SlideShare a Scribd company logo
 
Tactical Tech works to give rights advocates working with marginalised communities the tools and tactics they need for effective advocacy . We work with Human Rights Defenders, anti-corruption advocates and independent journalists who deal with freedom of expression issues as a means to an end  Tactical Tech's Digital Security program - Started in 2004 - In partnership with Frontline Human Rights Defenders - Focused on making Rights advocates aware of their security vulnerabilities and providing them with the skills and tools to work as safely as possible
1,554 toolkits distributed and  downloaded in 2007 (more copied)‏ 165,000 visits to the toolkit website in 2007 Toolkit  “ in-a-box”, “on-line” and “on-a-stick” - Attempt to pool expertise of leading practitioners - Peer review (language + expert teams)‏ - Available in 5 languages (French, Spanish, Arabic Russian and English) translated and localised. Covering; anonymity and circumvention, but also... - keeping your computer safe and stable - communicating privately - keeping data confidential and backed-up - mobile security - working from an internet cafe New version to be launched in September 2008
Training -  Four experts/trainers in the core project team - Network of 14 trainers  During 2007 7 dedicated workshops  257 advocates trained Nearly 1500 advocates and independent journalists trained to date Trainings in... Belarus, Former Soviet Union, Uganda, Kenya, DRC, Uzbekistan, Ethiopia, Indonesia, Iran, Syria, Tunisia Thailand/Burmese, Yemen and many global events Publishing this curricula at the end of 2008
Reaching rights advocates working on the ground:  Giving them the tips, tools and tactics they need to do their work Why we train (tooklits and workshops) and some of the things we've learnt... 1. Helping advocates find solutions There is a percentage of the internet that knows about  circumvention and a percentage who does not - Many HRDs don't know, don't move in those circles, but   are facing the same challenges as bloggers e.g. Tunisian group hadn't been able to access their website for 5 yrs
2. Problems with using tools  - Knowing which tools to use, where and when - Tools don't always work; important to be able to help advocates trouble shoot and show them what it looks like - Rumours;  people say its broken or can be traced, people don't know if it's really safe - Censorship can be opaque or inconsistent; for example different ISPs or points of access blocked - There is safety in numbers; if your going to stick your neck out, helpful to know that others are doing it too - People don't always have contacts e.g. Psiphon, trainer can act as a point of contact, we depend on TOR as it  is less dependent on social networks, but it is more complicated to use.
3. Helping to make the tools available and usable - localisation of tools and materials - but also working with developers giving them feedback (they listen, we hope!, because our feedback is based on use in the field, and the feedback of people who use their technology)‏
4. Helping advocates make their own decisions Giving advocates enough understanding so that they can decide how to use digital security for themselves – how it works, what's possible,  when they should rely on it, when not, build their confidence, and help them to make their own decisions.
5. Content censorship – the blessing and the curse of web 2.0 The tools that are the easiest to use are the ones most likely to be blocked or content taken down. Services have been a great breakthrough, but for most of the HRD's we work with they are not a viable option. Sex Worker Health and Rights Advocates
6. Freedom of expression and self censorship Shouldn't forget that HRDs and advocates share information, publish and organise a lot still through non-web formats. Email and IM, increasingly by mobiles We give people alternatives like riseup.net, vaultletsoft and pidgin 7. Anonymity – hosting your own content Trying to host content anonymously is difficult and there are hidden challenges to this  (e.g. – contacting the owners of the site)‏

More Related Content

What's hot

Reem's Investigation
Reem's InvestigationReem's Investigation
Reem's Investigation
uk01f0015
 
Nettique
NettiqueNettique
Nettique
thepaper
 
The Nine Elements
The Nine ElementsThe Nine Elements
The Nine Elements
BrodyJWU
 
Omar Todd - Cybersecurity Expert and Consultant
Omar Todd - Cybersecurity Expert and ConsultantOmar Todd - Cybersecurity Expert and Consultant
Omar Todd - Cybersecurity Expert and Consultant
Omar Todd
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
malvin050
 
Privacy in a Digital age
Privacy in a Digital agePrivacy in a Digital age
Privacy in a Digital age
Felix Garcia Lainez
 
Tech savvy seniors week 3 term 4 intro to internet
Tech savvy seniors   week 3 term 4 intro to internetTech savvy seniors   week 3 term 4 intro to internet
Tech savvy seniors week 3 term 4 intro to internet
Marni3Bridges
 

What's hot (7)

Reem's Investigation
Reem's InvestigationReem's Investigation
Reem's Investigation
 
Nettique
NettiqueNettique
Nettique
 
The Nine Elements
The Nine ElementsThe Nine Elements
The Nine Elements
 
Omar Todd - Cybersecurity Expert and Consultant
Omar Todd - Cybersecurity Expert and ConsultantOmar Todd - Cybersecurity Expert and Consultant
Omar Todd - Cybersecurity Expert and Consultant
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Privacy in a Digital age
Privacy in a Digital agePrivacy in a Digital age
Privacy in a Digital age
 
Tech savvy seniors week 3 term 4 intro to internet
Tech savvy seniors   week 3 term 4 intro to internetTech savvy seniors   week 3 term 4 intro to internet
Tech savvy seniors week 3 term 4 intro to internet
 

Viewers also liked

экопластика.Ppt 2
экопластика.Ppt 2экопластика.Ppt 2
экопластика.Ppt 2
Kokossokok
 
Changes to Fellowship Scheme Presentation – Katherine Warren
Changes to Fellowship Scheme Presentation – Katherine WarrenChanges to Fellowship Scheme Presentation – Katherine Warren
Changes to Fellowship Scheme Presentation – Katherine Warren
Arts and Humanities Research Council (AHRC)
 
C.V .
C.V .C.V .
Musings_CLSARoadshows
Musings_CLSARoadshowsMusings_CLSARoadshows
Musings_CLSARoadshows
Nelson Gaytón
 
Step21 1
Step21 1Step21 1
Step21 1
wunderwaffle
 
個資法 - 資料就是財富
個資法 - 資料就是財富個資法 - 資料就是財富
個資法 - 資料就是財富
ChrisChenTw
 
Project Management Workshop Overview
Project Management Workshop OverviewProject Management Workshop Overview
Project Management Workshop Overview
sundong
 
Let's talk about certification: SCJA
Let's talk about certification: SCJALet's talk about certification: SCJA
Let's talk about certification: SCJA
José Maria Silveira Neto
 
Introduction To Social Media
Introduction To Social MediaIntroduction To Social Media
Introduction To Social Media
krynsky
 
Microsoft Windows Intune getting started guide dec 2012 release
Microsoft Windows Intune getting started guide   dec 2012 releaseMicrosoft Windows Intune getting started guide   dec 2012 release
Microsoft Windows Intune getting started guide dec 2012 release
David J Rosenthal
 
The comparison of immunization
The comparison of immunizationThe comparison of immunization
The comparison of immunization
IJCNCJournal
 
Website design
Website designWebsite design
Website design
BreezeGo
 
VPN Security
VPN SecurityVPN Security
Purcell 2000000744
Purcell 2000000744Purcell 2000000744
Purcell 2000000744
savomir
 
Evaluation question 6
Evaluation question 6Evaluation question 6
Evaluation question 6
Boassy Benson
 
Research skills for journalists
Research skills for journalists Research skills for journalists
Research skills for journalists
oflynns
 
Шаг-Рысь-Галоп: видимое ускорение разработки
Шаг-Рысь-Галоп: видимое ускорение разработкиШаг-Рысь-Галоп: видимое ускорение разработки
Шаг-Рысь-Галоп: видимое ускорение разработки
SQALab
 
Freelance copywriter - Miriam, Haarlem
Freelance copywriter - Miriam, HaarlemFreelance copywriter - Miriam, Haarlem
Freelance copywriter - Miriam, Haarlem
Copywriter Collective
 
2 q15 investment commentary
2 q15 investment commentary2 q15 investment commentary
2 q15 investment commentary
melanig123
 

Viewers also liked (19)

экопластика.Ppt 2
экопластика.Ppt 2экопластика.Ppt 2
экопластика.Ppt 2
 
Changes to Fellowship Scheme Presentation – Katherine Warren
Changes to Fellowship Scheme Presentation – Katherine WarrenChanges to Fellowship Scheme Presentation – Katherine Warren
Changes to Fellowship Scheme Presentation – Katherine Warren
 
C.V .
C.V .C.V .
C.V .
 
Musings_CLSARoadshows
Musings_CLSARoadshowsMusings_CLSARoadshows
Musings_CLSARoadshows
 
Step21 1
Step21 1Step21 1
Step21 1
 
個資法 - 資料就是財富
個資法 - 資料就是財富個資法 - 資料就是財富
個資法 - 資料就是財富
 
Project Management Workshop Overview
Project Management Workshop OverviewProject Management Workshop Overview
Project Management Workshop Overview
 
Let's talk about certification: SCJA
Let's talk about certification: SCJALet's talk about certification: SCJA
Let's talk about certification: SCJA
 
Introduction To Social Media
Introduction To Social MediaIntroduction To Social Media
Introduction To Social Media
 
Microsoft Windows Intune getting started guide dec 2012 release
Microsoft Windows Intune getting started guide   dec 2012 releaseMicrosoft Windows Intune getting started guide   dec 2012 release
Microsoft Windows Intune getting started guide dec 2012 release
 
The comparison of immunization
The comparison of immunizationThe comparison of immunization
The comparison of immunization
 
Website design
Website designWebsite design
Website design
 
VPN Security
VPN SecurityVPN Security
VPN Security
 
Purcell 2000000744
Purcell 2000000744Purcell 2000000744
Purcell 2000000744
 
Evaluation question 6
Evaluation question 6Evaluation question 6
Evaluation question 6
 
Research skills for journalists
Research skills for journalists Research skills for journalists
Research skills for journalists
 
Шаг-Рысь-Галоп: видимое ускорение разработки
Шаг-Рысь-Галоп: видимое ускорение разработкиШаг-Рысь-Галоп: видимое ускорение разработки
Шаг-Рысь-Галоп: видимое ускорение разработки
 
Freelance copywriter - Miriam, Haarlem
Freelance copywriter - Miriam, HaarlemFreelance copywriter - Miriam, Haarlem
Freelance copywriter - Miriam, Haarlem
 
2 q15 investment commentary
2 q15 investment commentary2 q15 investment commentary
2 q15 investment commentary
 

Similar to Stephanie Hankey talks about Tactical Technology Collective

Knowledge management for professionals
Knowledge management for professionalsKnowledge management for professionals
Knowledge management for professionals
Esteban Romero Frías
 
ICT.pptx
ICT.pptxICT.pptx
Privacy, Encryption, and Anonymity in the Civil Legal Aid Context
Privacy, Encryption, and Anonymity in the Civil Legal Aid ContextPrivacy, Encryption, and Anonymity in the Civil Legal Aid Context
Privacy, Encryption, and Anonymity in the Civil Legal Aid Context
Legal Services National Technology Assistance Project (LSNTAP)
 
Module 11- Promotion of safe use of Internet.pptx
Module 11- Promotion of safe use of Internet.pptxModule 11- Promotion of safe use of Internet.pptx
Module 11- Promotion of safe use of Internet.pptx
ShashankPrabalclass1
 
Report on cyber security fishbowl by shreedeep rayamajhi
Report on cyber security fishbowl by shreedeep rayamajhiReport on cyber security fishbowl by shreedeep rayamajhi
Report on cyber security fishbowl by shreedeep rayamajhi
Shreedeep Rayamajhi
 
Facilitating knowledge-exchange: providing the right format, incentives, faci...
Facilitating knowledge-exchange: providing the right format, incentives, faci...Facilitating knowledge-exchange: providing the right format, incentives, faci...
Facilitating knowledge-exchange: providing the right format, incentives, faci...
kjantin
 
Empowerment technologies
Empowerment technologiesEmpowerment technologies
Empowerment technologies
Rufa Laguit
 
Open Cambodia 2014 Invite
Open Cambodia 2014 InviteOpen Cambodia 2014 Invite
Open Cambodia 2014 Invite
John Weeks
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
egschool
 
Devon County Council - Risk assessment for social media
Devon County Council - Risk assessment for social mediaDevon County Council - Risk assessment for social media
Devon County Council - Risk assessment for social media
Carl Haggerty
 
Reading 2
Reading 2Reading 2
Reading 2
Mary_Younginer
 
Understanding Speech Data Collection: An Essential Component of Modern AI
Understanding Speech Data Collection: An Essential Component of Modern AIUnderstanding Speech Data Collection: An Essential Component of Modern AI
Understanding Speech Data Collection: An Essential Component of Modern AI
GLOBOSE TECHNOLOGY SOLUTIONS PRIVATE LIMITED
 
DigComp - Konferens om skolans digitalisering, 8 sep, Stockholm
DigComp - Konferens om skolans digitalisering, 8 sep, StockholmDigComp - Konferens om skolans digitalisering, 8 sep, Stockholm
DigComp - Konferens om skolans digitalisering, 8 sep, Stockholm
Riina Vuorikari
 
Youth Privacy
Youth PrivacyYouth Privacy
Youth Privacy
CTIC Technology Centre
 
Fostering an Ecosystem for Smartphone Privacy
Fostering an Ecosystem for Smartphone PrivacyFostering an Ecosystem for Smartphone Privacy
Fostering an Ecosystem for Smartphone Privacy
Jason Hong
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
Mukesh Tekwani
 
Personally Identifiable Information
Personally Identifiable InformationPersonally Identifiable Information
Personally Identifiable Information
Toya Shamberger
 
Sup de Co Rennes - planning 2014-2015
Sup de Co Rennes - planning 2014-2015Sup de Co Rennes - planning 2014-2015
Sup de Co Rennes - planning 2014-2015
Prof. Jacques Folon (Ph.D)
 
Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011
Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011
Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011
Jason Hong
 
Need for Data Protection Training - How E-learning Can Help?
Need for Data Protection Training - How E-learning Can Help?Need for Data Protection Training - How E-learning Can Help?
Need for Data Protection Training - How E-learning Can Help?
CommLab India – Rapid eLearning Solutions
 

Similar to Stephanie Hankey talks about Tactical Technology Collective (20)

Knowledge management for professionals
Knowledge management for professionalsKnowledge management for professionals
Knowledge management for professionals
 
ICT.pptx
ICT.pptxICT.pptx
ICT.pptx
 
Privacy, Encryption, and Anonymity in the Civil Legal Aid Context
Privacy, Encryption, and Anonymity in the Civil Legal Aid ContextPrivacy, Encryption, and Anonymity in the Civil Legal Aid Context
Privacy, Encryption, and Anonymity in the Civil Legal Aid Context
 
Module 11- Promotion of safe use of Internet.pptx
Module 11- Promotion of safe use of Internet.pptxModule 11- Promotion of safe use of Internet.pptx
Module 11- Promotion of safe use of Internet.pptx
 
Report on cyber security fishbowl by shreedeep rayamajhi
Report on cyber security fishbowl by shreedeep rayamajhiReport on cyber security fishbowl by shreedeep rayamajhi
Report on cyber security fishbowl by shreedeep rayamajhi
 
Facilitating knowledge-exchange: providing the right format, incentives, faci...
Facilitating knowledge-exchange: providing the right format, incentives, faci...Facilitating knowledge-exchange: providing the right format, incentives, faci...
Facilitating knowledge-exchange: providing the right format, incentives, faci...
 
Empowerment technologies
Empowerment technologiesEmpowerment technologies
Empowerment technologies
 
Open Cambodia 2014 Invite
Open Cambodia 2014 InviteOpen Cambodia 2014 Invite
Open Cambodia 2014 Invite
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Devon County Council - Risk assessment for social media
Devon County Council - Risk assessment for social mediaDevon County Council - Risk assessment for social media
Devon County Council - Risk assessment for social media
 
Reading 2
Reading 2Reading 2
Reading 2
 
Understanding Speech Data Collection: An Essential Component of Modern AI
Understanding Speech Data Collection: An Essential Component of Modern AIUnderstanding Speech Data Collection: An Essential Component of Modern AI
Understanding Speech Data Collection: An Essential Component of Modern AI
 
DigComp - Konferens om skolans digitalisering, 8 sep, Stockholm
DigComp - Konferens om skolans digitalisering, 8 sep, StockholmDigComp - Konferens om skolans digitalisering, 8 sep, Stockholm
DigComp - Konferens om skolans digitalisering, 8 sep, Stockholm
 
Youth Privacy
Youth PrivacyYouth Privacy
Youth Privacy
 
Fostering an Ecosystem for Smartphone Privacy
Fostering an Ecosystem for Smartphone PrivacyFostering an Ecosystem for Smartphone Privacy
Fostering an Ecosystem for Smartphone Privacy
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Personally Identifiable Information
Personally Identifiable InformationPersonally Identifiable Information
Personally Identifiable Information
 
Sup de Co Rennes - planning 2014-2015
Sup de Co Rennes - planning 2014-2015Sup de Co Rennes - planning 2014-2015
Sup de Co Rennes - planning 2014-2015
 
Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011
Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011
Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011
 
Need for Data Protection Training - How E-learning Can Help?
Need for Data Protection Training - How E-learning Can Help?Need for Data Protection Training - How E-learning Can Help?
Need for Data Protection Training - How E-learning Can Help?
 

More from Global Voices

do censorship & repression kill content online?
do censorship & repression kill content online?do censorship & repression kill content online?
do censorship & repression kill content online?
Global Voices
 
Digital activism & online free speech
Digital activism & online free speechDigital activism & online free speech
Digital activism & online free speech
Global Voices
 
Live Broadcasting Center, Bahrain Experience, by Hussain Yousif
Live Broadcasting Center, Bahrain Experience, by Hussain YousifLive Broadcasting Center, Bahrain Experience, by Hussain Yousif
Live Broadcasting Center, Bahrain Experience, by Hussain Yousif
Global Voices
 
Yemen Portal Presentation
Yemen Portal PresentationYemen Portal Presentation
Yemen Portal Presentation
Global Voices
 

بروز الصحافة المواطِنة في المغرب

بروز الصحافة المواطِنة في المغرب
بروز الصحافة المواطِنة في المغرب

بروز الصحافة المواطِنة في المغرب
Global Voices
 
FOSS: Technologies Communities And Society
FOSS: Technologies Communities And SocietyFOSS: Technologies Communities And Society
FOSS: Technologies Communities And Society
Global Voices
 
Meedan Presentation, by Anas Tawileh
Meedan Presentation, by Anas TawilehMeedan Presentation, by Anas Tawileh
Meedan Presentation, by Anas Tawileh
Global Voices
 
Live Broadcasting
Live  BroadcastingLive  Broadcasting
Live Broadcasting
Global Voices
 
A game of cat and mouse
A game of cat and mouseA game of cat and mouse
A game of cat and mouse
Global Voices
 
Belarusian Internet filtering
Belarusian Internet filteringBelarusian Internet filtering
Belarusian Internet filtering
Global Voices
 
Filteringfinal
FilteringfinalFilteringfinal
Filteringfinal
Global Voices
 
Living with censorship
Living with censorshipLiving with censorship
Living with censorship
Global Voices
 
Self Censorship in media Role of citizen journalists
Self Censorship in media  Role of citizen journalistsSelf Censorship in media  Role of citizen journalists
Self Censorship in media Role of citizen journalists
Global Voices
 
Formation of a post-colonial censorship regime
Formation of a  post-colonial censorship regimeFormation of a  post-colonial censorship regime
Formation of a post-colonial censorship regime
Global Voices
 
Exposing Corruption on YouTube “Targuist Sniper”
Exposing Corruption on YouTube “Targuist Sniper”Exposing Corruption on YouTube “Targuist Sniper”
Exposing Corruption on YouTube “Targuist Sniper”
Global Voices
 
Filtering final
Filtering finalFiltering final
Filtering final
Global Voices
 
Bloguer Anonymement
Bloguer AnonymementBloguer Anonymement
Bloguer Anonymement
Global Voices
 

More from Global Voices (17)

do censorship & repression kill content online?
do censorship & repression kill content online?do censorship & repression kill content online?
do censorship & repression kill content online?
 
Digital activism & online free speech
Digital activism & online free speechDigital activism & online free speech
Digital activism & online free speech
 
Live Broadcasting Center, Bahrain Experience, by Hussain Yousif
Live Broadcasting Center, Bahrain Experience, by Hussain YousifLive Broadcasting Center, Bahrain Experience, by Hussain Yousif
Live Broadcasting Center, Bahrain Experience, by Hussain Yousif
 
Yemen Portal Presentation
Yemen Portal PresentationYemen Portal Presentation
Yemen Portal Presentation
 

بروز الصحافة المواطِنة في المغرب

بروز الصحافة المواطِنة في المغرب
بروز الصحافة المواطِنة في المغرب

بروز الصحافة المواطِنة في المغرب
 
FOSS: Technologies Communities And Society
FOSS: Technologies Communities And SocietyFOSS: Technologies Communities And Society
FOSS: Technologies Communities And Society
 
Meedan Presentation, by Anas Tawileh
Meedan Presentation, by Anas TawilehMeedan Presentation, by Anas Tawileh
Meedan Presentation, by Anas Tawileh
 
Live Broadcasting
Live  BroadcastingLive  Broadcasting
Live Broadcasting
 
A game of cat and mouse
A game of cat and mouseA game of cat and mouse
A game of cat and mouse
 
Belarusian Internet filtering
Belarusian Internet filteringBelarusian Internet filtering
Belarusian Internet filtering
 
Filteringfinal
FilteringfinalFilteringfinal
Filteringfinal
 
Living with censorship
Living with censorshipLiving with censorship
Living with censorship
 
Self Censorship in media Role of citizen journalists
Self Censorship in media  Role of citizen journalistsSelf Censorship in media  Role of citizen journalists
Self Censorship in media Role of citizen journalists
 
Formation of a post-colonial censorship regime
Formation of a  post-colonial censorship regimeFormation of a  post-colonial censorship regime
Formation of a post-colonial censorship regime
 
Exposing Corruption on YouTube “Targuist Sniper”
Exposing Corruption on YouTube “Targuist Sniper”Exposing Corruption on YouTube “Targuist Sniper”
Exposing Corruption on YouTube “Targuist Sniper”
 
Filtering final
Filtering finalFiltering final
Filtering final
 
Bloguer Anonymement
Bloguer AnonymementBloguer Anonymement
Bloguer Anonymement
 

Recently uploaded

Gen AI: Privacy Risks of Large Language Models (LLMs)
Gen AI: Privacy Risks of Large Language Models (LLMs)Gen AI: Privacy Risks of Large Language Models (LLMs)
Gen AI: Privacy Risks of Large Language Models (LLMs)
Debmalya Biswas
 
MAKE MONEY ONLINE Unlock Your Income Potential Today.pptx
MAKE MONEY ONLINE Unlock Your Income Potential Today.pptxMAKE MONEY ONLINE Unlock Your Income Potential Today.pptx
MAKE MONEY ONLINE Unlock Your Income Potential Today.pptx
janagijoythi
 
EuroPython 2024 - Streamlining Testing in a Large Python Codebase
EuroPython 2024 - Streamlining Testing in a Large Python CodebaseEuroPython 2024 - Streamlining Testing in a Large Python Codebase
EuroPython 2024 - Streamlining Testing in a Large Python Codebase
Jimmy Lai
 
Integrating Kafka with MuleSoft 4 and usecase
Integrating Kafka with MuleSoft 4 and usecaseIntegrating Kafka with MuleSoft 4 and usecase
Integrating Kafka with MuleSoft 4 and usecase
shyamraj55
 
Using LLM Agents with Llama 3, LangGraph and Milvus
Using LLM Agents with Llama 3, LangGraph and MilvusUsing LLM Agents with Llama 3, LangGraph and Milvus
Using LLM Agents with Llama 3, LangGraph and Milvus
Zilliz
 
Girls Call Churchgate 9910780858 Provide Best And Top Girl Service And No1 in...
Girls Call Churchgate 9910780858 Provide Best And Top Girl Service And No1 in...Girls Call Churchgate 9910780858 Provide Best And Top Girl Service And No1 in...
Girls Call Churchgate 9910780858 Provide Best And Top Girl Service And No1 in...
maigasapphire
 
Mule Experience Hub and Release Channel with Java 17
Mule Experience Hub and Release Channel with Java 17Mule Experience Hub and Release Channel with Java 17
Mule Experience Hub and Release Channel with Java 17
Bhajan Mehta
 
Connector Corner: Leveraging Snowflake Integration for Smarter Decision Making
Connector Corner: Leveraging Snowflake Integration for Smarter Decision MakingConnector Corner: Leveraging Snowflake Integration for Smarter Decision Making
Connector Corner: Leveraging Snowflake Integration for Smarter Decision Making
DianaGray10
 
High Profile Girls call Service Pune 000XX00000 Provide Best And Top Girl Ser...
High Profile Girls call Service Pune 000XX00000 Provide Best And Top Girl Ser...High Profile Girls call Service Pune 000XX00000 Provide Best And Top Girl Ser...
High Profile Girls call Service Pune 000XX00000 Provide Best And Top Girl Ser...
bhumivarma35300
 
Finetuning GenAI For Hacking and Defending
Finetuning GenAI For Hacking and DefendingFinetuning GenAI For Hacking and Defending
Finetuning GenAI For Hacking and Defending
Priyanka Aash
 
Communications Mining Series - Zero to Hero - Session 3
Communications Mining Series - Zero to Hero - Session 3Communications Mining Series - Zero to Hero - Session 3
Communications Mining Series - Zero to Hero - Session 3
DianaGray10
 
It's your unstructured data: How to get your GenAI app to production (and spe...
It's your unstructured data: How to get your GenAI app to production (and spe...It's your unstructured data: How to get your GenAI app to production (and spe...
It's your unstructured data: How to get your GenAI app to production (and spe...
Zilliz
 
Camunda Chapter NY Meetup July 2024.pptx
Camunda Chapter NY Meetup July 2024.pptxCamunda Chapter NY Meetup July 2024.pptx
Camunda Chapter NY Meetup July 2024.pptx
ZachWylie3
 
LeadMagnet IQ Review: Unlock the Secret to Effortless Traffic and Leads.pdf
LeadMagnet IQ Review:  Unlock the Secret to Effortless Traffic and Leads.pdfLeadMagnet IQ Review:  Unlock the Secret to Effortless Traffic and Leads.pdf
LeadMagnet IQ Review: Unlock the Secret to Effortless Traffic and Leads.pdf
SelfMade bd
 
Feature sql server terbaru performance.pptx
Feature sql server terbaru performance.pptxFeature sql server terbaru performance.pptx
Feature sql server terbaru performance.pptx
ssuser1915fe1
 
Garbage In, Garbage Out: Why poor data curation is killing your AI models (an...
Garbage In, Garbage Out: Why poor data curation is killing your AI models (an...Garbage In, Garbage Out: Why poor data curation is killing your AI models (an...
Garbage In, Garbage Out: Why poor data curation is killing your AI models (an...
Zilliz
 
Vertex AI Agent Builder - GDG Alicante - Julio 2024
Vertex AI Agent Builder - GDG Alicante - Julio 2024Vertex AI Agent Builder - GDG Alicante - Julio 2024
Vertex AI Agent Builder - GDG Alicante - Julio 2024
Nicolás Lopéz
 
kk vathada _digital transformation frameworks_2024.pdf
kk vathada _digital transformation frameworks_2024.pdfkk vathada _digital transformation frameworks_2024.pdf
kk vathada _digital transformation frameworks_2024.pdf
KIRAN KV
 
leewayhertz.com-AI agents for healthcare Applications benefits and implementa...
leewayhertz.com-AI agents for healthcare Applications benefits and implementa...leewayhertz.com-AI agents for healthcare Applications benefits and implementa...
leewayhertz.com-AI agents for healthcare Applications benefits and implementa...
alexjohnson7307
 
Step-By-Step Process to Develop a Mobile App From Scratch
Step-By-Step Process to Develop a Mobile App From ScratchStep-By-Step Process to Develop a Mobile App From Scratch
Step-By-Step Process to Develop a Mobile App From Scratch
softsuave
 

Recently uploaded (20)

Gen AI: Privacy Risks of Large Language Models (LLMs)
Gen AI: Privacy Risks of Large Language Models (LLMs)Gen AI: Privacy Risks of Large Language Models (LLMs)
Gen AI: Privacy Risks of Large Language Models (LLMs)
 
MAKE MONEY ONLINE Unlock Your Income Potential Today.pptx
MAKE MONEY ONLINE Unlock Your Income Potential Today.pptxMAKE MONEY ONLINE Unlock Your Income Potential Today.pptx
MAKE MONEY ONLINE Unlock Your Income Potential Today.pptx
 
EuroPython 2024 - Streamlining Testing in a Large Python Codebase
EuroPython 2024 - Streamlining Testing in a Large Python CodebaseEuroPython 2024 - Streamlining Testing in a Large Python Codebase
EuroPython 2024 - Streamlining Testing in a Large Python Codebase
 
Integrating Kafka with MuleSoft 4 and usecase
Integrating Kafka with MuleSoft 4 and usecaseIntegrating Kafka with MuleSoft 4 and usecase
Integrating Kafka with MuleSoft 4 and usecase
 
Using LLM Agents with Llama 3, LangGraph and Milvus
Using LLM Agents with Llama 3, LangGraph and MilvusUsing LLM Agents with Llama 3, LangGraph and Milvus
Using LLM Agents with Llama 3, LangGraph and Milvus
 
Girls Call Churchgate 9910780858 Provide Best And Top Girl Service And No1 in...
Girls Call Churchgate 9910780858 Provide Best And Top Girl Service And No1 in...Girls Call Churchgate 9910780858 Provide Best And Top Girl Service And No1 in...
Girls Call Churchgate 9910780858 Provide Best And Top Girl Service And No1 in...
 
Mule Experience Hub and Release Channel with Java 17
Mule Experience Hub and Release Channel with Java 17Mule Experience Hub and Release Channel with Java 17
Mule Experience Hub and Release Channel with Java 17
 
Connector Corner: Leveraging Snowflake Integration for Smarter Decision Making
Connector Corner: Leveraging Snowflake Integration for Smarter Decision MakingConnector Corner: Leveraging Snowflake Integration for Smarter Decision Making
Connector Corner: Leveraging Snowflake Integration for Smarter Decision Making
 
High Profile Girls call Service Pune 000XX00000 Provide Best And Top Girl Ser...
High Profile Girls call Service Pune 000XX00000 Provide Best And Top Girl Ser...High Profile Girls call Service Pune 000XX00000 Provide Best And Top Girl Ser...
High Profile Girls call Service Pune 000XX00000 Provide Best And Top Girl Ser...
 
Finetuning GenAI For Hacking and Defending
Finetuning GenAI For Hacking and DefendingFinetuning GenAI For Hacking and Defending
Finetuning GenAI For Hacking and Defending
 
Communications Mining Series - Zero to Hero - Session 3
Communications Mining Series - Zero to Hero - Session 3Communications Mining Series - Zero to Hero - Session 3
Communications Mining Series - Zero to Hero - Session 3
 
It's your unstructured data: How to get your GenAI app to production (and spe...
It's your unstructured data: How to get your GenAI app to production (and spe...It's your unstructured data: How to get your GenAI app to production (and spe...
It's your unstructured data: How to get your GenAI app to production (and spe...
 
Camunda Chapter NY Meetup July 2024.pptx
Camunda Chapter NY Meetup July 2024.pptxCamunda Chapter NY Meetup July 2024.pptx
Camunda Chapter NY Meetup July 2024.pptx
 
LeadMagnet IQ Review: Unlock the Secret to Effortless Traffic and Leads.pdf
LeadMagnet IQ Review:  Unlock the Secret to Effortless Traffic and Leads.pdfLeadMagnet IQ Review:  Unlock the Secret to Effortless Traffic and Leads.pdf
LeadMagnet IQ Review: Unlock the Secret to Effortless Traffic and Leads.pdf
 
Feature sql server terbaru performance.pptx
Feature sql server terbaru performance.pptxFeature sql server terbaru performance.pptx
Feature sql server terbaru performance.pptx
 
Garbage In, Garbage Out: Why poor data curation is killing your AI models (an...
Garbage In, Garbage Out: Why poor data curation is killing your AI models (an...Garbage In, Garbage Out: Why poor data curation is killing your AI models (an...
Garbage In, Garbage Out: Why poor data curation is killing your AI models (an...
 
Vertex AI Agent Builder - GDG Alicante - Julio 2024
Vertex AI Agent Builder - GDG Alicante - Julio 2024Vertex AI Agent Builder - GDG Alicante - Julio 2024
Vertex AI Agent Builder - GDG Alicante - Julio 2024
 
kk vathada _digital transformation frameworks_2024.pdf
kk vathada _digital transformation frameworks_2024.pdfkk vathada _digital transformation frameworks_2024.pdf
kk vathada _digital transformation frameworks_2024.pdf
 
leewayhertz.com-AI agents for healthcare Applications benefits and implementa...
leewayhertz.com-AI agents for healthcare Applications benefits and implementa...leewayhertz.com-AI agents for healthcare Applications benefits and implementa...
leewayhertz.com-AI agents for healthcare Applications benefits and implementa...
 
Step-By-Step Process to Develop a Mobile App From Scratch
Step-By-Step Process to Develop a Mobile App From ScratchStep-By-Step Process to Develop a Mobile App From Scratch
Step-By-Step Process to Develop a Mobile App From Scratch
 

Stephanie Hankey talks about Tactical Technology Collective

  • 1.  
  • 2. Tactical Tech works to give rights advocates working with marginalised communities the tools and tactics they need for effective advocacy . We work with Human Rights Defenders, anti-corruption advocates and independent journalists who deal with freedom of expression issues as a means to an end Tactical Tech's Digital Security program - Started in 2004 - In partnership with Frontline Human Rights Defenders - Focused on making Rights advocates aware of their security vulnerabilities and providing them with the skills and tools to work as safely as possible
  • 3. 1,554 toolkits distributed and downloaded in 2007 (more copied)‏ 165,000 visits to the toolkit website in 2007 Toolkit “ in-a-box”, “on-line” and “on-a-stick” - Attempt to pool expertise of leading practitioners - Peer review (language + expert teams)‏ - Available in 5 languages (French, Spanish, Arabic Russian and English) translated and localised. Covering; anonymity and circumvention, but also... - keeping your computer safe and stable - communicating privately - keeping data confidential and backed-up - mobile security - working from an internet cafe New version to be launched in September 2008
  • 4. Training - Four experts/trainers in the core project team - Network of 14 trainers During 2007 7 dedicated workshops 257 advocates trained Nearly 1500 advocates and independent journalists trained to date Trainings in... Belarus, Former Soviet Union, Uganda, Kenya, DRC, Uzbekistan, Ethiopia, Indonesia, Iran, Syria, Tunisia Thailand/Burmese, Yemen and many global events Publishing this curricula at the end of 2008
  • 5. Reaching rights advocates working on the ground: Giving them the tips, tools and tactics they need to do their work Why we train (tooklits and workshops) and some of the things we've learnt... 1. Helping advocates find solutions There is a percentage of the internet that knows about circumvention and a percentage who does not - Many HRDs don't know, don't move in those circles, but are facing the same challenges as bloggers e.g. Tunisian group hadn't been able to access their website for 5 yrs
  • 6. 2. Problems with using tools - Knowing which tools to use, where and when - Tools don't always work; important to be able to help advocates trouble shoot and show them what it looks like - Rumours; people say its broken or can be traced, people don't know if it's really safe - Censorship can be opaque or inconsistent; for example different ISPs or points of access blocked - There is safety in numbers; if your going to stick your neck out, helpful to know that others are doing it too - People don't always have contacts e.g. Psiphon, trainer can act as a point of contact, we depend on TOR as it is less dependent on social networks, but it is more complicated to use.
  • 7. 3. Helping to make the tools available and usable - localisation of tools and materials - but also working with developers giving them feedback (they listen, we hope!, because our feedback is based on use in the field, and the feedback of people who use their technology)‏
  • 8. 4. Helping advocates make their own decisions Giving advocates enough understanding so that they can decide how to use digital security for themselves – how it works, what's possible, when they should rely on it, when not, build their confidence, and help them to make their own decisions.
  • 9. 5. Content censorship – the blessing and the curse of web 2.0 The tools that are the easiest to use are the ones most likely to be blocked or content taken down. Services have been a great breakthrough, but for most of the HRD's we work with they are not a viable option. Sex Worker Health and Rights Advocates
  • 10. 6. Freedom of expression and self censorship Shouldn't forget that HRDs and advocates share information, publish and organise a lot still through non-web formats. Email and IM, increasingly by mobiles We give people alternatives like riseup.net, vaultletsoft and pidgin 7. Anonymity – hosting your own content Trying to host content anonymously is difficult and there are hidden challenges to this (e.g. – contacting the owners of the site)‏