Special

Search by property

This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.

Search by property

A list of all pages that have property "Motivations for organizing training" with value "Open meetings for learning DST and drink hand craft made beer". Since there have been only a few results, also nearby values are displayed.

Showing below up to 50 results starting with #1.

View (previous 250 | next 250) (20 | 50 | 100 | 250 | 500)


    

List of results

    • Workshop, Manuals with a gender perspective, IFF, Valencia  + (Over the past two years, there has been an
      Over the past two years, there has been an increasing production of guides and other self learning resources oriented at better understanding what is violence against women (online and offline) and how to document and share about the initiatives, processes and tools that are challenging it under its different forms. The workshop will address this panorama of resources departing from the participants experiences and their needs in relation to those materials. When mapping what is there and what is missing, they will draft guidelines for shared good practices when producing new materials (such as how to not reinvent the wheel and duplicating upstream work, thinking ahead the maintainability, translatability, feedback, peer review and overall sustainability of those resources) and will reflect on how to develop materials that are ethical, inclusive and accessible. This workshop should enable people engaged with the production of self learning resources around privacy and digital security to better understand how to include a gender and intersectional perspective, inasmuch as it should enable networking among people planning to produce gender-related materials in the field of privacy and digital security.
      the field of privacy and digital security.)
    • Panel Including Gender - Re-publica conference, Berlin  + (Over the past years, an increasing attenti
      Over the past years, an increasing attention has been directed to online hate speech, harassment, stalking and death threats launched by non state actors, but also by governments, against women human rights activists and LGTBI people, and their collaborators. More broadly, misogyny, homophobia and bigotry also intertwine to oppose and silent women engaging into technological fields such as engineering, computing or digital security. The following discussion will invite different cyberfeminists to exchange about those trends and present current promising initiatives and collective strategies that are confronting and overcoming those issues.
      e confronting and overcoming those issues.)
    • Digital security trainings for female students, Pakistan  + (Pakistan is ranked as the third most dange
      Pakistan is ranked as the third most dangerous country in the world for women. Women make half of this country's population but their inclusion and participation in larger socio-economic development processes is hardly visible and still need a huge effort to bring at par with any international standards or best practices. Mostly women in Pakistan are deprived of their basic human rights. The weak implementation of legislation and cultural biases has made them more vulnerable. In addition, women have been traditionally targeted through socio- economic oppression, cultural and religious biases, sexual harassment, lack of opportunities and domestic violence. They have been deprived of education that most importantly results in the lack of opportunities for their social and economic well being. '''The Issue -- Cyber Harassment and Access to ICTs:''' The Internet is an essential tool that provides a way for women to get access to the wider world — the world of networks, communities, health and education information, financial advice and business skills training. It’s a platform for women to seek help where they need it, so helping to redress the gender imbalance and foster the empowerment of women. Pakistani Women can also play an important part in the economic sphere of the country if important steps would have been taken to prevent different forms of harassment which are pervasive in the society. Pakistan is a country which has benefited from the advances in technology. There have been a lot of technological breakthroughs in the past few years which have made it easier for people to get connected. The Internet has been a treasure trove of knowledge and made our lives easier. Unfortunately all good things come with a price. The price is cyber stalking, harassment, blackmailing which is slowly becoming the norm within the country. In Khyber Pakhtunkhwa, a second underdeveloped province of Pakistan where honor killing of women is common, four women were killed due to a mobile video which went viral in a village in the area of Kohistan http://tribune.com.pk/story/671386/justice-delayed-in-kohistan/ Even in cities educated families who give access to ICTs to their young girls, restrict the access if they find out that the harassment is happening. Due to the fear of losing access to ICTs, women do not often speak about cyber harassment to their families. Awareness about using secure and safe Internet and ICTs is not common in Pakistan especially among young women and girls.
      an especially among young women and girls.)
    • Taller Seguridad Digital, Via Campesina, Durango, Euskal Herria  + (Para el grupo de comunicación de la Vía Ca
      Para el grupo de comunicación de la Vía Campesina es muy importante conocer los canales de comunicación existentes, las oportunidades, riesgos y amenazas existentes para poder utilizarlos de manera eficiente, sin que se vuelvan en nuestra contra. Por medio del taller aprenderemos como usar las redes sociales de manera que se muestre lo que hemos decidido mostrar, nada más.
      e lo que hemos decidido mostrar, nada más.)
    • Talk on Digital Security for Women Journalists, Wien, Austria  + (Part of a larger event, which was also part of an ongoing series about how to support women journalists and combat online harassment.)
    • Privacy Presentation, Cali, Colombia  + (Presentar a varias compañeras de la fundación elementos de reflexión para mejores practicas dentro de la organización para cuidar la privacidad y aumentar los niveles de seguridad digital)
    • Acompanamiento, Seguridad Digital Activistas Derecho a Decidir, Ecuador  + (Se estan dando crecienteataques de los anti derechos a las activistas por el derecho a decidir, esta situacion implica mejorar la seguridad digital de las companeras)
    • Charla, Privacidad, Seguridad Digital y Ciberfeminismos: Experiencias desde Latino América, Barcelona  + (Se ha creado un vortex espacio temporal qu
      Se ha creado un vortex espacio temporal que nos propulsa todas juntas en la Cooperativa La Base (C/Hortes 10 - Poble sec) el próximo sábado 4 de marzo a partir de las 18H30 para compartir experiencias e iniciativas cocinandose por Barcelona, Latino América y mas allá... Compañeras feministas, activistas, defensoras de derechos humanos, formadoras, investigadoras trabajando en Brasil, Chile, Ecuador, Honduras, Nicaragua, México presentaran los proyectos en los cuales están involucradas para transformar y crear mundos con mas justicia social desde una perspectiva ciberfeminista. Las aventuras compartidas serán variadas con elementos de reflexión y acción acerca de seguridad digital, privacidad, control/vigilancia, derechos digitales así como sexuales y reproductivos. Se plantearan acciones y estrategias feministas frente a los feminicidios y las violencias facilitadas por el uso de internet y las tecnologías digitales. Las presentaciones serán seguidas por una charla y debate con todas las participantes y esperamos clausurar con vermut y posiblemente bailoteo.
      usurar con vermut y posiblemente bailoteo.)
    • Taller taller de redes sociales y seguridad, Colombia  + (Se realizó el taller en el marco de un aco
      Se realizó el taller en el marco de un acompañamiento integral (jurídico y psicosocial) a personas que próximamente van a recobrar su libertad. Población que se caracteriza por sus años en cárcel sin acceso a comunicaciones en la cárcel (sólo cartas y llamadas por el teléfono fijo colectivo) y anteriormente por su vida en la insurgencia, por su poco uso y conocimiento de las redes sociales. Ahora empiezan a tener uso de celulares y en la salida a la vida en libertad, aun más. Decidí realizar este taller como parte de su preparación a lo que hemos llamado "la calle hoy" y para brindarles herramientas prácticas para una comunicación segura.
      as prácticas para una comunicación segura.)
    • Taller inmersión de autodefensa digital feminista, Barcelona  + (Será un espacio de formación intensiva de
      Será un espacio de formación intensiva de dos días sobre violencias machistas, privacidad y seguridad digital desde una perspectiva feminista, crítica y holística. En ella trabajaremos para comprender y detectar las violencias en internet y redes sociales así como para desarrollar estrategias individuales y colectivas de autodefensa y cuidados digitales. Se trabajarán ámbitos relacionados con la privacidad y protección digital, para desarrollar prácticas más reflexivas, tácticas, placenteras y seguras con las tecnologías. El taller será impartido en catalán y castellano.
      er será impartido en catalán y castellano.)
    • Digital security and privacy session - Geek Girl festival, Kenya  + (Session: Awareness creation session on digital security and privacy. Event: speed geeking, Design Thinking and much more)
    • Taller de seguridad para mujeres, Puebla, Mexico  + (Si bien el proceso de resistencia contra m
      Si bien el proceso de resistencia contra megaproyectos logró la creación de una radio comunitaria desde la cual las mujeres lograron hacer oír su voz se han topado con la patriarcado de sus compañeros de lucha, el poder acompañarles era importante para acercar herramientas de autocuidado y espacios de reflexión para lo que viven desde ellas, es decir sin imponer una postura externa a sus propios procesos.
      a postura externa a sus propios procesos.)
    • Talk, Training to privacy advocacy and digital security from a gender perspective, IFF, Valencia, Spain  + (Since 2014, Tactical Technology Collective
      Since 2014, Tactical Technology Collective has engaged directly with Women Human Rights Defenders, women net activists and their allies in order to face a global trend of using ICT for controlling and shutting down women voices and opinions through online harassment and gender-based violence launched by governments and non state actors. The project was designed in the long term to increase our target groups' resilience and their capacity to develop their own mitigation strategies by shifting expertise to the community itself. In a multi-faceted approach the project has directly strengthened their capacities to firstly improve their own response to restrictions to freedom of expression and freedom of opinion and secondly enable them to improve the capacity within their own communities. Our research and experience shows that only project activities that are embedded in and owned by the communities take hold and stand a chance of succeeding in the long run. This project is a practical response to demand on the ground and is based upon Tactical Tech's theory of change and its 'do not harm' approach which puts the safety and wellbeing of target groups and the specific communities they represent at the centre of all activities.
      represent at the centre of all activities.)
    • Workshop: Safer Nudes @Montreal, Canada  + (Since the leaks of nudes and the numerous
      Since the leaks of nudes and the numerous cases of revenge porn start to become everyday news, we've witnessed all kinds of narratives about it. The vast majority of them are paternalistic, patronizing pieces that ultimately state that sending nudes is irresponsible and unsafe. In this guide, we will try to confront this narrative and introduce the "Send Nudes!" project, a guide to digital security for sharing intimate images that does not base itself on slutshaming, but on a pro-sex attitude. This project aimed to call the attention to how
learning to send nudes through the internet in a safer way can be a practice of self-determination for us as sexual bodies and internet users. More than protection, we need to spread knowledge about daily practices and actions that can work towards shifting perspectives about gender roles and digital rights.
      ves about gender roles and digital rights.)
    • FemH3ck - Round table Privacy and security in the Open IT Space, Serbia  + (Since the observed large gaps in the knowl
      Since the observed large gaps in the knowledge of the area and the lack of real information about it, such an introductory approach is necessary. The knowledge and experience that I have as a participant GPS camp was able to convey using the capacities and resources of the organization that I represent do not meet the needs that are in the process open. A more comprehensive approach, which will be able to process information and education include a large number of interested individuals, organizations and representatives of institutions which is in the job description democratization of society and the protection of individual rights and the protection of human rights. The inclusion of educated media representatives (including television, radio, newspapers, wire services) and the Ombudsman is necessary, to send information about the necessity of protecting the right to privacy of communication and storage of data, '' sent to as many addresses', that is, all the citizens who will be able to watch the show on a round table in the media, and institutions that have jurisdiction in the protection of the rights of individuals to privacy and the preservation of the same.
      privacy and the preservation of the same.)
    • Womanity award, Oui Share Festival, Paris, France  + (Tackling violence against women through IC
      Tackling violence against women through ICTs is a cornerstone of Womanity’s work in 2016. By convening actors driving innovation to prevent violence against women through the Womanity Award for the prevention of Violence Against Women, the foundation will provide three-years of support to two Awardees who will scale-up a successful innovation in a new context. In May 2016, Womanity will announce the winners of the Womanity Award for the Prevention of Violence Against Women, at OuiShare Fest in Paris.
      Against Women, at OuiShare Fest in Paris.)
    • Workshop, Other than women: Exploring harassment and difference online, Rightscon, Belgium  + (Tactical Tech is interested in the problem
      Tactical Tech is interested in the problem of online harassment as a barrier to political participation in quantified societies, and in terms of the harm it causes those targeted. We have been working to customise tactics of resistance and support to communities/individuals who are working online and are exposed to, or are at risk of, harassment. This Satellite Session at Rightscon is fashioned as an intervention into ongoing advocacy, research, and practical support efforts, and seeks to interrogate a wide range of possible framings of (as well as responses to) online harassment. A growing body of evidence shows that in addition to gendered and sexualised harassment, Islamophobic, racist, trans- and homophobic harassment equally take place online. We observe, however, that the sexist, misogynist and anti-feminist harassment ciswomen (of relative privilege and visibility in their social contexts) face is noticeably more visible in public discourse, media, research, and advocacy than any other form of online harassment. We are interested in how our work as researchers and advocates may become more intersectional, may focus more fully on gender rather than conflating gender with women, and forge connections with and/or support marginalised groups working in specific contexts. We will take critical approaches to Islamophobia, ethnicity, and race as they intersect with gender and sexuality to help understand localised experiences of harassment.
      stand localised experiences of harassment.)
    • AWID, Coming Back to Tech, Brazil  + (Tactical Tech is launching a new research
      Tactical Tech is launching a new research project that focused on what happens to women after they have been harassed online, how their relationship with technology changes, and what it means to "go offline", particularly for activists whom rely on social media and the internet to conduct their work. As part of the AWID Forum in Brazil, Tactical Tech conducted the session entitled "Coming Back to Tech" aimed at presenting the new research concept and at receiving feedback from participants. Participants were divided into breakout groups, with each group using case studies the Tactical Tech team provided to discuss different elements related to coming back to tech. One key observation from the feedback showed that there was a tendency by the participants to focus on how to respond to online harassment as it occurs, instead of how to continue to be effective online after facing harassment.
      effective online after facing harassment.)
    • Gender and Technology Institute, Panama  + (The Gender and Technology Institute and th
      The Gender and Technology Institute and the Privacy camp for Year 2 took place in Panama in September 2017. The event was entitled “Gender and Technology Institute: Take Control Over Your Data”. It was organised in collaboration with a global organisation called Women Help Women that provide support to activists around the world about safe abortion and with a local human rights organisation. The meeting brought together 35 participants from 13 different countries around Central and South American Countries (Mexico, Panama, Nicaragua, Honduras, El Salvador, Republica Dominicana, Guatemala, Costa Rica, Peru, Colombia, Venezuela, Ecuador and Chile). The group was composed by women activists that work on organisations or informal collectives that provide information, counsel and/or accompaniment to women seeking safe abortions, with the hope that they would gain new knowledge and skills for improving their mitigation strategies and for updating their security protocol and that they would advice, train or influence their networks and collectives once back home. This meeting took place over five days and the main goals were to have knowledge exchange to know how data is impacting the work carried out in the field; share strategies on how to mitigate the risk associated with data; identify unique needs of the different regions, people and groups they work with; and see if and how we can compliment each others’ work moving forward. Specific curricula and facilitation methodologies was developed for the event and feed back about their suitableness for pro-choice activists around LAC was collected through the event. The open call for applications was open for two weeks and half and received 170 applications among which almost 40% came from pro-choice activists thanks to a strong diffusion by our partner WHW. Participants mainly came from Central American and Caribbean countries encompassing Mexico (7), Panama (5), Nicaragua (7), Honduras (4), El Salvador (2), Republica Dominicana (2) Guatemala (1), Costa Rica (1). Among those we find four countries which forbid abortion under any circumstance. There were also some participants from South American countries, namely from Peru (1), Colombia (1), Venezuela (1), Ecuador (1) and Chile (1) where the legal and social criminalisation of abortion is also among the harshest of all LAC. All together they brought various experiences regarding their activism, uses and practices with technologies, the risks and attacks they were facing inasmuch as their security strategies, resilience and agency. It should also be noted that one of the aims behind the selection of participants was to provide priority to centro american countries. Our research on risks and attacks faced by pro-choice activists in LAC detected that activists from those countries were facing higher level of dangers, and this finding was echoed by some of the experts invited at the 5 days preparatory meeting that took place in March 2017. They confirmed that activists from Central American countries, in comparison to activists located in south America, had in general fewer opportunities to attend training oriented towards privacy and digital security and had also in general fewer possibilities to meet and share among them.
      ossibilities to meet and share among them.)
    • Internet Governance Forum, Cyber Security and Safer Internet, Sri Lanka  + (The IGF happened from 16-18 May and there
      The IGF happened from 16-18 May and there was a School of Internet Governance running parallel to it. The main conference on the final day addressed themes such as cyber security, SDGs and the Internet, and digital rights and multistakeholderism. Interestingly, there was mention of a Women IGF on the first day as well. There was very little information available but a few of us including the Women and Media Collective decided to mobilize around the Women IGF and the main conference. We shared the IGF information with other activists and women’s rights org’s (WROs) in Sri Lanka and while some were interested and turned up, one of the main things I realized was that we need a primer of sorts on why an IGF is a relevant space for WROs. I found APC’s issue paper to be extremely useful in this respect. Our main objective was to be identified as interested stakeholders at the IGF and to highlight why women are key and relevant stakeholders in internet governance. Our strategy was to be present at the Women IGF as well as relevant sessions of the main IGF and engage with the discussions, both as participants and panelists. We also asked for and received advice and tips about engaging with an IGF from Jac and Valentina from APC which was great and much appreciated.
      APC which was great and much appreciated.)
    • Conversation, Coffee Chat at ARROW HQ Malaysia  + (The activity was a chat coffee chat sessio
      The activity was a chat coffee chat session conducted by three participants at the GTI Asia as a report back for their colleagues at ARROW and to also provide any assistance to staff who would like to further explore digital security and privacy solutions.
      re digital security and privacy solutions.)
    • F3mhack - Hacktona Feminista, Sao Paulo, Brasil  + (The cases of online harassment over women
      The cases of online harassment over women are increasing in Brazil and this has concern feminists that are using the internet to communicate, mobilize and articulate in their activities. There was a recent case of a feminist journalist that got all her online personal information stoled and was being persecuted by harassers because she posted an article about how women were excluded from geek environments. She got her information stole from one employee of an Brazilian data broker. Other cases that corned these women were about abortion posts at Facebook that exposes some girls. In Brazil abortion is illegal and the current Senate is very conservative about it. At the same time that these feminists realize that they need to know more about Digital Security, their engagement to use and learn new tools is still very small. Many don't get involved because they think that these knowledges are to advanced or they can't understand how its affects them. Discussing with a small group we realize that this happens because we still don't have a proper feminist communication for DS. That is why we really thought it was essential to have the first meeting to introduce basic stuff about online privacy and start an oriented communication. The F3Mhack was great for that and we decided to do an event with these goals.
      e decided to do an event with these goals.)
    • Digital security workshop for environmental activists, Brasil  + (The group was being monitored by companies and knew they had an infiltrated among them)
    • Digital security workshop- LAVITS, Brasil  + (The intention was to offer a practical workshop for the public that was coming to this event.)
    • Gender and Technology Institute Asia, Start up Meeting, Colombo, Skri Lanka  + (The meeting brought 12 women experts from South and South East Asia to brainstorm regarding the upcoming Gender and Technology Institute in Asia.)
    • Gender and Technology Institute Asia  + (The objective of this GTI was to: • Offer
      The objective of this GTI was to: • Offer practical support and training to enable activists in movements to be confident and skilled in their use of technology for activism in the face of online harassment. • Contextualise and localise how digital technologies are implicated in gender and sexuality rights, and freedom of expression, along with online and offline participation, particularly for women and women identified people in South and South East Asia. • Widen the existing global GTI network to include communities, movements and individuals working in South and South East Asia. • Contribute local perspectives to Tactical Tech's on going documentation around what security and privacy mean from a gender perspective.
      nd privacy mean from a gender perspective.)
    • Panel, Women Digital Trainers in LAC, IFF, Valencia  + (The panel consisted in 6 women trainers sh
      The panel consisted in 6 women trainers sharing about their background, how they engaged within the field of digital security in LAC, what motivates them but also which are the main bottlenecks they are facing. The idea of the meeting was also to enable that women engaged in that field meet each other.
      men engaged in that field meet each other.)
    • Holistic digital security training for women journalists, Mexico  + (The risks their work involves them)
    • Panel Gender and Surveillance, Circumvention Tech Festival, Spain  + (The roundtable, "Women in Surveillance and
      The roundtable, "Women in Surveillance and Being Surveilled" will gather women speakers from Germany, Syria, Pakistan, Nigeria, Brazil and UK in order to talk about past, present and future issues concerning women in anti-surveillance and being surveilled--from their country context. Definitions of surveillance considered will be wide (mass, targeted, by state and non-state actors, health systems, employers, intimate partners, organized crime groups, other groups and individuals).
      ime groups, other groups and individuals).)
    • Digital security training for antimining activists, Mexico  + (The workshop was conducted at the request
      The workshop was conducted at the request of an organization that is opposing mining projects in the region. Some of its participants are representatives of their communities and are subjected to constant high risk. In the words of the organization, they needed the workshop in order to communicate with human rights defenders organizations in a safer way.
      ts defenders organizations in a safer way.)
    • Campaign Zero Trollerance, Internet  + (This campaign was inspired by debates and
      This campaign was inspired by debates and exchanges regarding gender based online violence and trolling that took place during the GTI and were informed by participants experiences. This initiative was designed by a facilitator of the institute in partnership with the Peng collective which is a Berlin based communication group. The initiative was widely supported and relayed by many participants to the GTI. As explained in their website in a humoristic manner: “Hate has always been a part of the Internet and the intentional harassment of other people (termed trolling) has too. But the gendered forms of harassment and violence on Twitter today point to a deeper problem in society that cannot be solved by technical solutions alone. Trolls need serious, practical help to overcome their sexism, deal with their anger issues and change their behavior”.
      r anger issues and change their behavior”.)
    • Gender and Technology Institute, Uruguay  + (This one was the fifth “Gender and Technol
      This one was the fifth “Gender and Technology Institute” and it was organized in collaboration with FRIDA and Mama Cash. They attended the preparatory gathering on February 2018 in Mexico DF and brought logistic support doing outreach and giving support in the selection of participants, as well as covering the costs of 10 of the 49 participants selected. They also brought a small fun to economically support follow up actions and trainings by the participants and facilitators to the GTI, between July and December 2018. On the other hand, Amnesty International economically supported two participants and one person from Fondo de Acción Urgente LAC covered her costs to attend this GTI. This GTI was held during five days and had several objectives: Bring new skills and knowledge to its participants for them to be able to improve their strategies of mitigation as well as update their security protocols; Be able to train their own networks, organizations and communities about the topics learned once they are back home; Improve the synergy and collaboration between the different collectives and organizations attending the gathering. During two previous events specific curricula and methodologies were created for this specific GTI: A preparatory gathering in February 2018 with 20 participants that represented several organizations related to land rights defenders and/or with digital and holistic security with gender perspective. A gathering for the development of curricula content in April 2018 with 20 participants with the focus in developing of workshops and activities based on past GTIs. We are going to publish this repository of curricula in Spanish and english. The GTI brought 70 people including 50 participants and a team of 20 facilitators and organizers (3 from Tactical Tech, 1 representative from Mama Cash, 1 representative from the local organization Cotidiano Mujer, 1 person supporting logistics, 1 translator, 12 external facilitators). Among the participants were 40 women right land defenders and allies and 10 participants who were involved in feminist activism. The countries represented were Uruguay, Chile, Argentina, Colombia, Peru, Brazil, Bolivia, Honduras, Guatemala, Mexico, Nicaragua, Ecuador, El Salvador and Venezuela. However, it should be noted that for many participants this identification does not make sense. For those who represent their territory and community claiming an identity dissociated from the borders imposed by the nation states. The states maintain direct conflicts with women land rights defenders, criminalizing and actively pursuing them. About the roles of the participants in their own communities and organizations, we had the following profiles: - In charge of the management of Information and Communication Technologies (ICT) for their organization or collective (responsible for communication, campaigns, data collection and collective memory, others). - Activist who collectively manages ICTs (feminist activism, intense use of social networks, etc.) - Project and/or funding coordinator (director, programs, spokesperson, etc) - Profiles with sophisticated use or development of technologies (free software/hardware, geodata, system administrators) - Legal Defenders/Lawyers And about the audience that their communities, organizations and collectives work with we found the following distribution represented by a word cloud. Among the women that are object of gender based violence and hate speech online and offline, the women land rights defenders, indigenous communities leaders, environmental activists are specially under risk. During the preparatory event we spent some time to put on the same page several studies, analysis and reports related to the risks that they have. Other example of this is the big response we got to the convocation to the GTI. Although it was only open during 3 weeks and we didn’t distribute the call for applications further from the networks and organizations that were mapped during the preparatory event, we received more than 220 applications and most of the ones coming from land rights defenders showed people under hight risk. When analyzing the applications, we gave priority to the participantes that were exposed to the higher levels of risk as explained here: Attacks, hate speech through social networks (RRSS) Dealing with sensitive data, Manejo de datos sensibles, intervention risks Identity and account theft Computer theft Tracking of communication and cellphones Campaigns of discredit and fake news and defaming Attacks to their web pages Monitoring and surveillance Lack of security protocols in the organization Blackmail and criminalization Legal pitfalls Police visits to house, work place, etc Raids of offices and personal houses Threats to close family members Non-consensual dissemination of intimate content (“Revenge porn”) Sexual violence Discrimination Harassment Disappearances Murders Related to their motivations to attend the GTI, we can see that the participants want to improve their skills and get methodologies and tools to defend the rights of the communities they work in. On one side they want to be able to improve their visibility and advocacy, know how to manage and care about the data they generate, as well as to reduce the risks of attacks and violence. On other side, they want to acquire concepts and tools to be able to improve their levels of security and skills when creating mitigation strategies. Those motivations get combined with their goals of being able to share this knowledge with their own organizations, communities and networks. The gathering allowed many of the participants to meet face to face and create new networks based on trust that can only be obtained in presential gatherings. Many of them brought to our attention that being able to be a whole week with other comrades learning about their experiences and realities, questioning and learning about technical topics that usually are not easy to access, brought them a lot of strength and empowerment. They were able to gather in a safe space where they could relax, eat, laugh, cry and dance and that allowed them to center in themselves and that is in itself an act of political rebellion. And finally the institute brought them the opportunity to better understand how to defend the territory in other contexts and how to navigate their own specific context to fight against criminalization, to organize campaigns, document proofs, create collective memories, develop cartographic processes, etc You can read about the follow up activities organised by GTI participants in the follwoing reports: ENG: https://gendersec.tacticaltech.org/wiki/images/2/2a/-Public_Sharing-_report_grant_land_defenders.pdf Report of follow up activities organised by participants of the GTI oriented at land defenders December 2018 - “Caring for life on earth: Holistic, digital and self care security” SPA: https://gendersec.tacticaltech.org/wiki/images/e/e2/InformeDefensoras_delatierra.pdf Informe de las actividades de seguimiento organizadas por las participantes del IGT orientado a defensoras de la tierra Febrero 2019 - “Cuidando de la vida en la tierra: Seguridad holística, digital y autocuidado”
      eguridad holística, digital y autocuidado”)
    • Panel, Building feminist infrastructure, IFF, Spain  + (This session was a follow up to a pre-IFF
      This session was a follow up to a pre-IFF gathering of feminist hosting providers. This session is a chance to engage with broader conversations about the directions, challenges and hopes for feminist infrastructure. The types of activities, campaigns and organizations that feminist infrastructure providers support are on the front lines of repression, violence and surveillance. Not only are feminist infrastructure providers working on mission critical communications and technical support projects for at-risk users and organizations, the women and non-binary people responsible for the servers, access and technical skills are themselves often working in oppressive conditions, both offline and online. Through sharing and mapping, we’ll use the session to outline strategies for nurturing solidarity and mentorship within nodes of feminist infrastructure projects and explore opportunities for existing services and organizational sustainability. The session was attended by 40 persons more or less that were curious about the concept of feminist infrastructure and the current scene of feminist initiatives that are building it. The session presented several initiatives: systerserver, anarchaserver, vedetas, cl4ndestina, kefir, colnodo, codigo sur. We had a collective conversation about our aims, publics, communities, potential and challenges.
      cs, communities, potential and challenges.)
    • Training about gender, privacy and security for WHRD, Nicaragua  + (This training was oriented at a variety of
      This training was oriented at a variety of woman human rights defenders and activists located in Managua. Before that event, the regional start up meeting was organised gathering 12 women representative of different organisations from LAC in order to prepare the Gender and Technology Institute to be held in Ecuador some months later. The regional start up meeting aims were to design the facilitation methodologies, curricula and sessions design, agenda and how to ensure the safety of participants through the process. The follow up training held in Managua enabled us to test some experimental sessions we have designed in the previous meeting and gather feed back from the women engaged in the training. It enable also a part of the facilitation team to meet and train together their training skills.
      and train together their training skills.)
    • Seguridad digial para defensores de derechos humanos en contextos mineros 3  + (This training was realized within the cont
      This training was realized within the context of a program which contained a training aimed at strengthening "digital communication and social networks". The organization that facilitated the participation was Cooperacción, an NGO that develops two progamms: the program for collective rights and extractive industries and the program for costal development.
      es and the program for costal development.)
    • Holistic Security, Train Of Trainers, Germany  + (This was the key event for the part of the
      This was the key event for the part of the holistic security project which is focuesd on fostering best practices and community-building among security trainers. The objectives of the TOAST were as follows: * Identify and build the cross-domain knowledge necessary to improve trainers' own security and well-being in the course of their work * Learn, co-create and practice new exercises, and approaches for trainers from each domain to integrate in their trainings * Identify avenues of collaboration with participants from different domains * In the context of Tactical Tech's ongoing work (with partner organisations) on holistic security resources for human rights defenders and trainers, to explore and ideally agree upon a common framework and language for security, protection and well-being of HRDs across domains. * Contribute to the fortification of a collaborative cross-domain network of trainers
      aborative cross-domain network of trainers)
    • Stockholm Internet Forum (SIF), Gender equality, Stockholm  + (This years SIF theme is access seen from a
      This years SIF theme is access seen from a multi-dimensional approach. The aspects of access will be covered through discussions of issues related to economy, technology, policy and human rights – with a special emphasis on gender equality. Access to the internet plays an important role in the economic, social, cultural and political development of societies and nations. There are still huge differences – both in terms of access and usage – between those who have, and those who do not have access to the internet, between countries and regions, between rich and poor, and between men and women. But access is often not what it seems, and simply having access to the internet does not necessarily achieve social justice and development outcomes. To help us understand access from a multi-dimensional perspective SIF15 will use gender as a lens that can enable us to see beneath the surface. What does access to the internet mean? Who has access to the internet? Who has the ability to assimilate the information available online? These are some areas which will be discussed during SIF15
      areas which will be discussed during SIF15)
    • Digital security meetup for women human rights defenders, Kenya  + (To create a collective of digital security in Kenya with a focus on women.)
    • One-to-one DigiSec trainings for activists, Argentina  + (To explain the motives for using opensourc
      To explain the motives for using opensource software To help understand local and international policy around surveillance To conduct a personal risk assessment To get people using some of the digital security and activist tools which are most ueful to them
      ctivist tools which are most ueful to them)
    • Femhack- Encryption and digital security workshop for cis, trans and queer women, Bangalore  + (To have a safe and closed space for women
      To have a safe and closed space for women to discuss and address insecurities around computers and technology, being able to share useful secure communication practices and tools to organize around LGBTQ issues and use these tools strategically. Also to recognize that engagement with technology is political feminist issue and to gauge interest and capacity for events like this.
      nterest and capacity for events like this.)
    • Editatona Mujeres Nicas  + (Una editatona es un espacio, para mujeres,
      Una editatona es un espacio, para mujeres, de edición y creación de artículos de Wikipedia sobre una temática relacionada a la vivencia de las mujeres en nuestros propios contextos. ¿Por qué Wikipedia? Porque es una fuente de conocimiento construida de manera voluntaria y colectiva, que sirve de referencia para millones de personas alrededor del mundo. En 2012 se conoció que de cada 10 editores de Wikipedia, sólo 1 era mujer: desde entonces se han creado diversas iniciativas para cerrar la brecha de género promoviendo el involucramiento de las mujeres, la creación de artículos sobre mujeres y la revisión de artículos ya existentes que puedan estar escritos desde una perspectiva machista. La Editatona Mujeres Nicas en Managua es parte de ese esfuerzo mundial; y tiene como objetivo incluir en Wikipedia las biografías de mujeres destacadas en la historia de Nicaragua: artistas, científicas, médicas, activistas, docentes, guerrilleras y todas las mujeres cuyas historias sólo se conocen en pequeños círculos académicos.
      e conocen en pequeños círculos académicos.)
    • Screenings HackiNetIk, Mexico  + (Vivimos en un mundo en constante cambio, c
      Vivimos en un mundo en constante cambio, cada vez más acelerados, y las nuevas tecnologías de la comunicación y las redes digitales están planteando nuevos paradigmas, tanto de opresión como de liberación. ¿Cómo estamos reaccionando ante estas nuevas situaciones? ¿Qué peligros y oportunidades aparecen?
      s? ¿Qué peligros y oportunidades aparecen?)
    • FemH3ck - How the internet works for WHRD, Mexico  + (We believe that before telling this women
      We believe that before telling this women participating in the project, about how great is the Internet, we needed to share with them more information related to how it works. So we started the introductory session on digital security with the exercise how the internet works, we talked about the stages or places where our information travels when sharing it through the Internet. One of the things I have learned about basic digital security with WHRD, is that we don't always know where the risks are, but sometimes we hear somthing about a certain tool and we quickly download it but we don't always use the tool in the right way. So this session always helps to get a general picture and also it helps to solve a lot of questions from different tools and different risks. We have now a couple of materials for the session, we also have the flyer on how the internet works: https://www.dropbox.com/sh/q8o7041fi8ac6mz/AAAUn56sjbpWa3krLldVPRnea?dl=0 A serie of cards like ISP, router, platforms that help in the facilitation of the dinamic. Also we printed some materials to share with them on this same topic, this are also available in the dropbox link. The printed material had some other great resources to check.
      l had some other great resources to check.)
    • Panel, Strategizing around online gender-based violence documentation and accompaniment practice, IFF, Spain  + (We had a session of 2 hours with several p
      We had a session of 2 hours with several practitioners carrying out documentation and accompaniment for online gender based violence. We came together to discuss different challenges being faced when providing emotional and technical support, categorization and analysis of cases, assignation-projection of impact or harm, secure data practices, helpline possibilities and limitations, doing and sharing research and learnings. The session had around 35 attendees coming from a wide range of initiatives and countries. After presenting the different experiences developed by organisations involved in the organisation of the session we had an exchange with the different participants in the room.
      th the different participants in the room.)
    • Workshop, Imagine, Create, Be. Gender and Technologies, IFF, Spain  + (What are the side effects of funding? How
      What are the side effects of funding? How can we avoid divisions and foster collaboration? - Why are identity politics not enough? How can we include that which excludes us? - How might we maximize efforts, ressources and ideas from past and present experiences? - How can we acknowldege precariousness and overcome technology overload? - How can the analogue -digital integration be turned into a mandate and a provocation?
      e turned into a mandate and a provocation?)
    • Digital security for the Association of Media Women, Kenya  + (When the femh3ck flash training in Nairobi
      When the femh3ck flash training in Nairobi came to an end, one of the participants who was from AMWIK approached Mary Kiio of Roshani Consultancy Services and requested if the company would consider training their members as the issues highlighted were very pertinent to what women go through in the country. The potential of media being more informed on cyber threats especially women would hopefully translate to various media platforms being utilized to reach more women across the country A few days later an email from the secretariat of AMWIK inquiring on if we could share on the outcomes of the femh3ck training and a request on if we can engage in other similar activities and/or platforms, lead to the discussion of holding a three day training for its members over the month of August on Saturdays for three consecutive weekends. Though both companies did not have any funding for the training , there was an agreement that Roshani Consultancy Services would avail facilitators who would be willing to share information with no pay.AMWIK on the other hand committed to identify participants who are willing to attend training with the aim of being the future trainers. AMWIK also provided office space, Internet connection, workshop materials and snacks. It was the willing participants who shared their training needs via a pre training questionnaire that resonated with the theme of the training that provided the highest motivation of the training.
      ed the highest motivation of the training.)
    • Digital security training for women activists from the Balkans, Macedonia  + (Women Human Rights Defenders and LGTBQ act
      Women Human Rights Defenders and LGTBQ activists from the balkans (albania, armenia, bosnia, croatia, serbia, georgia, macedonia) with low levels of knowledge regarding privacy and digital security. Almost all of them used Windows, had a smartphone and used facebook for work and activism. Most of them managed sensitive data involving third parties information. The background of the participants was different, they were coming from different countries from the Balkans and the Caucasus region, dealing with different issues but what they all had in common, was that they are WHRD, they all used facebook, managed sensitive data and 17 of them were using Windows. One was only using MAC after switching from Linux. The group had already built wonderful dynamic in their work as before the DST they have spent some days on workshop about integrated security. They already knew each other, some even from before.
      dy knew each other, some even from before.)
    • Plataforma Ciberseguras, Mexico  + (¿Qué es Ciberseguras? Ciberseguras es un
      ¿Qué es Ciberseguras? Ciberseguras es un espacio que reúne muchos recursos y herramientas para que aprendamos más sobre Internet y seguridad digital. Buscamos compartir reflexiones sobre cómo la tecnología nos transforma, nos atraviesa y nos ofrece posibilidades y experiencias nuevas. Este espacio surge a partir de la idea de que el mundo digital y el mundo análogo no son esferas totalmente separadas, pues detrás de todo perfil, plataforma o red social existen personas concretas, en situaciones concretas. Queremos aportar información que ayuden a que todas podamos disfrutar libremente y de forma segura nuestras actividades, luchas y pasatiempos en línea, porque sabemos que somos nosotras quienes tenemos el control de la tecnología, quienes decidimos si nos sirve o si queremos cambiarla. Internet es un espacio que habitamos, compartimos y construimos juntas. ¡Bienvenidas a Ciberseguras!
      imos juntas. ¡Bienvenidas a Ciberseguras!)
    • Criptofiesta: ¡aprende a cifrar tus correos!  + (¿Sabías que nuestros correos electrónicos
      ¿Sabías que nuestros correos electrónicos están expuestos? “¿Por qué me vigilarían a mí?”, te preguntarás. Pues por muchas razones: porque nuestros datos son moneda de cambio y generan riqueza, porque los Estados están sedientos de controlar todo, porque las recolección, almacenamiento y procesamiento masivo de datos son la base del mundo que nos propone Sillicon Valley. Pero la buena noticia es tenemos derecho a que nuestras comunicaciones sean privadas y tenemos a mano las herramientas para garantizarlo. Así que una de las maneras de proteger nuestra privacidad y reducir nuestra sombra digital es cifrando nuestros correos. ¿Cifrando? ¡Tal vez te suena más la palabra encriptar! Pues eso, echar mano de las matemáticas para convertir nuestros mensajes en códigos ilegibles que sólo nosotras podamos leer. Queremos juntarnos, divertirnos y aprender a cifrar nuestros correos electrónicos de manera sencilla. ¿Te vienes a esta cryptofiesta?
      sencilla. ¿Te vienes a esta cryptofiesta?)