Search by property

This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.

Search by property

A list of all pages that have property "Detailed schedule and contents" with value "La agenda detallada esta adjuntada en el pdf anterior". Since there have been only a few results, also nearby values are displayed.

Showing below up to 46 results starting with #1.

View (previous 500 | next 500) (20 | 50 | 100 | 250 | 500)


List of results

    • Primer Encuentro de Defensa Personal Feminista, Bogota, Colombia  + (La colectiva facilitó el taller de Segurid
      La colectiva facilitó el taller de Seguridad digital, al cuál acudieron 35 mujeres. Creemos que el taller fluyó muy bien, existe una necesidad clara de pensar la autodefensa feminista en todos los ámbitos , la protección de nosotras se extiende en la vida cotidiana, y uno de los puntos vulnerables en las organizaciones se reconoce que es la parte digital. Ahora todas las asistentes tiene una estrategia de seguridad digital para sus acciones En realidad fue muy emocionante poder compartir en torno al tema, porque existe una necesidad clara de reflexionar y reconocer la autodefensa feminista como una estrategia de acción para los diferentes feminismos, contra el capitalismo patriarcal heteronormado.
      a el capitalismo patriarcal heteronormado.)
    • Charla, Ciberfeminismos, Congreso Soberania Tecnologica, Barcelona  + (La conferencia ha sido gravada y sera pronto puesta a dispocion)
    • Editatona Mujeres Nicas  + (La jornada de la Editatona Mujeres Nicas t
      La jornada de la Editatona Mujeres Nicas tiene dos momentos. Comenzamos desde cero, con el taller ¿Cómo editar Wikipedia?, donde estaremos creando nuestros perfiles de usuaria y comprendiendo mejor la dinámica de la plataforma, sus principios y cómo se debe estructurar el contenido. Luego pasamos a una sesión de creación y edición de biografías sobre mujeres nicaragüenses, 5 horas de Manos a la Obra para trabajar colectivamente y aprender las unas de las otras.
      ivamente y aprender las unas de las otras.)
    • Motivando a la Gyal, Medellin, Colombia  + (Miércoles 19 Abril en Proyecto NN (San Joa
      Miércoles 19 Abril en Proyecto NN (San Joaquin Circular 3 # 66 B -136, Medellín) 10:00 a.m -12 Software Libre y seguridad Digital Por Julieta Rodriguez 2:00 p.m -4:00 p.m Experimentación Textil por Maria Salome 5:00 p.m -7:00 p.m Ginecología Natural por Laura Tejada. 7:00 p.m -8:30 p.m Diseño de Jardines por Sofía Montoya Jueves 20 Abril en Platohedro (Buenos Aires Calle 49a # 36-93) 10:00 a.m -12m Carpintería por Sara Ramirez. 2:00 p.m – 4:00 p.m Taller de Fanzine 4:00 p.m – 6:00 p.m Conciencia femenina y autocuidado Por Laura Tejada 6:30 p.m -8:30 p.m Defensa Personal Por Luu Viernes 21 Abril en Platohedro (Buenos Aires Calle 49a # 36-93) 10:00 a.m -12m Con la comida si se Juegue Por Cori 2:00 p.m – 4:00 p.m Feminismo, Caos y Cuerpo Por Lina Mejía 4:00 p.m – 6:00 p.m El Cine y la mujer en Colombia Laura Mora 6:00 p.m -8:00 p.m Anarquismo y Poder Por Alejandra R. Sábado 22 abril en Platohedro (Buenos Aires Calle 49a # 36-93) 10:00 a.m -12m Artes Marciales Mixtas por Dulfary Smir 2:00 p.m – 4:00 p.m Formulación de Proyectos por Cecilia Cardona 4:00 p.m – 6:00 p.m Agricultura y siembra por Sintropía 6:00 p.m – 8:00 p.m Encuadernación por Katty Party cierre. Djs invitadas Domingo 23 de Abril Club de Billares EuroSam (Envigado) 2:00 p.m – 4:00 pm Taller de tizas sobre el asfalto por Natasha Jaramillo 4:00 p.m – 6:00 pm Taller de Billar por Claudia Marcela Lalinde R. (Actual Campeona Nacional en la modalidad a tres bandas)
      na Nacional en la modalidad a tres bandas))
    • Webinar, HerNetHerRights, online conference  + (Moderator: Pierrette Pape, Policy & Ca
      Moderator: Pierrette Pape, Policy & Campaigns Director, European Women’s Lobby Alexandra Hache, PhD, Spain, Project Coordinator at TacticalTech, will discuss the different forms of online violence and paradigms of analysis At Tactical Tech, Alex coordinates the project "Securing Online and Offline Freedoms for Women: Expression, Privacy and Digital Inclusion." She is a sociologist and a researcher on ICT for the public good, and holds a PhD in social economy. For the last decade, she has been involved in the development of cyberfeminist collectives and technological sovereignty initiatives for social and political transformation within neighbourhood communities, engaged research networks, social movements and women’s groups. Elisabeth Kate Mc Guinness is a research assistant at the European Institute for Gender Equality where she co-wrote the 2017 report on cyber violence against women and girls. She holds a Masters in Human Rights and Democratisation with a specialisation in Gender Relations. Her interests include image-based abuse, ‘redpilling,’ and reproductive rights.’ Nicole Shephard, PhD, UK, will talk about the feminist implications of big data and privacy, and is an independent researcher, writer and consultant interested in the intersections between gender and technology. Her work takes a feminist perspective on the politics of data, privacy and surveillance. She holds a PhD in Gender (LSE) and an MSc in International Development (University of Bristol). Follow her on Twitter. Emma Holten, Danish activist and revenge porn survivor, on her experience and strategies is an online human rights activist and editor at Friktion Magasin. After being a victim of non-consensual pornography in 2011, she became aware of the pitfalls of structural oppression and gendered online violence. This led to the activist project CONSENT, which became a viral success. She speaks on the democratic importance of an internet free of harassment and violations of privacy if we want to achieve full freedom of speech. She is 26 years old and lives in Copenhagen. Lie Junius, Director Public Policy and Government Relations, Google Belgium, on their work to combat online violence against women and girls ​ ​joined​ ​Google​ ​in​ ​November​ ​2015​ ​when​ ​she​ ​was​ ​appointed​ ​the​ ​new​ ​Director​ ​of​ ​Public Policy​ ​and​ ​Government​ ​Relations​ ​in​ ​Brussels.​ ​She​ ​has​ ​more​ ​than​ ​twenty​ ​years​ ​of​ ​European and​ ​international​ ​public​ ​affairs​ ​experience.​ ​Before​ ​Google,​ ​Lie​ ​led​ ​Government​ ​Affairs​ ​in​ ​EMEA for​ ​Goodyear​ ​Dunlop​ ​from​ ​2008,​ ​and​ ​also​ ​managed​ ​Corporate​ ​Communications.​ ​Previously,​ ​Lie was​ ​Senior​ ​Vice​ ​President​ ​of​ ​Government​ ​Relations​ ​for​ ​ABN​ ​Amro​ ​Bank​ ​and​ ​worked​ ​in​ ​the Government​ ​Affairs​ ​Team​ ​of​ ​General​ ​Motors​ ​Europe.​ Essa Reijmers, Dutch expert to EWL Observatory on violence against women has been working on violence against women for nearly three decades. Since 1998 she has been working for Blijf Groep, one of the largest Dutch shelter-organizations, providing a range of services in two provinces, with 6 shelters and non-residential programs for both adults and children. Her focus at Blijf Groep has always been on innovation and development of new approaches, amongst which digital safety and systemic interventions (like the Orange House-approach). She participates in several networks on national level and is the Dutch delegate in the European Women’s Lobby Observatory, on behalf of the Dutch Women’s Council, NVR. She fill talk about SafetyNed. Salome Mbugua, Chair of the European Network of Migrant Women, will focus on the intersection of racism and sexism online. Advocate for human rights and gender Equality, Salome Mbugua is the founder and president of AkiDwA, the migrant women’s network in Ireland. Salome have served at various advisory board, expert groups and boards at European level and in Ireland. She is the chair of European network of migrant women and is a board member of the European Women’s Lobby. She is a former board member of Equality Authority, state board in Ireland and vice chair of National Women Council of Ireland. Salome is currently undertaking a doctorate research on conflict resolution and peacebuilding at Trinity College Dublin. Sodfa Daaji, youth activist in Italy, member of Afrika Youth Movement and of Youth4Abolition, will focus on the experience of young women. She is a 24 years old feminist, proud abolitionist and activist for women’s rights in Italy and Tunisia. She studies International Relations and Diplomatic Affairs at the University of Bologna. On march 2017 she has been elected as chairwoman of the Gender and Equality committee at Afrika Youth Movement. Her activism focuses particularly on human trafficking, migrant women and the relationship between Gender Equality and Religious Freedom. Céline Piques Feminist for a long time, since 2014 she is active with Osez le Féminisme! » a French feminist organisation with 26 branches across the country. In 2015, she coordinated the campaign « Marre du rose ! » (« Stop Pink ! » ) to denounce the stereotypes in the toys industry. Since 2016, she has been the webzine and newspaper editor-in-chief. In 2017, she worked on the campaign « Osez l’égalité » (Dare Equality) during the election period, and became spokeswoman of Osez le Féminisme ! Negin Nazem Zorromodi, youth activist, Sweden is an Information Technology student at the KTH Royal Institute of Technology. She also is a board member of the Stockholm women empowering center in Sweden, a former webmaster and app founder and a manager in the KTH Equality week. She has spoken about cyberviolence and methods to stop cyberviolence attacks. She also works with IT documentation and financial reporting at Novartis. She was a participant at the AGORA Young Feminist Summer School 2017, organised by the European Women’s Lobby, where she led a workshop about cyberviolence. Isabel Ventura, Portuguese expert to EWL Observatory on violence against women, on EWL recommendations Isabel holds a PhD. in Sociology from the University of Minho “Medusa at the Court house: images of women, sexuality and violence from the analysis of law in books and law in action” was awarded the “APAV Research Award 2016”. Presently, she is the coordinator of a Master course seminar about sex crimes at the Catholic University of Oporto, School of Law. She also coordinates, along with Maria do Mar Pereira, the network of emergent researchers from the Portuguese Association of Women’s Studies – APEM. She is the Portuguese expert of the Observatory of Violence Against Women at the European Women’s Lobby and is a member of the Editorial Board of Palgrave Communications. Check out her research. 11h15-12h15 - Tweetchat discussion Around 4 main topics: 11h15-11h30: a male-dominated digital world 11h30-11h45: links between sexist media and cyberVAWG 11h45-12h: initiatives on protection and justice 12h-12h15: recommendations Check out later video messages by: Mariya Gabriel, EU Commissioner for the Digital Economy and Society Terry Reintke, MEP, on the European Parliament report on gender equality and empowering women in the digital age Karen Sadlier, psychologist, France, on the impact of cyber violence against women Save the date and join us to say NO to online violence against women and girls in Europe! Join us by following @EuropeanWomen!
      rope! Join us by following @EuropeanWomen!)
    • Gender and Technology Institute, Berlin  + (Morning Tracks Starting on Wednesday, you
      Morning Tracks Starting on Wednesday, you will have the option to choose between two tracks which you will continue with for the rest of the week “Training Skills” and “Privacy Advocacy”. 1. Privacy Advocacy This track has been designed to develop our understanding of digital privacy from a practical perspective. The aim is to strengthen our work as digital privacy advocates who can talk practically about the issues, what can be done and what this means in the context of our work. Each day we will combine discussion based learning with practical hands-on sessions and together not only learn from each other but build our confidence and skills as future advocates. Over five days, we will work to create some of the key building blocks that will help us better understand how technology, the infrastructure and the industry works and how to convince others to make better choices. We will start by looking behind the screens to see where our data goes, how the data industry works and explore our digital shadows. We will then look at surveillance, how it works practically and what this means for freedom of expression and association. Moving from behind the screens to what happens within them, we will look at online harassment and intimidation, particularly in the context of gender, and work together through strategies for handling this; from identity management to social media tactics. Finally, we will work on skills for advocating around privacy, influencing others and breaking down common arguments, such as 'nothing to hide' and 'national security' arguments. On the final morning, participants will be expected to prepare and lead a session on digital privacy and will receive feedback. Important to note that this track requires continuity through all learning sessions. 2. Training Skills This track, designed for participants relatively knowledgeable about digital security focuses on practicalities and best-practices of facilitating digital security trainings for human rights defenders and activists. The areas of focus will include: Training as a process, wherein we will explore the role and limitations of training on digital security, and best practices relating to agenda design, logistics, evaluation and more. We will highlight important principles of facilitation in the context of a holistic approach to security which recognises the central importance of well-being and broader best practices relating to security management and planning to a successful digital security training: How does a trainer deal with stress and trauma among participants, and how might these factors impact a participant's ability to learn? What are effective and ineffective ways to promote security in a learning environment, and what does gender justice in a digital security training look like? We will also focus on the different ways adults learn in order to prepare participants for how to deal with different styles and learning types, and design creative and interactive means of teaching sometimes dry and complicated technical concepts. It is important to note that this track requires continuity through all learning sessions. You can find here more details about the foreseen learning sessions that will compose this track. Afternoon Hands-On Digital Security and Privacy Tools The track on digital security and privacy tools is oriented towards all participants of the Institute and will split between those who already have basic knowledge and experiences with security tools and strategies and those who are already using them. The sessions here aim to explain complicated concepts (e.g how encryption works), help you understand how these can help you in your work, and teach you the available and trusted tools to do it. This track will also host install party sessions in order to help participants who want to migrate to Gnu/Linux to install a free distribution. Depending on your level of knowledge, the learning outcomes will be determined together with the facilitators and the rest of the group but could include: mobile security, encryption of devices, files and mails, anonymisation and bypassing of censorship, how to use Tails and how to organise a key signing party. Basics Gender and Technology Basics These sessions are oriented towards all participants with or without previous knowledge of feminism and/or gender social justice issues. The expected learning outcomes encompass a better understanding about the different feminist movements, which are the feminist and post-feminist theories in relation to technologies and why there is a gender and cultural diversity gap in computer sciences, free software and hacker cultures and which are the strategies to reduce those gaps. This track will also address the different types of on-line threats and on-line gender based violence inasmuch as the tactics and initiatives enabling to overcome and tackle those issues. The different learning sessions will mix different methodologies such as storytelling, focussed group discussion, videos, talks and many other surprises. You can browse among the bibliographic resources dealing with those topics here and also visit our page listing gender and feminist initiatives online Computer and Security Basics These sessions are aimed at people who want to start with the basics, or catch up on what they think have missed in previous trainings or learning on digital security such as how the internet works, history of operating systems, why everyone loves free and open source software, malware and viruses, basics of data storage or hardware security etc. Skillshares These sessions will allow participants who have a specific skill or experience relevant to the Institute, which won't be covered in the content tracks, to share with others. These could include topics such as “Strategies to counter online violence”, “How Mesh Networks work”, “Feminist Technology Infrastructure” etc.
      “Feminist Technology Infrastructure” etc.)
    • Taller Seguridad Digital, Feministas, Ecuador  + (Mudar a riseup + signal + telegram + poniendo en practica metodologías de cuidar lo que se habla + usar share.riseup < muchas situaciones de intervención de celulares y de cuentas con telegram /)
    • AWID, Mediactivismo, nuevas narrativas feministas, Brasil  + (Nuevas narrativas feministas latinoamericanas en internet Seguridad digital Redes sociales y uso crítico y feminista)
    • SEGUNDO CAMPAMENTO FEMINISTA PARA MUJERES JÓVENES, Oaxaca, Mexico  + (Objetivo: Generar un proceso de formación,
      Objetivo: Generar un proceso de formación, autoconocimiento, acercamiento al feminismo y deconstrucción de ideas patriarcales a través de la aproximación y reflexión de conceptos, prácticas y expresiones del movimiento feminista. Dirigido a: un grupo de mujeres jóvenes entre 14 y 19 años de edad, radicadas en la ciudad de Oaxaca de Juárez, Valles Centrales y Mixteca de Oaxaca, que tienen un potencial liderazgo en sus comunidades. Temas: Género y feminismo Deconstruyendo el amor romántico Autonomía corporal y autocuidado: deconstruyendo estereotipos de belleza Derechos sexuales y reproductivos Violencias machistas: en el espacio público y la web Sororidad Actividades: Presentación Acuerdos de convivencia y expectativas Cine debate Mesas de diálogo Taller de elaboración de jabones terapéuticos para nuestro autocuidado Juegos grupales sobre acoso sexual callejero y ciberviolencias Sesión de básicos de autodefensa feminista Taller de pintura de espejos de Santa Ana Zegach
      de pintura de espejos de Santa Ana Zegach)
    • Workshop, Architectures of online harassment, Berlin  + (On January 3, Caroline Sinders and I condu
      On January 3, Caroline Sinders and I conducted a workshop at Tactical Tech about applying design-thinking approaches to understanding and addressing online and offline harassment. I write about the results of this workshop in two parts, the first, this one, dealing with the framing of online harassment in the context of speech, and why this needs to be reconsidered. The second documents how we applied a design-thinking approach to understanding how online and offline harassment occurs.
      how online and offline harassment occurs.)
    • Panel Including Gender - Re-publica conference, Berlin  + (Online hate speech, harassment, stalking a
      Online hate speech, harassment, stalking and death threats are trapping too many vocal women and LGTBI persons into a contradictory situation where in one hand, as Internet is crucial for their work, in order to coordinate actions or enable a wider reach out, they are also increasingly expose to surveillance and/or punitive actions. All those factors have driven to a situation where Internet is not a safe space and where it is common to see feminist and activist work being deleted, (self)censored, and actively prevented of being seen, heard or read. Logically, those trends diminish the freedom of expression and privacy rights of the people targeted. Tackling those dangers has become higher in the agenda of many feminist and LGTBI organizations and networks and has driven to an active panorama of initiatives, collective strategies and new approaches to privacy and digital security including a gender and cultural diversity perspective. Building upon past events such as the TransHackFeminist convergence, Autonomy (im)possible, Darmstadt delegation, the Feminist Server Summit, Ministry of hacking and the Gender and technology Institute, our invited participants will discuss from a cyberfeminist perspective what is happening online and how we can reclaim and reshape a feminist internet.
      n reclaim and reshape a feminist internet.)
    • Formacion Seguridad Digital, El Salvador  + (PRIMER DIA 8:00-8:15 Saludo y bienvenida
      PRIMER DIA 8:00-8:15 Saludo y bienvenida 8:15-9:00 Dinámica de presentación 9:00-9:30 Lluvia de ideas 9:30-10:30 Buen uso de datos móviles, riesgos virtuales 10:30-11:30 Uso de redes sociales (Facebook, wasap) 11:30-12:00 Instagram, twiter 12:00-1:00 almuerzo 1:00-1:30 Uso de TAILS 1:30-2:00 Uso de TOR 2:00-2:30 Dinámica de ambientación 2:30-3:30 Trabajo grupal 3:30-4:00 plenaria SEGUNDO DIA 8:00-8:15 Saludo y bienvenida 8:15-9:00 Dinámica de ambientación 9:00-9:30 retroalimentacion 9:30-10:30 Imágenes que sostienen las formas de violencia y estereotipos patriarcales 10:30-11:30 Trabajo individual 11:30-12:00 Uso seguro de telefonía celular y aplicaciones: conceptos básicos, desmitificación de dicha tecnología, a asegurar sus dispositivos móviles y configurar sus opciones para aumentar la protección de sus datos, navegar la red de manera segura desde sus móviles. 12:00-1:00 almuerzo 1:00-1:30 Presentación” Herramientas, procesos y metodologías analógicas y digitales para almacenar o editar información por parte de diferentes personas partes de una misma colectiva/organizacion/comunidad.” 1:30-2:00 Dinámica de ambientación 2:00-2:45 Panel de experiencias personales 2:45-3:30 Trabajo grupal “ Emociones y adiciones cuando accedemos a plataformas y medios sociales (discutir contextos, imaginarios y realidades de las mujeres en el uso y diseño de campañas en redes sociales, Quien la crea, quien las patenta,” 3:30-4:00 plenaria TERCER DIA 8:00-8:15 Saludo y bienvenida 8:15-9:9.45 Ritual de inicio dinámica de los desapegos 9:45-10:15 Lluvia de ideas 10:15-11:15 Exposición “imágenes y contenidos de los imaginarios que tenemos las mujeres, amor romántico, estereotipos patriarcales, trabajo del cuidado” 11:15-12:00 exposición “impactos tiene el uso de plataformas sociales en el cuerpo de las mujeres jóvenes, emociones, cuerpo cansados, roles impuestos, trabajo del cuidado reforzado en las plataformas sociales.” 12:00-1:00 almuerzo 1:00-1:30 Trabajo grupal 1:30-2:00 plenaria 2:00-2:45 Construcción de estrategias colectivas 2:30-4:00 Dinámica de concentración, armonización Consideramos que esta información puede ser como referencia no solo para este tipo de actividades si no para otras como es la seguridad holística, y violencia así como uso y meno de mecanismo de seguridad para las mujeres cuando las mismas acceden a plataformas virtuales.
      as mismas acceden a plataformas virtuales.)
    • Conference Global Tech Women Voices, Internet  + (Panel participants: Servane Mouazan, The
      Panel participants: Servane Mouazan, The Womanity Foundation Ann Demarle, Champlain College Emergent Media Centre Nancy Glass, Johns Hopkins School of Nursing Alex Hache, Tactical Tech Collective Hera Hussain, Chayn Jac Sm Kee, Association for Progressive Communications
      Association for Progressive Communications)
    • Violencias Conectadas, Nicaragua  + (Para hacer visible cómo opera la violencia
      Para hacer visible cómo opera la violencia en la era digital, EnRedadas, tecnología para la igualdad, en el marco de la conmemoración del 25 de Noviembre y los 16 Días de Activismo Contra la Violencia Hacia las Mujeres, lanza la campaña ViolenciasConectadas, de donde se desprende esta exposición. La exposición pone la mirada en la violencia que se genera con la emergencia de los nuevos medios, donde se expresan las viejas violencias. Está compuesta por 16 testimonios, que mujeres nicaragüenses, de diversas edades, contextos y situaciones, compartieron de manera anónima; con el objetivo de denunciar y alertar. Esta exposición cuenta con el apoyo del Fondo Centroamericano de Mujeres y se desarrolla en coordinación con Time Travellers, Galería Códice, El Faro, Mama Yamna y Mará Mará.
      a Códice, El Faro, Mama Yamna y Mará Mará.)
    • Reunión Introductoria a la Protección Integral y Digital para Defensoras del Territorio, Ecuador  + (Presentación Ritual de inicio Enfoque de p
      Presentación Ritual de inicio Enfoque de protección integral Impactos de la defensora en nuestros cuerpos y nuestras relaciones Prácticas de auto-cuidado y bienestar Segunda parte (2 horas y medias) ¿Con quiénes nos comunicamos? ¿Cómo nos comunicamos? ¿Qué comunicamos? ¿Cómo funciona la telefonía celular? Experiencias de telefonía celular autónoma Aplicaciones de comunicación segura Preguntas y comentarios
      omunicación segura Preguntas y comentarios)
    • Workshop, Manuals with a gender perspective, IFF, Valencia  + (Presentation and introduction should not t
      Presentation and introduction should not take more than 25 mins: Coordinators of the session introduce the objectives of the session, agenda and how we will work (methodological steps) + Quick round of introduction people in the room: Mapping knowledge and experiences in the room with production of guides (need to think about a good dynamic to do that) In order to make the most of the session, we will work in 4 or 5 small groups (between 4 or 5 persons) around different exercise and/or common guideline and will then share all together – 45 mins
      and will then share all together – 45 mins)
    • AWID, Coming Back to Tech, Brazil  + (Presentation of the research idea, presentation of the objectives of the session and break out groups, break out groups and feedback to the general group.)
    • Digital security workshop - Les Degommeuses  + (Program : * Issues about Security, Privacy
      Program : * Issues about Security, Privacy, Anonymity * Mapping activities and risks * Draw your tech day * Ask yourself good questions * Secure your devices and data * What is Internet ? * How the data are circulating in the network * Reduce your digital shadow * Use emails in a safer way * Preserve your anonymity, circumvent censorship * Social network, safe space, online identities * Téléphone mobile / intelligent * Specific questions * Good practices, a synthesis * Identifying good resources
      , a synthesis * Identifying good resources)
    • Asesoria, Seguridad interna, Chile  + (Realicé una asesoría a una radio y a su re
      Realicé una asesoría a una radio y a su red de reporteras a nivel nacional en torno a seguridad digital, esto en el mes de noviembre en la cual realizamos la actualización de claves y sistemas, unificación de criterios y nuevos protocolos de seguridad basados en las contingencias nacionales y relacionadas al actuar de otras colectivas. En ambas actividades se abordó tanto seguridad a nivel de navegadores y celulares.
      uridad a nivel de navegadores y celulares.)
    • Europarlament, Digitale Revolution Feminist, Brussels  + (Sichtbarkeit von Frauen* Unumstritten ist
      Sichtbarkeit von Frauen* Unumstritten ist, dass die digitale Revolution neue Möglichkeiten geschaffen hat am gesellschaftlichen Diskurs teilzunehmen – und das gerade für diejenigen, die nicht in den Mainstream Medien vertreten sind. IMG_0879 Gleichzeitig muss der Zugang für Frauen*, das Internet mit gestalten zu können, erleichtert werden. Deshalb braucht es finanzielle Förderungen von Frauen, die im digitalen Sektor tätig sind oder tätig sein wollen, und die deutliche Erhöhung des Frauen*anteils im bisher männlich dominierten ICT Sektor. Um die Sichtbarkeit von Frauen* zu fördern, fordern wir, dass sich in ganz alltäglichen Praktiken strikte Regeln etablieren, ein Beispiel wäre: kein(e) Frau(en)* im Panel, kein Panel. Feministische Netzwerke stärken Für alle Teilnehmer*innen stand fest: Es braucht gemeinsame Plattformen und Netzwerke. Um sich zu vernetzen und zu unterstützen, um Erfahrungen auszutauschen, neuen Input zu bekommen und gemeinsame Ideen weiterzuentwickeln. IMG_0831 Misogynie wird im Internet in erschreckenden Dimensionen praktiziert. Dem dürfen wir keinen Raum geben. Put the shame where it belongs! Cyber Harassment, Revenge Porn und viele andere Tools von Anti-Feminists müssen enttarnt werden: Als abscheuliche Formen von Gewalt gegen Frauen*. Darauf müssen wir politische Antworten entwickeln. Sexistische Kommentare und Kampagnen haben in einer emanzipierten Gesellschaft keinen Platz. Aber wir müssen auch strukturelle Diskriminierungen in der Gesellschaft bekämpfen und für die Rechte von Frauen einstehen. Ein freies, inklusives und gleichberechtigtes Internet braucht eine freie, inklusive und gleichberechtigte Gesellschaft. Den Initiativbericht von Terry, den sie für den FEMM Ausschuss verfasst hat, könnt ihr hier lesen.
      schuss verfasst hat, könnt ihr hier lesen.)
    • Panel Gender and Surveillance, Circumvention Tech Festival, Spain  + (Some of the cases and initiatives presented during the panelː http://policespiesoutoflives.org.uk/ http://www.theguardian.com/uk/undercover-police-and-policing)
    • TransHackFeminist Convergence 2, Mexico  + (Sábado 25 Julio 2015 10:00 AM – 12:00
      Sábado 25 Julio 2015 10:00 AM – 12:00 PM *Asamblea inicial THF* 12:00 PM – 03:00 PM *Preparación de alimentos y comida* 03:00 PM – 06:00 PM *Autodefensa Hackfeminista y Cuidados Colectivos Digitales* 06:00 PM – 08:00 PM *AUTOEDITORAS: Hacemos Femzines* 08:15 PM – 11:00 PM *Fiesta de bienvenida* Domingo 26 Julio 2015 09:30 AM – 10:30 AM *Desayuno* 10:30 AM – 01:30 PM *Autodefensa Hackfeminista y Cuidados Colectivos Digitales* 01:30 PM – 03:00 PM *Comida* 03:00 PM – 05:00 PM *Autodefensa Hackfeminista y Cuidados Colectivos Digitales* 05:00 PM – 7:00 PM *Acompañamiento seguro a interrupción de embarazo* Lunes 27 Julio 2015 08:00 AM – 10:00 AM *Clase Lucha libre* 09:30 AM – 10:30 AM *Desayuno* 11:00 AM – 02:00 PM *Edición de audio con Ardour* 01:30 PM – 03:00 PM *Comida* 03:00 PM – 05:00 PM *Danza Butoh* 05:00 PM – 6:00 PM *Presentación de la Red de Radios Comunitarias y Software Libre* 06:00 PM – 08:00 PM *Armando campañas en red 1 Interviniendo youtube* Martes 28 Julio 2015 08:00 AM – 10:00 AM *Clase Lucha libre* 09:30 AM – 10:30 AM *Desayuno* 10:45 AM – 01:30 PM *Mesa Los otros trabajos* 01:30 PM – 03:00 PM *Comida* 05:00 PM – 08:00 PM *Armando campañas en red 2. Redes sociales* Miércoles 29 Julio 2015 08:00 AM – 10:00 AM *Clase Lucha libre* 09:30 AM – 10:30 AM *Desayuno* 10:30 AM – 01:30 PM *Mesa ecofeminismo* 01:30 PM – 03:00 PM *Comida* 05:00 PM – 07:00 PM *Mesa: Autodefensa ciudadana* 07:00 PM – 9:00 PM *Performance Vociferación* Jueves 30 Julio 2015 08:00 AM – 10:00 AM *Clase Lucha libre* 09:30 AM – 10:30 AM *Desayuno* 10:30 AM – 01:30 PM *Haciendo cápsulas de radio con audacity* 10:30 AM – 01:30 PM *Autodefensa antipatriarcal entre mujeres* 01:30 PM – 03:00 PM *Comida* 05:00 PM – 06:30 PM *Charla Crypto Wars* 06:30 PM – 09:00 PM *Taller Autodefensa digital* Viernes 31 Julio 2015 08:00 AM – 10:00 AM *Clase Lucha libre* 09:30 AM – 10:30 AM *Desayuno* 10:30 AM – 01:30 PM *Autodefensa antipatriarcal entre mujeres* 01:30 PM – 03:00 PM *Comida* 03:00 PM – 08:00 PM *Taller autodefensa digital* 08:00 PM – 09:45 PM *Asamblea de cierre*
      08:00 PM – 09:45 PM *Asamblea de cierre*)
    • Talk Online Misoginy, Pakistan  + (The Last Word bookshop and Digital Rights
      The Last Word bookshop and Digital Rights Foundation recently collaborated on a discussion session held at the Last Word in Lahore, Pakistan, to help develop an understanding – and increase awareness of – the dangers of unchecked online harassment. The session, “A Call To Action: Online Misogyny in Pakistan, and How to Combat it”, was announced in response to a disturbing rise in online misogyny and gender-based cyber-harassment. According to Pakistan's Federal Investigation Agency, 3,027 cases of cybercrime were reported in the the period between August 2014 and August 2015, with 45% of the cases being related to cyber-harassment on social media against women. Aysha Raja, owner of the Last Word, compering the event. On her right are Nabiha Meher Shaikh and Susan Benesch The recent misogyny and hyper-jingoism on display last week (http://www.dawn.com/news/1203410) highlighted how important it is to tackle misogyny, and to examine the behaviours that give rise to it. The alarming frequency with which online harassment (which often bleeds out into real world “offline” harassment, or worse) has led to much needed public discourse – not just on recognising that the danger is real, but also to come up with proactive solutions to counter such behaviour. There are signs of understanding – the DRF/Last Word session, for example, saw a good turnout, with many men not only in attendance, but also contributing to the discussion in a mostly positive manner. Susan Benesch of The Berkman Center for Internet and Society, at Harvard University, and founder of the Dangerous Speech Project, “to find ways of diminishing inflammatory speech – and its capacity to inspire violence - while protecting freedom of expression.” http://www.voicesthatpoison.org/ https://twitter.com/dangerousspeech Nabiha Meher Sheikh, Co-founder of Pakistan Feminist Watch, and an instructor in Critical Thinking https://twitter.com/pakfemwatch http://pakistanfeministwatch.blogspot.com/ Jahanzaib Haque, Chief Digital Strategist and Editor at Dawn.com https://twitter.com/jhaque_ https://www.dawn.com Nighat Dad, Executive Director of Digital Rights Foundation https://twitter.com/nighatdad http://digitalrightsfoundation.pk/ Links We have collected the live-tweets of the session in Storify, for those unable to attend. The link can be found here. http://www.dawn.com/news/1205235 Dawn's coverage of the session.
      ws/1205235 Dawn's coverage of the session.)
    • Seguridad digial para defensores de derechos humanos en contextos mineros 2  + (The conversation started with an expositio
      The conversation started with an exposition about our data and the Internet, analyzing the infrastructure of the Internet and examples of ho companies use information of their users, as well as the techno-political context. During the conversation we talked on the importance of starting a digital security process within the organization that includes a critical vision of the necessities and adopted on the conditions in which the organization works.
      onditions in which the organization works.)
    • Conversation, Coffee Chat at ARROW HQ Malaysia  + (The feedback focused on the following topi
      The feedback focused on the following topics: - How the internet works - we re-enacted the flow of sending emails, how the messages can be intercepted at the respective points and the need to encrypt our emails (especially in relation to sensitive messages). - From that session, we introduced some practical actions (& solutions) towards digital security - email encryption; KeyPass; using Signal & Tor browsers; exploring mobile safety apps etc. - We concluded with the sharing of the 8-day Data Detox Kit and encouraged staff to undertake the data detox
      couraged staff to undertake the data detox)
    • Gender and Technology Institute Asia  + (The four day training included multiple se
      The four day training included multiple sessions based on three themes: Holistic Security, Politics of Data and Gender and Tech. Sessions included: Feminist Principles of the Internet, How the internet works, risk assessment and Online Gender Based violence to name a few.
      nline Gender Based violence to name a few.)
    • Womanity award, Oui Share Festival, Paris, France  + (The four finalist pairs of organisations t
      The four finalist pairs of organisations that will compete for this award in May are: TAKE BACK THE TECH! Innovation Partner finalist: Association for Progressive Communications (South Africa) Scale-Up Partner finalist: La Sandia Digital (Mexico) and their project Luchadoras Take Back the Tech! is a campaign to counter and build awareness of the problem of online and other tech-related violence against women. Since inception in 2006, it has supported local campaigns in over 30 countries. In 2011 TBTT! adapted the free Ushahidi software, enabling victims to report instances of online VAW, and build a global map of personal testimonies to help women’s rights organisations use evidence-based data to find solutions and speak out on the topic. The Award would enable the Partners to produce internet TV programmes to increase awareness of the campaign (particularly in Spanish-speaking South America), use online and traditional media to communicate tools and strategies for dealing with tech-related VAW, and build a network of feminist activists and media producers. THE GENDER AND TECH INSTITUTE Innovation Partner finalist: Tactical Tech Collective (Germany) Scale-Up Partner finalist: Just Associates (JASS) Mesoamerica (Mexico / Costa Rica) Whilst internet use is crucial to feminist activists, it can also be a space where women suffer harassment and surveillance. This can result in women’s voices being silenced as they censor themselves online in fear for their safety. This programme offers digital training in the field of internet security and privacy for leaders of organisations tackling VAW. The toolkits designed by the course participants serve to further train members of their own teams and networks. The Award would enable the training programme to have a far greater reach through JASS Associates’ global network. BREAKAWAY GAME Innovation Partner finalist: Champlain College, Emergent Media Centre (USA) Scale-Up Partner finalist: Grassroot Soccer (South Africa) Breakaway is a soccer-themed video game, encouraging players to move away from behaviour that promotes VAW, towards behaviour promoting mutual respect. Young players meet in camps where they role-play scenarios that create environments of gender equality. The game has been played in 185 countries with over 5,000 registered users. The Award would enable Grassroot Soccer to adapt the Breakaway programme to their location and its needs. The organisation has successfully used soccer as a means to address HIV-prevention with young people in South Africa and further afield. MYPLAN APP Innovation Partner finalist: Johns Hopkins School of Nursing (USA) Scale-Up Partner finalist: Il Comitato Internazionale per lo Sviluppo dei Popoli (CISP) (Kenya / Somalia) Abused women often have little formal support or resources available to them, and cannot openly get help without further endangering themselves or their children. MyPlan is a free, online and smart phone decision-making app that helps women to consider the severity of violence in their relationship, along with other risk factors, to decide whether to leave an abusive partner, and to create a tailored, safe action plan for doing so, linking into resources available locally. Since its release in January 2014, the app has already been downloaded over 9,000 times. The Award would enable the app to be adapted to help women in refugee settings in Nairobi and Mogadishu, make safe action plans in partnership with health professionals. ICT for Womanity Network Womanity is excited to announce that the resulting partnerships will also connect with existing Tech-for-Gender projects, creating a global network of activists and practitioners already using these technologies to tackle VAW. This collaborative network will be called the ICT for Womanity network. This network will: Increase the two Award winners’ learning opportunities; Provide a safe space to exchange information and knowledge on how ICTs can prevent violence against women; Collect and analyse data to assess the effectiveness of ICTs improving women’s safety; Increase awareness in the mainstream media of how ICT is proven to prevent violence against women.
      proven to prevent violence against women.)
    • Gender and Technology Institute Asia, Start up Meeting, Colombo, Skri Lanka  + (The meeting took place over three days. Du
      The meeting took place over three days. During those days we worked with the participants on mapping out the key risks and threats in their respective countries, their needs as activists, WHRDs, journalists and lawyers. Beyond that we focused on what type of content, sessions and participants that should be a part of the Asian GTI.
      ts that should be a part of the Asian GTI.)
    • FemH3ck - Round table Privacy and security in the Open IT Space, Serbia  + (The organization of the Round Table with t
      The organization of the Round Table with the workshop took place in several phases: -The First phase was the conclusion of a contract with the Media Centre Nis in order to provide space for holding events, and technical support. -The Second phase included the agreements with educational institutions dealing with education in the field of Information Technology 'IT Centre' and the Technical High School in Nis, in order to provide expert trainers on training and agree on topics that will be covered in the educational process, as well as ways their presentations to the participants and wider audiences. - The third phase involved the selection, calling and informing participants of the round table and workshops. -The Fourth phase has been informing and inviting the media to be actively involved in the work of the round table and workshops. - The fifth phase was the maintenance of the event with all the planned activities. Meanwhile, in the performance of all of the above mentioned phases in the process of organizing the event is done visually designing, preparing for and printing of supporting educational and promotional materials, as well as procurement of workshop materials. Agenda of the event: ROUNDTABLE WITH WORKSHOP TO RAISING AWARENESS, UNDERSTANDING AND DEVELOPMENT OF PRIVACY AND DIGITAL SECURITY FOR WOMEN activists and representatives of civil society organizations to fight for human rights Media & Reform CENTER NIS, Obrenovićeva 38 Monday, May 25th, 2015. – Introductory presentation on the concept of IT security and the press - Valentina Aleksandrovic, Chairwoman of the Association of Women's Development Center and participant of GPS Camp -Impact of the Internet and IT technology on privacy and security in communication- Valentina Aleandrovic, Chairwoman of the Association of Women's Development Center and participant of GPS Camp Topics: Risk assessment What are the 'digital shadow' What is' Metadata '' Tracking Endangering other Discussion Coffee brake – Mechanisms and tools to achieve a greater level of security on the Internet –IT Education Center Nis –Miloš Perić, dipl. inž. elektronike – sistem inženjer u IT centru;Aleksandar Petrović – student Visoke tehničke škole u Nišu Topics: -Protection from malware and hackers -Data protection from physical threats -Creating safe access codes (paswords) -How to protect privacy in online communication - How to safely use smartphones - Discussion - Lunch
      ly use smartphones - Discussion - Lunch)
    • Digital Trainers Summit - Circumvention Tech Festival, Spain  + (The summit will start with a public event
      The summit will start with a public event where the col laboratory project Level-Up will be presented and you will have an opportunity to talk with the contributors of this digital security resource for trainers in smaller break out sessions, where there is an opportunity to ask questions, try things and learn more. The rest of the Trainer Summit will be closed to participation only by digital security trainers. For the remaining 3 days digital security trainers from all over the world will come together to share experiences and practices on training, talk about how to best train in specific regions and tools, hunt for bugs in tools with developers and strengthen a global network or trainers that in turn will strengthen the assistance we can provide to human rights defenders in every corner of the globe.
      ts defenders in every corner of the globe.)
    • Seguridad digial para defensores de derechos humanos en contextos mineros  + (The training was divided in three parts. D
      The training was divided in three parts. During the first part we worked on the general aspects of privacy and digital security in the Latin-American context. In the second part we worked on threats for cellphones. During the third part we worked on secure communication through e-mail and encryption of folders to protect sensitive information. During the training all participants configured a Wire account, analyzed the security of their cellphone devices, create a secure mail account in a secure server and use veracrypt to encrypt their folders.
      nd use veracrypt to encrypt their folders.)
    • Holistic digital security training for women journalists, Mexico  + (The workshop consisted of the use of encrypted email, encrypted instant messaging, anonymous surfing with Tails and use of VPN. And a monitoring process for two months.)
    • Workshop, Regional networks for tackling gender-based online violence, IFF, Valencia  + (This session will last two hours and its p
      This session will last two hours and its principal aims are to brainstorm together in order to imagine how we can build regional networks for tackling tech-related violence and create networks of support and solidarity. This entrails from thinking what type of training and curricula such networks would required in order to blossom, but also what could be their needs in relation to autonomous infrastructure, low tech and/or privacy and security oriented tools of communication. We will try to make the best of the time we have in our hands, this is why we would ask you to think about one good example of community/network of support (does not have to be gender oriented) and to carefully think about it is successful (impact, resilience, sustainability, etc). The workshop will be participative and we hope that ideas and exchanges that will take place during the session will inspire all of us in our own practices. Brainstorm about how practices taking place in those networks could be boosted in our own training activities to privacy and digital security? How do we transform training in seeds for change inside regional territories? What are the basic elements for a training to create a network of support that remains over time? (hotline, information on time when under attack, psychosocial counseling at distance, regional and local aspects of tech-related violence and tactics to mitigate and overcome it, etc.) Which dimensions should be taken into account for an appropriate curricula and training methodologies that would have those objectives in mind? Are they any requirements in relation to collective and participants which are trained? What should be the technical infrastructure? Etc Quick round of introduction people in the room: By families maybe (gender, holistic, training, tech development, documentation, etc To be decided) – 10 mins maximum Presentation and introduction should not take more than 20 mins In order to make the most of the session, we will work in 4 or 5 small groups (between 4 or 5 persons) around a common guideline and will then share all together – 30 to 45 mins Put in common: 20 mins / Debate and synthesis: 20 mins
      : 20 mins / Debate and synthesis: 20 mins)
    • Gender and Technology Institute, Uruguay  + (Through the event, the participants attend
      Through the event, the participants attended different sessions distributed in the following big topics: digital security, security in mobiles, privacy, data politics, gender and technology, replication and training. They were developed across the following sessions: - Digital security: basic concepts about security, how to take control of the browser, malware’s attacks, server’s attacks, web hosting, anonymity, encryption, TOR, TAILS and deep web. - Mobile security: Understand infrastructure and mobiles, security and privacy settings for mobiles, telephony alternatives with VOIP. - Data politics: Metadata, create and protect databases, free mapping processes, technology sovereignty, collective memory. - Campaigns: Creative uses of social media, planning of campaign considering privacy and security, search engine optimization, push profiles of land right defenders under risk, hate speech and feminist counter-speech. - Holistic security: Technology in demonstrations, documenting violence, preparing an event or training in an unknown context, emotions and addictions using social media. And at the end of the day there were two labs that people could attend: the feminist hackerspace and the self-care lab. We noticed that many of the participants went to the hackerspace, even when that activity was not required for the institute. It shows us that digital security, privacy and self-learning are activities that they understand are relevant for their own work. Some of them didn’t have any previous experience with free software and privacy tools, but they were looking to learn about this options and use them as soon as they could. In the self-care lab, one facilitator was providing methodologies to deal with stress and anxiety as well as to learn to relax and ground in front of fear and trauma. She provided a space to share methods of collective and individual care. About the schedule, the first day we worked with all the participants to clarify the goals of the GTI, the shared agreements, media protocols and documentation, as well as all important logistic information. There was also a symbolic action to begin the institute and connect between all of us. In the afternoon the participants shared in small groups about knowledge that comes from their ancestors and their first memories of technology as well as how their relationship with technology has been influenced by their gender as well as other intersectional dimensions like geographic origin, social class, access to education, opportunities to education and so on. Based on those conversations we moved on into a first collective session about what integral security means, detailing many areas that can be protected as well as strategies of mitigation that exist. The participants shared some of their security strategies linking the relationship between physical integrity, digital security and psychosocial well-being. The last session allowed us all to visibilize the diversity of knowledge and security practices that the participants and their networks already have. It also let us see that the participants were already applying security practices that we also use in digital environments, strategies known like “fortification”, “reduction”, “obfuscation” and "compartmentalization". That first day allowed the participants to understand that technologies are diverse and broad and that ancestral technologies are valuable technical knowledge that we need to reclaim, showing how all of them have an expert relationship with many technical knowledges. It also allowed us to all of us to start from a shared vocabulary as well as to have a better understanding of the diversity of contexts, challenges and strategies. About the schedule during the GTI, it usually was 3 different sessions in parallel that allowed the participants to find the session that better accommodate their interests. All the sessions were facilitated by 2 or 3 facilitators and one additional person was taking notes. Finally, all the facilitators were meeting at the end of the day to evaluate how everything went, what was the evaluation of their sessions by the participants and which changes they needed to implement the next day. The last day was designed for the participants to have strategical conversations about topics they needed to go deep in. And at the end we had a closing session where we discussed next steps after the GTI, which activities, trainings, or facilitations they were planning, how they wanted to keep in touch and how to manage the documentation of the sessions. The next steps will be to create a mailing list for participants, share reviewed documentation, update the curricula as well as to create this document. We will also do a follow up of each participant to understand which are the trainings and awareness raising activities they are planning in their own networks and communities, and see what is the best way that we can support their efforts.
      est way that we can support their efforts.)
    • Gender and Technology Institute, Panama  + (Throughout this event, participants were i
      Throughout this event, participants were involved in different tracks such as digital security, mobiles security, politics of data, gender and technology and training which were complemented with three different labs. Each track encompassed the following sessions: - Digital Security: Security basics, Browser control, Malware attacks, Server attacks and hosting solutions, Anonymity, Encryption, TAILS and Deep web. - Mobiles security: Understanding of infrastructure and mobiles, Security and privacy configuration for mobiles, Alternatives for telephony over VOIP. - Politics of data: Metadata, Criteria for selecting and developing apps, Creating and protecting databases, SEO and positioning your contents. - Gender and technology: Creative uses of social networks, Feminist campaigning taking into account privacy and security, Reporting and documenting gender based online violence, Hacking hate speech, Big data and sexual surveillance. - Training skills: ADIDS for education to technologies, Create safe spaces. Besides those sessions, there were three labs at the end of the day that people could attend: the feminist hackerspace, a science fiction lab and a self care lab. We can note that lots of participants engaged in the hackerspace even if it was not a mandatory activity. It shows that digital security and privacy are concepts that they understood as relevant for their activity. Some didn't have any experience with free software and privacy tools before, but they were clearly in search for learning and using immediately or as soon as possible those in their routines. The other most attended lab was the self care one where the facilitator provided methodologies for dealing with stress and anxiety, how to relax and rebalance when facing fear and trauma, and provided space for exchanging on methods for collective and individual self care. The science fiction lab was also attended by some participants during the first two days but was dropped in the last two days as participants felt it was more urgent to attend the hackerspace or the self care lab. Anyhow it enabled to work on the issue of creativity and how to develop methodologies that easy the process of collective creation of imaginaries, narratives and desires in relation to our technologies and activisms.
      elation to our technologies and activisms.)
    • Training, Digital Security and Online Safety Training Philippines  + (Topics include How Internet Works, History of Internet from global to Philippines context, Risk Assessment, Managing Identities Online, Building Strategies to counter online gender-based violence and mobile security.)
    • Herramientas comunicacionales para la protección del territorio y naturaleza, Ecuador  + (Viernes – 07 de diciembre Hora Actividad R
      Viernes – 07 de diciembre Hora Actividad Responsable Materiales 12h30 Llegada y almuerzo en Hostal Casa Kolping CEDHU 14h00-14h30 Bienvenida al curso, presentación de objetivos del módulo y explicación de temas logísticos. CEDHU Presentación de lxs participantes y equipo de facilitación. Reglas durante el taller. CEDHU 14h30-16h00 Recuento del módulo anterior y revisión de tareas Facilitadora: CEDHU Presentación de resultados del trabajo con las herramientas cartográficas usadas el módulo III Facilitadora: CEDHU 16h00-18h00 Presentación de herramientas jurídicas: Derechos colectivos y mecanismos de exigibilidad Facilitadora: Nathy Yépez 18h00-19h00 Cena Casa Kolping Sábado 08 de diciembre Hora Actividad Metodología Responsable 7:30 – 8:30 Desayuno 8:45 – 9:00 Inicio Dinámicas de inicio jornada Jorge 9:00 – 9:15 Presentación de taller comunicación Facilitadoras dan la bienvenida Presentación de agenda – taller Jorge 9:15 – 9:30 Presentación grupal Cada persona hace una presentación corta:
nombre, de qué organización, comunidad viene, qué actividad realiza y qué comida le gusta. Jorge 9:30 – 9:45 Establecimiento de acuerdos Escribimos en un papelote los acuerdos a los que llegamos para el taller a partir de dos preguntas generadoras. ¿Qué quiero aprender en el taller? ¿Qué saber puedo compartir en el taller? Jorge 9:45 – 10:30 El Árbol Vital: Comunicar como defensor de Derechos Humanos y de la Naturaleza Ejercicio de reconocimiento como defensor/a Este árbol soy yo Ahora vamos a dibujar en la cartulina A4 el árbol que encontramos en nuestro paseo imaginario. En el tronco del árbol escribamos nuestro nombre. A continuación relacionamos cada parte del árbol con nuestra vida comunitaria, así: La Raíz, Hojas, Flores, Frutos Jorge 10:30 11:00 Plenaria JOrge 11:00 11:30 Lluvia de ideas Se pide a los y las participantes que realicen una lluvia de ideas con pocas palabras sobre la palabra comunicación y que la escriban en una cartulina. Cada uno deberá leer su cartulina al grupo y pagarla en el papelote. Jorge 11:30 – 11:45 Trabajo de cooperación, dialogo y organización Ejercicio de organización por grupos de la torre de sorbetes Jorge 11:45 12:45 ¿Qué quiero comunicar? Mapa de la comunicación y defensa del territorio Se organizan en grupos a partir de su cercanía territorial. Cada grupo deberá dibujar un mapa donde represente a su comunidad, organización, barrio, ciudad. (se dividen por regiones) JOrge 12:45 – 13:00 Plenaria Plenaria sobre dialogo y construcción colectiva Jorge 13:00 – 14:00 Almuerzo Barriga llena corazón contento Módulo IV, Segunda parte: Protección y Seguridad para defensoras y defensores del territorio. Seguridad Digital: telefonía celular e internet. Hora Actividad Metodología Responsable 14:00 – 14:10 Introducción al Análisis de Riesgos y la protección integral Breve introducción al enfoque integral de la protección a defensoras. En trabajo en grupos (los mismos que en la mañana) se deben contestar preguntas en un papelografo. Maka 14:10 – 14:20 Mapa de Actividades - ¿Cuáles son todas las actividades de defensa y promoción de los derechos humanos que realiza la defensora y/o su organización? ¿Algunas son más riesgosas? ¿Los riesgos son de ataques a nuestra integridad física y digital o también emocional y riesgos por desgaste? Maka 14:20 – 14:30 Análisis de contexto ¿Cuál es el contexto económico, político, jurídico, social en el que nos desempeñamos? ¿Existen actores agresores que no sean actores estatales? Califica el contexto psicosocial: ¿existe temor, miedo, frustración social por un contexto de violencia política? ¿Cómo impacta en la labor? Maka 14:30 – 14:40 Mapa de Actores ¿Quién son los actores susceptibles de atacarnos por nuestra labor? ¿Qué tan fuertes y amplias son nuestras alianzas con actores a nivel local, estatal, nacional e internacional? ¿Cuál es la cadena de mando? ¿Existe manera de incidir en ellos? ¿Qué actores tienen más o menos poder? ¿De qué manera se pueden movilizar lox aliadxs? ¿Qué apoyo podrían brindar? Maka 14:40 – 15:00 Identificar riesgos Incidente de Seguridad Un evento fuera de lo común que afecta a la seguridad física, digital y/o emocional de la defensora y/o de su familia, organización, entorno. Amenaza Una amenaza es un incidente de seguridad que tiene un impacto alto en la integridad física, digital y/o emocional de la defensora, y del cual recuperarse es más difícil. No todos los incidentes de seguridad son amenazas, pero todas las amenazas son incidentes de seguridad. Ataque Un ataque es un incidente de seguridad que tiene un impacto alto en la integridad física, digital y/o emocional de la defensora, y del cual recuperarse es más difícil. El ataque es directamente dirigido en contra de la persona defensora o su familia o aliados estratégicos. Maka 15:00 – 15:30 Diseño de planes de protección digital Planes de prevención y mitigación poniendo énfasis en la comunicación y el bienestar colectivo. Maka 15:30 – 17:00 Herramientas de seguridad digital ¿Cómo funciona la telefonía celular e Internet? Maka 17:00-18:00 Comunicación móvil Conocer nuestro celular, revisar la configuración de cuentas Googles y conocer algunas aplicaciones seguras de comunicación Maka Domingo 9 de Diciembre Hora Actividad Metodología Responsable 8:00 – 9:00 Continuidad Herramientas de mensajería Cuáles son los criterios para escoger una aplicación de mensajería segura Maka 9:00 – 10:00 Correo Seguro Cómo funciona el correo electrónico Maka 10:00 – 11:00 Contraseñas seguras Cuáles son los criterios para crear una contraseña segura Maka 11:00 – 12:00 Evaluación y preguntas Cierre CEDHU
      12:00 Evaluación y preguntas Cierre CEDHU)
    • Acompanamiento, Seguridad Digital Activistas Derecho a Decidir, Ecuador  + (Vimos los básicos: contraseñas seguras, co
      Vimos los básicos: contraseñas seguras, correo seguro, como compartir archivos de manera segura, como usar las herramientas de documentos compartidos seguros, como guardar información. Por otro lado celulares, uso de aplicaciones seguras, signal y telegrama chat secreto.
      seguras, signal y telegrama chat secreto.)
    • FemH3ck - How the internet works for WHRD, Mexico  + (Voces de Mujeres (Women's Voices) was a 3
      Voces de Mujeres (Women's Voices) was a 3 days training on multimedia production with WHRD in Amecameca, Estado de Mexico. During this 3 days we covered: Narrative - How to tell a story How to conduct an ethic and secure interview Video, photo, text and audio production Digital security: How the Internet works? - What do we use Internet for? - What type of information do we exchange through Internet? - Exercise with the cards: giving each person a card (router, computer, ISP, Google..) - Looking at the risks - What could go wrong on each stage? - What can we do or which tools can we use to solve this? - Questions
      we use to solve this? - Questions)
    • Feminist Internet Meeting, Malaysia  + (We began with stories. Personal and collec
      We began with stories. Personal and collective stories of our struggles that form as bookmarks and knots to the long thread of feminist organising and movement building in issues as diverse as queer rights in Aceh, to sex work in Uganda, funding women's rights organisations in Georgia, and building autonomous feminist internet radio networks in Brazil. We brought artefacts from our movements – photographs, posters, publications, stickers, protest banners, anti-surveillance toolkits, bottles of healing elixirs and more – and threaded our stories through them. How we became involved, why this mattered, how we lost people whom we were loving inspired by and through that, building relationships of care and solidarity, and how our presence and action ruptured the normality of discrimination. This was important not just to locate ourselves in our collective history of movement building, but to also to recognise that we've got this. That as a movement, or as movements, we have encountered innumerable challenges and worked together in different ways to figure things out and respond with shared political commitment. To also know that we have much to build from, and that this is a moment in a long trajectory of feminist organising in creative and resilient ways all over the world. And that memory is resistance, especially when our histories and contribution have been and are actively being rendered invisible. The act of recalling, of naming, is to also make visible our claim in shaping the world we are in. The act of recalling, of naming, is to also make visible our claim in shaping the world we are in. Discourse as a site of activism Digitally networked technologies have seeded and enabled the proliferation of feminist expression in multiple spaces, from online journals to podcasts, digital archives, the humble comments section, digital storytelling projects, social media engagement and more. This has contributed to the most stubborn and invisible quadrant of change in the classic framework of how change happens: that of culture and norms, and in behaviour, thoughts and attitudes. There were many activists at the MFI who were engaged in content and discourse related initiatives, such as the Kohl Journal that surfaces critical analysis on gender and sexuality in the MENA region, Skin Stories that provides deep reflection on the many dimensions of disabilities and sexuality in India, and Bnt Al Masarwa, an independent feminist band that transformed conversations with women across three villages in Egypt into lyrics that provoke further conversation. This does not yet include the many people present who engage on social media as a political site of their everyday activism in pushing back against patriarchal discourse and norms, and face serious and critical backlash in response. This has contributed to the most stubborn and invisible quadrant of change in the classic framework of how change happens: that of culture and norms, and in behaviour, thoughts and attitudes. Yet, women's movements tend to instrumentalise our engagement with digitally networked technologies. There is an approach of “using social media to reach out to more people,” instead of seeing it as a space of activism in and of itself. Perhaps this is understandable due to the milestones achieved in engagement with policy and legal reform in recent decades, but in an age of unprecedented circulation of information, discourse, visuals and knowledge – there is a need to reimagine and understand better discourse as a site of activism, in and of itself, and its potential for deep transformative change. Constellation of actors, leadership & accountability In particular, discourse as a site for activism is important to also see new and emerging actors who are part of feminist organising, but remain outside of the more familiar format of organisations. Some of them are content creators, some are social media activists, some are part of interest-driven collectives, some are feminist techies, and some are what I like to call “free radicals” - nodes that connect between formal organising and informal networks who act as key bridge builders and interlocutors of different actors and different spaces. The internet and its capacity for anonymity and distance has also enabled actors who are diffident of visibility for various reasons (e.g. risk, introverts etc) to participate actively and expressively in organising for change. Some of them are content creators, some are social media activists, some are part of interest-driven collectives, some are feminist techies, and some are what I like to call “free radicals” - nodes that connect between formal organising and informal networks who act as key bridge builders and interlocutors of different actors and different spaces. This is significant for several reasons. First, to appreciate the actual breadth and diversity of the movement. Even as there are valid concerns about the sustainability of organisations in terms of new leadership, it is both pivotal and reassuring the recognise that the movement is in fact, much more diverse and broader than imagined. This brings with it some key questions compel attention as we think through how to contribute to building stronger movements. For example, the backlash and attacks that are being faced by those who agitate patriarchy with feminist narratives in the public-private domain online. Without a recognition and an effort to forge connections, we are coming up short in our efforts at solidarity and resilience. Another question is on leadership and accountability, where we have placed our investment on this, and the challenges that arise from it. One instance is on addressing sexual harassment in the movement – a conversation that is currently alive and having the potency of upturning the quiet toxic culture of sexualised power in our everyday engagement. We have thought through and provided for this through the model of institutions. But where we have different and informal lines of accountability to each other through shared political commitment, there is a discernible lacuna. Much of this is being taken up online, by individuals and collectives, that brings with it both possibilities and challenges. One instance is on addressing sexual harassment in the movement – a conversation that is currently alive and having the potency of upturning the quiet toxic culture of sexualised power in our everyday engagement. How do we think through accountability in a movement where there is a diversity in terms of constellation of actors and how we relate to each other? Who do we see as leaders and custodians of the principles that matter to us in our work for change? And is it possible to reframe the question of intergenerational leadership to one that is perhaps more about intersection of actors, spaces and ways of organising? Documentation of MFI meeting 2017, Malaysia. Museum of Movements, photograph by Fungai Machirori Pace, sustainability and ways of organising Another cluster of issues discussed at the convening was on the pace and sustainability of our organising. This is relevant not just in terms of resource mobilisation – although facets for consideration of that are many, ranging from supporting actors who are involved in informal ways of organising, to greater restrictions placed by the state to funds that can be received by NGOs – but also in terms of the rhythms of our movement. There appears to be campaigns, protests and threats in rapid succession, creating a hectic cadence that result in several things. One is burn out and an increasing sense of fatigue that requires serious consideration as we reflect on what it means to practice the politics of self and collective care. Another is rendering moments of abeyances invisible. The everyday labour of organising that happens in the in-between times. What do we see, and not, in our activism? In an age where internet technologies run on the logic capital of visibility and eyeballs, how are we resisting this by reclaiming our pace, and privileging the everyday work, and the people who do them? How does the everyday work look like in the evolving and nebulous ecosystem of our movements in a digital age? One is burn out and an increasing sense of fatigue that requires serious consideration as we reflect on what it means to practice the politics of self and collective care. It was also recognised that the steps in which we understood movement building to happen is no longer as clear and linear (perception of injustice > leadership > critical analysis > building shared political agenda > organising & building constituency > identify actions, strategies & priorities > act for change > visibility/backlash > gains > analysis > expansion of membership base). While this may have always been true to an extent, the distribution of leadership, actors and ways of organising enabled through digitally networked relationships and sites of organising have troubled this in significant ways. In particular, the building of a shared political agenda and the development of strategies and actions. This is happening at multiple sites, through the leadership of multiple nodes, that may or may not be in relationship with each other. A visible conversation online could be the start, rather than an outcome, of taking action for change and the building of a constituency. Perhaps what is more important than consideration of which steps come first, is the shifting terrain of each component. One is the notion of constituency in a digital age. This was discussed in terms of the more familiar question of who is representing whom, particularly in unstructured formats that lie outside of institutional structures, as well as the critical question of access to the internet. Access to what kind of internet was a key issue at the MFI. Recognising that access is not just about connectivity and devices, but also skills, online communications culture and dominant languages played a role in terms of who can be seen, heard and included in particular moments in the movement. This conversation had many complex layers – from thinking about current disparity in internet access between and within geographical locations and people; to the commodification of our narratives and political actions as we rely on privatised online spaces for our organising; to the need to think about feminist digital infrastructures not just as technical responses, but a response that subverts the current logic capital of technology and access; to the ability of multiple connections and the forging of global political solidarities; as well as enabling muted voices within feminist movements as well as in the larger public to find kin and amplify their realities. We discussed in terms of the more familiar question of who is representing whom, particularly in unstructured formats that lie outside of institutional structures, as well as the critical question of access to the internet. What became evident to me throughout the four days, is also the need for an exchange of movement building skills, capacities and strategies that can integrate lessons and questions from onground and online organising. On how we understand leadership, accountability, constituency building, representation, issues, ways of organising, sites of activism, pace, change and impact. Breaking the binary: Feminist Principles of the Internet Perhaps the most important point of conversation at the MFI was the urgent need to break the binary between what is perceived as online and onground. Rather than see them as distinct, to understand the flow and impact between one and the other, and where embodiment lies as a site of this intersection. This is not just in terms of the ways in which we recognise and understand the shape and form of our movements, but also the intersection of issues that we need to take into account as we continue in our work to critically analyse power structures towards imagining transformative futures. The collectively developed Feminist Principle of the Internet can act as a seed and a framework for the conversation. To recognise that first, feminists and women's movements have always been part of the history of the internet for social justice and change, and have played a pivotal role in its development. And that we need to apply a feminist lens of deconstructing power in understanding and engaging with an increasingly digitally networked world. From issues of access, to expression, the economy, governance, embodiment and public participation. And when we begin the conversation with our political framework, and grounded through the diverse realities of our contexts, then we locate ourselves as critical stakeholders, articulators, shapers, dreamers and political actors of our unfolding past, present and future. When we begin the conversation with our political framework of feminism, and grounded through the diverse realities of our contexts, then we locate ourselves as critical stakeholders, articulators, shapers, dreamers and political actors of our unfolding past, present and future.
      of our unfolding past, present and future.)
    • Workshop, Other than women: Exploring harassment and difference online, Rightscon, Belgium  + (We have a number of questions we would lik
      We have a number of questions we would like to address through this newer line of work and these will inform the framing of the session: What can and cannot be learned about online harassment through the approaches, tools, and responses we've developed globally in response to harassment faced by women? What do we know about the contexts and shapes of harassment faced by different communities/groups of people marginalised because of their religion, ethnicity, gender identity or race? Is it problematic to think about harassment along identity categories? What might it afford us, what in turn prevent? What are the spaces and forms that identity-based harassment takes (f.ex. Reddit threads, Twitter abuse, images, memes, fanfiction)? How is online hate speech and harassment directed at specific religious, ethnic, linguistic, or political communities experienced? How might an intersectional lens affect our working definition of online harassment? How does expanding our focus beyond women affect our thinking about responses to online harassment (f.ex. in terms of design, tools, policy, research methodologies, activism, etc.)? We see this session as an opportunity for discussion and reflection, and to contribute to an agenda that is more specific and contextual with respect to responding to targeted online attacks. We invite people working on online harassment, advocates of freedom of expression and participation online, those working on human rights, as well as interested technologists, activists, and researchers to attend this session. We especially welcome civil society organisations based in Brussels. This session will consist of an introductory presentation to frame the issues and the terms of the debate, a plenary brainstorming session to collaboratively identify further relevant topics/question around online harassment, breakout group discussions, and conclude with a plenary discussion to consolidate the outcomes of our work as a group.
      idate the outcomes of our work as a group.)
    • Digital security training for antimining activists, Mexico  + (Workshop for a grassroot organization in t
      Workshop for a grassroot organization in the North Sierra of Puebla (Mexico) The workshop was held in a village about an hour from the capital Puebla, it took place in a center to teach and learn crafts with mud that also counts with a computer room. The computers were installed with Windows and the Internet connection was only working if there was no more than two computers connected at the same time (sounds familiar? ;-). Most of the attendees brought their personal computers with Windows but there was also two persons using Ubuntu. About 12 people attended, mostly men aged between 19 years - 60 years. The level of education and occupation was variable. The workshop gave an introduction to technopolitical aspects of surveillance, digital security and digital tools. The possibility of using TAILS was discussed and I brought some USB installed with me but we did not have enough time to work on that topic. The workshop consisted in mail encryption using Thunderbird and Enigmail. It took place on Saturday, which is the most appropriate day for the community and lasted from 10AM to 6 PM with an hour break for lunch.
      10AM to 6 PM with an hour break for lunch.)
    • Gender and Technology Institute, Ecuador  + (You can read about the evaluation and agenda of the GTI in Ecuador here: https://gendersec.tacticaltech.org/wiki/images/7/72/Documentacion_Evaluacion_IGT.pdf The document is available in Spanish so far.)
    • International Journalism Festival - Perugia  + (http://www.journalismfestival.com/programme/2016)
    • Taller Autodefensa Digital, Encuentro LBT Feminista, Ecuador  + (la agenda de trabajo contempló los siguientes temas: Marco jurídico y ejercicio de derechos; salud sexual lésbica; kuerpas disientes y espacio público; autodefensa digital; arte como expresión de contracultura (serigrafía, poesía, música); gordofobia.)