SlideShare a Scribd company logo
 
Tactical Tech works to give rights advocates working with marginalised communities the tools and tactics they need for effective advocacy . We work with Human Rights Defenders, anti-corruption advocates and independent journalists who deal with freedom of expression issues as a means to an end  Tactical Tech's Digital Security program - Started in 2004 - In partnership with Frontline Human Rights Defenders - Focused on making Rights advocates aware of their security vulnerabilities and providing them with the skills and tools to work as safely as possible
1,554 toolkits distributed and  downloaded in 2007 (more copied)‏ 165,000 visits to the toolkit website in 2007 Toolkit  “ in-a-box”, “on-line” and “on-a-stick” - Attempt to pool expertise of leading practitioners - Peer review (language + expert teams)‏ - Available in 5 languages (French, Spanish, Arabic Russian and English) translated and localised. Covering; anonymity and circumvention, but also... - keeping your computer safe and stable - communicating privately - keeping data confidential and backed-up - mobile security - working from an internet cafe New version to be launched in September 2008
Training -  Four experts/trainers in the core project team - Network of 14 trainers  During 2007 7 dedicated workshops  257 advocates trained Nearly 1500 advocates and independent journalists trained to date Trainings in... Belarus, Former Soviet Union, Uganda, Kenya, DRC, Uzbekistan, Ethiopia, Indonesia, Iran, Syria, Tunisia Thailand/Burmese, Yemen and many global events Publishing this curricula at the end of 2008
Reaching rights advocates working on the ground:  Giving them the tips, tools and tactics they need to do their work Why we train (tooklits and workshops) and some of the things we've learnt... 1. Helping advocates find solutions There is a percentage of the internet that knows about  circumvention and a percentage who does not - Many HRDs don't know, don't move in those circles, but   are facing the same challenges as bloggers e.g. Tunisian group hadn't been able to access their website for 5 yrs
2. Problems with using tools  - Knowing which tools to use, where and when - Tools don't always work; important to be able to help advocates trouble shoot and show them what it looks like - Rumours;  people say its broken or can be traced, people don't know if it's really safe - Censorship can be opaque or inconsistent; for example different ISPs or points of access blocked - There is safety in numbers; if your going to stick your neck out, helpful to know that others are doing it too - People don't always have contacts e.g. Psiphon, trainer can act as a point of contact, we depend on TOR as it  is less dependent on social networks, but it is more complicated to use.
3. Helping to make the tools available and usable - localisation of tools and materials - but also working with developers giving them feedback (they listen, we hope!, because our feedback is based on use in the field, and the feedback of people who use their technology)‏
4. Helping advocates make their own decisions Giving advocates enough understanding so that they can decide how to use digital security for themselves – how it works, what's possible,  when they should rely on it, when not, build their confidence, and help them to make their own decisions.
5. Content censorship – the blessing and the curse of web 2.0 The tools that are the easiest to use are the ones most likely to be blocked or content taken down. Services have been a great breakthrough, but for most of the HRD's we work with they are not a viable option. Sex Worker Health and Rights Advocates
6. Freedom of expression and self censorship Shouldn't forget that HRDs and advocates share information, publish and organise a lot still through non-web formats. Email and IM, increasingly by mobiles We give people alternatives like riseup.net, vaultletsoft and pidgin 7. Anonymity – hosting your own content Trying to host content anonymously is difficult and there are hidden challenges to this  (e.g. – contacting the owners of the site)‏

More Related Content

What's hot

Reem's Investigation
Reem's InvestigationReem's Investigation
Reem's Investigation
uk01f0015
 
Nettique
NettiqueNettique
Nettique
thepaper
 
The Nine Elements
The Nine ElementsThe Nine Elements
The Nine Elements
BrodyJWU
 
Omar Todd - Cybersecurity Expert and Consultant
Omar Todd - Cybersecurity Expert and ConsultantOmar Todd - Cybersecurity Expert and Consultant
Omar Todd - Cybersecurity Expert and Consultant
Omar Todd
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
malvin050
 
Privacy in a Digital age
Privacy in a Digital agePrivacy in a Digital age
Privacy in a Digital age
Felix Garcia Lainez
 
Tech savvy seniors week 3 term 4 intro to internet
Tech savvy seniors   week 3 term 4 intro to internetTech savvy seniors   week 3 term 4 intro to internet
Tech savvy seniors week 3 term 4 intro to internet
Marni3Bridges
 

What's hot (7)

Reem's Investigation
Reem's InvestigationReem's Investigation
Reem's Investigation
 
Nettique
NettiqueNettique
Nettique
 
The Nine Elements
The Nine ElementsThe Nine Elements
The Nine Elements
 
Omar Todd - Cybersecurity Expert and Consultant
Omar Todd - Cybersecurity Expert and ConsultantOmar Todd - Cybersecurity Expert and Consultant
Omar Todd - Cybersecurity Expert and Consultant
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Privacy in a Digital age
Privacy in a Digital agePrivacy in a Digital age
Privacy in a Digital age
 
Tech savvy seniors week 3 term 4 intro to internet
Tech savvy seniors   week 3 term 4 intro to internetTech savvy seniors   week 3 term 4 intro to internet
Tech savvy seniors week 3 term 4 intro to internet
 

Viewers also liked

экопластика.Ppt 2
экопластика.Ppt 2экопластика.Ppt 2
экопластика.Ppt 2
Kokossokok
 
Changes to Fellowship Scheme Presentation – Katherine Warren
Changes to Fellowship Scheme Presentation – Katherine WarrenChanges to Fellowship Scheme Presentation – Katherine Warren
Changes to Fellowship Scheme Presentation – Katherine Warren
Arts and Humanities Research Council (AHRC)
 
C.V .
C.V .C.V .
Musings_CLSARoadshows
Musings_CLSARoadshowsMusings_CLSARoadshows
Musings_CLSARoadshows
Nelson Gaytón
 
Step21 1
Step21 1Step21 1
Step21 1
wunderwaffle
 
個資法 - 資料就是財富
個資法 - 資料就是財富個資法 - 資料就是財富
個資法 - 資料就是財富
ChrisChenTw
 
Project Management Workshop Overview
Project Management Workshop OverviewProject Management Workshop Overview
Project Management Workshop Overview
sundong
 
Let's talk about certification: SCJA
Let's talk about certification: SCJALet's talk about certification: SCJA
Let's talk about certification: SCJA
José Maria Silveira Neto
 
Introduction To Social Media
Introduction To Social MediaIntroduction To Social Media
Introduction To Social Media
krynsky
 
Microsoft Windows Intune getting started guide dec 2012 release
Microsoft Windows Intune getting started guide   dec 2012 releaseMicrosoft Windows Intune getting started guide   dec 2012 release
Microsoft Windows Intune getting started guide dec 2012 release
David J Rosenthal
 
The comparison of immunization
The comparison of immunizationThe comparison of immunization
The comparison of immunization
IJCNCJournal
 
Website design
Website designWebsite design
Website design
BreezeGo
 
VPN Security
VPN SecurityVPN Security
Purcell 2000000744
Purcell 2000000744Purcell 2000000744
Purcell 2000000744
savomir
 
Evaluation question 6
Evaluation question 6Evaluation question 6
Evaluation question 6
Boassy Benson
 
Research skills for journalists
Research skills for journalists Research skills for journalists
Research skills for journalists
oflynns
 
Шаг-Рысь-Галоп: видимое ускорение разработки
Шаг-Рысь-Галоп: видимое ускорение разработкиШаг-Рысь-Галоп: видимое ускорение разработки
Шаг-Рысь-Галоп: видимое ускорение разработки
SQALab
 
Freelance copywriter - Miriam, Haarlem
Freelance copywriter - Miriam, HaarlemFreelance copywriter - Miriam, Haarlem
Freelance copywriter - Miriam, Haarlem
Copywriter Collective
 
2 q15 investment commentary
2 q15 investment commentary2 q15 investment commentary
2 q15 investment commentary
melanig123
 

Viewers also liked (19)

экопластика.Ppt 2
экопластика.Ppt 2экопластика.Ppt 2
экопластика.Ppt 2
 
Changes to Fellowship Scheme Presentation – Katherine Warren
Changes to Fellowship Scheme Presentation – Katherine WarrenChanges to Fellowship Scheme Presentation – Katherine Warren
Changes to Fellowship Scheme Presentation – Katherine Warren
 
C.V .
C.V .C.V .
C.V .
 
Musings_CLSARoadshows
Musings_CLSARoadshowsMusings_CLSARoadshows
Musings_CLSARoadshows
 
Step21 1
Step21 1Step21 1
Step21 1
 
個資法 - 資料就是財富
個資法 - 資料就是財富個資法 - 資料就是財富
個資法 - 資料就是財富
 
Project Management Workshop Overview
Project Management Workshop OverviewProject Management Workshop Overview
Project Management Workshop Overview
 
Let's talk about certification: SCJA
Let's talk about certification: SCJALet's talk about certification: SCJA
Let's talk about certification: SCJA
 
Introduction To Social Media
Introduction To Social MediaIntroduction To Social Media
Introduction To Social Media
 
Microsoft Windows Intune getting started guide dec 2012 release
Microsoft Windows Intune getting started guide   dec 2012 releaseMicrosoft Windows Intune getting started guide   dec 2012 release
Microsoft Windows Intune getting started guide dec 2012 release
 
The comparison of immunization
The comparison of immunizationThe comparison of immunization
The comparison of immunization
 
Website design
Website designWebsite design
Website design
 
VPN Security
VPN SecurityVPN Security
VPN Security
 
Purcell 2000000744
Purcell 2000000744Purcell 2000000744
Purcell 2000000744
 
Evaluation question 6
Evaluation question 6Evaluation question 6
Evaluation question 6
 
Research skills for journalists
Research skills for journalists Research skills for journalists
Research skills for journalists
 
Шаг-Рысь-Галоп: видимое ускорение разработки
Шаг-Рысь-Галоп: видимое ускорение разработкиШаг-Рысь-Галоп: видимое ускорение разработки
Шаг-Рысь-Галоп: видимое ускорение разработки
 
Freelance copywriter - Miriam, Haarlem
Freelance copywriter - Miriam, HaarlemFreelance copywriter - Miriam, Haarlem
Freelance copywriter - Miriam, Haarlem
 
2 q15 investment commentary
2 q15 investment commentary2 q15 investment commentary
2 q15 investment commentary
 

Similar to Stephanie Hankey talks about Tactical Technology Collective

Knowledge management for professionals
Knowledge management for professionalsKnowledge management for professionals
Knowledge management for professionals
Esteban Romero Frías
 
ICT.pptx
ICT.pptxICT.pptx
Privacy, Encryption, and Anonymity in the Civil Legal Aid Context
Privacy, Encryption, and Anonymity in the Civil Legal Aid ContextPrivacy, Encryption, and Anonymity in the Civil Legal Aid Context
Privacy, Encryption, and Anonymity in the Civil Legal Aid Context
Legal Services National Technology Assistance Project (LSNTAP)
 
Module 11- Promotion of safe use of Internet.pptx
Module 11- Promotion of safe use of Internet.pptxModule 11- Promotion of safe use of Internet.pptx
Module 11- Promotion of safe use of Internet.pptx
ShashankPrabalclass1
 
Report on cyber security fishbowl by shreedeep rayamajhi
Report on cyber security fishbowl by shreedeep rayamajhiReport on cyber security fishbowl by shreedeep rayamajhi
Report on cyber security fishbowl by shreedeep rayamajhi
Shreedeep Rayamajhi
 
Facilitating knowledge-exchange: providing the right format, incentives, faci...
Facilitating knowledge-exchange: providing the right format, incentives, faci...Facilitating knowledge-exchange: providing the right format, incentives, faci...
Facilitating knowledge-exchange: providing the right format, incentives, faci...
kjantin
 
Empowerment technologies
Empowerment technologiesEmpowerment technologies
Empowerment technologies
Rufa Laguit
 
Open Cambodia 2014 Invite
Open Cambodia 2014 InviteOpen Cambodia 2014 Invite
Open Cambodia 2014 Invite
John Weeks
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
egschool
 
Devon County Council - Risk assessment for social media
Devon County Council - Risk assessment for social mediaDevon County Council - Risk assessment for social media
Devon County Council - Risk assessment for social media
Carl Haggerty
 
Reading 2
Reading 2Reading 2
Reading 2
Mary_Younginer
 
DigComp - Konferens om skolans digitalisering, 8 sep, Stockholm
DigComp - Konferens om skolans digitalisering, 8 sep, StockholmDigComp - Konferens om skolans digitalisering, 8 sep, Stockholm
DigComp - Konferens om skolans digitalisering, 8 sep, Stockholm
Riina Vuorikari
 
Youth Privacy
Youth PrivacyYouth Privacy
Youth Privacy
CTIC Technology Centre
 
Fostering an Ecosystem for Smartphone Privacy
Fostering an Ecosystem for Smartphone PrivacyFostering an Ecosystem for Smartphone Privacy
Fostering an Ecosystem for Smartphone Privacy
Jason Hong
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
Mukesh Tekwani
 
Personally Identifiable Information
Personally Identifiable InformationPersonally Identifiable Information
Personally Identifiable Information
Toya Shamberger
 
Sup de Co Rennes - planning 2014-2015
Sup de Co Rennes - planning 2014-2015Sup de Co Rennes - planning 2014-2015
Sup de Co Rennes - planning 2014-2015
Prof. Jacques Folon (Ph.D)
 
Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011
Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011
Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011
Jason Hong
 
Need for Data Protection Training - How E-learning Can Help?
Need for Data Protection Training - How E-learning Can Help?Need for Data Protection Training - How E-learning Can Help?
Need for Data Protection Training - How E-learning Can Help?
CommLab India – Rapid eLearning Solutions
 
Uses of internet
Uses of internetUses of internet
Uses of internet
sheenam65
 

Similar to Stephanie Hankey talks about Tactical Technology Collective (20)

Knowledge management for professionals
Knowledge management for professionalsKnowledge management for professionals
Knowledge management for professionals
 
ICT.pptx
ICT.pptxICT.pptx
ICT.pptx
 
Privacy, Encryption, and Anonymity in the Civil Legal Aid Context
Privacy, Encryption, and Anonymity in the Civil Legal Aid ContextPrivacy, Encryption, and Anonymity in the Civil Legal Aid Context
Privacy, Encryption, and Anonymity in the Civil Legal Aid Context
 
Module 11- Promotion of safe use of Internet.pptx
Module 11- Promotion of safe use of Internet.pptxModule 11- Promotion of safe use of Internet.pptx
Module 11- Promotion of safe use of Internet.pptx
 
Report on cyber security fishbowl by shreedeep rayamajhi
Report on cyber security fishbowl by shreedeep rayamajhiReport on cyber security fishbowl by shreedeep rayamajhi
Report on cyber security fishbowl by shreedeep rayamajhi
 
Facilitating knowledge-exchange: providing the right format, incentives, faci...
Facilitating knowledge-exchange: providing the right format, incentives, faci...Facilitating knowledge-exchange: providing the right format, incentives, faci...
Facilitating knowledge-exchange: providing the right format, incentives, faci...
 
Empowerment technologies
Empowerment technologiesEmpowerment technologies
Empowerment technologies
 
Open Cambodia 2014 Invite
Open Cambodia 2014 InviteOpen Cambodia 2014 Invite
Open Cambodia 2014 Invite
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Devon County Council - Risk assessment for social media
Devon County Council - Risk assessment for social mediaDevon County Council - Risk assessment for social media
Devon County Council - Risk assessment for social media
 
Reading 2
Reading 2Reading 2
Reading 2
 
DigComp - Konferens om skolans digitalisering, 8 sep, Stockholm
DigComp - Konferens om skolans digitalisering, 8 sep, StockholmDigComp - Konferens om skolans digitalisering, 8 sep, Stockholm
DigComp - Konferens om skolans digitalisering, 8 sep, Stockholm
 
Youth Privacy
Youth PrivacyYouth Privacy
Youth Privacy
 
Fostering an Ecosystem for Smartphone Privacy
Fostering an Ecosystem for Smartphone PrivacyFostering an Ecosystem for Smartphone Privacy
Fostering an Ecosystem for Smartphone Privacy
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Personally Identifiable Information
Personally Identifiable InformationPersonally Identifiable Information
Personally Identifiable Information
 
Sup de Co Rennes - planning 2014-2015
Sup de Co Rennes - planning 2014-2015Sup de Co Rennes - planning 2014-2015
Sup de Co Rennes - planning 2014-2015
 
Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011
Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011
Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011
 
Need for Data Protection Training - How E-learning Can Help?
Need for Data Protection Training - How E-learning Can Help?Need for Data Protection Training - How E-learning Can Help?
Need for Data Protection Training - How E-learning Can Help?
 
Uses of internet
Uses of internetUses of internet
Uses of internet
 

More from Global Voices

do censorship & repression kill content online?
do censorship & repression kill content online?do censorship & repression kill content online?
do censorship & repression kill content online?
Global Voices
 
Digital activism & online free speech
Digital activism & online free speechDigital activism & online free speech
Digital activism & online free speech
Global Voices
 
Live Broadcasting Center, Bahrain Experience, by Hussain Yousif
Live Broadcasting Center, Bahrain Experience, by Hussain YousifLive Broadcasting Center, Bahrain Experience, by Hussain Yousif
Live Broadcasting Center, Bahrain Experience, by Hussain Yousif
Global Voices
 
Yemen Portal Presentation
Yemen Portal PresentationYemen Portal Presentation
Yemen Portal Presentation
Global Voices
 

بروز الصحافة المواطِنة في المغرب

بروز الصحافة المواطِنة في المغرب
بروز الصحافة المواطِنة في المغرب

بروز الصحافة المواطِنة في المغرب
Global Voices
 
FOSS: Technologies Communities And Society
FOSS: Technologies Communities And SocietyFOSS: Technologies Communities And Society
FOSS: Technologies Communities And Society
Global Voices
 
Meedan Presentation, by Anas Tawileh
Meedan Presentation, by Anas TawilehMeedan Presentation, by Anas Tawileh
Meedan Presentation, by Anas Tawileh
Global Voices
 
Live Broadcasting
Live  BroadcastingLive  Broadcasting
Live Broadcasting
Global Voices
 
A game of cat and mouse
A game of cat and mouseA game of cat and mouse
A game of cat and mouse
Global Voices
 
Belarusian Internet filtering
Belarusian Internet filteringBelarusian Internet filtering
Belarusian Internet filtering
Global Voices
 
Filteringfinal
FilteringfinalFilteringfinal
Filteringfinal
Global Voices
 
Living with censorship
Living with censorshipLiving with censorship
Living with censorship
Global Voices
 
Self Censorship in media Role of citizen journalists
Self Censorship in media  Role of citizen journalistsSelf Censorship in media  Role of citizen journalists
Self Censorship in media Role of citizen journalists
Global Voices
 
Formation of a post-colonial censorship regime
Formation of a  post-colonial censorship regimeFormation of a  post-colonial censorship regime
Formation of a post-colonial censorship regime
Global Voices
 
Exposing Corruption on YouTube “Targuist Sniper”
Exposing Corruption on YouTube “Targuist Sniper”Exposing Corruption on YouTube “Targuist Sniper”
Exposing Corruption on YouTube “Targuist Sniper”
Global Voices
 
Filtering final
Filtering finalFiltering final
Filtering final
Global Voices
 
Bloguer Anonymement
Bloguer AnonymementBloguer Anonymement
Bloguer Anonymement
Global Voices
 

More from Global Voices (17)

do censorship & repression kill content online?
do censorship & repression kill content online?do censorship & repression kill content online?
do censorship & repression kill content online?
 
Digital activism & online free speech
Digital activism & online free speechDigital activism & online free speech
Digital activism & online free speech
 
Live Broadcasting Center, Bahrain Experience, by Hussain Yousif
Live Broadcasting Center, Bahrain Experience, by Hussain YousifLive Broadcasting Center, Bahrain Experience, by Hussain Yousif
Live Broadcasting Center, Bahrain Experience, by Hussain Yousif
 
Yemen Portal Presentation
Yemen Portal PresentationYemen Portal Presentation
Yemen Portal Presentation
 

بروز الصحافة المواطِنة في المغرب

بروز الصحافة المواطِنة في المغرب
بروز الصحافة المواطِنة في المغرب

بروز الصحافة المواطِنة في المغرب
 
FOSS: Technologies Communities And Society
FOSS: Technologies Communities And SocietyFOSS: Technologies Communities And Society
FOSS: Technologies Communities And Society
 
Meedan Presentation, by Anas Tawileh
Meedan Presentation, by Anas TawilehMeedan Presentation, by Anas Tawileh
Meedan Presentation, by Anas Tawileh
 
Live Broadcasting
Live  BroadcastingLive  Broadcasting
Live Broadcasting
 
A game of cat and mouse
A game of cat and mouseA game of cat and mouse
A game of cat and mouse
 
Belarusian Internet filtering
Belarusian Internet filteringBelarusian Internet filtering
Belarusian Internet filtering
 
Filteringfinal
FilteringfinalFilteringfinal
Filteringfinal
 
Living with censorship
Living with censorshipLiving with censorship
Living with censorship
 
Self Censorship in media Role of citizen journalists
Self Censorship in media  Role of citizen journalistsSelf Censorship in media  Role of citizen journalists
Self Censorship in media Role of citizen journalists
 
Formation of a post-colonial censorship regime
Formation of a  post-colonial censorship regimeFormation of a  post-colonial censorship regime
Formation of a post-colonial censorship regime
 
Exposing Corruption on YouTube “Targuist Sniper”
Exposing Corruption on YouTube “Targuist Sniper”Exposing Corruption on YouTube “Targuist Sniper”
Exposing Corruption on YouTube “Targuist Sniper”
 
Filtering final
Filtering finalFiltering final
Filtering final
 
Bloguer Anonymement
Bloguer AnonymementBloguer Anonymement
Bloguer Anonymement
 

Recently uploaded

find out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challengesfind out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challenges
huseindihon
 
BEGINNER’S GUIDE TO AI AGENTS (1).pptx...
BEGINNER’S GUIDE TO AI AGENTS (1).pptx...BEGINNER’S GUIDE TO AI AGENTS (1).pptx...
BEGINNER’S GUIDE TO AI AGENTS (1).pptx...
WriteMe
 
Recent Advancements in the NIST-JARVIS Infrastructure
Recent Advancements in the NIST-JARVIS InfrastructureRecent Advancements in the NIST-JARVIS Infrastructure
Recent Advancements in the NIST-JARVIS Infrastructure
KAMAL CHOUDHARY
 
DealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 editionDealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 edition
Yevgen Sysoyev
 
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALLBLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
Liveplex
 
IPLOOK Remote-Sensing Satellite Solution
IPLOOK Remote-Sensing Satellite SolutionIPLOOK Remote-Sensing Satellite Solution
IPLOOK Remote-Sensing Satellite Solution
IPLOOK Networks
 
Evolution of iPaaS - simplify IT workloads to provide a unified view of data...
Evolution of iPaaS - simplify IT workloads to provide a unified view of  data...Evolution of iPaaS - simplify IT workloads to provide a unified view of  data...
Evolution of iPaaS - simplify IT workloads to provide a unified view of data...
Torry Harris
 
7 Most Powerful Solar Storms in the History of Earth.pdf
7 Most Powerful Solar Storms in the History of Earth.pdf7 Most Powerful Solar Storms in the History of Earth.pdf
7 Most Powerful Solar Storms in the History of Earth.pdf
Enterprise Wired
 
Choose our Linux Web Hosting for a seamless and successful online presence
Choose our Linux Web Hosting for a seamless and successful online presenceChoose our Linux Web Hosting for a seamless and successful online presence
Choose our Linux Web Hosting for a seamless and successful online presence
rajancomputerfbd
 
How RPA Help in the Transportation and Logistics Industry.pptx
How RPA Help in the Transportation and Logistics Industry.pptxHow RPA Help in the Transportation and Logistics Industry.pptx
How RPA Help in the Transportation and Logistics Industry.pptx
SynapseIndia
 
Applying Retrieval-Augmented Generation (RAG) to Combat Hallucinations in GenAI
Applying Retrieval-Augmented Generation (RAG) to Combat Hallucinations in GenAIApplying Retrieval-Augmented Generation (RAG) to Combat Hallucinations in GenAI
Applying Retrieval-Augmented Generation (RAG) to Combat Hallucinations in GenAI
ssuserd4e0d2
 
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdfWhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
ArgaBisma
 
Amul milk launches in US: Key details of its new products ...
Amul milk launches in US: Key details of its new products ...Amul milk launches in US: Key details of its new products ...
Amul milk launches in US: Key details of its new products ...
chetankumar9855
 
WPRiders Company Presentation Slide Deck
WPRiders Company Presentation Slide DeckWPRiders Company Presentation Slide Deck
WPRiders Company Presentation Slide Deck
Lidia A.
 
Three New Criminal Laws in India 1 July 2024
Three New Criminal Laws in India 1 July 2024Three New Criminal Laws in India 1 July 2024
Three New Criminal Laws in India 1 July 2024
aakash malhotra
 
Advanced Techniques for Cyber Security Analysis and Anomaly Detection
Advanced Techniques for Cyber Security Analysis and Anomaly DetectionAdvanced Techniques for Cyber Security Analysis and Anomaly Detection
Advanced Techniques for Cyber Security Analysis and Anomaly Detection
Bert Blevins
 
The Role of Technology in Payroll Statutory Compliance (1).pdf
The Role of Technology in Payroll Statutory Compliance (1).pdfThe Role of Technology in Payroll Statutory Compliance (1).pdf
The Role of Technology in Payroll Statutory Compliance (1).pdf
paysquare consultancy
 
Empowering Businesses in the Digital Age
Empowering Businesses in the Digital AgeEmpowering Businesses in the Digital Age
Empowering Businesses in the Digital Age
Bert Blevins
 
ScrumGathering New Orleans 2024 Catherine Louis.pdf
ScrumGathering New Orleans 2024  Catherine Louis.pdfScrumGathering New Orleans 2024  Catherine Louis.pdf
ScrumGathering New Orleans 2024 Catherine Louis.pdf
Global Agile Consulting- CLL-Group, LLC
 
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-InTrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc
 

Recently uploaded (20)

find out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challengesfind out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challenges
 
BEGINNER’S GUIDE TO AI AGENTS (1).pptx...
BEGINNER’S GUIDE TO AI AGENTS (1).pptx...BEGINNER’S GUIDE TO AI AGENTS (1).pptx...
BEGINNER’S GUIDE TO AI AGENTS (1).pptx...
 
Recent Advancements in the NIST-JARVIS Infrastructure
Recent Advancements in the NIST-JARVIS InfrastructureRecent Advancements in the NIST-JARVIS Infrastructure
Recent Advancements in the NIST-JARVIS Infrastructure
 
DealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 editionDealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 edition
 
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALLBLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
 
IPLOOK Remote-Sensing Satellite Solution
IPLOOK Remote-Sensing Satellite SolutionIPLOOK Remote-Sensing Satellite Solution
IPLOOK Remote-Sensing Satellite Solution
 
Evolution of iPaaS - simplify IT workloads to provide a unified view of data...
Evolution of iPaaS - simplify IT workloads to provide a unified view of  data...Evolution of iPaaS - simplify IT workloads to provide a unified view of  data...
Evolution of iPaaS - simplify IT workloads to provide a unified view of data...
 
7 Most Powerful Solar Storms in the History of Earth.pdf
7 Most Powerful Solar Storms in the History of Earth.pdf7 Most Powerful Solar Storms in the History of Earth.pdf
7 Most Powerful Solar Storms in the History of Earth.pdf
 
Choose our Linux Web Hosting for a seamless and successful online presence
Choose our Linux Web Hosting for a seamless and successful online presenceChoose our Linux Web Hosting for a seamless and successful online presence
Choose our Linux Web Hosting for a seamless and successful online presence
 
How RPA Help in the Transportation and Logistics Industry.pptx
How RPA Help in the Transportation and Logistics Industry.pptxHow RPA Help in the Transportation and Logistics Industry.pptx
How RPA Help in the Transportation and Logistics Industry.pptx
 
Applying Retrieval-Augmented Generation (RAG) to Combat Hallucinations in GenAI
Applying Retrieval-Augmented Generation (RAG) to Combat Hallucinations in GenAIApplying Retrieval-Augmented Generation (RAG) to Combat Hallucinations in GenAI
Applying Retrieval-Augmented Generation (RAG) to Combat Hallucinations in GenAI
 
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdfWhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
 
Amul milk launches in US: Key details of its new products ...
Amul milk launches in US: Key details of its new products ...Amul milk launches in US: Key details of its new products ...
Amul milk launches in US: Key details of its new products ...
 
WPRiders Company Presentation Slide Deck
WPRiders Company Presentation Slide DeckWPRiders Company Presentation Slide Deck
WPRiders Company Presentation Slide Deck
 
Three New Criminal Laws in India 1 July 2024
Three New Criminal Laws in India 1 July 2024Three New Criminal Laws in India 1 July 2024
Three New Criminal Laws in India 1 July 2024
 
Advanced Techniques for Cyber Security Analysis and Anomaly Detection
Advanced Techniques for Cyber Security Analysis and Anomaly DetectionAdvanced Techniques for Cyber Security Analysis and Anomaly Detection
Advanced Techniques for Cyber Security Analysis and Anomaly Detection
 
The Role of Technology in Payroll Statutory Compliance (1).pdf
The Role of Technology in Payroll Statutory Compliance (1).pdfThe Role of Technology in Payroll Statutory Compliance (1).pdf
The Role of Technology in Payroll Statutory Compliance (1).pdf
 
Empowering Businesses in the Digital Age
Empowering Businesses in the Digital AgeEmpowering Businesses in the Digital Age
Empowering Businesses in the Digital Age
 
ScrumGathering New Orleans 2024 Catherine Louis.pdf
ScrumGathering New Orleans 2024  Catherine Louis.pdfScrumGathering New Orleans 2024  Catherine Louis.pdf
ScrumGathering New Orleans 2024 Catherine Louis.pdf
 
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-InTrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
 

Stephanie Hankey talks about Tactical Technology Collective

  • 1.  
  • 2. Tactical Tech works to give rights advocates working with marginalised communities the tools and tactics they need for effective advocacy . We work with Human Rights Defenders, anti-corruption advocates and independent journalists who deal with freedom of expression issues as a means to an end Tactical Tech's Digital Security program - Started in 2004 - In partnership with Frontline Human Rights Defenders - Focused on making Rights advocates aware of their security vulnerabilities and providing them with the skills and tools to work as safely as possible
  • 3. 1,554 toolkits distributed and downloaded in 2007 (more copied)‏ 165,000 visits to the toolkit website in 2007 Toolkit “ in-a-box”, “on-line” and “on-a-stick” - Attempt to pool expertise of leading practitioners - Peer review (language + expert teams)‏ - Available in 5 languages (French, Spanish, Arabic Russian and English) translated and localised. Covering; anonymity and circumvention, but also... - keeping your computer safe and stable - communicating privately - keeping data confidential and backed-up - mobile security - working from an internet cafe New version to be launched in September 2008
  • 4. Training - Four experts/trainers in the core project team - Network of 14 trainers During 2007 7 dedicated workshops 257 advocates trained Nearly 1500 advocates and independent journalists trained to date Trainings in... Belarus, Former Soviet Union, Uganda, Kenya, DRC, Uzbekistan, Ethiopia, Indonesia, Iran, Syria, Tunisia Thailand/Burmese, Yemen and many global events Publishing this curricula at the end of 2008
  • 5. Reaching rights advocates working on the ground: Giving them the tips, tools and tactics they need to do their work Why we train (tooklits and workshops) and some of the things we've learnt... 1. Helping advocates find solutions There is a percentage of the internet that knows about circumvention and a percentage who does not - Many HRDs don't know, don't move in those circles, but are facing the same challenges as bloggers e.g. Tunisian group hadn't been able to access their website for 5 yrs
  • 6. 2. Problems with using tools - Knowing which tools to use, where and when - Tools don't always work; important to be able to help advocates trouble shoot and show them what it looks like - Rumours; people say its broken or can be traced, people don't know if it's really safe - Censorship can be opaque or inconsistent; for example different ISPs or points of access blocked - There is safety in numbers; if your going to stick your neck out, helpful to know that others are doing it too - People don't always have contacts e.g. Psiphon, trainer can act as a point of contact, we depend on TOR as it is less dependent on social networks, but it is more complicated to use.
  • 7. 3. Helping to make the tools available and usable - localisation of tools and materials - but also working with developers giving them feedback (they listen, we hope!, because our feedback is based on use in the field, and the feedback of people who use their technology)‏
  • 8. 4. Helping advocates make their own decisions Giving advocates enough understanding so that they can decide how to use digital security for themselves – how it works, what's possible, when they should rely on it, when not, build their confidence, and help them to make their own decisions.
  • 9. 5. Content censorship – the blessing and the curse of web 2.0 The tools that are the easiest to use are the ones most likely to be blocked or content taken down. Services have been a great breakthrough, but for most of the HRD's we work with they are not a viable option. Sex Worker Health and Rights Advocates
  • 10. 6. Freedom of expression and self censorship Shouldn't forget that HRDs and advocates share information, publish and organise a lot still through non-web formats. Email and IM, increasingly by mobiles We give people alternatives like riseup.net, vaultletsoft and pidgin 7. Anonymity – hosting your own content Trying to host content anonymously is difficult and there are hidden challenges to this (e.g. – contacting the owners of the site)‏