Difference between revisions of "Seguridad digial para defensores de derechos humanos en contextos mineros"

From Gender and Tech Resources

(Created page with "{{Activities |Title of the activity=Training with Derechos Humanos sin Fronteras |Start when ?=2018/07/16 |End when ?=2018/07/16 |Number of hours if only one day ?=9 |Who orga...")
 
Line 1: Line 1:
 
{{Activities
 
{{Activities
 
|Title of the activity=Training with Derechos Humanos sin Fronteras
 
|Title of the activity=Training with Derechos Humanos sin Fronteras
 +
|Category=Digital Security
 
|Start when ?=2018/07/16
 
|Start when ?=2018/07/16
 
|End when ?=2018/07/16
 
|End when ?=2018/07/16
 
|Number of hours if only one day ?=9
 
|Number of hours if only one day ?=9
 +
|Where is located the activity ?=Regional
 +
|Geo-localization of the activity ?=-12.548845587274496, -74.00390625
 
|Who organize it=Training with Derechos Humanos sin Fronteras, CEDEP AYLLU,
 
|Who organize it=Training with Derechos Humanos sin Fronteras, CEDEP AYLLU,
 
|organisation(s) website=https://es-la.facebook.com/derechossinfronteras.pe/
 
|organisation(s) website=https://es-la.facebook.com/derechossinfronteras.pe/
Line 9: Line 12:
 
|How many people trained=12
 
|How many people trained=12
 
|Motivations for organizing training=DHSF is an organization that works on territorial conflicts related to extractive industries. During the training the organization shared about several physical security incidents it has had in the past and their suspicion of having their phones intecepted.
 
|Motivations for organizing training=DHSF is an organization that works on territorial conflicts related to extractive industries. During the training the organization shared about several physical security incidents it has had in the past and their suspicion of having their phones intecepted.
|Topics addressed=digital security, movil, encrypt
+
|Topics addressed=digital security, mobil, encrypt
 
}}
 
}}
 
{{Planning and documentation
 
{{Planning and documentation
Line 15: Line 18:
 
During the training all participants configured a Wire account, analyzed the security of their cellphone devices, create a secure mail account in a secure server and use veracrypt to encrypt their folders.
 
During the training all participants configured a Wire account, analyzed the security of their cellphone devices, create a secure mail account in a secure server and use veracrypt to encrypt their folders.
 
|Methodologies for training=Popular education,
 
|Methodologies for training=Popular education,
 +
|Existing toolkits and resources=https://gendersec.tacticaltech.org (Mobil topics)
 +
From the training part of My shadow [https://myshadow.org/train]the following material was:
 +
How Mobile Communication Works
 +
How the Internet works
 +
Mobile Communication
 +
Mobile Phone Settings (Hands-on)
 +
 +
Additionally we used the following websites.
 +
https://trackography.org/
 +
|Gender and tech tutorials used=myshadow.org,
 +
}}
 +
{{Learning outcomes
 +
|Feelings=The presence of the directives of the organization was important since we reached several agreements on the implementation of digital security tools that we worked on during the training.
 +
|Feedbacks=the participants commented that the workshop was useful and the methodology was adequate
 
}}
 
}}
{{Learning outcomes}}
 

Revision as of 20:42, 16 July 2018

Title Training with Derechos Humanos sin Fronteras
Category Digital Security
Start 2018/07/16
End 2018/07/16
Hours 9
Scale Regional
Geolocalization -12° 32' 56", -74° 0' 14"
Loading map...
Organisation Training with Derechos Humanos sin Fronteras, CEDEP AYLLU,
Website https://es-la.facebook.com/derechossinfronteras.pe/
Target audience Human right defenders
Number of participants 12
Context and motivations DHSF is an organization that works on territorial conflicts related to extractive industries. During the training the organization shared about several physical security incidents it has had in the past and their suspicion of having their phones intecepted.
Topics digital security, mobil, encrypt
Links
Media [[File:]]
Agenda The training was divided in three parts. During the first part we worked on the general aspects of privacy and digital security in the Latin-American context. In the second part we worked on threats for cellphones. During the third part we worked on secure communication through e-mail and encryption of folders to protect sensitive information.

During the training all participants configured a Wire account, analyzed the security of their cellphone devices, create a secure mail account in a secure server and use veracrypt to encrypt their folders.

Methodologies Popular education,
Resources [[Existing toolkits and resources::https://gendersec.tacticaltech.org (Mobil topics)

From the training part of My shadow [1]the following material was: How Mobile Communication Works How the Internet works Mobile Communication Mobile Phone Settings (Hands-on)

Additionally we used the following websites. https://trackography.org/]]

Gendersec myshadow.org
Feelings The presence of the directives of the organization was important since we reached several agreements on the implementation of digital security tools that we worked on during the training.
Feedbacks the participants commented that the workshop was useful and the methodology was adequate
Start
Stop
Keep