Difference between revisions of "Digital security for Women, Bosnia"

From Gender and Tech Resources

(Created page with "{{Activities |Title of the activity=Digital security for Women, Bosnia |Category=Privacy Advocacy, Digital Security, Gender and Tech |Start when ?=2015/12/05 |End when ?=2015/...")
(No difference)

Revision as of 09:45, 9 December 2015

Title Digital security for Women, Bosnia
Category Privacy Advocacy Digital Security Gender and Tech
Start 2015/12/05
End 2015/12/08
Hours
Scale Bosnia-Herzegovina
Geolocalization 43° 52' 29", 18° 17' 52"
Loading map...
Organisation Gender and tech organisation
Website
Target audience Young women interested in gender social justice, feminism, privacy and digital security
Number of participants 17
Context and motivations Cyberbullying and online harassment are used massively worldwide to control, manipulate, build up fear and ultimately remove girls and women and non-conforming transgender individuals from online spaces, whether we talk about gaming world or political campaigns run by female politician, the rules of unbalanced power relations between men and women in the offline world, remain and amplify in the virtual one. Sadly, but not surprisingly, Bosnia and Herzegovina is keeping up with this „trend“ too. Institutional reaction in terms of protection are slow and almost not existent. This year we intend to integrate the learning of the tools with the thinking and planning of coordinated response to attacks.

Starting from this year experience of the attacks on #takebackthetech, and of similar attack against Balkan activists and groups we intend to go one step further and while continuing to provide capacity to individuals start the conversation of new practices of concerted online solidarity and response groups, envisioning a solidarity network that can support the victim during the attack and generate reverse positive content.

One of the most efficient and successful activities that we have been conducting for past 5 years are digital security trainings for girls, women leaders and women's rights organisations in Bosnia and Herzegovina. Trainings on privacy and security online are a big eye-opener for girls and women and lead to actual changes in the way they think about their own security and how they should use technology and Internet accordingly in their daily lives, professionally and personally.

Topics Information Communication Technologies (ICT), Sexuality, Violence against Girls and Women, online harassment, feminisms, privacy, digital security
Links Articles, videos, photos on-line, ...
Media [[File:]]
Agenda Day one

HouseRules and Shared Agreements Round what is your name and how do you feel?

SESSION 1ː Speedgeeking: 1. go to the person that is across and share what is your superpower? (group of 2) 2. go to the person you dont know and talk about what are you passionate about (group of 3) 3. say somethingthat nobody knows about you (or u think so) – 5 minutes, 2 people(NO NEED TO REPORT BACK)

Agenda Hacking (post it) What are your interests, in relation to: 1. Tools and Apps, 2. Problem-Challenge, 3. Issue, 4. Devices, 5. Social media or means of communications

SESSION 2 ː My Cyber Body Q: Your first memory of technology (write down year/your age/what was it) + when did you begin to actively use ICT and for which reasons (write down context and motivations) + could you underline if you enjoy it/your pleasure in tech, and/or if it was a forced and stressful relationship with tech?

Work in groups of 3 – share your personal stories and mark donw commonalities and differences, decide what do you want to report back to the whole group? No names, but we want to hear your story

Risk analysis exercise Group Association of ideas around safety/security

Individual exercise: Your daily routine (10/15 mins) Put in a paper your daily routine > When you wake up, and the rituals you have to start the day (where are you, who are you with...) > When you leave your home and where you go first. What do you take with you (e.g. mobile phones, handbags,...) - be sure to include that. > Where do you go - what does the journey look like? Who else is there? Think about where you are when you're working. Who are you working with? > What devices are you using, if any? > Do you eat or relax during the day? > How do you get home? Or what do you do before you go home? > What do you do in the evenings? When do you sleep?

Now add information about the ICT/Tech in your map (10/15 mins) > What kind of data do you produce/manage/move offline and online? > Where is this data? (do you keep personal/professional/activist data together)? > How sensitive is this data (from a work/activist/privacy perspective) Does it imply personal data about others? > Are you sharing your device (mobile/computer) or your accounts (email/social media/etc) with another person (family, partner, colleagues etc)? > How do you deal with this data when you are traveling (to do a training/other purposes?) > Do you have back up of those data? Have you lost sensitive data before? How did that happen? (device or online account get compromised? ) > How do you build trust in relation to your data and how you store it?

Report to the group about elements of safety and threats you realised about

SESSION 3ː Spectogram: 1. Revolution is not possible witout feminism 2. Harasser hide behind fake names 3. Pornography harms women Create your own statements for spectogram (3 groups of 5 plus one – 5 min)

BARBIE session - understanding how tech is engendered / From barbie computer engineer to Hello Barbie.

Pleasure and privacy: Gender Matrix meets Feminist Principles of the internet Individual exercise: How would you translate those elements into your own reality?

SESSION 4ː WALL OF FAME: Celebration of the contribution of women to tech and other important area for all of us ;-)

DAY 2

9:30-9:45 Morning Circle 9:45-10:45 Feminist principles of internet 10:45-11:00 Break 11:00-13:00 How the internet works? TOR, circumvention 13:00-14:00 Lunch 14:00-15:30 Digital Hygiene: Anti virus , Back Up, Passwords 15:30-15:45 Break 15:45-17:30 Tech Bazaar After the break, setting is different 4 tables x 4 girls will go before or after the break depending on time and participants questions

4 stations: 1st round 1. File Encryption (30 min)-Alex 2. E-mail Encryption (30 min)-Gillo 2nd Round 3. Chat Encrytion (15 min) 4. Mobile Encryption (15 min) (iphone and android: surespot/chatsecure)

17:30 - 18:00 Closing of the day

DAY 3

9:30 / 10:00 - Introduction/morning circle

10:00 / 11:30 - Session 1 Introduction to history of social networks and social media - going through basic notions of social networs and social networking platforms, terms of service (read the small print) Understanding your digital traces and digital shadow - people will assess their digital shadow using different platforms such as my shadow Self-doxing - what means doxing and which methodologies can help you to understand what information exists about you on the internet. Participants group in three teams and investigate three profiles which have volunteer (people from the facilitators team), they have 20 minutes to find as much information as possible, then they present to the rest of te group waht they found.

Break

Creating profiles (anonymous/pseudonymous/collective name)and strategies online. Participants team up in three groups and need to develop a campaign in a context where members of the collective want to hide their real name and still make their message ressonate on different platforms. One group will make a strategy to open a campaign in facebook and will list privacy and security dimensions they need to take into account in that specific platform. Another group does the same using a blog, the last group develop a strategy on snapchat and instagram. They have 30 minutes to develop the strategy and present the security and privacy dimension they should take into account to remain safe.

13:30 / 14:30 - Lunch

Privacy and security settings (FB, Twitter, others by participants) Gender-based online violence VS feminist campaigns We share about what is online harassment, our perspectives and experiences of it and what is the current situation in bosnia. The we share about current succesful and inspiring campaigns.

17:00 Closure - Closing circle and Evaluation

Methodologies DAY 1

SESSION 1 - Intro/Speedgeeking https://en.wikipedia.org/wiki/Speed_geeking

SESSION 2 - My cyber body https://www.coursera.org/ (free online courses Higher Education)

SESSION 3 - Barbie Feminist Hacker Barbie https://computer-engineer-barbie.herokuapp.com/ Fair Use Barbie: Changing the narrative & the legality of remix http://caseyfiesler.com/2014/11/24/fair-use-barbie/ http://www.tampabay.com/news/business/retail/privacy-advocates-try-to-keep-hello-barbie-from-hitting-shelves/2220896 What does Barbie says: http://hellobarbiefaq.mattel.com/wp-content/uploads/2015/11/hellobarbie-lines-v2.pdf Campaign against Hello Barbie: http://www.commercialfreechildhood.org/action/hell-no-barbie-8-reasons-leave-hello-barbie-shelf Hacking Hello Barbie: http://www.theguardian.com/technology/2015/nov/26/hackers-can-hijack-wi-fi-hello-barbie-to-spy-on-your-children

Pleasure and Privacy The online terrain for women’s rights https://www.giswatch.org/en/report-introduction/online-terrain-women-s-rights Gender at Work Matrix http://www.genderatwork.org/OurWork/OurApproach/GWFramework.aspx

SESSION 4 - Wall of fame Time to come out!: Pioneering women in history of technology http://www.genderit.org/feminist-talk/time-come-out-pioneering-women-history-technology From string theory to clothes wringers: A historical map of women shaping science and technology http://www.genderit.org/resources/string-theory-clothes-wringers-historical-map-women-shaping-science-and-technology The computers (ENIAC PROGRAMMERS PROJECT) http://eniacprogrammers.org/

Lelacoders, interviews with women hackers (spanish, englis, catalan): https://vimeo.com/user8966514 online group:https://n-1.cc/g/donestech+lelacoders

Animation about the HerStory in Sciences and Computer Sciences: https://vimeo.com/107858829

DAY 2

SESSION 1 - Feminist Principle of the internetː http://www.genderit.org/articles/feminist-principles-internet http://www.genderit.org/sites/default/upload/fpi_v3.pdf http://zenskaposla.ba/content/feministicki-principi-interneta (bhs prevod)

How technology issues impact women’s rights: 10 points on Section J http://www.genderit.org/articles/how-technology-issues-impact-women-s-rights-10-points-section-j

Zašto je feminizam važan za internet http://oneworldplatform.net/category/zenska-prava/page/2/ Why feminism matters to Internet? http://oneworldplatform.net/en/why-feminism-matters-to-internet/ In the continuum of privacy and data http://hvale.me/2015/01/in-the-continuum-of-privacy-and-data/ A feminist internet and its reflection on privacy, security, policy and violence against Women https://gendersec.tacticaltech.org/wiki/index.php/A_feminist_internet_and_its_reflection_on_privacy,_security,_policy_and_violence_against_Women 2013 - Women's rights, gender and ICTs https://www.giswatch.org/2013-womens-rights-gender-and-icts 2015 - Sexual rights and the internet https://www.giswatch.org/2015-sexual-rights-and-internet

SESSION 2

WHAT IS NSA? https://en.wikipedia.org/wiki/National_Security_Agency WHAT IS TOR AND WHAT IS TOR PROJECT? https://www.torproject.org/ Virtual rasicm campaign - http://www.racismovirtual.com.br/

Session 4 - Tech bazar

Antivirus sessionː Visualiation malware: https://cybermap.kaspersky.com/

Folder and devices encryption (Veracrypt): How to Create and Use a VeraCrypt Container: https://veracrypt.codeplex.com/wikipage?title=Beginner%27s%20Tutorial Hidden volumes with Veracrypt: https://veracrypt.codeplex.com/wikipage?title=Hidden%20Volume Protect hidden volumes from damage: https://veracrypt.codeplex.com/wikipage?title=Protection%20of%20Hidden%20Volumes

DAY 3


https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual https://donottrack-doc.com/en/intro/ http://digitalshadow.com/ https://myshadow.org/lost-in-small-print/ https://myshadow.org/trace-my-shadow https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual#Self-doxing

Session Doxxing - Self doxxing

https://startpage.com/ https://duckduckgo.com/ http://www.whois-search.com/ http://yacy.net/en/index.html

Searching for information using a post or discussion: http://omgili.com/

Searching for information using an image: https://tineye.com

Bosnia specific https://www.bhtelecom.ba/imenik.html http://www.europronet.ba/imenik/index.php/imenik/fizickalica http://www.hteronet.ba/telefonski-imenik http://www.telemach.ba/Privatni+korisnici/980/Telefonski+imenik.shtml http://www.mtel.ba/single-article/879

Looking for profile(s) of (a) person(s): Check Usernames: http://checkusernames.com/ Lullar: http://com.lullar.com Peek You: http://www.peekyou.com Pipl:https://pipl.com/ Recorded Future: https://www.recordedfuture.com/ Social Mention: http://socialmention.com/ WebMii: http://webmii.com/ Whos Talkin: http://www.whostalkin.com/

Domain tools /Who is? http://www.faqs.org/rfcs/rfc1834.html http://www.faqs.org/rfcs/rfc954.html

Europe http://www.archivesportaleurope.net/directory http://www.wayp.com/eng/europa3.shtml

Resources Ženskaposla.ba (feminist portal)

http://zenskaposla.ba/

TakeBackTheTech campaing https://www.takebackthetech.net/ Safety Road map https://www.takebackthetech.net/know-more

GenderIt - Changing the way you see ICT (feminist reflections on interent policies http://www.genderit.org/

ICTs for Feminist Movement Building: Activist Toolkit https://www.apc.org/en/pubs/icts-feminist-movement-building-activist-toolkit

One World Platform http://oneworldplatform.net/

APC - Association for Progressive Communication https://www.apc.org/

Privacy and digital security ->

Security in a box: https://securityinabox.org/

Me and my shadow: https://myshadow.org/trace-my-shadow

Gender and technology Institute: http://tacticaltech.org/genderandtechnologyinstitute

Manual for social media + safe spaces with gender perspective ttc.io/zenmanual

Manuals for security and privacy with a gender perspective: https://gendersec.tacticaltech.org/wiki/index.php/Manuals_with_a_gender_perspective

Public digital libraries: https://www.memoryoftheworld.org/blog/2014/11/06/a-public-library-of-my-own/

Feminist public library: http://feminism.memoryoftheworld.org/

Documentary Donestech, women and tech (spanish sub eng): https://www.youtube.com/watch?time_continue=37&v=KTaxQZbcL1g

Install Calibre for viewing, organising, transforming ebooks (like the calibre feminist you have in your USB key)ː http://calibre-ebook.com/

Gendersec Gender Tech Herstory Exhibition, Gender Tech Personal Memories, Hands On How the internet works, Hands On Understanding the group – Spectrogram, Holistic security - A day in your life, Holistic Security - Demonstrating the interconnectedness, Threat analysis - Information Mapping I, Threat analysis - Information Mapping II
Feelings The participants were very heterogeneous and provide a lot of diversity and richness in the room. They bound a lot among them because in general they felt alone in relation to their interests in technology and gender-related topics. They felt they had meet new friends and were eager to stay in touch.

During the evening sessions we screen a documentary on internet meme culture and in the second day we had a small party where we play collective games. That worked very well and participants were happy to see facilitators joining them. We also provided them with an USB key with SIAB selected software and also documentation such as guides on security with a gender perspective (zen manual among others) and participants appreciate that material a lot.

Finally, we felt that the rhythm and pace of the agenda worked very well as the first day we concentrate more on the links between gender, feminism and technology enabling the participants to share about their own personal experience. On the second day we concentrate more on notions around anonymity, circumvention and encryption going then to hands on session on a selection of tools. The third day we address in-depth social media platforms as participants were all very intensive users of those and were not aware of many of their privacy and security flaws. By treating them as experts of those platforms and enabling them to pull together their own tactics, they realise that they knew a lot and could develop strategies to make their voices heard without exposing their real identity. That was felt as a very empowering moment.

Feedbacks Review of participants evaluation showed that all participants felt this training had empowered them and enable them to better understand links between gender, feminism, tech related violence, privacy and digital security.
Start Screening related documentaries in the evening.
Stop Training to enigmail.
Keep First memories about something technological.