/anonymity is what you need, then a different tool might suit your needs better. '''Step 6: Strategies of Resistance (30 min)''' Use the following activity to guide participants through key strategies for taking more control of the data they share with commercial companies. Adapt it so that it specifically focuses on Browsing. Activity: "Strategies of Resistance" Preparation Prepare to present the four categories of resistance. Have a full list of examples for each one. Decide which area you would like the group to focus on (for example browser tracking, location tracking, mobile phones in general, etc). Four types of resistance (15 min) Ask participants for a few ways they have tried to increase their privacy online. Put some of these on the board. Use the examples on the board to lay out four broad strategies of resistance: Reduction (Reduce) Obfuscation (Confuse/Create noise) Compartimentalisation (Separate) Fortification (Fortify) Brainstorm strategies (20 min) Split participants into four groups, and give each group one of the four strategies: Reduction, Obfuscation, Compartmentalisation, Fortification. Set the focus area. Each group should brainstorm ways in which they can reduce / obfuscate / compartmentalise /fortify their data in this area. Feedback: presentations (15 min) Each group reports back to the entire group in a 2-3 minute presentation. Discussion (10 min) Lead a brief discussion on the benefits and limitations of each strategy, feeding in where necessary. Step 7: Wrap up (15 min) See if anything is unclear, and answer questions Direct participants to resources Hand out Tactical Tech's Pocket Privacy guide for Mobiles if you have them.
    rivacy guide for Mobiles if you have them.  +
  • * Get everyone to sit in a circle * Distri
    * Get everyone to sit in a circle * Distribute sticky notes and pens * Ask everyone to write your earliest memory of using, seeing, or interacting with technology, with your rough age, and the device you used. * Then go round the circle and (depending on how many people are present) – ask people to read out their answers. * If there are too many people present, ask for volunteers to put their hands up, and read out their answers. If the exercise stimulates discussion around certain stereotypes, the facilitator can also make a list of these at the front of the group.
    a list of these at the front of the group.  +
  • 1) First briefly explain what an install p
    1) First briefly explain what an install party is and also explain P2P systems to share data (i.e. not mediated by a central server). Ask if participants in the room can explain those concepts in their own words. Then describe parallels between proprietary software systems where the code is closed and cannot be reviewed or modified and heterosexual sex-gender systems (we know how they work but we can not easily change them). Brief discussion. (10 minutes) 2) Start the install party. Each person writes on post-its (or in a usb scheme, see document attached) concepts that have to do with gender, feminism, sexual dissidence, sexuality, or any specific knowledge/skills they can share with another person. One copy of these post-its / identifiers is posted on a wall and another on their body. After that every person writes a concept, situation, habit they want to remove or "un-install" (for instance patriarchy, sexism, transphobia etc) . They also stick one copy on their body and another one on the wall. (10 minutes) Give the group time to review the different concepts (installing and un-installing) on the wall. Check for repetitions and unify/cluster concepts. (10 minutes) 3) The installation begins. The group has to be divided into two groups, one will be the first "installers" and the other group will be "installed". The people in the "installed" group are individually choosing a concept they wish to install /learn and will have to look for the person who has that post it note on their body. Every person from the "installed" group then talks to their "installer" for 5 minutes. After this 5 minute session the "installed" person can become an "installer" of that concept to other persons, placing the post-it sign on their body. It is possible that during the installation several people want to install the same concept at the same time. If so, they can form a group where the "installer" can do a group installation. The dynamic is free and organic, the group adjusts to its own pace. Although this exercise is mainly about finding out about new concepts, it is also interesting to find new edges and perspectives to familiar concepts. The installation becomes an opportunity to exchange and amplify the understandings and practical experience around the freedoms of free software applied to gender codes. This exercise should last for about 40-60 minutes. Finish with a round of evaluation, impressions, and learnings (10 minutes)
    n, impressions, and learnings (10 minutes)  +
  • 1) Se explica brevemente una install party
    1) Se explica brevemente una install party, y los sistemas de P2P de compartir datos (no mediados por un servidor que centraliza). Se pregunta si alguna de las participantes sabe para que lo explique con sus palabras. Se describe los sistemas de software privativos donde el código está cerrado y sus pararlelos con los sistemas de sexo-género heterosexualizantes (sabemos cómo funcionan pero no podemos modificarlos claramente). Breve debate. (10 minutos) 2) Empieza la install party. Cada persona escribe en post-it's (o en un esquema de usb) de un color un conceptos que tenga que ver con el género, el feminismo, la disidencia sexual, la sexualidad, o un conocimiento que pueda compartir con otra persona, cuyo significado conozca y pueda explicar, aunque sea de una forma poco académica o formal. Una copia de estos post-it's/identificadores se irán pegando sobre el muro. Por otra parte escribirá un concepto, situación, hábito que sepa desinstalar, que pueda explicar a otra cómo buscar hacerlo. Tmbién lo pega en su cuerpo y otra copia en el muro. (5 minutos) Se toma un tiempo para agrupar los conceptos del muro. Se revisa si hay algunos repetidos y se unifican. (10 minutos) 3) Empieza la instalación. Ha de dividirse el grupo más o menos en dos partes, una de quienes serán las primeras “instaladoras” y otro de quienes serán “instaladas”. El grupo de “instaladas” va, individualmente, eligiendo un concepto que desea instalarse/aprender o desintalarse/desaprender para buscar a la persona que tiene aquel signo en su cuerpo. Se reúne con ella y durante unos 5 minutos mantienen una conversación de transferencia en torno a ese concepto. Tras esos 5 minutos la persona “instalada” ya puede convertirse en “instaladora” de ese concepto, colocándose la señal iconográfica (o post-it) en su cuerpo. Es posible que durante la instalación varias personas deseen instalarse el mismo concepto a la vez, en ese caso, podrán ir en grupo donde la “instaladora” para hacer una transferencia más colectiva. La dinámica es libre y orgánica, el grupo se va acomodando. Si bien al principio se busca colectivizar algunos conceptos, también es interesante recibir conceptos que una ya conoce para aprender nuevas aristas del mismo. La instalación se vuelve una situación de intercambio, de amplificación de las comprensiones y de experiencia práctica en torno a las libertades del software libre aplicadas al género.. Esta dinámica se puede extender durante unos 40-60 minutos. Para finalizar se hace una ronda de evaluación, impresiones, aprendizajes (10 minutos)
    ón, impresiones, aprendizajes (10 minutos)  +
  • A partir de la educación popular se planteará una discusión sobre lo que implica pensar desde la defensa personal feminista la seguridad digital y su integración  +
  • Actividad #1: Presentación y juego - Tras
    Actividad #1: Presentación y juego - Tras una presentación rápida del grupo de participantes, se puede hacer una dinámica más corporal para romper el hielo y buscar inspiración maquínica y ficcional en las participantes. Una posibilidad es simular la construcción colectiva de una máquina en la que cada persona representa una parte (simulando el sonido y movimiento de dicha parte). Actividad #2: Crear las características del mundo - Previamente se han creado categorías: funcionalidades, adjetivos, materiales, personajes, espacios físicos, formas de uso, etc. Pueden crearse tantas categorías como se desee, lo importante es que sean complementarias entre ellas. - Cada persona agrega elementos a cada una de estas categorías, es una dinámica tipo "lluvia de ideas" Actividad #3: Combinar características para crear otros mundos - A partir de la combinatoria de las categorías que emergen en la lluvia de ideas, se van desarrollando los engendros combinatorios. Por ejemplo, si me ha salido la combinación: funcionalidad de tragar sapos + adjetivo de suave + material de madera + espacio físico dentro de mi cerebro; entonces deberé desarrollar un artefacto o personaje que corresponda a estas características, por ejemplo: "Dentro de mi cerebro hay un cubo de madera muy suave que se traga y hace desaparecer todos los sapos que hipotéticamente se convertirían en príncipes azules" Actividad #4: Dar cuerpo a los engendros - Con los resultados de la actividad #3 se pueden hacer distintas cosas, esto ya dependerá del tiempo disponible y de la planificación que se haya hecho. Posibles aplicaciones son: * Realizar dibujos a partir de la combinación de categorías * Realizar modelado tridimensional con plastilina * Realizar collages con recortes y fotos Actividad #5: Escribir historias - Por medio de la técnica del "cadáver exquisito": https://es.wikipedia.org/wiki/Cad%C3%A1ver_exquisito o por medio de la escritura individual se van desarrollando narraciones en las que aparezcan y actúen los engendros desarrollados
    ezcan y actúen los engendros desarrollados  +
  • Ask participants to get into pairs, and br
    Ask participants to get into pairs, and brainstorm answers to the following questions: * Why do you want to be a trainer * What are the qualities of a good trainer? * Which of these qualities do you think you have? It might be helpful to give the participants post it notes to write their answers down on – especially the different qualities, and to cluster them at the end of the partner work. After 15-20 minutes in pairs, bring the group back to plenary, and ask them to report back on what they discussed, by going through the three questions again. Think about the following question in the big group, and bring these up for a group discussion: Does it take a certain type of personality to be a good trainer? As a wrap up, try to lead the participants to the understanding that with patience and self awareness, anyone can be a good trainer – people need to be committed to learning and improving their training styles throughout the process, though.
    ing styles throughout the process, though.  +
  • Ask participants to get into the same grou
    Ask participants to get into the same groups as for the Training Skills II session, with the same situational specifications (day length and participant profile). Explain that this is an exercise on prioritisation – given financial constraints, how would we decide to spend our funds? Give each group the same amount of (limited) funds for them to decide to spend on either: * another international trainer * a translator * boosted internet service * one more day of training * comfort material, like snacks * comfortable accommodation Groups have 15 minutes to decide how they will use their money, then come back into plenary and ask one person from each group to explain their decision. Encourage the group to debate these decisions.
    urage the group to debate these decisions.  +
  • Ask participants to spend 10 minutes drawi
    Ask participants to spend 10 minutes drawing on a piece of paper what they think the internet looks like, using (if available) a variety of coloured pens- as abstract, literal or imaginative as they like. After everyone has finished their drawings, hang them on the wall in a gallery for others to look at, and ask the people who drew each one to explain a little their reasoning behind their interpretation of the internet.
    hind their interpretation of the internet.  +
  • Ask people to get into small (3-4 person)
    Ask people to get into small (3-4 person) groups, and think about experience they've had where they have felt marginalised in their communities. This might be anything from microaggressions at work, not feeling able to speak up, or blatant forms of discrimination. To the extent that they all feel comfortable, go around the group and ask people to share these experiences. If they don't feel comfortable sharing their own, talking about experiences they have heard about from others, is also a valuable contribution. The exercise is primarily one around listening and sharing in small groups- if the group is already close, then sharing back in the big group might also be appropriate, but this is not a necessary part of the exercise. Coming back to the big group, the facilitator could ask: * What have you learned, from hearing from others in your group? * Does anyone feel comfortable sharing their experiences with the bigger group? * (Especially for those for whom these experiences might be new) - has this changed your perspective at all?
    has this changed your perspective at all?  +
  • Assuming participants have already put som
    Assuming participants have already put some thought into their chosen suggestions for the 'herstory' exhibition – ask everyone to put their pictures up around the room, like in a gallery. If participants don't have big photos to put up, encourage them to draw their own interpretations and label them with the name of the woman and the country she comes from. Walk around the “gallery” with participants and encourage whoever put up different pictures to tell the group about them and the work they did. Afterwards, collect up these names and make them into a slidedeck for others to use in the future.
    slidedeck for others to use in the future.  +
  • Begin session with giving some context to
    Begin session with giving some context to the history of quantification of bodies in 19th C Europe. Always good to customise this with a lot of local examples and contextually relevant material, for example, in the Asian GTI, we used examples from the colonial history of the region. Presentation: - Europe, 1800s-1900s – through industry, scientific advancement etc human knowledge and grasp of various anatomical realities – an idea of God was displaced. There was an explosion of ‘rationality’, ‘scientific’ truth... While mathematics is ancient, the way of cataloging and organising information is relatively modern that started in this period. Thus a growth of libraries, cataloging systems, indexing systems, field guides, and so on. - These advancements in discovery, invention, science - These times were also marked by slavery and colonial empires - All these ideas of development, change, transformation etc changed the European mindset – they came to think of themselves as superior. This is known as Social Darwinism. - The interaction between society and tech; it is not just a one-way thing,that tech creates an influence on society, but societies also shape, and re-shape technologies. - The emphasis on measurement, classification, numbering, naming, indexing led to the identification of norms, 'the normal', and outliers. This was not just about numbers, but was extended to people based on their behaviour. Criminals, prostitutes, the mentally unwell etc. these people were social ‘deviants’ and there was also an interest in carrying out scientific testing and experiments on these deviants to ‘understand’ them better. They were also considered as not valuable to the 'efficient' direction in which early modern European society was going. - One example of a sub-discipline developing within criminology was Bertillonage. Andre Bertillon started studying criminal’s bodies, physiognomy etc (size of head, size of ears, placement of ears on the side of the head, size of the lips etc) in prison to try and discern patterns between the physical make-up of criminals and the crimes they had committed, as well as compared to the general population. - Another example that connects these practices with colonialism was the story of Sarah Baartman: she was brought from South Africa as an exhibit to the paraded, measured (movie reference: Venus Noir). In Asia, while the above was documented more in the African context, the colonisers did census and gathered finger-prints to gather knowledge about the ‘natives’. - Photography developed as a medium, a volatile medium because it is so unstable, through which bodies were documented and identified. Present day examples of how race intersects with this unstable medium : the Apple watch, the Shirley Card for lighting in photography The session then moves on to the present day, looking at recent practices of quantification and big data. - The body becomes the best way to prove your identity, it becomes a very clear marker. Body scanning, facial recognition, fingerprinting, biometric databases etc. India has constructed the world's largest biometric database, called Aadhaar. - At the same time, the Quantified Self Movement sought to bring the control and power of quantification to the self; to quantify the self, to gather this knowledge as ‘self knowledge’. It started in 2007, founded by Kevin Kelly and Gary Wolff, were editors of Wired Magazine. - Fitbits and Unfitbits But who owns this data? How secure is this data? To creatively counter these narratives, there are two artist projects which challenge the notions of personal quantification. Session then moves on to an exercise: Exploring Menstruation Apps Ask participants to get into as many groups as there are apps to discuss; generally, it works well to have 4-5 people per group. Each group should be assigned one app from the list mentioned in the Arrow journal (see resources below) OR identify new/current/local apps based on your own knowledge of the landscape. Ask the group to spend 20 minutes finding out the following based on a review of the app, the privacy policy, and online searches - What the app does - What kinds of data it collects about the user - Where the data is stored - Who owns the data and what they do with it - Who made the app, and what are their motivations for it? Once the groups have completed the exercise, bring everyone back together for a feedback and review session.
    ogether for a feedback and review session.  +
  • Concentration exercise: We listen to a did
    Concentration exercise: We listen to a didactic radio capsule to make our breath conscious '' 'Exercises: 1. Hold the body' '' This exercise is carried out with a partner to bring peace and calm at moments of acute stress, anxiety, fear, despondency and in other situations. By using this technique, a direct connection is made with the energy of the person affected, therefore it is necessary to be very focused, calm and aware that we will share love, peace, harmony and tranquillity with our companion. Before we begin, we have to concentrate, so to start there is a short two-minute meditation with eyes closed. ''Steps:''' 1. Hold the forehead and base of your partner's skull, placing the hands gently without touching the head for for 3 to 5 minutes. (?? - is this possible?) 2. Hold the crown of the head with your fingertips on the forehead for 3 to 5 minutes. 3. Hold the shoulders for 3 to 5 minutes. 4. Hold the point over the sternum (chest) and behind the heart (back) for 3 to 5 minutes. '' 'Exercises: 2. "Switching" (guided imagination)' '' To focus the flow of energy '''Steps:''' Sit comfortably and breathe deeply. Cross your left ankle over your right ankle. Extend your hands to the front then turn your hands with thumbs towards the earth. Cross your right hand over your left hand, interlacing the fingers of your hands to form a fist. With your fist touch the center of your sternum. Close your eyes, breathe deeply and relax the entire body. Imagine that you can go down to a place in the center of your being. (You can imagine a center below the navel in the center of the abdomen.) For the people of China this center is called the Dantien. For people from India this is called la Hara). Relax the tongue inside the mouth and with the tip of the tongue touch behind the upper teeth. Breathe deeply and let go of all thoughts. Rest in peace and deep silence for a few minutes. After two or three minutes, relax your hands and place them on your legs. Take a deep breath and slowly open your eyes. Stretch your hands and arms. '' 'Discussion: Effect of stress and trauma on hacktivists' '' We share the importance of being able to connect with yourself, with your emotions and how powerful meditation is to help this. We share diverse experiences of stress, care, lack of care and impacts on the bodies of activists. '''Closing:''' We close the session with an exercise of collective containment, hugging and "mesándonos" (needs explanation) in circle.
    mesándonos" (needs explanation) in circle.  +
  • Distribute big sheets of paper to particip
    Distribute big sheets of paper to participants and ask them to draw a typical day in their lives – preferably a busy day, listing/illustrating all activities that they regularly do, such as commuting to work, working, eating, etc. After their 'day schedule' is complete, ask them to add in who they interact with at different steps of the day. Then, ask them to mark in a different colour, the steps of the day at which they feel insecure. Encourage them to look at each other's papers and, if there is time, explain through a couple of the steps. Is there anything that has come from this exercise that surprises them? The facilitator could then explain the idea of security – or the need to be secure – as a holistic concept, rather than one to be thought of just in terms of 'digital security'.
    ht of just in terms of 'digital security'.  +
  • Distribute big sheets of paper to particip
    Distribute big sheets of paper to participants. Ask them to draw a typical participant who might attend one of their trainings – if it helps, encourage them to remember past, real participants, and base this upon them. Ask them to label the following areas of the body with the following topics: On the ground: (ie. Getting context) * where are they coming from? * what are the problems weighing them down? * chest area: fears, values, what's important to them? * right hand: what skills are they bringing? * left hand: what skills do they need? * head: (left of head) what do they need to know? (inside the head) what do they want to know? (right of head) what do they know? Once participants have drawn their 'typical participant', get them together in smaller groups of 3-4 people, and talk through the differences in their typical participants and how this might affect the structure and style of their workshop. (note: try to avoid 'content' for now). After 15-20 minutes, bring the group back to plenary, and ask people to think through and discuss how they knew this information about participants, and how easy it is to get this understanding in time to help really design the workshop, when meeting a new group of workshop attendees. Try and come up with a list of points of how to get this information, and how different data points about the attendees would inform various workshop style and strategy decisions.
    ous workshop style and strategy decisions.  +
  • Divide the participants into small groups
    Divide the participants into small groups – 4 or 5 people, and ask them to create a real or fictitious story around security or self care. The format for presentation is a theatre piece, a 'fireside story', a drawing or comic strip – the most important part is that every member of the group is taking part in the storytelling. Facilitators should encourage participants to ensure agency – we all have our own power, we face risks, but we have responses – and encourage these themes to be used in the stories we tell. Groups are given 45 minutes to come up with a short story to then perform back to the group as a whole.
    then perform back to the group as a whole.  +
  • Durante unos minutos, bailamos juntas al s
    Durante unos minutos, bailamos juntas al sonido de tambores relajantes porque como dice Emma Goldman, Jane Barry y Jelena Dordevic : ¿De que sirve la revoluciónsi no podemos bailar? '''Ejercicio 1. Abrazar los dedos''' Escuchamos una capsula radiofónica didáctica. '''Resumen:''' Cuando sientes una emoción fuerte, abraza tu dedo con la otra mano y sostenlo por 2-5 minutos hasta que el nivel de la emoción baje. Por cada dedo existe una conexión de la energía que corresponde a una emoción como los mostramos de la siguiente manera: '''Pulgar:''' es para las lagrimas, dolor y pena emocional. Agarrarse los dedos no impide las lagrimas o el dolor, pero permite que la energía se mueva hasta que la persona se calma. Agarra el pulgar, respira profundamente y exhala el dolor y la pena que sientes. Agárrate el dedo hasta que sientas un pulsación de energía. '''Índice:''' es para el miedo, es importante escuchar el miedo como una/o escucharía a un guía. El miedo puede decirnos muchas cosas sobre vuestro medio ambiente, nuestro bienestar físico y nuestro crecimiento. Es lo que hacemos con el miedo lo que es importante. Si tienes miedo, en vez de paralizarse, agarra tu dedo índice para tomar una decisión sabia en la situación – huir, quedarse o reaccionar. Con el estrés traumático una persona puede sentir pánico continuamente en su cuerpomente-espíritu. Usar el dedo índice es una buena manera de aprender como trabajar con el miedo, en vez de ser una victima del miedo. Mientras te agarras el dedo índice, exhala y deja ir el miedo, e inhala coraje y fuerza de ser. '''Medio:''' es para la cólera y la rabia. La cólera es una emoción natural y normal en muchas situaciones, La furia puede dar como resultado la violencia hacia otras o hacia nosotras mismas. La ira reprimida o la negación de nuestras propias profundidades de furia, puede resultar en un comportamiento pasivo-agresivo o en muchos síntomas físicos en el cuerpo que incluyen artritis, ulceras, migrañas y nudos en los músculos de varias partes del cuerpo. Agárrate el dedo del medio, exhale y deja ir toda la furia y la cólera, inhala energía y pasión creativa en tu ser. '''Anular:''' es para la ansiedad y el nerviosismo. Como mucha gente inconscientemente juega con sus anulares cuando está afligida y molesta por el constante ruido mental. El anular ayuda a descargar la innecesaria aflicción y ansiedad, guardando la energía para la acción. Respira profundamente y agarra tu anular. Exhala, dejando ir todas las preocupaciones y ansiedad. Inhala con un profundo sentido de paz y seguridad en medio de los problemas de la vida, sabiendo que estas respaldada y cuidada espiritualmente '''Meñique:''' es para la autoestima cuando una se siente victima de las circunstancias. Sujetate el meñique es una manera de controlar los sentimientos de indignidad y baja autoestima. Para dejar de sentirte como victima, es importante primero reconocer lo que se consigue cuando uno se siente de esa manera – atención, lastima, la preocupación de las otras. Situarte en un estado de poder y autoestima da muchas recompensas y un verdadero sentido de aprecio ante los ojos de las demás. Agárrate el meñique, respira profundamente, exhala y deja ir la inseguridad y la falta de autoestima. '''Ejercicios: 2. Descargar ansiedad''' Las técnicas para la liberación emocional son muy útiles para desbloquear y sanar emociones fuertes, miedos, ansiedad, dolor emocional, enojos, memorias traumáticas,fobias y adicciones, así como para aliviar, síntomas de dolor, como el dolor de cabeza o dolor del cuerpo. La técnica se basa en la teoría del campo de energía del cuerpo, mente y espíritu, junto a la teoría del meridiano de la medicina oriental. Los problemas, traumas, ansiedad y dolor pueden causar un bloqueo en el recorrido de la energía en el cuerpo. Con golpecitos o acupresión en los puntos conectados conlos canales o meridianos de energía pueden ayudar a desbloquear la energía congestionada y promover un recorrido fluido o sano de energía en el cuerpo yen el campo mental. '''Pasos:''' * Sientate muy comoda, sin cruzar pies * Piensa en un problema que pueda servirpara medir su nivel de ansiedad: Elije para trabajar un problema, una preocupación, una fobia, una ansiedad, unamemoria traumática, o algún pensamiento negativo. * Usando una escala de 0 a 10 mide el nivel de ansiedad que siente cuando piensa en elasunto. (0 = nada de ansiedad y 10 = máximo nivel de ansiedad). * Da de 7 o 9 golpecitos a los puntos de acupresión abajo identificados * Respira profundamente mientras das los toquecitos con los dedos índice y medio en lospuntos indicados: 1. Los puntos donde empiezan las cejas 2. Los puntos donde terminan las cejas 3. Los puntos en los pómulos, debajo de las pupilas 4. El punto debajo de la nariz 5. El punto en la barbilla, debajo de los labios 6. Los puntos unos 10cm, debajo de las axilas 7. Los puntos debajo de las clavículas por el esternón. * Toca el punto que se encuentra al lado dela mano y repite 3 veces: “A pesar de que tengo este problema, estoy bien, y lo trabajo!” * Vuelve a repetir la secuencia presentada enlos puntos 2 y 3: * Repite esta secuencia hasta que su nivel de ansiedad haya bajado a 0-2 * Date un masaje suave en el “punto adolorido” que seencuentra al lado izquierdo del pecho, unos 5cm debajo del lado izquierdo de laclavícula y 4 o 5 cm al lado del esternón.
    clavícula y 4 o 5 cm al lado del esternón.  +
  • Ejercicio de concentración: Escuchamos una
    Ejercicio de concentración: Escuchamos una cápsula radiofónica didáctica para hacer consciente nuestra respiración '''Ejercicios: 1. Sostener el cuerpo''' Esta técnica aporta paz y tranquilidad a las personas que atraviesan por un momento de estrés agudo situación de ansiedad, temor, tristeza, desaliento etc. La podemos utilizar para bajar una situación de crisis con una compañera A través de esta técnica se hace una conexión directa con la energía de la persona afectada, por lo tanto es necesario estar muy centradas tranquila y consciente de que vamos a compartir amor, paz armonía y tranquilidad con nuestracompañera. Antes de empezar, me tengo que concentrar, una pequeña meditación de dos minutos conlos ojos cerrados y también protegerme. '''Pasos:''' 1. Sostener la frente y la base del cráneo, colocando las manos suavemente sin tocar la cabeza. Por 3 a 5 minutos. 2. Sostener la coronilla con la punta de los dedos sobre la frente. Por 3 a 5 minutos. 3. Sostener los hombros. Por 3 a 5 minutos. 4. Sostener la parte sobre el esternón (pecho) y detrás del corazón (espalda). Por 3 a 5 minutos. '''Ejercicios: 2. "Switching" (fantasía guiada)''' Para centrarse ocorregir el flujo de energía '''Pasos:''' Sientate cómodamente y respira profundo. Cruza el tobillo izquierdo sobre el tobillo derecho Extiende las manos hacia el frente. Da una vuelta con las manos con los pulgares dirigidos hacia la tierra. Cruza la mano derecha sobre la mano izquierda. Entrelaza los dedos de las manos formando un puño. Con un puño de las manos toca el centro de tu esternón. Cierra los ojos, respira profundo y relaja todo el cuerpo. Imagina que te puedes bajar hacia un lugar en el centro de tu ser. (Te puedes imaginar un centro debajo del ombligo en el centro del abdomen. Para la gente de China este centro se llama el Dantien. Para la gente de India es la Hara.) Relaja la lengua adentro de la boca y con la punta de la lengua toca detrás de los dientes superiores. Respira profundo y deja ir todo los pensamientos. Descansa en paz y en silencio profundo por algunos minutos. Después de dos o tres minutos, relaja las manos encima de las piernas. Respira profundo y despacio abre los ojos. Estira las manos y los brazos. '''Discusión: Efecto del estrés y trauma en hacktivistas''' Compartimos la importancia de poder conectarse con una misma, con sus emociones y lo potente que es para ello las meditaciones. Compartimos diversas experiencias de estrés, cuidado, falta de cuidado e impactos en los cuerpos de las activistas '''Cierre:''' Cerramos la sesión con un ejercicio de contención colectivo abrazándonos y mesándonos en circulo.
    ivo abrazándonos y mesándonos en circulo.  +
  • For a few minutes, we danced together to t
    For a few minutes, we danced together to the sound of relaxing drums because, as Emma Goldman, Jane Barry and Jelena Dordevic put it: What good is revolution, if we can not dance? Exercise 1. Embrace Fingers We listen to an audio recording. Summary: When you feel a strong emotion, grasp your fingers on one hand with the other hand and hold for 2-5 minutes until the level of emotion drops. For each finger there is a connection of energy that corresponds to an emotion: Thumb: is for tears, pain and emotional pain. Holding fingers does not prevent tears or pain, but allows the energy to move until the person calms down. Grab your thumb, breathe deeply and exhale the pain and the sorrow you feel. Hold your thumb until you feel a pulse of energy. Index: is for fear - it is important to listen to the fear as one would hear a guide. Fear can tell us many things about our environment, our physical well being and our growth. It is what we do with fear that is important. If you are afraid, instead of feeling paralyzed, grab your index finger to make a good decision at critical moments - run away, stay or react. With traumatic stress a person can feel trapped in a spiral of mental and physical panic. Using the index finger is a good way to learn how to work with fear, rather than be a victim of fear. As you hold your index finger, exhale and let go of fear, and inhale courage and strength. Medium: is for anger and rage. Anger is a natural and normal emotion in many situations. Fury can result in violence toward others or toward ourselves. Suppressed anger or denial of our own depths of fury can result in passive-aggressive behavior or many physical symptoms in the body, including arthritis, ulcers, migraines, and knots in the muscles of various parts of the body. Hold your middle finger, exhale and let go of all the fury and anger, inhale energy and creative passion in your being. Override: is for anxiety and nervousness, such as when people unconsciously play with their ringtones when they are afflicted and annoyed by the constant mental noise around them. Annulment helps to discharge unnecessary distress and anxiety, saving energy for action. Take a deep breath and grab your ring finger. Exhale, and let go of all your worries and anxiety. Inhale with a deep sense of peace and security amid the problems of life, knowing that you are spiritually supported and cared for. Little finger: is for self-esteem when one feels victimized by circumstances. Holding the little finger is a way to control feelings of unworthiness and low self-esteem. To stop feeling like a victim, it is important to first recognize what you get when you feel that way - attention, hurt, the concern of others. Placing yourself in a state of power and self-esteem gives you many rewards and a true sense of appreciation in the eyes of others. Hold your little finger, breathe deeply, exhale and let go of insecurity and low self-esteem. Exercises: 2. Download Anxiety Emotional release techniques are very useful to unlock and heal strong negative emotions; fears, anxiety, emotional pain, anger, traumatic memories, phobias and addictions, as well as to alleviate pain symptoms such as headache or body pain. This technique is based on the theory of the energy field of the body, mind and spirit, together with the meridian theory of oriental medicine. Problems, traumas, anxiety and pain can cause a blockage in the travel of energy in the body. Tapping or acupressure at the points connected to the energy channels or meridians can help unlock the congested energy and promote a fluid or healthy flow of energy through the body and mind. Steps: Sit very comfortably without crossing your feet Think of a problem that can be used to measure your level of anxiety: Choose to work on a problem, a concern, a phobia, an anxiety, a traumatic memory, or some negative thinking. Using a scale of 0 to 10 measure the level of anxiety you feel when you think about it. (0 = no anxiety and 10 = maximum anxiety level). Give 7 or 9 taps to the acupressure points identified below Breathe deeply as you tap the fingers with your index and middle fingers at these points: 1. The points where the eyebrows begin 2. The points where the eyebrows end 3. The points on the cheekbones, under the pupils 4. The point under the nose 5. The point on the chin, under the lips 6. The points about 10cm below the armpits 7. The points below the clavicle (collar bone) by the sternum. Touch the dot next to your hand and repeat 3 times: "Even though I have this problem, I'm fine, and I work it!" Repeat the sequence presented in points 2 and 3: Repeat this sequence until your anxiety level has dropped to 0-2 Give a gentle massage on the "sore spot" that lies on the left side of the chest, about 5cm below the left side of the clavicle (collar bone) and 4 or 5cm along from the sternum.
    bone) and 4 or 5cm along from the sternum.  +
  • Get the participants (presumably a reasona
    Get the participants (presumably a reasonably small group) to sit in a circle. Go around the group and ask people to introduce themselves, and what drew them to the session. If relevant, ask them to mention whether they have had any past experience specific to this topic or another related one. Facilitators could write on a flipchart at the front of the room a list of questions that are raised about the topics – such as, * Research methods * Connection between online and offline violence * Definition of violence against women online * Datasets available on violence against women The session is intended more as a discussion space than a workshop session – so, if the discussion moves in a different direction, let participants air their concerns and questions.
    icipants air their concerns and questions.  +
  • Get the participants to sit in a circle. T
    Get the participants to sit in a circle. The facilitator should explain what is meant by 'self care' and the concept of holistic security – not just thinking about security online, but in all aspects of our lives. They could also touch on issues like the 'martyr complex' – thinking that the needs of an individual are far smaller than the greater cause. Ask the group if any of these problems sound familiar, and encourage the group to raise their hands and talk about their own experiences. Once a few experiences have been shared, move the discussion to think about strategies to deal with these kinds of problems. The facilitator could write down on a big flipchart some of the most popular strategies – such as looking after each other in groups, being aware of the pressure we put our colleagues under.
    the pressure we put our colleagues under.  +
  • Give participants different characters, su
    Give participants different characters, such as: * Users * ISPs * Google * Facebook * Yahoo etc / other companies The aim of the exercise is to “send” and “receive” messages through the chain of participants. A simplified version of this chain is: 1. The sender sending a message on gmail 2. ISP 3. Google 4. ISP 5. Yahoo 6. ISP 7. Receiver getting the message on Yahoo. Get participants to stand in this order, and pass an unencrypted 'message' between them – and make it clear to them that every single one of them is able to read the message that is sent by the user without any trouble at all. Next, get participants to send an encrypted message between them – this time, only the sender and the receiver are able to see the message. Emphasise that the internet is a communication platform and nothing else. There are certain elements you cannot do without; and two basic components that could expose an identity are 'to' and 'from'. Stuck with this model, there are two things that can be done – we can do it be aware of the model that we're using, and we can rely on tools. Also, think about the following aspects: 1)Identity (you can change this) 2)Location (there are tools that can be used) 3)Channel (cannot control this one, very difficult to control). Either they are owned by governments or can be controlled by governments. Which is the lesser evil of the channels that you can choose. Encryption is passing through a channel but it is wrapped in a protocol. 4)The message (metadata is important here, as it might put you at risk)/ Metadata is the information about information. A digital photo has metadata, for example, the date it was taken, the name, the camera that took the photo.
    the name, the camera that took the photo.  +
  • Give participants post it notes, and ask t
    Give participants post it notes, and ask them to write down on three things that the group needs in order to create a safe space this week, with one issue on one post it note. Ask everyone to put the post it notes up on a wall, and cluster them according to themes. Once a few main themes have come out of the clustering exercise, write these up on the flip chart, and ask people to come up with concrete examples of when these themes or issues might come up – for example, 'respect at all times' could have the concrete example of 'showing up on time', 'putting mobile phones on 'silent''. Build out the themes to have a number of concrete examples or smaller parts to them that can then be displayed around the main room as a shared agreement. Ask people whether they agree with all parts, or whether there is anything they would add, before putting it up, and get a group agreement that all participants will abide by terms that everyone has come up with here.
    terms that everyone has come up with here.  +
  • Ideally: take a polaroid picture of each p
    Ideally: take a polaroid picture of each participant, and write some 'metadata' on it – the place the photo was taken, the time, and the kind of camera used to take the photo. If facilitators can't get hold of a polaroid camera, then ask participants to bring in a photo of themselves to the session, that (ideally) they don't mind writing on and using for the session. Once metadata has been put on the photos of participants, give them back to the participants, along with a big sheet of paper and glue, and ask participants to draw the different data shadows and traces that they leave, associated with devices and online services that they use. If possible, provide people with a variety of art materials – glitter, coloured pens, stickers, etc, and encourage them to use anything they like to express and visualise their data shadows.
    express and visualise their data shadows.  +
  • Introduction: (15 mins) Start with the di
    Introduction: (15 mins) Start with the disclaimer: (and this is really key!) - If you decide to do data detox please be aware that you may find information about yourself that you did not know was online, and this may be distressing for you. We explain that this is structured as an eight day program, but we will only be doing a two hour 'taster' session to give people a feel of what it is like, and how they can continue to use it in their own locations. In this session, we started by giving a background to the development of the DDKit within the context of Tactical Tech's Glass Room and My Shadow program; and the objective of this intervention and program to raise awareness about 'data shadows' and 'traces', what they mean, and how to control them in the interest of privacy. There are details about the Glass Room online here: https://tacticaltech.org/projects/glass-room and about data shadows and why they matter here: https://myshadow.org However, if you don't know much about the Glass Room, you can just start with MyShadow and what it is about, and the move to the Data Detox Kit. Activity1. Intro to the Data Detox (15 mins) All the participants go to https://myshadow.org/ckeditor_assets/attachments/189/datadetoxkit_optimized_01.pdf and do the personal activity listed at the start and do the activity under 'Discovery: Day 1'. . Familiarise yourself with the kit and its layout. Participants feedback after activity: - what did they feel? - what did they discover? - how much of this was new to them? - what was the most surprising? Activity 2 (20 mins) - Get participants into pairs and assign each pair one of the days of the data detox kit. If there are a lot of people, you can assign more than one group a particular day. In the GTI in Malaysia in 2017, we focused on Days 2,34,5. Depending on how long the session is, you can increase it, ie do more sections of the DDK on a second day or later session - Alert people to the Appendix section at the end that offers some helpful tips on how to find settings on various operating systems on their devices. Report Back – 30 mins - Each group reports back talking about what they learned, what they could and could not do (technically), the technologies or terms they need help with. Activity 3. Brand New You. ( 15 mins) : - Ask participants to form new pairs, or small groups of three people max. - Ask them to look through Day 7 of the Data Detox Kit and talk about what they think is doable, or not, what they might want to do themselves,. and how they would practically go about it, what kinds of support they would potentially need, or skills, or information. - Ask the group to report back, but not in detail, just about their discussion. End of the session
    t their discussion. End of the session  +
  • Line up all participants on either a line
    Line up all participants on either a line in the middle of the room, or on the middle step. Facilitator reads out various statements regarding access to/privilege in technology, and participants are asked to take one step forward if this is true for them, or one step back if not. Sample: * I had a computer at home when I was growing up * Where I live, I have good, consistent access to the internet * I was under the age of 10 when I first accessed a computer * I have my own laptop now * I didn't have my own laptop until I was over 18. * I can access the majority of what I want to read online, in my native language. By noticing who moves forwards and backwards, and how often people swap spaces, participants are encouraged to think about their own levels of privilege within the community. At the end of the exercise, ask the participants if there were any surprises in what they saw among the group. How do they think these privileges affect their current life and work?
    ileges affect their current life and work?  +
  • Mark a line on the floor towards the middl
    Mark a line on the floor towards the middle of the room, and signal that one side of the room is 'strongly agree', the other is 'strongly disagree', and if participants are 'neutral' towards a certain topic, they can stand in the middle of the room on the line. Participants are asked to move around the room depending upon their feelings towards statements that the facilitator will read out, and the facilitator will also ask for opinions and reasoning behind their positioning, from certain participants. Statements could include: "The internet is dangerous": agree or disagree?” "Only digital security experts can be digital security trainers." "Technology can be sexist" If there are any particularly polemic decisions, it might be a good idea for the facilitator to make a note of them for future discussions.
    ake a note of them for future discussions.  +
  • Methodology == Activity & Discussion:
    Methodology == Activity & Discussion: Vision mapping (25 minutes) == Within the socio-political context in which we are working, as human rights defenders we have identified issues we see as unjust and want to try to alleviate. It is useful to assert the change we want to see in our society in order to think critically about how we go about achieving this change. ''Process for groups from the same organization:'' '''Step 1.''' On an area of wall space if possible, using butcher block paper, get participants to write the name of the organization on a piece of colored paper or sticky note and place it in the middle of the paper. Draw an arrow from this paper to the right-hand side of the paper and here, ask participants to brainstorm the goals they want to see achieved in their society, write them on stickies and place them at the end of the arrow, representing the organization's objectives. '''Step 2.''' Ask participants what activities they carry out in order to achieve these goals. For each answer, write it underneath the name of the group or organization in the centre. '''Step 3.''' Give the group sticky-notes or papers of one color (e.g. green) and here, possibly in groups according to their role in the organization, brainstorm the other actors in society which are SUPPORTIVE of the work of the organization, or share these goals. Allow them to brainstorm these (10 minutes) and place them on the left-hand side of the sheet. ''Process for groups from different organizations'' '''Step 1:''' Give each participant a sheet of flipchart paper and ask them to write their own name or that of their organization in the centre, with an arrow going to one side representing their objectives. Here, they write the changes they wish to see in their society. '''Step 2:''' Underneath their name or that of their organization in the centre, they note the activities or projects they carry out in order to achieve these goals. On the left-hand side of their flipchart, they identify their allies (as above). == Input (20 minutes) == The next step in the exercise will be to carry out actor mapping, including our allies, our adversaries and the neutral parties ambivalent to our work. From an analytical perspective the mapping helps us: identify our allies and build security networks (we can return to our allies when it comes to building strategies and plans); identify our adversaries, their resources and the ways they may try to stop our work; identify opportunities for building acceptance of our work among neutral elements in society so that they become our allies; The mapping exercise also helps us understand the perceptions each of us may have and to verify our assumptions. Furthermore, through the process of the mapping, we are able to elaborate on the dynamics that connect the various actors, and how the dynamics affects our security (positively or negatively) == Deepening: Mapping Allies, Adversaries and Neutral Parties (30 minutes) == '''Step 1.''' Using two different colors of paper or sticky note, participants brainstorm and add neutral parties (centre) and adversaries (right, between the organization and its goals) to the map. Ask participants to also consider whether adversaries are: intellectual authors of attacks against HRDs or journalists, as opposed to material authors of attacks. Introduce the legend (attached) and give an example for each type of relationship. Give participants 10-15 minutes to map out the relationships between the adversaries, neutral parties and allies identified according to the legend. '''Step 2:''' Questions for discussion with the group: Do they have any activities which provoke a particularly strong reaction from adversaries? Should they consider these activities priorities for making security plans? What are the interests of adversaries? Why are they opposed to our work? Which adversaries do they consider to be the most dangerous? Why? What threats do they pose to HRDs/journalists? How can our allies help to protect us from our adversaries? What resources can they offer us? (can include material resources, but also inspiration, hope, friendship, solidarity). What opportunities are there here to foster acceptance of our work among neutral parties or adversaries? What opportunities are there here to deter attacks against us through our relationship with powerful allies? == Synthesis == * Understanding the actors around us helps us to make strategies which will open a space for us to continue to work, through protecting ourselves and building networks with our allies, or raising the cost of attacks against us for adversaries. * A key element we must now look towards, however, is information: information about ourselves and our work is a valuable asset to our adversaries, and much of it now lives in digital devices, so we must consider how it is stored and moves between us, and which new actors we must add to our map.
    d which new actors we must add to our map.  +
  • Methodology == Activity/Discussion: Romeo
    Methodology == Activity/Discussion: Romeo and Juliet (10 minutes) == '''Step 1.''' Get participants to sit around in a 'U' shape facing the flipchart. Designate a “Romeo” and a “Juliet” at both extremities of the group of participants (can also be “Romeo and Romeo”, “Juliet and Julia”, or any other combination). '''Step 2.''' Explain that we will explore how the internet works, as an example of how data is transferred digitally, the threats to its integrity, and the potential ways of protecting it. Participants will map out a 'political' version of how the internet works, while the facilitator can map out the 'technical' version. '''Step 3.''' Instruct 'Romeo' to write a message to 'Juliet'. Romeo and Juliet will communicate, and since there is no internet, they depend on us to help them. == Input: How the Internet Works (45 minutes) == '''Steps & Input'''. Information, such as an e-mail, passes through at least the following points as it is transferred electronically over the internet. Once Romeo/Juliet have written their first message, have them pass it around the 'U' until it reaches the other. For each, ask them what they can read of the message and give them a sheet indicating their role. 1. '''Computer''' of the sender of the message (i.e. Romeo) 2. The '''router''' in the building or area where Romeo connects to the internet 3. The '''Internet Service Provider''', who owns the router. The ISP is usually a large company which must comply with the laws of the country. 4. The '''National Gateways''': part of the telecommunication infrastructure of the country, where the optic cables enter the territory of the country. It is often controlled by the State, or may be operated by a private company. The data may pass through several countries, ISPs and Gateways as it travels to the servers of the online service. 5. Eventually the email will arrive at the Gateway, and the '''ISP of the email provider''' (e.g. Yahoo!, in the United States) 6. It arrives at the '''servers of Yahoo'''! 7. When Juliet checks her email, the mail will pass through a combination of the above again before arriving at her ISP, her router and her computer. While in real life we send postcards referring to real physical addresses, devices also have addresses to send data around the internet: these are called '''IP addresses'''. IP addresses usually refer to concrete physical addresses too. Demonstrate: http://whatismyipaddress.com ''HTTP Traffic: A Postcard'' The first round of passing messages between Romeo and Juliet, they pass a message with content (a message) and an address, just like a postcard. And, like a postcard, this can be read at every point along the way. This kind of traffic is called HTTP Traffic. ''HTTPS Traffic: An Envelope'' '''Step 1.''' Ask participants – what is the first step that should be taken to protect the postcard? They should respond with the idea of putting it into an envelope – so provide an envelope to the person in the role of Yahoo! '''Step 2 Input.''' The difference with the internet is that the envelope is provided by the online service provider (the website). Romeo or Juliet must **ask for the envelope** and then write another message, inside the envelope, with an address on it. In this case, only Yahoo can read the message, since they provided the envelope. They can also copy and share this content. '''Step 3 Input.'''Everyone else can only read the address and the names of the sender and recipient. That is, the metadata. Metadata is still important and widely used for surveillance. We must not think about the sensitivity of our content in isolation, as metadata is often 'enough' for many State surveillance programs. ''Encrypted Traffic: A lockbox'' '''Step 1.''' Imagine that one day a magical 'gnome' (the facilitator) appears to Juliet and says to her: Juliet! Do you want Romeo to send you a note so that no one along the way can tell what it is? Then you should give him this, your very own open lockbox. This is a magical lockbox. '''Step 2''' Hand 'Juliet' the open box. Your lockbox is magical because: You have as many of the same lockbox as you want. You can give it to whomever you want to have send you confidential messages. Once they put their message in your lockbox and send it to you, another lockbox is magically there for them to use. Once they close and lock your lockbox, only its PRIVATE key can open it. '''Step 3''' Hand 'Juliet' the key. This is your Private key. ONLY YOU have this key. It is yours, and it is private. Keep your private key very safe. DON'T lose or share your private key. It will always open this lockbox and all of its copies. If you lose this private key, you will NOT be able to open the lockboxes associated with it. NEVER. (Optional) The private key will imprint itself on you the first time, with your kiss. Thereafter it will only work after you kiss it to tell it that it is you who are using it and no one else (metaphor for self-authentication via password). From this point on, the key will only work with your kiss. '''Step 4''' Concept checking. Ask participants: What does Romeo need in order to send Juliet a message? (her lockbox) Can Juliet send him a private message back? (Not yet). In order for both sides to be able to communicate privately, they both need a lock box and they both need a key. So, the gnome repeats the process above with Romeo. Repeat the process above with Romeo. '''Step 5''' Romeo and Juliet now have everything they need in order to communicate securely. All they need to do is exchange lockboxes! How can they do this? In person / Through the postal system like before. Have Romeo and Juliet exchange lockboxes and have Juliet send Romeo a message in his lockbox. '''Step 6 Input''' This process is how a kind of email encryption known as GPG works. Each of us has a public 'lockbox' which we share with everyone, and a private key which is password-protected which we maintain for ourselves and share with nobody. In order to communicate securely, we exchange our public lockboxes. After that, we can use them in certain computer programs to encrypt and send messages. However when a 'lockbox' (encrypted message) goes through the postal system, it's clear what it is, at least to Yahoo! Therefore it could be suspicious and draw attention to yourself. ''Circumvention and Anonymity'' We can circumvent the system of IP addresses which facilitates censorship and online tracking through using softwares such as a VPN or TOR. A VPN is less effective at anonymizing, although it is not suspicious. TOR is more effective at anonymizing, but also more suspicious. == Deepening: Written Information Map – Information in Motion (30 minutes) == Summarise the threats to sensitive information in motion, potential tactics and their advantages and pitfalls after the exercise. You may want to create a table such as the below: HTTP / HTTPS / End-to-end Encryption / TOR Content protected from ISP (and whomever No / Yes / Yes / Yes they share it with) Content protected from website/service owners No / No / Yes / No (and whomever they share it with) Metadata protected No / No / No / Yes Introduce the information map for information in motion, explaining each of its parts. Participants fill out the map for information in motion (see handout) for 15 minutes and share reflections. == Synthesis: Return to Actor Map == Participants return to their Actor Maps and add any important new actors according to the map of how the internet works. Suspicious Depends on content / No / Potentially / Potentially
    No / Potentially / Potentially  +
  • Methodology == Activity: Lion, Horse, Tur
    Methodology == Activity: Lion, Horse, Turtle (20 minutes) == '''Step 1.''' Divide the space into three sectors by placing pieces of paper on the floor, reading 'Lion'; 'Horse'; and 'Turtle'. Theb ask participants: What are the characteristics of a Lion? How do they respond to danger? (Typically by attacking); What are the characteristics of a Turtle? How do they protect themselves? How are they different than a Lion?; What are the characteristics of a Horse? How do they protect themselves? How are they different than the others?. '''Step 2.''' Gather participants in the centre of the space and ask them to call to mind a particular event in which they felt they were in danger. Leave a moment for this and give hints if necessary (it may be during a protest, or a security incident which has happened to them of which you are aware). Then, ask participants to move to the animal with which they associate their behaviour in that moment. == Discussion (10 minutes) == Lead a pop-corn style discussion on this – if needed, use prompt questions such as: Why do you associate yourself with this animal in that situation? How did you act? Was it a conscious or unconscious decision to act the way that you did? Did you always react the same way, or has it changed in different situations? '''Note:''' Although the energy can be light and fun, in this conversation, people may recall particularly difficult moments wherein they experienced violence. Try to avoid value judgements and critiquing how someone behaved in a particular situation, but rather listen respectfully to their rationale for doing so. == Input: Physiological responses to threat. (20 minutes) == Humans, like all animals, have built-in responses to threat which have helped us to survive throughout our evolution. When we perceive acute danger, many of these responses kick in without our ability to control them: they are hard-wired to our bodies and minds. Introduce the reactions on a paper or flipchart one by one and, for each, ask if it resonates or if any participant has any reflections on it. The “'''freeze response'''” is when a person becomes utterly still while remaining highly alert and poised for action. This response relies on escaping notice until the danger has passed. For example, we might cease the work that we are doing, stop communicating through our usual channels, or reduce communication with someone with whom we are in conflict. In each case, we are hoping that the unwelcome attention will pass if we become inactive. The “'''flight response'''” is when a person quickly tries to get as far away from the danger as possible. We might move our operations to a safer location, abandon certain activities or modes of communication, or separate ourselves from people who might cause us harm. The “'''comply response'''” involves doing what an aggressor instructs in the hope that cooperation will result in the attack ending quickly and without injury. We might agree to suspend or abandon certain objectives or activities, or give up passwords to secure information. The “'''tend response'''” happens when people try to protect other, more vulnerable people who are being similarly victimized. Many HRD are motivated to help others because of our own experiences of oppression and exploitation. The “'''befriend response'''” involves trying to build some kind of relationship with the aggressor in the hope that this will limit the harm perpetrated against oneself or others. By telling physical aggressors about our families we might try to humanize ourselves in their eyes, a strategy that is sometimes useful in reducing violence. The “'''posture response'''” is an attempt to drive off the danger by pretending to have greater power than one actually does. As HRD we often threaten to expose threats of violence broadly so as to publicly embarrass our adversaries. The “'''fight response'''” is when a person attacks with the intent of driving off or destroying the aggressor. Of course there are many ways to fight and we all make our own ethical choices about this. == Deepening: Stress Table (30 minutes) == This is a useful tool which can help us to identify the effect that stress has on our bodies and minds individually and engage our own tactics and resources for managing it. '''Step 1.''' Ask participants to take a sheet of A4 paper and divide it into 16 sections. On a flipchart, draw the following matrix: Symptoms Tactics Resources Green Yellow Red '''Step 2''' Input: We can arbitrarily enough identify three (or more) 'levels' of stress. ''Green:'' bearable, motivating stress. This kind of stress might keep us creative, but we may become tired more easily, need more breaks and know that we don't want to feel it for a long period of time. ''Yellow:'' unpleasant stress. With this level of stress we may feel tired and at the same time alert. We may manifest physical signs of stress. We will usually have a strong desire to change the situation which is causing this sensation. ''Red:'' unbearable, profound and lasting stress. This kind of stress affects different spheres of our lives including our relationships at work, with our friends and family, and also our intimate relationships. Our bodies show clear physical reactions, and we may feel close to collapse, and resort to unhealthy measures to stay alert, such as stimulants. '''Step 3.''' Ask participants to consider for each level – however they define it for themselves – what are the symptoms each one causes in them. If you're comfortable, share an example from your own life. Then, ask participants to fill in what tactics they have for easing these symptoms or the cause of the stress, and what resources are necessary for this. == Synthesis (10 minutes) == Security is not just an abstract concept: our bodies have evolved ways of keeping us safe However this system is impacted by stress, tiredness and trauma. We must better manage this in order to better manage our security.
    is in order to better manage our security.  +
  • Methodology == Activity: PEST Analysis (1
    Methodology == Activity: PEST Analysis (15 minutes) == Before starting on a large area of wall, ideally with some butcher-block, map out the 12 months of the last year. '''Step 1.''' Give participants pieces of paper and get them to plot the most important events of the last 12 months. Ask participants to consider: political developments, economic developments, social developments, technological developments. Optionally, you may want to include environmental developments and legal developments. '''Step 2.''' If you wish to add a layer of complexity, you may wish to allow participants to distinguish between: International developments, National developments, Regional/local developments. == Discussion (10 minutes) == Considering the map of developments created by participants, pose questions such as: What are the current trends people can observe in the past year in the different categories (political, economic, social, technological, etc)?. What are its implications for your work? Are there any categories about which we know less? Why? What are our sources of information for this? How trustworthy are they? What new sources of information do we need? Are there any events here which could have an impact on our security? == Input (15 minutes) == We often carry out situational analysis in our day to day lives and make decisions for our security or well-being based on this. It helps to be a little more organized about it as HRDs, so that we can stay as aware as possible about the changing situation around us, our allies and adversaries and what this could mean for our security. However, our ability to do this also depends to some extent on the availability of sources of information and their trustworthiness. It may be difficult to find sources of information about certain topics, or we may not have the habit. Therefore it's a good idea to think critically about our sources and actively seek new ones. We may want to consider: - Talking to trusted friends and colleagues; - Meetings with authorities, experts, diplomats and academics; - Online tools such as Google Alerts; - Regularly reading and analyzing the local and international media; == Deepening: Identifying and mapping trends (45 minutes) == '''Step 1'''. Assuming that participants are from the same organization or country, divide them into four groups (Political, Economic, Social, Technological). Each group is given a flipchart and markers. One person from each group should stay, while the others will rotate. '''Step 2.''' Participants are asked to: Identify at least THREE developments in the last year which may have a (positive or negative) impact on their security and explain why. '''Step 3.''' Give participants 15 minutes to get started, and then rotate the groups 3 times, each for 10 minutes. Participants can use the internet to search for information about anything they're not aware of. '''Step 4.''' Make a gallery of the flip-charts. Ask some questions including: Did anyone discover new sources of information while carrying out the exercise? If participants are a mixed group, each participant can do this exercise individually and compare notes afterwards with another participant. == Synthesis == * Regular analysis of our environment will help us to identify opportunities and threats relative to our work and our security and well-being. * Our analysis depends on the trustworthiness of our sources, so it helps to think critically about them.
    o it helps to think critically about them.  +
  • Methodology == Format: Interactive Discus
    Methodology == Format: Interactive Discussion & Input == '''Step 1.''' Ask participants: imagine you are preparing to go to a public protest. What are THREE security measures you take. Allow it to be a popcorn exercise but prompt: what devices do we bring or not bring with us? Write the three suggestions at the bottom-right of a sheet of flip-chart paper or butcher block. At the bottom-right, in a different colour, write: STRATEGIES, TOOLS, TACTICS '''''Input:''''' So we are beginning from the end. Each of us already has strategies, tools and tactics which keep us safer at a protest. What we will now do is explore how and why we came to these conclusions. '''Step 2.''' Going one by one through the suggestions, ask participants for each: Why would you do this: what are you protecting yourself against? Participants will respond with a number of suggestions, e.g. taking a gas-mask in case of a tear-gas attack; not bringing a mobile telephone in case of devices being confiscated during arrest. Write at least one of these threats related to each of the strategies on the left side of the flip-chart. On the right, write: THREAT IDENTIFICATION/ANALYSIS '''''Input:''''' We have taken these decisions because we have identified threats: potentially harmful events during the protest. '''Step 3:''' Ask participants: Why do we feel like these are things that could happen to us during a protest? Participants will respond with answers such as: it's happened before, we've read about it, other people have told us, or you see the police approaching with tear gas projectiles. On the left of the flipchart, write the sources of this information that participants give On the right, write: SECURITY INDICATORS. '''''Input''':'' We've observed our surroundings and examined a number of sources of information – friends, colleges, the media – in order to establish that these are the most likely things to happen to us. That is: we have shared and analyzed security indicators. '''Step 4:''' Ask participants: Who is behind these potential threats? Who would carry them out? Write responses on the left of the sheet. Focus on any of the tactics they have which relate to devices: Why did you take this decision, what are you trying to protect, or what might be at risk here? Participants may respond with information held on their devices. Write this on the left of the sheet as well. On the right (above) write: ACTOR MAPPING and (below) INFORMATION MAPPING. '''''Input:''''' We are aware in most situations that are dangerous such as this, there are some actors who are our OPPONENTS and others who are our ALLIES (ask for examples of this). That is, we've carried out ACTOR MAPPING. Furthermore, among our allies and adversaries, there is always a battle for information, such as through surveillance or access to our digital devices. We have less instinct for this, but it's vital that we carry out some INFORMATION MAPPING to remain in control of this, to the extent possible. '''Step 5:''' Ask participants: So, why are we at a protest in the first place, what's our objective? Answers might include 'justice', 'demanding rights', etc. Write their answers on the left. On the right, write: 'VISION' and 'ACTIONS' '''''Input:''''' As human rights defenders, we have a vision of the positive change we want to see in our society, and we decide on some actions in order to try to achieve that vision. '''Step 6:''' Ask participants: How did we establish that there was a problem to address in the first place? How do we monitor our progress and changes? Write participant answers on the left. On the right, write 'SITUATIONAL ANALYSIS'. '''''Input:''''' We're constantly analyzing our surroundings, beginning with our personal experiences but also through secondary and tertiary sources of information such as friends, colleagues, and the media. This is Situational Analysis and informs our strategies for action in defense of human rights. == Synthesis (5-10 minutes) == '''Step 7:''' Refer to the complete list of steps and answers. These are the basic steps of context analysis – we carry them out all the time. As human rights defenders, it can be useful to simply be more organized and systematic about it given that we often face threats as a result of our work. '''''Input'':''' Each of these steps can be an exercise which we should carry out regularly in order to update our security strategies, plans and tactics according to the changing context in which we're operating. This looks like a scientific, rational process: however, it's not. One of the biggest challenges we face is related to our perception: if we are stressed or very tired, we may find this very difficult to do. We need strategies both for managing this stress and tiredness, as well as checking our perception with trusted colleagues or partners. We may discover we have unfounded fears (paranoia) or unrecognized threats (verifiable threats that we didn't perceive before. Write 'PERCEPTION' vertically alongside the steps of context & risk analysis. '''Step 8.''' Allow space for questions and if you will continue with the next steps, give a summary of what is to follow.'''
    s, give a summary of what is to follow.'''  +
  • Methodology == Input/Activity: Basic secu
    Methodology == Input/Activity: Basic security plan (50 minutes) == '''Step 1 Input.''' Now that we have analysed the threats we face in our work, we will make a simple security plan to correspond to one of our activities (ideally, the one we used as a basis for the threat analysis exercise), and present it to another participant. The objective of our activity and the threats associated with it are the basic starting point for planning. For each threat identified, it's useful to consider two corresponding things: 1. Our existing security practices and capacities: the well-being, attitudes, knowledge, skills and resources to which we have access which help to keep us safer from a particular threat. 2. The gaps in our existing practices, and our vulnerabilities: the well-being, attitudes, knowledge, skills and resources (or lack thereof) which make us more susceptible to a threat. '''Step 2 Input.''' Security plans can be written or unwritten – it depends largely on the culture of the group or organisation. However, it's good to keep in mind that each plan should include as a minimum the following: the objective of the activity; the threats identified; prevention actions and resources; response/Emergency actions and resources; including: WHEN is it an emergency?; Communication and devices; well-being and self-care. Using this as a guide, create a security plan for one activity you carry out in your work. Use the threats you identified as the basis for the tactics and tools you will use It doesn't all have to be new: Include your already existing strategies and capacities. '''Step 3.''' Give participants 20 minutes to draft a plan, and then 15 minutes to present their plan to a fellow participant. Discussion: Pose the following questions to the group: How do you know the tactics you are using are the right ones? Where does the plan fall short? What are the things you can not yet protect yourself against? Are there any new skills, tools, or tactics you will need to learn in order to implement this plan? == Input / Discussion: Security Strategies (20 minutes) == We've practiced making a plan for a single human rights activity. But it's a good idea to have an overall strategy rather than to just plan for single events. If we have a strategy, then we can use it as a basis for drawing up plans as our work demands them, and according to our own rhythm and style of working. Introduce the ideas of acceptance, deterrence and protection strategies as ways of opening the socio-political space for your work: '''acceptance:''' building support for our human rights work among the actors around us, including our 'opponents'. What are examples of ways you already build acceptance of your work? '''deterrence:''' raising the political cost of attacks against us, so that our opponents decide not to carry them out. What are examples of ways you already deter attacks against you? '''and protection or self-defence.''': building our own strengths so that our opponents can't attack us so easily. What are ways you already act to protect yourself? == Deepening: New Skills, Tactics and Resources Required (20 minutes) == Draw a matrix like the one below on a flipchart, whiteboard etc and have participants reproduce it. Threats New Capacities Resources needed Participants consider the threats they have identified, the new capacities they need to build, and in this respect, the resources they need in order to build them (15 minutes). == Synthesis == Making security plans and agreements of some kind helps us to have at least some peace of mind when it comes to preparing for our activities. Our plans should be living documents and correspond to our changing contexts. The tools and tactics we use should correspond to our threats. We constantly need to learn new tools and tactics as our context changes. This demands time and resources and, if possible, should be built into our strategic planning.
    ould be built into our strategic planning.  +
  • Put participants in groups of 5, and ask t
    Put participants in groups of 5, and ask them to put their 'data shadow' illustrations together on one big piece of paper. Give each participant an envelope, and ask them to stick it on their individual data shadow images – then, distribute the slips of paper so that each participant has at least one digital behaviour, and one digital action that they do to others. Ask them to put these slips of paper into their respective envelopes, so that every data shadow illustration will have a set of papers in their envelopes describing different online activities. Now, ask each group to leave their collective tables to go to another table, and look at another groups' collective data shadow. Each group now takes the role of 'data broker', and is asked to develop a profile of the group based on the contents of the envelope, and their digital behaviours. One of the facilitators should now take the role of an “angel investor”, who is looking to invest in a new initiative around the use of data, and participants, in their groups, are tasked with figuring out a way to sell that data to an “angel investor” – ie. one of the facilitators. Give groups 20 minutes to plan a “pitch” to the angel investor, then bring the group back to plenary. With the “angel investor” at the front, ask the groups to perform their pitches – remind the groups that they are trying to convince the angel investor to give them money to develop their project, and that the data they have is more valuable than other groups. To round the session off, get the angel investor/facilitator to pick the pitch that they liked best – they are the winner! The facilitator could give a quick round up to the group of how – though this exercise was obviously heavily fictionalised – many companies' business model relies heavily upon personal data of their users, and that they “create value” from it in this way.
    t they “create value” from it in this way.  +
  • Put the participants into groups, and give
    Put the participants into groups, and give each group a different time frame, ranging from 1 day to 5 days. Give the group the participant profile, and ask each group to design a security and privacy training for this person. In addition to the specific training schedule, ask each group to keep a note of any challenges that they come across. After 30-40 minutes in small groups, bring the participants back to plenary, and ask them to share any major challenges that they faced. Get one person from each small group to talk the rest of the group through the training schedule that they came up with – try and keep these report backs reasonably short.
    keep these report backs reasonably short.  +
  • Split participants into groups, and give e
    Split participants into groups, and give each of the groups a topic to work on, such as 'password management', 'holistic security', file management, etc. Then, go through the following steps with them: * Activity * Discussion * Input * Deepening * Synthesis Explain where this structure comes from, and how it differs from traditional pedagogical approaches. Ask each small group to tackle the topic given to them using this approach – give them each a large piece of paper with the ADIDS cycle written on it, and ask them to come up with topic specific activities/sessions along each step of the cycle. Their aim should be thinking about how they would approach the topic in question in the ADIDS training structure. After 30 minutes in small groups, ask them to come back to plenary, and one person from each group should report back to the bigger group on what they came up with. If there are any new activities or ideas on how to tackle the topic in question, it might be useful for the facilitator to make note of them.
    for the facilitator to make note of them.  +
  • The relationship between the online and of
    The relationship between the online and offline worlds were addressed early on by cyberfeminist scholars and activists. In her book Zeroes + ones: digital women + the new technoculture, Sady Plant suggests that cyberspace has a feminist essence, and is therefore a natural space for women to inhabit. Rosi Braidotti, in her book Nomadic Subject, focuses on the fluidity and mobility aspects of online spaces that allows, she suggests, the creation of collective bonds among women. In other words, cyberspace makes global feminism possible in one's offline world as it is linked to the intimate, the immediate, the personal and the collective. Donna Haraway, in her Cyborg Manifesto, framed the internet as a force that might help shift forms of gender power on the Internet in turn enabling feminists to somewhat escape patriarchal structures online. This utopian view of cyberspace has since then been tone down as escaping gender, race or other intersectional forms of oppression has been much harder than first thought. But safe spaces are one way to experience and enable forms of collective and individual empowerment both online and offline.
    idual empowerment both online and offline.  +
  • This session has two parts: first, an acti
    This session has two parts: first, an activity to get people to understand different levels of password security, and secondly, a hand on part of learning about the password management tools. This tutorial will only cover the activity in detail – please refer to Security in a Box for more details on how to use and install the various tools. Get participants to line up at the back of the room – the aim of this activity is to reach the far wall the fastest, like a race. This, though, is a 'secure password race'. By asking questions about participants use of secure passwords, they will move forward or backwards, depending on the answer. For example: * if you have used the same password for two or more accounts, take 3 steps back * if you already use Keepass or a secure password management tool, take 2 steps forward * if someone else knows the password to your main email account, take 2 steps back Once at least one participant has reached the 'goal line', bring the participants back into a group, and have a discussion around the characteristics of good password management, based on the activity. One of the facilitators could make a list of these characteristics on a flip chart. For the next part of the session, do a hands on introduction to password management tools.
    introduction to password management tools.  +
  • This session is largely explanatory rather
    This session is largely explanatory rather than interactive: Explain the following concepts: * what PGP – Pretty Good Privacy – is * Differences/similarities between PGP and GPG * Why PGP is useful to us, and why might we want to understand it or use it? * How it differs from SSL, TLS and HTTPS – and define these terms
    SL, TLS and HTTPS – and define these terms  +