Difference between revisions of "FemH3ck - Basic privacy and digital security for feminist & LGTBQIA, Indonesia"

From Gender and Tech Resources

 
Line 1: Line 1:
 
{{Activities
 
{{Activities
|Title of the activity=Feminist Hackathon and Digital Feminist Hackathon and Digital Security Training
+
|Title of the activity=Feminist Hackathon and Digital Security Training For Women & LGBTIQ Activist in Indonesia
|Category=Digital Security, Gender and Tech
+
|Category=Privacy Advocacy, Digital Security, Gender and Tech
 
|Start when ?=2015/05/23
 
|Start when ?=2015/05/23
|End when ?=2015/05/23
+
|End when ?=2015/05/25
|Where is located the activity ?=World Regional area, Country and City if relevant
+
|Where is located the activity ?=Jakarta, Indonesia
|Geo-localization of the activity ?=-6.2497764532278, 106.89697265625
+
|Geo-localization of the activity ?=-6.255418246073, 106.81172132427
|Who organize it=Person(s), organization(s)
+
|Who organize it=Dhyta Caturani and PurpleCode Collective
|For whom is it organized=Feminists and LGTBI
+
|For whom is it organized=Feminists and LGBTIQ activists from Jakarta and Jogjakarta
|How many people trained=35
+
|How many people trained=20
|Links about the activity=Articles, videos, photos on-line, ...
+
|Motivations for organizing training=Activists have been using ICT to express their opinions both individually on the causes that they care about and organizationally for their campaigns in the most possible ways, especially with the emerging of social media platforms in the last decade. Women and LGBTIQ persons, although significantly less in number, are also increasingly taking advantage of ICT.
 +
 
 +
ICT especially social media has proven effective in amplifying our voices as activists. But will all the advantages we gain, also come ‘new’ threats along with that: privacy violation, surveillance, online harassment and violence, online threats and even arrest under the country’s cyber law.
 +
 
 +
Although both men and women (activists) become target of those threats, women and LGBTIQ persons are more targeted. Because besides the general threats that men received online. Women and LGBTIQ are being attacked more often and on the basis of their gender and sexualities, such as body shaming, slut calling, and even rape threats.
 +
 
 +
To address the aforementioned problems, there is an urgent need for women and LGBTIQ activists to understand that while using the technology they also need to understand the threats and how to deal with it. This was the major reason why this FemHack and digital security training were being conducted.
 +
|Topics addressed=Privacy & Anonymity, Online Violence Against Women & LGBT, Hands-on digital security training (strong password/keepass, circumvention/TOR, secure mail & PGP, OTR messaging, social media security strategy, basic mobile security)
 +
|Links about the activity=The event was covered by The Jakarta Post (largest English newspaper in the country)
 +
 
 +
[http://www.thejakartapost.com/news/2015/05/24/women-lgbt-raise-awareness-over-online-violence.html Women, LGBT raise awareness over online violence]
 +
 
 +
[http://www.thejakartapost.com/news/2015/06/09/netizens-need-more-knowledge-online-security.html Netizens need more knowledge for online security]
 +
|Upload content=Femhack group photo sm.jpg
 +
}}
 +
{{Planning and documentation
 +
|Detailed schedule and contents=Feminist Hack Days To End Violence Against Women & LGBT
 +
 
 +
 
 +
AGENDA
 +
 
 +
Day 1: Feminist Hackathon #femhack
 +
23 May 2015
 +
 
 +
Time Session
 +
09:30 – 09:55 Registration
 +
09:55 – 10:15 Opening and Introduction
 +
10:15 – 11:45 Digital Privacy – Presentation and Discussion
 +
11:45 – 13:00 Online Violence Against Women & LGBT - Presentation
 +
13:00 – 14:00 Lunch
 +
14:00 – 14:30 Online Violence Against Women & LGBT – Sharing Experience
 +
14:30 – 15:30 Discussion
 +
15:30 – 16:00 Break
 +
16:00 – 17:00 Social Media Survey
 +
17:00 – 17:30 Conclusion & Review
 +
 +
 
 +
Day 2: Digital Security Training
 +
24 May 2015
 +
 
 +
Time Session
 +
10:00 – 10:30 Women in Tech - Presentation
 +
10:30 – 11:00 How the Internet Works & Digital Communication Model
 +
11:00 – 12:00 Strong Password  - Keepass
 +
12:00 – 13:00 Circumvention Tools
 +
13:00 – 14:00 Lunch
 +
14:00 – 14:30 Circumvention Tools
 +
14:30 – 15:30 Privacy & Anonymity
 +
15:30 – 16:00 Break
 +
16:00 – 17:00 Be safe online – Share your strategy!
 +
17:00 – 17:30 Review
 +
 
 +
 
 +
 
 +
Day 3: Digital Security Training
 +
25 May 2015
 +
 
 +
Waktu Session
 +
09:30 – 13:00 Secure Mail & PGP
 +
13:00 – 14:00 Lunch
 +
13:30 – 15:00 Secure Mail & PGP, Key signing party 
 +
15:00 – 16:00 OTR (Off-The-Record) Messaging
 +
16:00 – 16:15 Break
 +
16:15 – 18:00 Mobile Security
 +
18:00 – 18:30 Review
 +
|Methodologies for training=Methodologies:
 +
Using the approach of adult learning where everyone is equal and everyone is both learning and teaching. But given the fact that the issues of Privacy and Digital Security are fairly new to most activists participating in the training, there were several presentation by me and followed with open and interactive discussions. Group discussions methodology were used for experience sharing and strategies sharing. A couple of games were applied to explain specific topics.
 +
|Existing toolkits and resources=I wrote/prepared all presentations based on my personal knowledge, experience and skills on the issues and add some resources from the GTI notes.
 +
|Gender and tech tutorials used=Security in the box, LevelUp,
 +
}}
 +
{{Learning outcomes
 +
|Feelings=The event went very well. As the organizer, I felt a great satisfaction to be able to conduct the training and share what I have learned in the past year. This small achievement serves as a seed of work to show and convince activists about the importance of the issues and it also serves very valuable ground work for me on the issues to build the gender and tech movement in Indonesia.
 +
 
 +
As for participants, they showed big interest and enthusiasm to start taking up the issues within their organization and movement.
 +
|Feedbacks=Participants were very grateful and excited about the event and the new issues they were learning in the training. All of them were very excited to share what they have learned with their friends in their organizations and collectives as now they know that most of digital security strategies will only work if it is applied collectively.
 +
 
 +
Participants also express their hopes for the continuation of the training and discussion after the event, not only for women and LGBTIQ activists but also for other activists working on different social justice issues.
 +
|START=Start looking for opportunities to spread the knowledge and skills on the issues through trainings or public discussions/events. Start collaborating with as many activists as possible.
 +
|STOP=Stop waiting for organizations to come and ask for training. I should be more proactive in approaching individuals to collaborate with, so that they can be the champions on the issues in their organizations/collective and in the movement.
 +
|KEEP=Keep learning about the development of the issues of digital rights and digital security. Keep putting gender and sexuality perspective into privacy and digital security discussion and training, even if it is for activists who are not focusing on gender and sexuality issues.
 +
Keep doing this work with or without financial support.
 
}}
 
}}

Latest revision as of 16:13, 14 July 2015

Title Feminist Hackathon and Digital Security Training For Women & LGBTIQ Activist in Indonesia
Category Privacy Advocacy Digital Security Gender and Tech
Start 2015/05/23
End 2015/05/25
Hours
Scale Jakarta, Indonesia
Geolocalization -6° 15' 19", 106° 48' 42"
Loading map...
Organisation Dhyta Caturani and PurpleCode Collective
Website
Target audience Feminists and LGBTIQ activists from Jakarta and Jogjakarta
Number of participants 20
Context and motivations Activists have been using ICT to express their opinions both individually on the causes that they care about and organizationally for their campaigns in the most possible ways, especially with the emerging of social media platforms in the last decade. Women and LGBTIQ persons, although significantly less in number, are also increasingly taking advantage of ICT.

ICT especially social media has proven effective in amplifying our voices as activists. But will all the advantages we gain, also come ‘new’ threats along with that: privacy violation, surveillance, online harassment and violence, online threats and even arrest under the country’s cyber law.

Although both men and women (activists) become target of those threats, women and LGBTIQ persons are more targeted. Because besides the general threats that men received online. Women and LGBTIQ are being attacked more often and on the basis of their gender and sexualities, such as body shaming, slut calling, and even rape threats.

To address the aforementioned problems, there is an urgent need for women and LGBTIQ activists to understand that while using the technology they also need to understand the threats and how to deal with it. This was the major reason why this FemHack and digital security training were being conducted.

Topics Privacy & Anonymity, Online Violence Against Women & LGBT, Hands-on digital security training (strong password/keepass, circumvention/TOR, secure mail & PGP, OTR messaging, social media security strategy, basic mobile security)
Links [[Links about the activity::The event was covered by The Jakarta Post (largest English newspaper in the country)

Women, LGBT raise awareness over online violence

Netizens need more knowledge for online security]]

Media Femhack group photo sm.jpg
Agenda Feminist Hack Days To End Violence Against Women & LGBT


AGENDA

Day 1: Feminist Hackathon #femhack 23 May 2015

Time Session 09:30 – 09:55 Registration 09:55 – 10:15 Opening and Introduction 10:15 – 11:45 Digital Privacy – Presentation and Discussion 11:45 – 13:00 Online Violence Against Women & LGBT - Presentation 13:00 – 14:00 Lunch 14:00 – 14:30 Online Violence Against Women & LGBT – Sharing Experience 14:30 – 15:30 Discussion 15:30 – 16:00 Break 16:00 – 17:00 Social Media Survey 17:00 – 17:30 Conclusion & Review


Day 2: Digital Security Training 24 May 2015

Time Session 10:00 – 10:30 Women in Tech - Presentation 10:30 – 11:00 How the Internet Works & Digital Communication Model 11:00 – 12:00 Strong Password - Keepass 12:00 – 13:00 Circumvention Tools 13:00 – 14:00 Lunch 14:00 – 14:30 Circumvention Tools 14:30 – 15:30 Privacy & Anonymity 15:30 – 16:00 Break 16:00 – 17:00 Be safe online – Share your strategy! 17:00 – 17:30 Review


Day 3: Digital Security Training 25 May 2015

Waktu Session 09:30 – 13:00 Secure Mail & PGP 13:00 – 14:00 Lunch 13:30 – 15:00 Secure Mail & PGP, Key signing party 15:00 – 16:00 OTR (Off-The-Record) Messaging 16:00 – 16:15 Break 16:15 – 18:00 Mobile Security 18:00 – 18:30 Review

Methodologies Methodologies:

Using the approach of adult learning where everyone is equal and everyone is both learning and teaching. But given the fact that the issues of Privacy and Digital Security are fairly new to most activists participating in the training, there were several presentation by me and followed with open and interactive discussions. Group discussions methodology were used for experience sharing and strategies sharing. A couple of games were applied to explain specific topics.

Resources I wrote/prepared all presentations based on my personal knowledge, experience and skills on the issues and add some resources from the GTI notes.
Gendersec Security in the box, LevelUp
Feelings The event went very well. As the organizer, I felt a great satisfaction to be able to conduct the training and share what I have learned in the past year. This small achievement serves as a seed of work to show and convince activists about the importance of the issues and it also serves very valuable ground work for me on the issues to build the gender and tech movement in Indonesia.

As for participants, they showed big interest and enthusiasm to start taking up the issues within their organization and movement.

Feedbacks Participants were very grateful and excited about the event and the new issues they were learning in the training. All of them were very excited to share what they have learned with their friends in their organizations and collectives as now they know that most of digital security strategies will only work if it is applied collectively.

Participants also express their hopes for the continuation of the training and discussion after the event, not only for women and LGBTIQ activists but also for other activists working on different social justice issues.

Start Start looking for opportunities to spread the knowledge and skills on the issues through trainings or public discussions/events. Start collaborating with as many activists as possible.
Stop Stop waiting for organizations to come and ask for training. I should be more proactive in approaching individuals to collaborate with, so that they can be the champions on the issues in their organizations/collective and in the movement.
Keep Keep learning about the development of the issues of digital rights and digital security. Keep putting gender and sexuality perspective into privacy and digital security discussion and training, even if it is for activists who are not focusing on gender and sexuality issues.

Keep doing this work with or without financial support.