Special

Search by property

This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.

Search by property

A list of all pages that have property "Motivations for organizing training" with value "The risks their work involves them". Since there have been only a few results, also nearby values are displayed.

Showing below up to 22 results starting with #1.

View (previous 500 | next 500) (20 | 50 | 100 | 250 | 500)


    

List of results

    • Panel Gender and Surveillance, Circumvention Tech Festival, Spain  + (The roundtable, "Women in Surveillance and
      The roundtable, "Women in Surveillance and Being Surveilled" will gather women speakers from Germany, Syria, Pakistan, Nigeria, Brazil and UK in order to talk about past, present and future issues concerning women in anti-surveillance and being surveilled--from their country context. Definitions of surveillance considered will be wide (mass, targeted, by state and non-state actors, health systems, employers, intimate partners, organized crime groups, other groups and individuals).
      ime groups, other groups and individuals).)
    • Digital security training for antimining activists, Mexico  + (The workshop was conducted at the request
      The workshop was conducted at the request of an organization that is opposing mining projects in the region. Some of its participants are representatives of their communities and are subjected to constant high risk. In the words of the organization, they needed the workshop in order to communicate with human rights defenders organizations in a safer way.
      ts defenders organizations in a safer way.)
    • Campaign Zero Trollerance, Internet  + (This campaign was inspired by debates and
      This campaign was inspired by debates and exchanges regarding gender based online violence and trolling that took place during the GTI and were informed by participants experiences. This initiative was designed by a facilitator of the institute in partnership with the Peng collective which is a Berlin based communication group. The initiative was widely supported and relayed by many participants to the GTI. As explained in their website in a humoristic manner: “Hate has always been a part of the Internet and the intentional harassment of other people (termed trolling) has too. But the gendered forms of harassment and violence on Twitter today point to a deeper problem in society that cannot be solved by technical solutions alone. Trolls need serious, practical help to overcome their sexism, deal with their anger issues and change their behavior”.
      r anger issues and change their behavior”.)
    • Gender and Technology Institute, Uruguay  + (This one was the fifth “Gender and Technol
      This one was the fifth “Gender and Technology Institute” and it was organized in collaboration with FRIDA and Mama Cash. They attended the preparatory gathering on February 2018 in Mexico DF and brought logistic support doing outreach and giving support in the selection of participants, as well as covering the costs of 10 of the 49 participants selected. They also brought a small fun to economically support follow up actions and trainings by the participants and facilitators to the GTI, between July and December 2018. On the other hand, Amnesty International economically supported two participants and one person from Fondo de Acción Urgente LAC covered her costs to attend this GTI. This GTI was held during five days and had several objectives: Bring new skills and knowledge to its participants for them to be able to improve their strategies of mitigation as well as update their security protocols; Be able to train their own networks, organizations and communities about the topics learned once they are back home; Improve the synergy and collaboration between the different collectives and organizations attending the gathering. During two previous events specific curricula and methodologies were created for this specific GTI: A preparatory gathering in February 2018 with 20 participants that represented several organizations related to land rights defenders and/or with digital and holistic security with gender perspective. A gathering for the development of curricula content in April 2018 with 20 participants with the focus in developing of workshops and activities based on past GTIs. We are going to publish this repository of curricula in Spanish and english. The GTI brought 70 people including 50 participants and a team of 20 facilitators and organizers (3 from Tactical Tech, 1 representative from Mama Cash, 1 representative from the local organization Cotidiano Mujer, 1 person supporting logistics, 1 translator, 12 external facilitators). Among the participants were 40 women right land defenders and allies and 10 participants who were involved in feminist activism. The countries represented were Uruguay, Chile, Argentina, Colombia, Peru, Brazil, Bolivia, Honduras, Guatemala, Mexico, Nicaragua, Ecuador, El Salvador and Venezuela. However, it should be noted that for many participants this identification does not make sense. For those who represent their territory and community claiming an identity dissociated from the borders imposed by the nation states. The states maintain direct conflicts with women land rights defenders, criminalizing and actively pursuing them. About the roles of the participants in their own communities and organizations, we had the following profiles: - In charge of the management of Information and Communication Technologies (ICT) for their organization or collective (responsible for communication, campaigns, data collection and collective memory, others). - Activist who collectively manages ICTs (feminist activism, intense use of social networks, etc.) - Project and/or funding coordinator (director, programs, spokesperson, etc) - Profiles with sophisticated use or development of technologies (free software/hardware, geodata, system administrators) - Legal Defenders/Lawyers And about the audience that their communities, organizations and collectives work with we found the following distribution represented by a word cloud. Among the women that are object of gender based violence and hate speech online and offline, the women land rights defenders, indigenous communities leaders, environmental activists are specially under risk. During the preparatory event we spent some time to put on the same page several studies, analysis and reports related to the risks that they have. Other example of this is the big response we got to the convocation to the GTI. Although it was only open during 3 weeks and we didn’t distribute the call for applications further from the networks and organizations that were mapped during the preparatory event, we received more than 220 applications and most of the ones coming from land rights defenders showed people under hight risk. When analyzing the applications, we gave priority to the participantes that were exposed to the higher levels of risk as explained here: Attacks, hate speech through social networks (RRSS) Dealing with sensitive data, Manejo de datos sensibles, intervention risks Identity and account theft Computer theft Tracking of communication and cellphones Campaigns of discredit and fake news and defaming Attacks to their web pages Monitoring and surveillance Lack of security protocols in the organization Blackmail and criminalization Legal pitfalls Police visits to house, work place, etc Raids of offices and personal houses Threats to close family members Non-consensual dissemination of intimate content (“Revenge porn”) Sexual violence Discrimination Harassment Disappearances Murders Related to their motivations to attend the GTI, we can see that the participants want to improve their skills and get methodologies and tools to defend the rights of the communities they work in. On one side they want to be able to improve their visibility and advocacy, know how to manage and care about the data they generate, as well as to reduce the risks of attacks and violence. On other side, they want to acquire concepts and tools to be able to improve their levels of security and skills when creating mitigation strategies. Those motivations get combined with their goals of being able to share this knowledge with their own organizations, communities and networks. The gathering allowed many of the participants to meet face to face and create new networks based on trust that can only be obtained in presential gatherings. Many of them brought to our attention that being able to be a whole week with other comrades learning about their experiences and realities, questioning and learning about technical topics that usually are not easy to access, brought them a lot of strength and empowerment. They were able to gather in a safe space where they could relax, eat, laugh, cry and dance and that allowed them to center in themselves and that is in itself an act of political rebellion. And finally the institute brought them the opportunity to better understand how to defend the territory in other contexts and how to navigate their own specific context to fight against criminalization, to organize campaigns, document proofs, create collective memories, develop cartographic processes, etc You can read about the follow up activities organised by GTI participants in the follwoing reports: ENG: https://gendersec.tacticaltech.org/wiki/images/2/2a/-Public_Sharing-_report_grant_land_defenders.pdf Report of follow up activities organised by participants of the GTI oriented at land defenders December 2018 - “Caring for life on earth: Holistic, digital and self care security” SPA: https://gendersec.tacticaltech.org/wiki/images/e/e2/InformeDefensoras_delatierra.pdf Informe de las actividades de seguimiento organizadas por las participantes del IGT orientado a defensoras de la tierra Febrero 2019 - “Cuidando de la vida en la tierra: Seguridad holística, digital y autocuidado”
      eguridad holística, digital y autocuidado”)
    • Panel, Building feminist infrastructure, IFF, Spain  + (This session was a follow up to a pre-IFF
      This session was a follow up to a pre-IFF gathering of feminist hosting providers. This session is a chance to engage with broader conversations about the directions, challenges and hopes for feminist infrastructure. The types of activities, campaigns and organizations that feminist infrastructure providers support are on the front lines of repression, violence and surveillance. Not only are feminist infrastructure providers working on mission critical communications and technical support projects for at-risk users and organizations, the women and non-binary people responsible for the servers, access and technical skills are themselves often working in oppressive conditions, both offline and online. Through sharing and mapping, we’ll use the session to outline strategies for nurturing solidarity and mentorship within nodes of feminist infrastructure projects and explore opportunities for existing services and organizational sustainability. The session was attended by 40 persons more or less that were curious about the concept of feminist infrastructure and the current scene of feminist initiatives that are building it. The session presented several initiatives: systerserver, anarchaserver, vedetas, cl4ndestina, kefir, colnodo, codigo sur. We had a collective conversation about our aims, publics, communities, potential and challenges.
      cs, communities, potential and challenges.)
    • Training about gender, privacy and security for WHRD, Nicaragua  + (This training was oriented at a variety of
      This training was oriented at a variety of woman human rights defenders and activists located in Managua. Before that event, the regional start up meeting was organised gathering 12 women representative of different organisations from LAC in order to prepare the Gender and Technology Institute to be held in Ecuador some months later. The regional start up meeting aims were to design the facilitation methodologies, curricula and sessions design, agenda and how to ensure the safety of participants through the process. The follow up training held in Managua enabled us to test some experimental sessions we have designed in the previous meeting and gather feed back from the women engaged in the training. It enable also a part of the facilitation team to meet and train together their training skills.
      and train together their training skills.)
    • Seguridad digial para defensores de derechos humanos en contextos mineros 3  + (This training was realized within the cont
      This training was realized within the context of a program which contained a training aimed at strengthening "digital communication and social networks". The organization that facilitated the participation was Cooperacción, an NGO that develops two progamms: the program for collective rights and extractive industries and the program for costal development.
      es and the program for costal development.)
    • Holistic Security, Train Of Trainers, Germany  + (This was the key event for the part of the
      This was the key event for the part of the holistic security project which is focuesd on fostering best practices and community-building among security trainers. The objectives of the TOAST were as follows: * Identify and build the cross-domain knowledge necessary to improve trainers' own security and well-being in the course of their work * Learn, co-create and practice new exercises, and approaches for trainers from each domain to integrate in their trainings * Identify avenues of collaboration with participants from different domains * In the context of Tactical Tech's ongoing work (with partner organisations) on holistic security resources for human rights defenders and trainers, to explore and ideally agree upon a common framework and language for security, protection and well-being of HRDs across domains. * Contribute to the fortification of a collaborative cross-domain network of trainers
      aborative cross-domain network of trainers)
    • Stockholm Internet Forum (SIF), Gender equality, Stockholm  + (This years SIF theme is access seen from a
      This years SIF theme is access seen from a multi-dimensional approach. The aspects of access will be covered through discussions of issues related to economy, technology, policy and human rights – with a special emphasis on gender equality. Access to the internet plays an important role in the economic, social, cultural and political development of societies and nations. There are still huge differences – both in terms of access and usage – between those who have, and those who do not have access to the internet, between countries and regions, between rich and poor, and between men and women. But access is often not what it seems, and simply having access to the internet does not necessarily achieve social justice and development outcomes. To help us understand access from a multi-dimensional perspective SIF15 will use gender as a lens that can enable us to see beneath the surface. What does access to the internet mean? Who has access to the internet? Who has the ability to assimilate the information available online? These are some areas which will be discussed during SIF15
      areas which will be discussed during SIF15)
    • Digital security meetup for women human rights defenders, Kenya  + (To create a collective of digital security in Kenya with a focus on women.)
    • One-to-one DigiSec trainings for activists, Argentina  + (To explain the motives for using opensourc
      To explain the motives for using opensource software To help understand local and international policy around surveillance To conduct a personal risk assessment To get people using some of the digital security and activist tools which are most ueful to them
      ctivist tools which are most ueful to them)
    • Femhack- Encryption and digital security workshop for cis, trans and queer women, Bangalore  + (To have a safe and closed space for women
      To have a safe and closed space for women to discuss and address insecurities around computers and technology, being able to share useful secure communication practices and tools to organize around LGBTQ issues and use these tools strategically. Also to recognize that engagement with technology is political feminist issue and to gauge interest and capacity for events like this.
      nterest and capacity for events like this.)
    • Editatona Mujeres Nicas  + (Una editatona es un espacio, para mujeres,
      Una editatona es un espacio, para mujeres, de edición y creación de artículos de Wikipedia sobre una temática relacionada a la vivencia de las mujeres en nuestros propios contextos. ¿Por qué Wikipedia? Porque es una fuente de conocimiento construida de manera voluntaria y colectiva, que sirve de referencia para millones de personas alrededor del mundo. En 2012 se conoció que de cada 10 editores de Wikipedia, sólo 1 era mujer: desde entonces se han creado diversas iniciativas para cerrar la brecha de género promoviendo el involucramiento de las mujeres, la creación de artículos sobre mujeres y la revisión de artículos ya existentes que puedan estar escritos desde una perspectiva machista. La Editatona Mujeres Nicas en Managua es parte de ese esfuerzo mundial; y tiene como objetivo incluir en Wikipedia las biografías de mujeres destacadas en la historia de Nicaragua: artistas, científicas, médicas, activistas, docentes, guerrilleras y todas las mujeres cuyas historias sólo se conocen en pequeños círculos académicos.
      e conocen en pequeños círculos académicos.)
    • Screenings HackiNetIk, Mexico  + (Vivimos en un mundo en constante cambio, c
      Vivimos en un mundo en constante cambio, cada vez más acelerados, y las nuevas tecnologías de la comunicación y las redes digitales están planteando nuevos paradigmas, tanto de opresión como de liberación. ¿Cómo estamos reaccionando ante estas nuevas situaciones? ¿Qué peligros y oportunidades aparecen?
      s? ¿Qué peligros y oportunidades aparecen?)
    • FemH3ck - How the internet works for WHRD, Mexico  + (We believe that before telling this women
      We believe that before telling this women participating in the project, about how great is the Internet, we needed to share with them more information related to how it works. So we started the introductory session on digital security with the exercise how the internet works, we talked about the stages or places where our information travels when sharing it through the Internet. One of the things I have learned about basic digital security with WHRD, is that we don't always know where the risks are, but sometimes we hear somthing about a certain tool and we quickly download it but we don't always use the tool in the right way. So this session always helps to get a general picture and also it helps to solve a lot of questions from different tools and different risks. We have now a couple of materials for the session, we also have the flyer on how the internet works: https://www.dropbox.com/sh/q8o7041fi8ac6mz/AAAUn56sjbpWa3krLldVPRnea?dl=0 A serie of cards like ISP, router, platforms that help in the facilitation of the dinamic. Also we printed some materials to share with them on this same topic, this are also available in the dropbox link. The printed material had some other great resources to check.
      l had some other great resources to check.)
    • Panel, Strategizing around online gender-based violence documentation and accompaniment practice, IFF, Spain  + (We had a session of 2 hours with several p
      We had a session of 2 hours with several practitioners carrying out documentation and accompaniment for online gender based violence. We came together to discuss different challenges being faced when providing emotional and technical support, categorization and analysis of cases, assignation-projection of impact or harm, secure data practices, helpline possibilities and limitations, doing and sharing research and learnings. The session had around 35 attendees coming from a wide range of initiatives and countries. After presenting the different experiences developed by organisations involved in the organisation of the session we had an exchange with the different participants in the room.
      th the different participants in the room.)
    • Workshop, Imagine, Create, Be. Gender and Technologies, IFF, Spain  + (What are the side effects of funding? How
      What are the side effects of funding? How can we avoid divisions and foster collaboration? - Why are identity politics not enough? How can we include that which excludes us? - How might we maximize efforts, ressources and ideas from past and present experiences? - How can we acknowldege precariousness and overcome technology overload? - How can the analogue -digital integration be turned into a mandate and a provocation?
      e turned into a mandate and a provocation?)
    • Digital security for the Association of Media Women, Kenya  + (When the femh3ck flash training in Nairobi
      When the femh3ck flash training in Nairobi came to an end, one of the participants who was from AMWIK approached Mary Kiio of Roshani Consultancy Services and requested if the company would consider training their members as the issues highlighted were very pertinent to what women go through in the country. The potential of media being more informed on cyber threats especially women would hopefully translate to various media platforms being utilized to reach more women across the country A few days later an email from the secretariat of AMWIK inquiring on if we could share on the outcomes of the femh3ck training and a request on if we can engage in other similar activities and/or platforms, lead to the discussion of holding a three day training for its members over the month of August on Saturdays for three consecutive weekends. Though both companies did not have any funding for the training , there was an agreement that Roshani Consultancy Services would avail facilitators who would be willing to share information with no pay.AMWIK on the other hand committed to identify participants who are willing to attend training with the aim of being the future trainers. AMWIK also provided office space, Internet connection, workshop materials and snacks. It was the willing participants who shared their training needs via a pre training questionnaire that resonated with the theme of the training that provided the highest motivation of the training.
      ed the highest motivation of the training.)
    • Digital security training for women activists from the Balkans, Macedonia  + (Women Human Rights Defenders and LGTBQ act
      Women Human Rights Defenders and LGTBQ activists from the balkans (albania, armenia, bosnia, croatia, serbia, georgia, macedonia) with low levels of knowledge regarding privacy and digital security. Almost all of them used Windows, had a smartphone and used facebook for work and activism. Most of them managed sensitive data involving third parties information. The background of the participants was different, they were coming from different countries from the Balkans and the Caucasus region, dealing with different issues but what they all had in common, was that they are WHRD, they all used facebook, managed sensitive data and 17 of them were using Windows. One was only using MAC after switching from Linux. The group had already built wonderful dynamic in their work as before the DST they have spent some days on workshop about integrated security. They already knew each other, some even from before.
      dy knew each other, some even from before.)
    • Plataforma Ciberseguras, Mexico  + (¿Qué es Ciberseguras? Ciberseguras es un
      ¿Qué es Ciberseguras? Ciberseguras es un espacio que reúne muchos recursos y herramientas para que aprendamos más sobre Internet y seguridad digital. Buscamos compartir reflexiones sobre cómo la tecnología nos transforma, nos atraviesa y nos ofrece posibilidades y experiencias nuevas. Este espacio surge a partir de la idea de que el mundo digital y el mundo análogo no son esferas totalmente separadas, pues detrás de todo perfil, plataforma o red social existen personas concretas, en situaciones concretas. Queremos aportar información que ayuden a que todas podamos disfrutar libremente y de forma segura nuestras actividades, luchas y pasatiempos en línea, porque sabemos que somos nosotras quienes tenemos el control de la tecnología, quienes decidimos si nos sirve o si queremos cambiarla. Internet es un espacio que habitamos, compartimos y construimos juntas. ¡Bienvenidas a Ciberseguras!
      imos juntas. ¡Bienvenidas a Ciberseguras!)
    • Criptofiesta: ¡aprende a cifrar tus correos!  + (¿Sabías que nuestros correos electrónicos
      ¿Sabías que nuestros correos electrónicos están expuestos? “¿Por qué me vigilarían a mí?”, te preguntarás. Pues por muchas razones: porque nuestros datos son moneda de cambio y generan riqueza, porque los Estados están sedientos de controlar todo, porque las recolección, almacenamiento y procesamiento masivo de datos son la base del mundo que nos propone Sillicon Valley. Pero la buena noticia es tenemos derecho a que nuestras comunicaciones sean privadas y tenemos a mano las herramientas para garantizarlo. Así que una de las maneras de proteger nuestra privacidad y reducir nuestra sombra digital es cifrando nuestros correos. ¿Cifrando? ¡Tal vez te suena más la palabra encriptar! Pues eso, echar mano de las matemáticas para convertir nuestros mensajes en códigos ilegibles que sólo nosotras podamos leer. Queremos juntarnos, divertirnos y aprender a cifrar nuestros correos electrónicos de manera sencilla. ¿Te vienes a esta cryptofiesta?
      sencilla. ¿Te vienes a esta cryptofiesta?)