Difference between revisions of "Seguridad digial para defensores de derechos humanos en contextos mineros"

From Gender and Tech Resources

 
Line 2: Line 2:
 
|Title of the activity=Training with Derechos Humanos sin Fronteras
 
|Title of the activity=Training with Derechos Humanos sin Fronteras
 
|Category=Digital Security
 
|Category=Digital Security
|Start when ?=2018/07/16
+
|Start when ?=2018/05/22
|End when ?=2018/07/16
+
|End when ?=2018/05/22
 
|Number of hours if only one day ?=9
 
|Number of hours if only one day ?=9
 
|Where is located the activity ?=Regional
 
|Where is located the activity ?=Regional
|Geo-localization of the activity ?=-12.548845587274496, -74.00390625
+
|Geo-localization of the activity ?=-12.548845587274, -74.00390625
 
|Who organize it=Training with Derechos Humanos sin Fronteras, CEDEP AYLLU,
 
|Who organize it=Training with Derechos Humanos sin Fronteras, CEDEP AYLLU,
 
|organisation(s) website=https://es-la.facebook.com/derechossinfronteras.pe/
 
|organisation(s) website=https://es-la.facebook.com/derechossinfronteras.pe/

Latest revision as of 16:32, 21 July 2018

Title Training with Derechos Humanos sin Fronteras
Category Digital Security
Start 2018/05/22
End 2018/05/22
Hours 9
Scale Regional
Geolocalization -12° 32' 56", -74° 0' 14"
Loading map...
Organisation Training with Derechos Humanos sin Fronteras, CEDEP AYLLU,
Website https://es-la.facebook.com/derechossinfronteras.pe/
Target audience Human right defenders
Number of participants 12
Context and motivations DHSF is an organization that works on territorial conflicts related to extractive industries. During the training the organization shared about several physical security incidents it has had in the past and their suspicion of having their phones intecepted.
Topics digital security, mobil, encrypt
Links
Media [[File:]]
Agenda The training was divided in three parts. During the first part we worked on the general aspects of privacy and digital security in the Latin-American context. In the second part we worked on threats for cellphones. During the third part we worked on secure communication through e-mail and encryption of folders to protect sensitive information.

During the training all participants configured a Wire account, analyzed the security of their cellphone devices, create a secure mail account in a secure server and use veracrypt to encrypt their folders.

Methodologies Popular education,
Resources [[Existing toolkits and resources::https://gendersec.tacticaltech.org (Mobil topics)

From the training part of My shadow [1]the following material was: How Mobile Communication Works How the Internet works Mobile Communication Mobile Phone Settings (Hands-on)

Additionally we used the following websites. https://trackography.org/]]

Gendersec myshadow.org
Feelings The presence of the directives of the organization was important since we reached several agreements on the implementation of digital security tools that we worked on during the training.
Feedbacks the participants commented that the workshop was useful and the methodology was adequate
Start
Stop
Keep