Seguridad digial para defensores de derechos humanos en contextos mineros

From Gender and Tech Resources

Title Training with Derechos Humanos sin Fronteras
Category Digital Security
Start 2018/05/22
End 2018/05/22
Hours 9
Scale Regional
Geolocalization -12° 32' 56", -74° 0' 14"
Loading map...
Organisation Training with Derechos Humanos sin Fronteras, CEDEP AYLLU,
Website https://es-la.facebook.com/derechossinfronteras.pe/
Target audience Human right defenders
Number of participants 12
Context and motivations DHSF is an organization that works on territorial conflicts related to extractive industries. During the training the organization shared about several physical security incidents it has had in the past and their suspicion of having their phones intecepted.
Topics digital security, mobil, encrypt
Links
Media [[File:]]
Agenda The training was divided in three parts. During the first part we worked on the general aspects of privacy and digital security in the Latin-American context. In the second part we worked on threats for cellphones. During the third part we worked on secure communication through e-mail and encryption of folders to protect sensitive information.

During the training all participants configured a Wire account, analyzed the security of their cellphone devices, create a secure mail account in a secure server and use veracrypt to encrypt their folders.

Methodologies Popular education,
Resources [[Existing toolkits and resources::https://gendersec.tacticaltech.org (Mobil topics)

From the training part of My shadow [1]the following material was: How Mobile Communication Works How the Internet works Mobile Communication Mobile Phone Settings (Hands-on)

Additionally we used the following websites. https://trackography.org/]]

Gendersec myshadow.org
Feelings The presence of the directives of the organization was important since we reached several agreements on the implementation of digital security tools that we worked on during the training.
Feedbacks the participants commented that the workshop was useful and the methodology was adequate
Start
Stop
Keep