SlideShare a Scribd company logo
1 of 10
 
Tactical Tech works to give rights advocates working with marginalised communities the tools and tactics they need for effective advocacy . We work with Human Rights Defenders, anti-corruption advocates and independent journalists who deal with freedom of expression issues as a means to an end  Tactical Tech's Digital Security program - Started in 2004 - In partnership with Frontline Human Rights Defenders - Focused on making Rights advocates aware of their security vulnerabilities and providing them with the skills and tools to work as safely as possible
1,554 toolkits distributed and  downloaded in 2007 (more copied)‏ 165,000 visits to the toolkit website in 2007 Toolkit  “ in-a-box”, “on-line” and “on-a-stick” - Attempt to pool expertise of leading practitioners - Peer review (language + expert teams)‏ - Available in 5 languages (French, Spanish, Arabic Russian and English) translated and localised. Covering; anonymity and circumvention, but also... - keeping your computer safe and stable - communicating privately - keeping data confidential and backed-up - mobile security - working from an internet cafe New version to be launched in September 2008
Training -  Four experts/trainers in the core project team - Network of 14 trainers  During 2007 7 dedicated workshops  257 advocates trained Nearly 1500 advocates and independent journalists trained to date Trainings in... Belarus, Former Soviet Union, Uganda, Kenya, DRC, Uzbekistan, Ethiopia, Indonesia, Iran, Syria, Tunisia Thailand/Burmese, Yemen and many global events Publishing this curricula at the end of 2008
Reaching rights advocates working on the ground:  Giving them the tips, tools and tactics they need to do their work Why we train (tooklits and workshops) and some of the things we've learnt... 1. Helping advocates find solutions There is a percentage of the internet that knows about  circumvention and a percentage who does not - Many HRDs don't know, don't move in those circles, but   are facing the same challenges as bloggers e.g. Tunisian group hadn't been able to access their website for 5 yrs
2. Problems with using tools  - Knowing which tools to use, where and when - Tools don't always work; important to be able to help advocates trouble shoot and show them what it looks like - Rumours;  people say its broken or can be traced, people don't know if it's really safe - Censorship can be opaque or inconsistent; for example different ISPs or points of access blocked - There is safety in numbers; if your going to stick your neck out, helpful to know that others are doing it too - People don't always have contacts e.g. Psiphon, trainer can act as a point of contact, we depend on TOR as it  is less dependent on social networks, but it is more complicated to use.
3. Helping to make the tools available and usable - localisation of tools and materials - but also working with developers giving them feedback (they listen, we hope!, because our feedback is based on use in the field, and the feedback of people who use their technology)‏
4. Helping advocates make their own decisions Giving advocates enough understanding so that they can decide how to use digital security for themselves – how it works, what's possible,  when they should rely on it, when not, build their confidence, and help them to make their own decisions.
5. Content censorship – the blessing and the curse of web 2.0 The tools that are the easiest to use are the ones most likely to be blocked or content taken down. Services have been a great breakthrough, but for most of the HRD's we work with they are not a viable option. Sex Worker Health and Rights Advocates
6. Freedom of expression and self censorship Shouldn't forget that HRDs and advocates share information, publish and organise a lot still through non-web formats. Email and IM, increasingly by mobiles We give people alternatives like riseup.net, vaultletsoft and pidgin 7. Anonymity – hosting your own content Trying to host content anonymously is difficult and there are hidden challenges to this  (e.g. – contacting the owners of the site)‏

More Related Content

What's hot (7)

Reem's Investigation
Reem's InvestigationReem's Investigation
Reem's Investigation
 
Nettique
NettiqueNettique
Nettique
 
The Nine Elements
The Nine ElementsThe Nine Elements
The Nine Elements
 
Omar Todd - Cybersecurity Expert and Consultant
Omar Todd - Cybersecurity Expert and ConsultantOmar Todd - Cybersecurity Expert and Consultant
Omar Todd - Cybersecurity Expert and Consultant
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Privacy in a Digital age
Privacy in a Digital agePrivacy in a Digital age
Privacy in a Digital age
 
Tech savvy seniors week 3 term 4 intro to internet
Tech savvy seniors   week 3 term 4 intro to internetTech savvy seniors   week 3 term 4 intro to internet
Tech savvy seniors week 3 term 4 intro to internet
 

Viewers also liked

Project Management Workshop Overview
Project Management Workshop OverviewProject Management Workshop Overview
Project Management Workshop Overview
sundong
 
Evaluation question 6
Evaluation question 6Evaluation question 6
Evaluation question 6
Boassy Benson
 

Viewers also liked (19)

экопластика.Ppt 2
экопластика.Ppt 2экопластика.Ppt 2
экопластика.Ppt 2
 
Changes to Fellowship Scheme Presentation – Katherine Warren
Changes to Fellowship Scheme Presentation – Katherine WarrenChanges to Fellowship Scheme Presentation – Katherine Warren
Changes to Fellowship Scheme Presentation – Katherine Warren
 
C.V .
C.V .C.V .
C.V .
 
Musings_CLSARoadshows
Musings_CLSARoadshowsMusings_CLSARoadshows
Musings_CLSARoadshows
 
Step21 1
Step21 1Step21 1
Step21 1
 
個資法 - 資料就是財富
個資法 - 資料就是財富個資法 - 資料就是財富
個資法 - 資料就是財富
 
Project Management Workshop Overview
Project Management Workshop OverviewProject Management Workshop Overview
Project Management Workshop Overview
 
Let's talk about certification: SCJA
Let's talk about certification: SCJALet's talk about certification: SCJA
Let's talk about certification: SCJA
 
Introduction To Social Media
Introduction To Social MediaIntroduction To Social Media
Introduction To Social Media
 
Microsoft Windows Intune getting started guide dec 2012 release
Microsoft Windows Intune getting started guide   dec 2012 releaseMicrosoft Windows Intune getting started guide   dec 2012 release
Microsoft Windows Intune getting started guide dec 2012 release
 
The comparison of immunization
The comparison of immunizationThe comparison of immunization
The comparison of immunization
 
Website design
Website designWebsite design
Website design
 
VPN Security
VPN SecurityVPN Security
VPN Security
 
Purcell 2000000744
Purcell 2000000744Purcell 2000000744
Purcell 2000000744
 
Evaluation question 6
Evaluation question 6Evaluation question 6
Evaluation question 6
 
Research skills for journalists
Research skills for journalists Research skills for journalists
Research skills for journalists
 
Шаг-Рысь-Галоп: видимое ускорение разработки
Шаг-Рысь-Галоп: видимое ускорение разработкиШаг-Рысь-Галоп: видимое ускорение разработки
Шаг-Рысь-Галоп: видимое ускорение разработки
 
Freelance copywriter - Miriam, Haarlem
Freelance copywriter - Miriam, HaarlemFreelance copywriter - Miriam, Haarlem
Freelance copywriter - Miriam, Haarlem
 
2 q15 investment commentary
2 q15 investment commentary2 q15 investment commentary
2 q15 investment commentary
 

Similar to Stephanie Hankey talks about Tactical Technology Collective

Open Cambodia 2014 Invite
Open Cambodia 2014 InviteOpen Cambodia 2014 Invite
Open Cambodia 2014 Invite
John Weeks
 
Uses of internet
Uses of internetUses of internet
Uses of internet
sheenam65
 

Similar to Stephanie Hankey talks about Tactical Technology Collective (20)

Knowledge management for professionals
Knowledge management for professionalsKnowledge management for professionals
Knowledge management for professionals
 
ICT.pptx
ICT.pptxICT.pptx
ICT.pptx
 
Privacy, Encryption, and Anonymity in the Civil Legal Aid Context
Privacy, Encryption, and Anonymity in the Civil Legal Aid ContextPrivacy, Encryption, and Anonymity in the Civil Legal Aid Context
Privacy, Encryption, and Anonymity in the Civil Legal Aid Context
 
Module 11- Promotion of safe use of Internet.pptx
Module 11- Promotion of safe use of Internet.pptxModule 11- Promotion of safe use of Internet.pptx
Module 11- Promotion of safe use of Internet.pptx
 
Report on cyber security fishbowl by shreedeep rayamajhi
Report on cyber security fishbowl by shreedeep rayamajhiReport on cyber security fishbowl by shreedeep rayamajhi
Report on cyber security fishbowl by shreedeep rayamajhi
 
Facilitating knowledge-exchange: providing the right format, incentives, faci...
Facilitating knowledge-exchange: providing the right format, incentives, faci...Facilitating knowledge-exchange: providing the right format, incentives, faci...
Facilitating knowledge-exchange: providing the right format, incentives, faci...
 
Empowerment technologies
Empowerment technologiesEmpowerment technologies
Empowerment technologies
 
Open Cambodia 2014 Invite
Open Cambodia 2014 InviteOpen Cambodia 2014 Invite
Open Cambodia 2014 Invite
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Devon County Council - Risk assessment for social media
Devon County Council - Risk assessment for social mediaDevon County Council - Risk assessment for social media
Devon County Council - Risk assessment for social media
 
Reading 2
Reading 2Reading 2
Reading 2
 
DigComp - Konferens om skolans digitalisering, 8 sep, Stockholm
DigComp - Konferens om skolans digitalisering, 8 sep, StockholmDigComp - Konferens om skolans digitalisering, 8 sep, Stockholm
DigComp - Konferens om skolans digitalisering, 8 sep, Stockholm
 
Youth Privacy
Youth PrivacyYouth Privacy
Youth Privacy
 
Fostering an Ecosystem for Smartphone Privacy
Fostering an Ecosystem for Smartphone PrivacyFostering an Ecosystem for Smartphone Privacy
Fostering an Ecosystem for Smartphone Privacy
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Personally Identifiable Information
Personally Identifiable InformationPersonally Identifiable Information
Personally Identifiable Information
 
Sup de Co Rennes - planning 2014-2015
Sup de Co Rennes - planning 2014-2015Sup de Co Rennes - planning 2014-2015
Sup de Co Rennes - planning 2014-2015
 
Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011
Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011
Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011
 
Need for Data Protection Training - How E-learning Can Help?
Need for Data Protection Training - How E-learning Can Help?Need for Data Protection Training - How E-learning Can Help?
Need for Data Protection Training - How E-learning Can Help?
 
Uses of internet
Uses of internetUses of internet
Uses of internet
 

More from Global Voices

Live Broadcasting Center, Bahrain Experience, by Hussain Yousif
Live Broadcasting Center, Bahrain Experience, by Hussain YousifLive Broadcasting Center, Bahrain Experience, by Hussain Yousif
Live Broadcasting Center, Bahrain Experience, by Hussain Yousif
Global Voices
 

More from Global Voices (17)

do censorship & repression kill content online?
do censorship & repression kill content online?do censorship & repression kill content online?
do censorship & repression kill content online?
 
Digital activism & online free speech
Digital activism & online free speechDigital activism & online free speech
Digital activism & online free speech
 
Live Broadcasting Center, Bahrain Experience, by Hussain Yousif
Live Broadcasting Center, Bahrain Experience, by Hussain YousifLive Broadcasting Center, Bahrain Experience, by Hussain Yousif
Live Broadcasting Center, Bahrain Experience, by Hussain Yousif
 
Yemen Portal Presentation
Yemen Portal PresentationYemen Portal Presentation
Yemen Portal Presentation
 

بروز الصحافة المواطِنة في المغرب

بروز الصحافة المواطِنة في المغرب
بروز الصحافة المواطِنة في المغرب

بروز الصحافة المواطِنة في المغرب
 
FOSS: Technologies Communities And Society
FOSS: Technologies Communities And SocietyFOSS: Technologies Communities And Society
FOSS: Technologies Communities And Society
 
Meedan Presentation, by Anas Tawileh
Meedan Presentation, by Anas TawilehMeedan Presentation, by Anas Tawileh
Meedan Presentation, by Anas Tawileh
 
Live Broadcasting
Live  BroadcastingLive  Broadcasting
Live Broadcasting
 
A game of cat and mouse
A game of cat and mouseA game of cat and mouse
A game of cat and mouse
 
Belarusian Internet filtering
Belarusian Internet filteringBelarusian Internet filtering
Belarusian Internet filtering
 
Filteringfinal
FilteringfinalFilteringfinal
Filteringfinal
 
Living with censorship
Living with censorshipLiving with censorship
Living with censorship
 
Self Censorship in media Role of citizen journalists
Self Censorship in media  Role of citizen journalistsSelf Censorship in media  Role of citizen journalists
Self Censorship in media Role of citizen journalists
 
Formation of a post-colonial censorship regime
Formation of a  post-colonial censorship regimeFormation of a  post-colonial censorship regime
Formation of a post-colonial censorship regime
 
Exposing Corruption on YouTube “Targuist Sniper”
Exposing Corruption on YouTube “Targuist Sniper”Exposing Corruption on YouTube “Targuist Sniper”
Exposing Corruption on YouTube “Targuist Sniper”
 
Filtering final
Filtering finalFiltering final
Filtering final
 
Bloguer Anonymement
Bloguer AnonymementBloguer Anonymement
Bloguer Anonymement
 

Recently uploaded

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 

Stephanie Hankey talks about Tactical Technology Collective

  • 1.  
  • 2. Tactical Tech works to give rights advocates working with marginalised communities the tools and tactics they need for effective advocacy . We work with Human Rights Defenders, anti-corruption advocates and independent journalists who deal with freedom of expression issues as a means to an end Tactical Tech's Digital Security program - Started in 2004 - In partnership with Frontline Human Rights Defenders - Focused on making Rights advocates aware of their security vulnerabilities and providing them with the skills and tools to work as safely as possible
  • 3. 1,554 toolkits distributed and downloaded in 2007 (more copied)‏ 165,000 visits to the toolkit website in 2007 Toolkit “ in-a-box”, “on-line” and “on-a-stick” - Attempt to pool expertise of leading practitioners - Peer review (language + expert teams)‏ - Available in 5 languages (French, Spanish, Arabic Russian and English) translated and localised. Covering; anonymity and circumvention, but also... - keeping your computer safe and stable - communicating privately - keeping data confidential and backed-up - mobile security - working from an internet cafe New version to be launched in September 2008
  • 4. Training - Four experts/trainers in the core project team - Network of 14 trainers During 2007 7 dedicated workshops 257 advocates trained Nearly 1500 advocates and independent journalists trained to date Trainings in... Belarus, Former Soviet Union, Uganda, Kenya, DRC, Uzbekistan, Ethiopia, Indonesia, Iran, Syria, Tunisia Thailand/Burmese, Yemen and many global events Publishing this curricula at the end of 2008
  • 5. Reaching rights advocates working on the ground: Giving them the tips, tools and tactics they need to do their work Why we train (tooklits and workshops) and some of the things we've learnt... 1. Helping advocates find solutions There is a percentage of the internet that knows about circumvention and a percentage who does not - Many HRDs don't know, don't move in those circles, but are facing the same challenges as bloggers e.g. Tunisian group hadn't been able to access their website for 5 yrs
  • 6. 2. Problems with using tools - Knowing which tools to use, where and when - Tools don't always work; important to be able to help advocates trouble shoot and show them what it looks like - Rumours; people say its broken or can be traced, people don't know if it's really safe - Censorship can be opaque or inconsistent; for example different ISPs or points of access blocked - There is safety in numbers; if your going to stick your neck out, helpful to know that others are doing it too - People don't always have contacts e.g. Psiphon, trainer can act as a point of contact, we depend on TOR as it is less dependent on social networks, but it is more complicated to use.
  • 7. 3. Helping to make the tools available and usable - localisation of tools and materials - but also working with developers giving them feedback (they listen, we hope!, because our feedback is based on use in the field, and the feedback of people who use their technology)‏
  • 8. 4. Helping advocates make their own decisions Giving advocates enough understanding so that they can decide how to use digital security for themselves – how it works, what's possible, when they should rely on it, when not, build their confidence, and help them to make their own decisions.
  • 9. 5. Content censorship – the blessing and the curse of web 2.0 The tools that are the easiest to use are the ones most likely to be blocked or content taken down. Services have been a great breakthrough, but for most of the HRD's we work with they are not a viable option. Sex Worker Health and Rights Advocates
  • 10. 6. Freedom of expression and self censorship Shouldn't forget that HRDs and advocates share information, publish and organise a lot still through non-web formats. Email and IM, increasingly by mobiles We give people alternatives like riseup.net, vaultletsoft and pidgin 7. Anonymity – hosting your own content Trying to host content anonymously is difficult and there are hidden challenges to this (e.g. – contacting the owners of the site)‏