Property

Detailed schedule and contents

From Gender and Tech Resources

This is a property of type Text. It links to pages that use the form Activities.

Pages using the property "Detailed schedule and contents"

Showing 25 pages using this property.

(previous 25) (next 25)

G

Gender and Technology Institute, Berlin +Morning Tracks Starting on Wednesday, you will have the option to choose between two tracks which you will continue with for the rest of the week “Training Skills” and “Privacy Advocacy”. 1. Privacy Advocacy This track has been designed to develop our understanding of digital privacy from a practical perspective. The aim is to strengthen our work as digital privacy advocates who can talk practically about the issues, what can be done and what this means in the context of our work. Each day we will combine discussion based learning with practical hands-on sessions and together not only learn from each other but build our confidence and skills as future advocates. Over five days, we will work to create some of the key building blocks that will help us better understand how technology, the infrastructure and the industry works and how to convince others to make better choices. We will start by looking behind the screens to see where our data goes, how the data industry works and explore our digital shadows. We will then look at surveillance, how it works practically and what this means for freedom of expression and association. Moving from behind the screens to what happens within them, we will look at online harassment and intimidation, particularly in the context of gender, and work together through strategies for handling this; from identity management to social media tactics. Finally, we will work on skills for advocating around privacy, influencing others and breaking down common arguments, such as 'nothing to hide' and 'national security' arguments. On the final morning, participants will be expected to prepare and lead a session on digital privacy and will receive feedback. Important to note that this track requires continuity through all learning sessions. 2. Training Skills This track, designed for participants relatively knowledgeable about digital security focuses on practicalities and best-practices of facilitating digital security trainings for human rights defenders and activists. The areas of focus will include: Training as a process, wherein we will explore the role and limitations of training on digital security, and best practices relating to agenda design, logistics, evaluation and more. We will highlight important principles of facilitation in the context of a holistic approach to security which recognises the central importance of well-being and broader best practices relating to security management and planning to a successful digital security training: How does a trainer deal with stress and trauma among participants, and how might these factors impact a participant's ability to learn? What are effective and ineffective ways to promote security in a learning environment, and what does gender justice in a digital security training look like? We will also focus on the different ways adults learn in order to prepare participants for how to deal with different styles and learning types, and design creative and interactive means of teaching sometimes dry and complicated technical concepts. It is important to note that this track requires continuity through all learning sessions. You can find here more details about the foreseen learning sessions that will compose this track. Afternoon Hands-On Digital Security and Privacy Tools The track on digital security and privacy tools is oriented towards all participants of the Institute and will split between those who already have basic knowledge and experiences with security tools and strategies and those who are already using them. The sessions here aim to explain complicated concepts (e.g how encryption works), help you understand how these can help you in your work, and teach you the available and trusted tools to do it. This track will also host install party sessions in order to help participants who want to migrate to Gnu/Linux to install a free distribution. Depending on your level of knowledge, the learning outcomes will be determined together with the facilitators and the rest of the group but could include: mobile security, encryption of devices, files and mails, anonymisation and bypassing of censorship, how to use Tails and how to organise a key signing party. Basics Gender and Technology Basics These sessions are oriented towards all participants with or without previous knowledge of feminism and/or gender social justice issues. The expected learning outcomes encompass a better understanding about the different feminist movements, which are the feminist and post-feminist theories in relation to technologies and why there is a gender and cultural diversity gap in computer sciences, free software and hacker cultures and which are the strategies to reduce those gaps. This track will also address the different types of on-line threats and on-line gender based violence inasmuch as the tactics and initiatives enabling to overcome and tackle those issues. The different learning sessions will mix different methodologies such as storytelling, focussed group discussion, videos, talks and many other surprises. You can browse among the bibliographic resources dealing with those topics here and also visit our page listing gender and feminist initiatives online Computer and Security Basics These sessions are aimed at people who want to start with the basics, or catch up on what they think have missed in previous trainings or learning on digital security such as how the internet works, history of operating systems, why everyone loves free and open source software, malware and viruses, basics of data storage or hardware security etc. Skillshares These sessions will allow participants who have a specific skill or experience relevant to the Institute, which won't be covered in the content tracks, to share with others. These could include topics such as “Strategies to counter online violence”, “How Mesh Networks work”, “Feminist Technology Infrastructure” etc.  +
Gender and Technology Institute, Ecuador +You can read about the evaluation and agenda of the GTI in Ecuador here: https://gendersec.tacticaltech.org/wiki/images/7/72/Documentacion_Evaluacion_IGT.pdf The document is available in Spanish so far.  +
Gender and Technology Institute, LAC, Start Up Meeting, Mexico +(English below) DIA 1 Lunes 12 de Febrero 2018: Presentaciones y mapeos 8:00- 9:00 Desayuno 9:30 - 10:00 Bienvenidas y presentación informal de las participantes. 10:00 – 10:30 Presentaciones: Tactical Tech Collective Tecnicas Rudas El Instituto de Genero y Tecnología Objetivos del encuentro Agenda Espacio y logística administrativa Espacio jerga/pad de recursos y documentación Acuerdos para el encuentro 10:30 - 12:00 Presentación de trabajos y proyectos de las organizaciones y participantes - Primera Parte (30 mins por grupo + 15 mins Q&A) Dos grupos responderán a preguntas sobre sus áreas de trabajo, su experiencia de base y sus luchas. Grupo 1: Seguridad con perspectiva de genero (Iniciativa Mesoamericana de Defensoras, Luchadoras, Laboratorio de interconectividades, Ciberseguras) Grupo 2: Seguridad para defensoras (Las Rudas, Hivos Digital Integrity, Broederlijk Delen as a Regional Security Expert for the Andes region, Protection International) 12:00 - 12:30 Pausa para el café 12:30 - 14:00 Presentación de trabajos y proyectos de las organizaciones y participantes - Segunda Parte (30 mins por grupo + 15 mins Q&A) Dos grupos responderán a preguntas sobre sus áreas de trabajo, su experiencia de base, sus luchas Grupo 3: Organizaciones e iniciativas de defensoras (Via Campesina/Cloc + JASS- Mujeres, Tierra y Paz + Red Latinoamericana de mujeres defensoras de derechos sociales y ambientales) Grupo 4: Financiadoras (FAO, FCM, FRIDA, Mamacash)14:00 - 15:30 Comida 15:30 Ejercicio de Movimiento para empezar la tarde 15:40- 17:30 Comprensión de los fenómeno de ataques y violencia contra mujeres defensoras y sus aliadas Mapeo del ecosistema - actores/organizaciones que trabajan con defensoras de la tierra más perfiles de defensoras de la tierra. Comprensión de los fenómeno de ataques y violencia contra mujeres defensoras y sus aliadas. Identificar casos en los cuales se usan especialmente las tecnologias de información y comunicación para llevar a cabo esos ataques. Presentación sobre estrategias de defensa y mitigación. 17:30 Plenaria - Cierra del primer día Sesión extra: 17:45 -18:30 Bazar tecnológico para compartir tecnologías (15 min por estación) Tres estaciones con presentación de herramientas varias de privacidad y seguridad digital (navegador, correos alternativos, cifrado, etc) 20:00 - 21:00 Cena --------------------------------------------------------------------------------------------------------- DIA 2 Martes 13 de Febrero 2018: creación de contenidos curriculares 8:00- 9:00 Desayuno 9:30 - 10: 00 Repaso del día uno 10:00 - 11:30 Lluvia de ideas para identificar el currículo necesario (sesiones y metodologías de facilitación) 11:30 - 12:00 Pausa para el café 12:00 -13:00 Presentación sobre contenidos curriculares Tactical Tech Collective Ciberseguras y Cyberwomen Luchadoras 13:00 Mapear nuevos contenidos Dividir en grupos de trabajo por cada categoría curricular definida en la lluvia de ideas (grupos diversos).14:00 - 15:30 Comida 15:30 Ejercicio de Movimiento para empezar la tarde 15:40 - 17:00 Mismos grupos de trabajo por cada categoría curricular siguen el trabajo de la mañana. 17:00 - 17:30 Puesta en común sobre las sesiones diseñadas por los grupos 17:30 - 17:45 Pausa para el café Sesión extra: 17: 45 - 18:30 Sesión de autocuidado . 20:00 - 21:00 Cena --------------------------------------------------------------------------------------------------------- DIA 3 Miércoles 14 de Febrero: Mapeo de participantes y lugar para organizar el Instituto de Genero y Tecnología 8:00- 9:00 Desayuno 9:30 - 11:30 Repaso del currículo trabajada el primer día 11:30- 12:00 Pausa para el café 12:00 - 13:00 Lluvia de ideas para seleccionar participantes y organizaciones 13:00 - 14:00 Ideas para seleccionar país, local y organizaciones. Presentación de requisitos en cuanto países y locales Dividir en grupos para crear lista de posibles países, locales y organizaciones aliadas 14:00 - 15:00 Comida 15:00 Ejercicio de Movimiento para empezar la tarde 15:10 - 16:00 Lista de chequeo para el encuentro del Instituto de Genero y Tecnología Dividir en 3 grupos para discutir y crear lista de chequeo para: Antes del encuentro (logística, etc) Durante el encuentro (logística, etc) Seguimiento luego del encuentro (seguimiento, evaluación, mentoria) 16:00 - 16:15 Pausa para el café 16:15 - 17:00: Próximos pasos Planes para sinergia y difusión Herramientas de comunicación y difusión17:00 - 17:30 Cierre Ronda de evaluación de las jornadas Agradecimientos Sesión extra: Por la noche jugamos a crear Ciencia ficción feminista 20:00 - 21:00 Cena ++++++++++++++++++++++++++++++++++++++++++++++++++++ (Español más arriba) DAY 1 Monday 12th of February 2018: Presentations and setting the scene 8:00- 9:00 Breakfast 9:30 - 10:00 Welcome and informal participants presentation 10:00 - 10:30 Presentations: Tactical Tech Collective Tecnicas Rudas The Gender and Technology Institute Goals of the preparatory meeting and agenda Spaces and admin logistics Spaces for jargon/documentation pads Shared agreements for the meeting 10:30 - 12:00 Presentation of the work and projects achieved by organisations and participants - part 1 2 groups will answer question about their areas of work, experiences and struggles (30 mins each + 15 mins Q&A) Group 1: Security with a gender perspective (Iniciativa Mesoamericana de Defensoras, Luchadoras, Laboratorio de interconectividades, Ciberseguras) Group 2: Security for WHRD land defenders (Las Rudas, Hivos Digital Integrity, Broederlijk Delen as a Regional Security Expert for the Andes region, Protection International) 12:00 - 12:30: Coffee Break12:30 - 14:00 Presentation of the work and projects achieved by organisations and participants - part 2 2 groups will answer question about their areas of work, experiences and struggles (30 mins each + 15 mins Q&A) Group 3: Orgnaisations and initiatives of WHRD land defenders (Via Campesina/Cloc + JASS-Mujeres, Tierra y Paz + Red Latinoamericana de mujeres defensoras de derechos sociales y ambientales) Group 4: Funders (FAO - FCM - FRIDA - Mamacash) 14:00 - 15:30 Lunch 15:30- 17:15 Understanding the nature of risks, attacks and violences faced by women human rights defenders (WHRD) and land defenders and their allies Energizer Mapping ecosystem of actors/organisations working with WHRD land defenders and profiles of WHRD land defenders Analysing the different contexts that are shaping the risks, attacks and violences faced by WHRD Identifying cases of ICT driven attacks against WHRD land defenders and their allies Input about strategies of defence and mitigation of risks 17:15 – 17:30 Plenary closure first day Extra session: 17:45 -18:30 Skill sharing Technological Bazaar We will have three stations of 15 minutes each showcasing different privacy and digital security tools 20:00 - 21:00 Dinner --------------------------------------------------------------------------------------------------------- DAY 2 Tuesday 13th February 2018: Curricula production for Gender and Tech Institute (GTI) 8:00- 9:00 Breakfast 9:30 - 10: 00 Recap of previous day, questions, introducing day 2 10:00 - 11:30 Brainstorming to identify the curricula that needs to be developed for next GTI (sessions and facilitation methodologies)11:30 - 12:00 Coffee Break 12:00 -13:00 Input about available gender and tech curricula Gender and Technology Institutes > Gendersec wiki + My shadow + Data Detox Ciberseguras and cyberwomen Luchadoras 13:00 - 14:00 Working groups produce new curricular sessions - part 1 14:00 - 15:30 Lunch 15:30 - 17h00 Working groups produce new curricular sessions - part 2 17h00 - 17h30 Plenary about sessions produced during the day and closure 17: 30 - 17:45 Break 17: 45 – 18:30 Skill sharing session: Self-care 20:00 - 21:00 Dinner --------------------------------------------------------------------------------------------------------- DAY 3 Wednesday 14th of February: Mapping participants and logistics for next GTI 8:00- 9:00 Breakfast 9:30 - 11:30 Review of curricula production 11:30- 12:00 Coffee Break 12:00 - 13:00 Brainstorming about participants and organisations that should be involved in next GTI 13:00 - 14:00 Choosing venue and country Input about requisites and criteria that need to be taken into account for choosing venue and country for hosting next GTI Listing and debating possible countries + venues + local partner organisations 14:00 - 15:00 Lunch 15:00 -16:00 Logistics before, during and after the GTI Three groups list things that need to be taken into account meanwhile preparing the GTI, during the GTI and also regarding follow up of participants after the GTI 16:00- 16:15 Coffee Break16:15 - 17:00: Next steps, possible synergies and collaboration, diffusion of the call for the GTI, documentation 17:00 - 17:30 Closure session Evaluation of the preparatory meeting Acknowledgements 20:00 - 21:00 Dinner Night proposal: Shaping Feminist Science Fiction together  +
Gender and Technology Institute, LAC, Start Up Meeting, Mexico DF +DIA 1 Lunes 12 de Febrero 2018: Presentaciones y mapeos 8:00- 9:00 Desayuno 9:30 - 10:00 Bienvenidxs y presentación informal de las participantes. 10:00 - 10:30 Presentaciones: Tactical Tech Collective Tecnicas Rudas El Instituto de Genero y Tecnología Objetivos del encuentro Agenda Espacio y logística administrativa Espacio jerga/pad de recursos y documentacion Acuerdos para el encuentro 10:30 - 12:00 Presentación de trabajos y proyectos de las organizaciones y participantes - Primera Parte (30 mins por grupo + 15 mins Q&A) Dos grupos responderán a preguntas sobre sus áreas de trabajo, su experiencia de base y sus luchas Grupo 1: Seguridad con perspectiva de genero (Iniciativa Mesoamericana de Defensoras, Luchadoras, Laboratorio de interconectividades, Ciberseguras) Grupo 2: Seguridad para defensoras (Las Rudas, Hivos Digital Integrity, Broederlijk Delen as a Regional Security Expert for the Andes region, Protection International) 12:00 - 12:30 Pausa para el café 12:30 - 14:00 Presentación de trabajos y proyectos de las organizaciones y participantes - Segunda Parte (30 mins por grupo + 15 mins Q&A) Dos grupos responderán a preguntas sobre sus áreas de trabajo, su experiencia de base, sus luchas Grupo 3: Organizaciones e iniciativas de defensoras (Via Campesina/Cloc + JASS-Mujeres, Tierra y Paz + Red Latinoamericana de mujeres defensoras de derechos sociales y ambientales) Grupo 4: Financiadoras (FAO, FCM, FRIDA, Mamacash) 14:00 - 15:30 Comida 15:30 Ejericio de Movimiento para empezar la tarde 15:40- 17:30 Comprensión de los fenómeno de ataques y violencia contra mujeres defensoras y sus aliadas Mapeo del ecosistema - actores/organizaciones que trabajan con defensoras de la tierra más perfiles de defensoras de la tierra. Comprensión de los fenómeno de ataques y violencia contra mujeres defensoras y sus aliadas. Identificar casos en los cuales se usan especialmente las tecnologias de información y comunicación para llevar a cabo esos ataques. Presentación sobre estrategias de defensa y mitigación. 17:30 Plenaria - Cierra del primer dia Sesion extra: 17:45 -18:30 Bazar tecnologico para compartir tecnologías (15 min por estación) Tres estaciones con presentacion de herramientas varias de privacidad y seguridad digital (navegador, correos alternativos, cifrado, etc) 20:00 - 21:00 Cena --------------------------------------------------------------------------------------------------------------------------------------- DIA 2 Martes 13 de Febrero 2018: creación de curricula 8:00- 9:00 Desayuno 9:30 - 10: 00 Repaso del día uno 10:00 - 11:30 Lluvia de ideas para identificar la curricula necesaria (sesiones y metodologías de facilitación) 11:30 - 12:00 Pausa para el café 12:00 -13:00 Presentación sobre contenidos curriculares Tactical Tech Collective Ciberseguras y Cyberwomen Luchadoras 13:00 Mapear nuevo contenido Dividir en grupos de trabajo por cada categoria curricular definida en la lluvia de ideas (grupos diversos). 14:00 - 15:30 Comida 15:30 Ejericio de Movimiento para empezar la tarde 15:40 - 17:00 Mismos grupos de trabajo por cada categoria curricular siguen el trabajo de la mañana. 17:00 - 17:30 Puesta en comun sobre las sesiones disenadas por los grupos 17:30 - 17:45 Pausa para el café Sesion extra: 17: 45 - 18:30 Sesión de autocuidado . 20:00 - 21:00 Cena --------------------------------------------------------------------------------------------------------------------------------------- DIA 3 Miercoles 14 de Febrero: mapeo de participantes y lugar para organizar el Instituto de Genero y Tecnología 8:00- 9:00 Desayuno 9:30 - 11:30 Repaso de la curricula trabajada el primer día 11:30- 12:00 Pausa para el café 12:00 - 13:00 Lluvia de ideas para seleccionar participantes y organizaciones 13:00 - 14:00 Ideas para seleccionar país, local y organizaciones. Presentación de requisitos en cuanto paises y locales (5 minutos) Dividir en grupos para crear lista de posibles paises, locales y organizaciones aliadas 14:00 - 15:00 Comida 15:00 Ejericio de Movimiento para empezar la tarde 15:10 - 16:00 Lista de chequeo para el encuentro del Instituto de Genero y Tecnología Dividir en 3 grupos para discutir y crear lista de chequeo para: antes del encuentro (logistica, etc) durante el encuentro (logistica, etc) seguimiento luego del encuentro (seguimiento, evaluación, mentoria) 16:00 - 16:15 Pausa para el café 16:15 - 17:00: Próximos pasos planes para sinergia y difusión herramientas de comunicación y difusión 17:00 - 17:30 Cierre ronda de evaluación de las jornadas agradecimientos Sesion extra: Por la noche jugamos a crear Ciencia ficción feminista 20:00 - 21:00 Cena --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- (Español en linea 3) DAY 1 Monday 12th of February 2018: Presentations and setting the scene 8:00- 9:00 Breakfast 9:30 - 10:00 Welcome and informal participants presentation 10:00 - 10:30 Presentations: Tactical Tech Collective Tecnicas Rudas The Gender and Technology Institute Goals of the preparatory meeting and agenda Spaces and admin logistics Spaces for jargon/documentation pads Shared agreements for the meeting 10:30 - 12:00 Presentation of the work and projects achieved by organisations and participants - part 1 Group 1 and 2 12:00 - 12:30: Coffee Break 12:30 - 14:00 Presentation of the work and projects achieved by organisations and participants - part 2 Group 3 and 4 4 groups will answer question about their areas of work, experiences and struggles (30 mins each + 15 mins Q&A) Group 1: Security with a gender perspective (Iniciativa Mesoamericana de Defensoras, Luchadoras, Laboratorio de interconectividades, Ciberseguras) Group 2: Security for WHRD land defenders (Las Rudas, Hivos Digital Integrity, Broederlijk Delen as a Regional Security Expert for the Andes region, Protection International) Group 3: Orgnaisations and initiatives of WHRD land defenders (Via Campesina/Cloc + JASS-Mujeres, Tierra y Paz + Red Latinoamericana de mujeres defensoras de derechos sociales y ambientales) Group 4: Funders (FAO - FCM - FRIDA - Mamacash) 14:00 - 15:30 Lunch 15:30- 17:15 Understanding the nature of risks, attacks and violences faced by women human rights defenders (WHRD) and land defenders and their allies Energizer Mapping ecosystem of actors/organisations working with WHRD land defenders and profiles of WHRD land defenders Analysing the different contexts that are shaping the risks, attacks and violences faced by WHRD Identifying cases of ICT driven attacks against WHRD land defenders and their allies Input about strategies of defense and mitigation of risks 17:15 – 17:30 Plenary closure first day Extra session: 17:45 -18:30 Skill sharing Technological Bazaar We will have three stations of 15 minutes each showcasing different privacy and digital security tools 20:00 - 21:00 Dinner ------------------------------------------------------------------------------------------------------------------------ DAY 2 Tuesday 13th Februray 2018: Curricula production for Gender and Tech Institute (GTI) 8:00- 9:00 Breakfast 9:30 - 10: 00 Recap of previous day, questions, introducing day 2 10:00 - 11:30 Brainstorming to identify the curricula that needs to be developed for next GTI (sessions and facilitation methodologies) 11:30 - 12:00 Coffee Break 12:00 -13:00 Input about available gender and tech curricula Gender and Technology Institutes > Gendersec wiki + My shadow + Data Detox Ciberseguras and cyberwomen Luchadoras 13:00 Producing new curricular contents Working groups produce new curricular sessions part 1 14:00 - 15:30 Lunch 15:30 - 17h00 Working groups produce new curricular sessions - part 2 17h00 - 17h30 Plenary about sessions produced during the day and closure 17: 30 - 17:45 Break 17: 45 – 18:30 Skill sharing session: Self-care 20:00 - 21:00 Dinner ------------------------------------------------------------------------------------------------------------------------ DAY 3 Wednesday 14th of February: Mapping participants and logistics for next GTI 8:00- 9:00 Breakfast 9:30 - 11:30 Review of curricula production 11:30- 12:00 Coffee Break 12:00 - 13:00 Brainstorming about participants and organisations that should be involved in next GTI 13:00 - 14:00 Choosing venue and country Input about requisites and criteria that need to be atken into account for chossing venue and country for hosting next GTI Listing and debating possible countries + venues + local partner organisations 14:00 - 15:00 Lunch 15:00 -16:00 Logistics before, during and after the GTI Three groups list things that need to be taken into account meanwhile preparing the GTI, during the GTI and also regarding follow up of participants after the GTI 16:00- 16:15 Coffee Break 16:15 - 17:00: Next steps, possible synergies and collaboraztion, diffusion of the call for the GTI, documentation 17:00 - 17:30 Closure Evaluation of the preparatory meeting and acknowledgements 20:00 - 21:00 Dinner Night proposal: Shaping Feminist Science Fiction together  +
Gender and Technology Institute, Panama +Throughout this event, participants were involved in different tracks such as digital security, mobiles security, politics of data, gender and technology and training which were complemented with three different labs. Each track encompassed the following sessions: - Digital Security: Security basics, Browser control, Malware attacks, Server attacks and hosting solutions, Anonymity, Encryption, TAILS and Deep web. - Mobiles security: Understanding of infrastructure and mobiles, Security and privacy configuration for mobiles, Alternatives for telephony over VOIP. - Politics of data: Metadata, Criteria for selecting and developing apps, Creating and protecting databases, SEO and positioning your contents. - Gender and technology: Creative uses of social networks, Feminist campaigning taking into account privacy and security, Reporting and documenting gender based online violence, Hacking hate speech, Big data and sexual surveillance. - Training skills: ADIDS for education to technologies, Create safe spaces. Besides those sessions, there were three labs at the end of the day that people could attend: the feminist hackerspace, a science fiction lab and a self care lab. We can note that lots of participants engaged in the hackerspace even if it was not a mandatory activity. It shows that digital security and privacy are concepts that they understood as relevant for their activity. Some didn't have any experience with free software and privacy tools before, but they were clearly in search for learning and using immediately or as soon as possible those in their routines. The other most attended lab was the self care one where the facilitator provided methodologies for dealing with stress and anxiety, how to relax and rebalance when facing fear and trauma, and provided space for exchanging on methods for collective and individual self care. The science fiction lab was also attended by some participants during the first two days but was dropped in the last two days as participants felt it was more urgent to attend the hackerspace or the self care lab. Anyhow it enabled to work on the issue of creativity and how to develop methodologies that easy the process of collective creation of imaginaries, narratives and desires in relation to our technologies and activisms.  +
Gender and Technology Institute, Uruguay +Through the event, the participants attended different sessions distributed in the following big topics: digital security, security in mobiles, privacy, data politics, gender and technology, replication and training. They were developed across the following sessions: - Digital security: basic concepts about security, how to take control of the browser, malware’s attacks, server’s attacks, web hosting, anonymity, encryption, TOR, TAILS and deep web. - Mobile security: Understand infrastructure and mobiles, security and privacy settings for mobiles, telephony alternatives with VOIP. - Data politics: Metadata, create and protect databases, free mapping processes, technology sovereignty, collective memory. - Campaigns: Creative uses of social media, planning of campaign considering privacy and security, search engine optimization, push profiles of land right defenders under risk, hate speech and feminist counter-speech. - Holistic security: Technology in demonstrations, documenting violence, preparing an event or training in an unknown context, emotions and addictions using social media. And at the end of the day there were two labs that people could attend: the feminist hackerspace and the self-care lab. We noticed that many of the participants went to the hackerspace, even when that activity was not required for the institute. It shows us that digital security, privacy and self-learning are activities that they understand are relevant for their own work. Some of them didn’t have any previous experience with free software and privacy tools, but they were looking to learn about this options and use them as soon as they could. In the self-care lab, one facilitator was providing methodologies to deal with stress and anxiety as well as to learn to relax and ground in front of fear and trauma. She provided a space to share methods of collective and individual care. About the schedule, the first day we worked with all the participants to clarify the goals of the GTI, the shared agreements, media protocols and documentation, as well as all important logistic information. There was also a symbolic action to begin the institute and connect between all of us. In the afternoon the participants shared in small groups about knowledge that comes from their ancestors and their first memories of technology as well as how their relationship with technology has been influenced by their gender as well as other intersectional dimensions like geographic origin, social class, access to education, opportunities to education and so on. Based on those conversations we moved on into a first collective session about what integral security means, detailing many areas that can be protected as well as strategies of mitigation that exist. The participants shared some of their security strategies linking the relationship between physical integrity, digital security and psychosocial well-being. The last session allowed us all to visibilize the diversity of knowledge and security practices that the participants and their networks already have. It also let us see that the participants were already applying security practices that we also use in digital environments, strategies known like “fortification”, “reduction”, “obfuscation” and "compartmentalization". That first day allowed the participants to understand that technologies are diverse and broad and that ancestral technologies are valuable technical knowledge that we need to reclaim, showing how all of them have an expert relationship with many technical knowledges. It also allowed us to all of us to start from a shared vocabulary as well as to have a better understanding of the diversity of contexts, challenges and strategies. About the schedule during the GTI, it usually was 3 different sessions in parallel that allowed the participants to find the session that better accommodate their interests. All the sessions were facilitated by 2 or 3 facilitators and one additional person was taking notes. Finally, all the facilitators were meeting at the end of the day to evaluate how everything went, what was the evaluation of their sessions by the participants and which changes they needed to implement the next day. The last day was designed for the participants to have strategical conversations about topics they needed to go deep in. And at the end we had a closing session where we discussed next steps after the GTI, which activities, trainings, or facilitations they were planning, how they wanted to keep in touch and how to manage the documentation of the sessions. The next steps will be to create a mailing list for participants, share reviewed documentation, update the curricula as well as to create this document. We will also do a follow up of each participant to understand which are the trainings and awareness raising activities they are planning in their own networks and communities, and see what is the best way that we can support their efforts.  +

H

Hackerspace Feminista. Quito, Ecuador +Fue un espacio de encuentro, volvernos a ver y recordar la gran experiencia que vivimos en el IGT, con la excusa de hacer una jornada de instalación. Al ser una sábado, la llegada de las participantes ocurrió durante 2 horas. No teníamos mucho tiempo, ni muchas maquinas para migrar, así que con dos maquinas que llevaban las compañeras hicimos algunos intentos. Tuvimos un inconveniente con una maquina que no logramos revivir, es una Lenovo idepad 100s, desde entonces no arranca y dice que esta activo el bitlocker, otro reto más con los malditos DRM Digital Rights/Restrictions Management.  +
Herramientas comunicacionales para la protección del territorio y naturaleza, Ecuador +Viernes – 07 de diciembre Hora Actividad Responsable Materiales 12h30 Llegada y almuerzo en Hostal Casa Kolping CEDHU 14h00-14h30 Bienvenida al curso, presentación de objetivos del módulo y explicación de temas logísticos. CEDHU Presentación de lxs participantes y equipo de facilitación. Reglas durante el taller. CEDHU 14h30-16h00 Recuento del módulo anterior y revisión de tareas Facilitadora: CEDHU Presentación de resultados del trabajo con las herramientas cartográficas usadas el módulo III Facilitadora: CEDHU 16h00-18h00 Presentación de herramientas jurídicas: Derechos colectivos y mecanismos de exigibilidad Facilitadora: Nathy Yépez 18h00-19h00 Cena Casa Kolping Sábado 08 de diciembre Hora Actividad Metodología Responsable 7:30 – 8:30 Desayuno 8:45 – 9:00 Inicio Dinámicas de inicio jornada Jorge 9:00 – 9:15 Presentación de taller comunicación Facilitadoras dan la bienvenida Presentación de agenda – taller Jorge 9:15 – 9:30 Presentación grupal Cada persona hace una presentación corta:
nombre, de qué organización, comunidad viene, qué actividad realiza y qué comida le gusta. Jorge 9:30 – 9:45 Establecimiento de acuerdos Escribimos en un papelote los acuerdos a los que llegamos para el taller a partir de dos preguntas generadoras. ¿Qué quiero aprender en el taller? ¿Qué saber puedo compartir en el taller? Jorge 9:45 – 10:30 El Árbol Vital: Comunicar como defensor de Derechos Humanos y de la Naturaleza Ejercicio de reconocimiento como defensor/a Este árbol soy yo Ahora vamos a dibujar en la cartulina A4 el árbol que encontramos en nuestro paseo imaginario. En el tronco del árbol escribamos nuestro nombre. A continuación relacionamos cada parte del árbol con nuestra vida comunitaria, así: La Raíz, Hojas, Flores, Frutos Jorge 10:30 11:00 Plenaria JOrge 11:00 11:30 Lluvia de ideas Se pide a los y las participantes que realicen una lluvia de ideas con pocas palabras sobre la palabra comunicación y que la escriban en una cartulina. Cada uno deberá leer su cartulina al grupo y pagarla en el papelote. Jorge 11:30 – 11:45 Trabajo de cooperación, dialogo y organización Ejercicio de organización por grupos de la torre de sorbetes Jorge 11:45 12:45 ¿Qué quiero comunicar? Mapa de la comunicación y defensa del territorio Se organizan en grupos a partir de su cercanía territorial. Cada grupo deberá dibujar un mapa donde represente a su comunidad, organización, barrio, ciudad. (se dividen por regiones) JOrge 12:45 – 13:00 Plenaria Plenaria sobre dialogo y construcción colectiva Jorge 13:00 – 14:00 Almuerzo Barriga llena corazón contento Módulo IV, Segunda parte: Protección y Seguridad para defensoras y defensores del territorio. Seguridad Digital: telefonía celular e internet. Hora Actividad Metodología Responsable 14:00 – 14:10 Introducción al Análisis de Riesgos y la protección integral Breve introducción al enfoque integral de la protección a defensoras. En trabajo en grupos (los mismos que en la mañana) se deben contestar preguntas en un papelografo. Maka 14:10 – 14:20 Mapa de Actividades - ¿Cuáles son todas las actividades de defensa y promoción de los derechos humanos que realiza la defensora y/o su organización? ¿Algunas son más riesgosas? ¿Los riesgos son de ataques a nuestra integridad física y digital o también emocional y riesgos por desgaste? Maka 14:20 – 14:30 Análisis de contexto ¿Cuál es el contexto económico, político, jurídico, social en el que nos desempeñamos? ¿Existen actores agresores que no sean actores estatales? Califica el contexto psicosocial: ¿existe temor, miedo, frustración social por un contexto de violencia política? ¿Cómo impacta en la labor? Maka 14:30 – 14:40 Mapa de Actores ¿Quién son los actores susceptibles de atacarnos por nuestra labor? ¿Qué tan fuertes y amplias son nuestras alianzas con actores a nivel local, estatal, nacional e internacional? ¿Cuál es la cadena de mando? ¿Existe manera de incidir en ellos? ¿Qué actores tienen más o menos poder? ¿De qué manera se pueden movilizar lox aliadxs? ¿Qué apoyo podrían brindar? Maka 14:40 – 15:00 Identificar riesgos Incidente de Seguridad Un evento fuera de lo común que afecta a la seguridad física, digital y/o emocional de la defensora y/o de su familia, organización, entorno. Amenaza Una amenaza es un incidente de seguridad que tiene un impacto alto en la integridad física, digital y/o emocional de la defensora, y del cual recuperarse es más difícil. No todos los incidentes de seguridad son amenazas, pero todas las amenazas son incidentes de seguridad. Ataque Un ataque es un incidente de seguridad que tiene un impacto alto en la integridad física, digital y/o emocional de la defensora, y del cual recuperarse es más difícil. El ataque es directamente dirigido en contra de la persona defensora o su familia o aliados estratégicos. Maka 15:00 – 15:30 Diseño de planes de protección digital Planes de prevención y mitigación poniendo énfasis en la comunicación y el bienestar colectivo. Maka 15:30 – 17:00 Herramientas de seguridad digital ¿Cómo funciona la telefonía celular e Internet? Maka 17:00-18:00 Comunicación móvil Conocer nuestro celular, revisar la configuración de cuentas Googles y conocer algunas aplicaciones seguras de comunicación Maka Domingo 9 de Diciembre Hora Actividad Metodología Responsable 8:00 – 9:00 Continuidad Herramientas de mensajería Cuáles son los criterios para escoger una aplicación de mensajería segura Maka 9:00 – 10:00 Correo Seguro Cómo funciona el correo electrónico Maka 10:00 – 11:00 Contraseñas seguras Cuáles son los criterios para crear una contraseña segura Maka 11:00 – 12:00 Evaluación y preguntas Cierre CEDHU  +
Holistic digital security training for women journalists, Mexico +The workshop consisted of the use of encrypted email, encrypted instant messaging, anonymous surfing with Tails and use of VPN. And a monitoring process for two months.  +

I

IGF, InternetEsNuestra, Mexico +'''¿Qué haremos en el encuentro #InternetEsNuestra?''' Junto a activistas de derechos humanos, especialistas de organizaciones de la sociedad civil y grupos de tecnología y derechos digitales - entre otros - presentaremos proyectos e informes de las organizaciones participantes impulsadas desde y para los grupos ciudadanos. El formato de presentación será: charlas relámpago o lightning talks (presentación en público de manera sencilla y breve, 10 minutos con 5 minutos de espacio de preguntas y respuestas) para intercambiar recursos, acciones y reunir esfuerzos. '''Programa del evento''' - ¿Por qué decimos #InternetEsNuestra? - Presentación de las mesas de organizaciones y colectivos - Introducción: ¿Qué es IGF? ¿Qué esperar del IGF? - Informe: Latin America in a Glimpse - Derechos Digitales - Informe: Vigilancia estatal - R3D - Informe: Vigilancia ilegal en el sector Telecom - SonTusDatos - Charla sobre Wikipedia - Wikimedia México - Charla con la Coalición de Ex-trabajadoras(es) y trabajadoras(es) de la Industria Electrónica Nacional (CETIEN) - Cryptofiesta Campaña Dominemos las TIC con APC y Luchadoras Mini charlas de seguridad digital con Enjambre Digital y SocialTIC Arma tu caja antivigilancia con ONG Derechos Digitales  +
II Festival Ciberfeminista, Tejiendo circuitos, Guatemala +Agenda de los días de actividades cerradas 9 y 10 de noviembre. Viernes 9/11/18 13:00 Almuerzo 14:00 Registro 14:30 Presentación del espacio 14:45 Presentación de participantes 15: 15 Espacio simbólico de apertura 15: 45 Acuerdos del espacio 16:00 Receso 16:30 Taller: Tecnologías Ancestrales 18:30 Cena Sábado 10/11/18 7:00 Desayuno 8:00 Intercambio de claves 8:30 Taller: ¿Cómo funciona Internet? Taller: Electrónica para principiantes Taller: Metadatos, conociendo nuestros rastros digitales 10:00 Receso 10:15 Taller: Básicos de Seguridad Digital 11: 15 Taller: Seguridad Móvil 13:00 Almuerzo 14:00 Taller: Crear una campaña online 15:30 Taller: Hackear el discurso de odio y estrategias ante violencia en línea. 16:45 Receso 17:30 Taller: Sanación de mujeres a través de la escritura 18:30 Cierre del Festival  +
International Journalism Festival - Perugia +http://www.journalismfestival.com/programme/2016  +

J

Jornada de Autocuidado y Autoconocimiento para mujeres, wallmapu +Esta jornada/taller desarrollo las siguientes ámbitos: • Reconocer mejor los estados emocionales propios y de los demás • Desarrollar el manejo consciente de las emociones • Aprender a activar e inducir las emociones en nosotras • Neutralizar la emoción, pudiendo conseguir a voluntad el “silencio emocional” • Identificar los patrones respiratorios, posturales y faciales que acompañan cada emoción básica • Desarrollar el arte de reconocer, expresar, moderar y transformar nuestras emociones como guía de un accionar que nos proporcione mayor bienestar. Incorporamos técnicas de terapia corporal emocional, pues desde niñas se nos ha enseñado a reprimir nuestras emociones para ser socialmente aceptadas. Hemos aprendido que la pena, la rabia y el miedo son negativas y debemos evitar sentirlas. Esconder nuestras emociones nos lleva a volvernos insensibles, a perder nuestra conexión con los otros y con nosotras mismas, a dejar ciclos Incorporaremos técnicas de terapia corporal emocional, pues desde niñas se nos ha enseñado a reprimir nuestras emociones para ser socialmente aceptadas. Hemos aprendido que la pena, la rabia y el miedo son negativas y debemos evitar sentirlas. Esconder nuestras emociones nos lleva a volvernos insensibles, a perder nuestra conexión con los otros y con nosotras mismas, a dejar ciclos abiertos y a arrastrar situaciones inconclusas. Nuestro verdadero yo está oculto bajo una gruesa coraza, nuestra cuerpa necesita expresar lo que siente, de lo contrario se enferma. Exploramos distintas técnicas basadas en los estudios de Reich y Lowen que nos permitieron ir liberándonos de nuestra coraza, pudiendo expresar emociones y desbloquear contracturas que formamos desde la infancia. Cerramos la jornada con danza primal, que nos permitió auto explorar, a través, del movimiento nuestras memorias moleculares profundas, liberando sus energías de manera sanadora e integrando cada chakra. Todo esto potencia nuestro trabajo Político y Propone un Feminismo Territorial que nace desde wallmapu, que comienza por hacerse cargo primero de nuestro cuerpo territorio. Este constate trabajo que va de lo personal a lo colectivo y de lo íntimo a lo Político; genera un trabajo como orgánica que se auto sustenta y perdura y se potencia en el tiempo.  +
Jornadas de autocuidado feminista. Cuidado físico, emocional y digital, Colombia +DÍA 1 Juegos de conocimiento y confianza Análisis de contexto Valoración de amenazas,riesgos,vulnerabilidades e impacto Medidas de seguridad en situaciones específicas Seguridad digital básica (teléfono, correo y navegación) Actividad de cuidado emocional DÍA 2 Juegos de conocimiento y confianza Defensa Personal feminista Hacker Space Actividad de cierre emocional  +

M

Motivando a la Gyal, Medellin, Colombia +Miércoles 19 Abril en Proyecto NN (San Joaquin Circular 3 # 66 B -136, Medellín) 10:00 a.m -12 Software Libre y seguridad Digital Por Julieta Rodriguez 2:00 p.m -4:00 p.m Experimentación Textil por Maria Salome 5:00 p.m -7:00 p.m Ginecología Natural por Laura Tejada. 7:00 p.m -8:30 p.m Diseño de Jardines por Sofía Montoya Jueves 20 Abril en Platohedro (Buenos Aires Calle 49a # 36-93) 10:00 a.m -12m Carpintería por Sara Ramirez. 2:00 p.m – 4:00 p.m Taller de Fanzine 4:00 p.m – 6:00 p.m Conciencia femenina y autocuidado Por Laura Tejada 6:30 p.m -8:30 p.m Defensa Personal Por Luu Viernes 21 Abril en Platohedro (Buenos Aires Calle 49a # 36-93) 10:00 a.m -12m Con la comida si se Juegue Por Cori 2:00 p.m – 4:00 p.m Feminismo, Caos y Cuerpo Por Lina Mejía 4:00 p.m – 6:00 p.m El Cine y la mujer en Colombia Laura Mora 6:00 p.m -8:00 p.m Anarquismo y Poder Por Alejandra R. Sábado 22 abril en Platohedro (Buenos Aires Calle 49a # 36-93) 10:00 a.m -12m Artes Marciales Mixtas por Dulfary Smir 2:00 p.m – 4:00 p.m Formulación de Proyectos por Cecilia Cardona 4:00 p.m – 6:00 p.m Agricultura y siembra por Sintropía 6:00 p.m – 8:00 p.m Encuadernación por Katty Party cierre. Djs invitadas Domingo 23 de Abril Club de Billares EuroSam (Envigado) 2:00 p.m – 4:00 pm Taller de tizas sobre el asfalto por Natasha Jaramillo 4:00 p.m – 6:00 pm Taller de Billar por Claudia Marcela Lalinde R. (Actual Campeona Nacional en la modalidad a tres bandas)  +

O

Oficina Uso crítico y feminista de internet, Brasil +(20 min) Apresentação, momento de reconhecimento entre presentes (30 min) Caminho que a informação faz na internet (30 min) Internet feminista (1h) uso seguro e crítico da internet, com enfase em práticas cotidianas (incluir alguma atividade prática. ex: pixel no rosto e tatoos etc) (30 min) Avaliação da oficina  +
Oficinas de cuidados digitais e segurança da comunicação, Salvador de bahia, Brasil +Dia 01/12 Objetivos do dia: Apresentar conceitos sobre o funcionamento da internet, suas vulnerabilidades e possibilidades. 09h00 - 9h40 Apresentações apresentação: 5 min as pessoas conversam entre si. apresenta a pessoa que conversou. Acordos (10 min) 9h40 - 11h Linha do tempo da internet no Brasil. - Quando você começou a usar o serviço? Colocar os serviços na linha do tempo. Fazer uma discussão sobre como habitamos a internet, as mudanças e transformações da internet ao longo dos anos. 11h - 12h Contexto de vigilância e redes sociais, através de Casos: Caso 1: “PF apreende equipamentos de repórter no Mato Grosso do Sul”: Veja mais em: <https://blogdosakamoto.blogosfera.uol.com.br/2013/05/19/pf-apreende-equipamentos-de-reporter-no-mato-grosso-do-sul/> Exibição do vídeo. “Durante uma ação de desocupação de indígenas Terena de uma fazenda, na tarde deste sábado (18), no município de Sidrolândia, Estado do Mato Grosso do Sul, o delegado da Polícia Federal, Alcídio de Souza Araújo, apreendeu um computador do jornalista do Conselho Indigenista Missionário (Cimi) Ruy Sposati, que, assim como outros profissionais de comunicação, cobria a ação. Segundo o jornalista, Araújo se negou a protocolar a apreensão ou a dar qualquer justificativa legal do ato e, em nenhum momento, apresentou qualquer ordem da Justiça ou de órgão competente para busca e apreensão de equipamentos, que seguiriam em posse da PF. Um gravador também teria sido apreendido.” Caso 2: “Grupo “Mulheres contra Bolsonaro” no Facebook sofre ataque cibernético”. Veja mais em: < https://brasil.elpais.com/brasil/2018/09/14/politica/1536941007_569454.html> “Neste dia, a administradora M.M. foi a principal afetada, e teve suas contas no Facebook e no WhatsApp invadidas. De acordo com as organizadoras, os ataques começaram por volta das 14h na sexta. Antes disso, moderadoras e administradoras haviam recebido ameaças em suas contas no WhatsApp. Os invasores exigiram que o grupo fosse extinto até às 24h de sexta-feira e tentaram intimidar as responsáveis pelo grupo ameaçando divulgar seus dados pessoais como como CPF, RG, Título de eleitor, nome da mãe, entre outros dados extremamente sensíveis.” Rodada de falas: relacionado os casos com o nosso contexto e com a luta dos movimentos e participantes da formação. 12h - 13h30 - ALMOÇO 13h30 - 15h Introdução sobre a segurança em grupo X segurança individual. 13h30 - 15h Camadas de segurança - a partir de uma situação real do grupo. Garantindo o deslocamento com segurança de uma assessora, e das informações que ela transporta. Cada grupo elabora um plano de segurança. (30 min elaboração e 45 min apresentação geral). 15h30 Como funciona a internet?Montar o funcionamento com os cards. Fazer a problematização da vigilância e do mercado no sistema da internet. Vulnerabilidades, brechas e possibilidades. Pedir para que falem três coisas que eles fazem usando a internet. Mostrar as fragilidades deste processo. Exibição do cabeamento submarino: 16h40 - 17h como foi o dia e o que aprendeu? Dia 02/12 Objetivos do dia: Trabalhar com conceitos de segurança organizacional (grupo) e segurança integral (individual) e algumas feramentas - matriz de risco. 09h00 - 9h30 – Memória do dia anterior 10h00 - Teste de segurança e vulnerabilidade de senhas. Apresentação do Mosaico posibilidades. Qual ferramenta querem trabalhar? Email? Armazenamento? Ferramentas de comunicação segura: wire e senhas, signal, configurar autenticação, email (protonmail), armazenar arquivos (meganz). 12h - 13h30 ALMOÇO 14h00 – Juventude do MSTB – Desenvolveu uma atividade de alongamento. 14h30 - Elementos a elaboração de protocolo de segurança de acordo com a realidade de cada grupo/organização e movimentos sociais. A história das Icamiabas que lutavam para defender o seu território – “Icamiabas' ou iacamiabas (do tupi i + kama + îaba, significando "peito partido") é a designação genérica dada a índias que teriam formado uma tribo de mulheres guerreiras que não aceitavam a presença masculina. Compunham uma sociedade rigorosamente matriarcal, caracterizada por mulheres guerreiras sem homens, ou ainda mulheres que ignoravam a lei.” Fonte – Wikipédia < https://pt.wikipedia.org/wiki/Icamiabas > A partir da história das Icamiabas debater os elementos do protocolo de segurança: 1) Quais são as atividades que o meu grupo/coletivo faz? 2) O que usamos para fazer essas ações? 3) O que queremos proteger? A partir da matriz abaixo cada grupo desenvolve o seu protocolo de segurança: 15h - 16h - Apresentação 16h - 16h30 - encerramento : Escrever em tarjetas os aprendizados. E Como continua?  +
One-to-one DigiSec trainings for activists, Argentina +- Prior interview to understand the strategies and resources which are being used to organize or for documentation - Conversation about the current state of policy around surveillance locally and internationally. What are the risks? How do they perceive the landscape? - Run through a personal risk assessment. - Run through tools available, which may be useful, which may be not practical, which are strategic on an individual level, and which on an organisational level. - One on one installation and explanation of tools, with practice. ----------------- later ---------------- - Ongoing followup  +

P

Panel Gender and Surveillance, Circumvention Tech Festival, Spain +Some of the cases and initiatives presented during the panelː http://policespiesoutoflives.org.uk/ http://www.theguardian.com/uk/undercover-police-and-policing  +
Panel Including Gender - Re-publica conference, Berlin +Online hate speech, harassment, stalking and death threats are trapping too many vocal women and LGTBI persons into a contradictory situation where in one hand, as Internet is crucial for their work, in order to coordinate actions or enable a wider reach out, they are also increasingly expose to surveillance and/or punitive actions. All those factors have driven to a situation where Internet is not a safe space and where it is common to see feminist and activist work being deleted, (self)censored, and actively prevented of being seen, heard or read. Logically, those trends diminish the freedom of expression and privacy rights of the people targeted. Tackling those dangers has become higher in the agenda of many feminist and LGTBI organizations and networks and has driven to an active panorama of initiatives, collective strategies and new approaches to privacy and digital security including a gender and cultural diversity perspective. Building upon past events such as the TransHackFeminist convergence, Autonomy (im)possible, Darmstadt delegation, the Feminist Server Summit, Ministry of hacking and the Gender and technology Institute, our invited participants will discuss from a cyberfeminist perspective what is happening online and how we can reclaim and reshape a feminist internet.  +
Panel, Strategizing around online gender-based violence documentation and accompaniment practice, IFF, Spain +*Notes* Taxonomies are useful for helping explain to the individuals who are reporting issues to help them use more accurate definitions. They use "blackmail" but there is no request for an exchange. But, the affected indivoidual does not have another word for the attack. ### Coordinated Harassment When women reported incidents on social media channels online they would face significant additional attacks for doing so. There are teams of people who are ready to bully people online. Engage in any conversation with women and gender violence online. Also websites get DDOS'ed ## The need for data who is creating the data about gender violence onloine there is a lack of data online but, also public policy folks are making bad decisions. But, when confronted they say. There is no data. It is hard to maintain data-sets. sets are small and unmaintained. Private platforms are not sharing this type of information with the public. In Brasil there is one helpline that is for "online attacks" (not basecd on gender) Attacks depend on the target - journalists, activists, and those with public profiles are more heavily targeted in Brasil. - Collectives that are openly speaking that they are pro-abortion are more targeted. - One journalist had her router hacked. Most of the cases that come to them they are "big" public cases. - but many cases are "control of devices by partner and/or family" where they have to make the devices available. This also includes GPS location to track and control women. We don't talk about it much, ut it is common in Colombia. There is little authonomy and they have to share their passwords. These women are often controled by partners, brothers, etc. A lot of folks talk about online violence. It looks like that is all the violence that happens. APC started talking about it as segmented violence. But, they are missing much because people are not recognizing the other types of violence as well. ## How are we documenting cases ### What do we deal with? ### what type of info do they record? ### How do you tell this person that you are taking notes? ### what part of the conversation do we tell people we are taking notes? They eventually say they are taking notes, but that they are not recording sensitive info (record name, etc.) - if they do record your name they tell them this. - They inform them about data destruction processes - Most of the people are very satisfied by that. How can they build a template for sharing and exchanging their data? Sometimes you just don't want to take notes because the case is so difficult to anonymize. - How to anonymize data - How will we exchange that information? We have two typologies. But every one of the violence has a different impact depending on the power, relationship, etc. But, it's also multi-layered, it requires time to understand the personal situation and the impact. As such the strategies and solutions are very unique. But, this is a good strategy. If we document it too much it could be used by the adversaries to run counter-attacks. When documenting good practice, don't document something that is so contextual that it can be used to build new attack tactics. In the working group they are trying to figure out trends so that they can share and learn with each other in the working group. What is the purpose of the documentation that is to be shared? How to do case documentation to not put people in danger the people who come to them for help. In Brasil they don't have a helpline. And, so the colleagues there are very brave. There is a network of feminist pro-bono lawyers who are already doing helplines. There are other groups who already have helplines. (Lawyers, psych, etc.) But, those groups don't usually have the expertise on digital. We may have to work on building connections with those groups. They try all the time to keep updated on new cases. ### Example from Syria - They are working more and more with regular women (Not activists) - there has been a massive leapfrog of women on phones. - have to use them to communicate, and also to connect with dispersed families 1) Facebook Prison: everyone is on Facebook. It is the communication channel of choice. People are walking with their phones. People are taking phones from women. And these women are being arrested based on info on their phones. They are running all womens clinics on issues around owning the technology they are using. 2) Own your phone: Hairdressers taking a picture of themselves uncovered to send to a relative in Jordan. And, then someone takes that photo off their relative and these women have to leave their families and countries because it gets leaked. These women are active users but don't understand how to control their data and technologies. 3) Women go to local internet cafe where man helps set up accounts and keeps passwords after they set them up. They will keep access to the passwords after the fact. So, having to help women understand that. ### Documentation we have to take the documentation to the platforms and/or the state. - For example: non-consenual pornography. The victims don't want to be dis-anonymised. When you go to the state the state demands personal inforemation. -- One underage victim didn't want to report with the state because her parents would know. -- How to avoid the institutional violence (revictimization) - In non-consentual pornography. On some platforms force you to give name, real-id, and sometimes even an account to report these things. Somehow you have to work with platforms to get this removed Make sure that you communicate the actual possibilities with the individuals. Don't give them unrealistic expectations about how the case will progress. - "The process is very slow. Don't get your hopes up" - "This is how they will deal with your case" - You don't want an individual to be re-compromised by the hands of an official investigation - Listening - Documentation - assessment - exploring solutions - drafting plans - whats next.  +
Permacultura digital +* '''Día 1''': mapeo de referencias, exponer investigaciones e inquietudes, agrupar temáticas de interés. sondear posibles formatos "output" y planear qué técnicas, materiales necesitamos para ejecutarlas: diseñar ruta de trabajo; crear guión * '''Día 2''': generar versiones borrador * '''Día 3''': versión final de contenidos  +
Primer Encuentro de Defensa Personal Feminista, Bogota, Colombia +La colectiva facilitó el taller de Seguridad digital, al cuál acudieron 35 mujeres. Creemos que el taller fluyó muy bien, existe una necesidad clara de pensar la autodefensa feminista en todos los ámbitos , la protección de nosotras se extiende en la vida cotidiana, y uno de los puntos vulnerables en las organizaciones se reconoce que es la parte digital. Ahora todas las asistentes tiene una estrategia de seguridad digital para sus acciones En realidad fue muy emocionante poder compartir en torno al tema, porque existe una necesidad clara de reflexionar y reconocer la autodefensa feminista como una estrategia de acción para los diferentes feminismos, contra el capitalismo patriarcal heteronormado.  +
Proyecto Apoyo Activo, Mexico +Domingo 1 de Julio: 8 am hasta que se confirmen los resultados electorales Instalación de módulos - Escucha Activa: primeros auxilios psicológicos y apoyo sororario - Atención a violencias de género en línea y en persona: En jitsi y signal prestaremos asesoría. - Espacio de bienestar y de descanso express: Tendremos cobijas y almohadas para descansar un rato. Adicionalmente proporcionaremos ejercicios de bienestar cada hora de forma general a la brigada.  +

R

Radio, El desarmador, Bolivia +'''01 Acoso En Linea:''' En nuestro primer programa desarmamos el acoso en línea. Hacemos una primera aproximación al tema urgente de la violencia contra las mujeres en internet, exploramos cuál es el panorama del ciberacoso en Bolivia y cómo hacerle frente. '''02 Facebook Bajo La Lupa:''' En este desarmador criticamos la política de uso de datos y privacidad de Facebook, y analizamos la letra chica de sus términos y condiciones de uso. Con la participación de la ciberfeminista y periodista Florencia Goldsman. '''03 Neutralidad De La Red:''' En este desarmador abordamos qué es la neutralidad de la red, por qué es importante, y cuáles son los avances legales más significativos en Europa, Norteamérica y Sudamérica. Además criticamos la iniciativa internet.org de facebook. Con comentarios de Tebot, activista de la comunidad de software libre en Bolivia. '''04 Como Funciona Internet:''' En este desarmador hacemos una radiografía técnica a la estructura que hace posible las comunicaciones virtuales. Estudiamos la capa física (infraestructura), las condiciones técnicas y comerciales (protocolos y empresas que proveen internet), y los estándares de contenidos y aplicaciones. Con la colaboración de Hask, del hacklab feminista de Nicaragua y miembro del colectivo Enredadas. '''05 Principios Feministas De Internet:''' En este desarmador hacemos un repaso a los 15 principios feministas para internet. Exploramos qué es una internet feminista y la agencia, expresión, economía, y participación de las mujeres en internet. Con material compartido por la plataforma mexicana para radios libres Palabra Radio. '''06 Estados De Vigilancia:'''En este desarmador conversamos acerca de quién, y por qué nos vigilan, repasando la importancia de la privacidad y del resguardo de nuestros datos. Con comentarios de la investigadora, defensora de derechos humanos y ciberactivista centroamericana Hedme Sierra-Castro. '''07 Analisis De Riesgos Seguridad Digital''' En este desarmador presentamos una metodología clara y sencilla para analizar los riesgos a los que cada una hace frente, para luego escoger las tácticas y herramientas de seguridad digital que mejor se ajustan a nuestras necesidades. Con la colaboración de Nymeria, del hacklab feminista de Nicaragua y miembro del colectivo Enredadas. '''08 Tacticas Seguridad Digital''' En este desarmador abordamos tácticas básicas de seguridad digital, que facilitarán la elección de determinadas herramientas para tener comunicaciones más seguras. Con el apoyo de Srta. Pinky, ciberactivista y experta en temas de seguridad digital.  +
(previous 25) (next 25)