SlideShare a Scribd company logo
1 of 10
 
Tactical Tech works to give rights advocates working with marginalised communities the tools and tactics they need for effective advocacy . We work with Human Rights Defenders, anti-corruption advocates and independent journalists who deal with freedom of expression issues as a means to an end  Tactical Tech's Digital Security program - Started in 2004 - In partnership with Frontline Human Rights Defenders - Focused on making Rights advocates aware of their security vulnerabilities and providing them with the skills and tools to work as safely as possible
1,554 toolkits distributed and  downloaded in 2007 (more copied)‏ 165,000 visits to the toolkit website in 2007 Toolkit  “ in-a-box”, “on-line” and “on-a-stick” - Attempt to pool expertise of leading practitioners - Peer review (language + expert teams)‏ - Available in 5 languages (French, Spanish, Arabic Russian and English) translated and localised. Covering; anonymity and circumvention, but also... - keeping your computer safe and stable - communicating privately - keeping data confidential and backed-up - mobile security - working from an internet cafe New version to be launched in September 2008
Training -  Four experts/trainers in the core project team - Network of 14 trainers  During 2007 7 dedicated workshops  257 advocates trained Nearly 1500 advocates and independent journalists trained to date Trainings in... Belarus, Former Soviet Union, Uganda, Kenya, DRC, Uzbekistan, Ethiopia, Indonesia, Iran, Syria, Tunisia Thailand/Burmese, Yemen and many global events Publishing this curricula at the end of 2008
Reaching rights advocates working on the ground:  Giving them the tips, tools and tactics they need to do their work Why we train (tooklits and workshops) and some of the things we've learnt... 1. Helping advocates find solutions There is a percentage of the internet that knows about  circumvention and a percentage who does not - Many HRDs don't know, don't move in those circles, but   are facing the same challenges as bloggers e.g. Tunisian group hadn't been able to access their website for 5 yrs
2. Problems with using tools  - Knowing which tools to use, where and when - Tools don't always work; important to be able to help advocates trouble shoot and show them what it looks like - Rumours;  people say its broken or can be traced, people don't know if it's really safe - Censorship can be opaque or inconsistent; for example different ISPs or points of access blocked - There is safety in numbers; if your going to stick your neck out, helpful to know that others are doing it too - People don't always have contacts e.g. Psiphon, trainer can act as a point of contact, we depend on TOR as it  is less dependent on social networks, but it is more complicated to use.
3. Helping to make the tools available and usable - localisation of tools and materials - but also working with developers giving them feedback (they listen, we hope!, because our feedback is based on use in the field, and the feedback of people who use their technology)‏
4. Helping advocates make their own decisions Giving advocates enough understanding so that they can decide how to use digital security for themselves – how it works, what's possible,  when they should rely on it, when not, build their confidence, and help them to make their own decisions.
5. Content censorship – the blessing and the curse of web 2.0 The tools that are the easiest to use are the ones most likely to be blocked or content taken down. Services have been a great breakthrough, but for most of the HRD's we work with they are not a viable option. Sex Worker Health and Rights Advocates
6. Freedom of expression and self censorship Shouldn't forget that HRDs and advocates share information, publish and organise a lot still through non-web formats. Email and IM, increasingly by mobiles We give people alternatives like riseup.net, vaultletsoft and pidgin 7. Anonymity – hosting your own content Trying to host content anonymously is difficult and there are hidden challenges to this  (e.g. – contacting the owners of the site)‏

More Related Content

What's hot (7)

Reem's Investigation
Reem's InvestigationReem's Investigation
Reem's Investigation
 
Nettique
NettiqueNettique
Nettique
 
The Nine Elements
The Nine ElementsThe Nine Elements
The Nine Elements
 
Omar Todd - Cybersecurity Expert and Consultant
Omar Todd - Cybersecurity Expert and ConsultantOmar Todd - Cybersecurity Expert and Consultant
Omar Todd - Cybersecurity Expert and Consultant
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Privacy in a Digital age
Privacy in a Digital agePrivacy in a Digital age
Privacy in a Digital age
 
Tech savvy seniors week 3 term 4 intro to internet
Tech savvy seniors   week 3 term 4 intro to internetTech savvy seniors   week 3 term 4 intro to internet
Tech savvy seniors week 3 term 4 intro to internet
 

Viewers also liked

Project Management Workshop Overview
Project Management Workshop OverviewProject Management Workshop Overview
Project Management Workshop Overview
sundong
 
Evaluation question 6
Evaluation question 6Evaluation question 6
Evaluation question 6
Boassy Benson
 

Viewers also liked (19)

экопластика.Ppt 2
экопластика.Ppt 2экопластика.Ppt 2
экопластика.Ppt 2
 
Changes to Fellowship Scheme Presentation – Katherine Warren
Changes to Fellowship Scheme Presentation – Katherine WarrenChanges to Fellowship Scheme Presentation – Katherine Warren
Changes to Fellowship Scheme Presentation – Katherine Warren
 
C.V .
C.V .C.V .
C.V .
 
Musings_CLSARoadshows
Musings_CLSARoadshowsMusings_CLSARoadshows
Musings_CLSARoadshows
 
Step21 1
Step21 1Step21 1
Step21 1
 
個資法 - 資料就是財富
個資法 - 資料就是財富個資法 - 資料就是財富
個資法 - 資料就是財富
 
Project Management Workshop Overview
Project Management Workshop OverviewProject Management Workshop Overview
Project Management Workshop Overview
 
Let's talk about certification: SCJA
Let's talk about certification: SCJALet's talk about certification: SCJA
Let's talk about certification: SCJA
 
Introduction To Social Media
Introduction To Social MediaIntroduction To Social Media
Introduction To Social Media
 
Microsoft Windows Intune getting started guide dec 2012 release
Microsoft Windows Intune getting started guide   dec 2012 releaseMicrosoft Windows Intune getting started guide   dec 2012 release
Microsoft Windows Intune getting started guide dec 2012 release
 
The comparison of immunization
The comparison of immunizationThe comparison of immunization
The comparison of immunization
 
Website design
Website designWebsite design
Website design
 
VPN Security
VPN SecurityVPN Security
VPN Security
 
Purcell 2000000744
Purcell 2000000744Purcell 2000000744
Purcell 2000000744
 
Evaluation question 6
Evaluation question 6Evaluation question 6
Evaluation question 6
 
Research skills for journalists
Research skills for journalists Research skills for journalists
Research skills for journalists
 
Шаг-Рысь-Галоп: видимое ускорение разработки
Шаг-Рысь-Галоп: видимое ускорение разработкиШаг-Рысь-Галоп: видимое ускорение разработки
Шаг-Рысь-Галоп: видимое ускорение разработки
 
Freelance copywriter - Miriam, Haarlem
Freelance copywriter - Miriam, HaarlemFreelance copywriter - Miriam, Haarlem
Freelance copywriter - Miriam, Haarlem
 
2 q15 investment commentary
2 q15 investment commentary2 q15 investment commentary
2 q15 investment commentary
 

Similar to Stephanie Hankey talks about Tactical Technology Collective

Open Cambodia 2014 Invite
Open Cambodia 2014 InviteOpen Cambodia 2014 Invite
Open Cambodia 2014 Invite
John Weeks
 
Uses of internet
Uses of internetUses of internet
Uses of internet
sheenam65
 

Similar to Stephanie Hankey talks about Tactical Technology Collective (20)

Knowledge management for professionals
Knowledge management for professionalsKnowledge management for professionals
Knowledge management for professionals
 
ICT.pptx
ICT.pptxICT.pptx
ICT.pptx
 
Privacy, Encryption, and Anonymity in the Civil Legal Aid Context
Privacy, Encryption, and Anonymity in the Civil Legal Aid ContextPrivacy, Encryption, and Anonymity in the Civil Legal Aid Context
Privacy, Encryption, and Anonymity in the Civil Legal Aid Context
 
Module 11- Promotion of safe use of Internet.pptx
Module 11- Promotion of safe use of Internet.pptxModule 11- Promotion of safe use of Internet.pptx
Module 11- Promotion of safe use of Internet.pptx
 
Report on cyber security fishbowl by shreedeep rayamajhi
Report on cyber security fishbowl by shreedeep rayamajhiReport on cyber security fishbowl by shreedeep rayamajhi
Report on cyber security fishbowl by shreedeep rayamajhi
 
Facilitating knowledge-exchange: providing the right format, incentives, faci...
Facilitating knowledge-exchange: providing the right format, incentives, faci...Facilitating knowledge-exchange: providing the right format, incentives, faci...
Facilitating knowledge-exchange: providing the right format, incentives, faci...
 
Empowerment technologies
Empowerment technologiesEmpowerment technologies
Empowerment technologies
 
Open Cambodia 2014 Invite
Open Cambodia 2014 InviteOpen Cambodia 2014 Invite
Open Cambodia 2014 Invite
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Devon County Council - Risk assessment for social media
Devon County Council - Risk assessment for social mediaDevon County Council - Risk assessment for social media
Devon County Council - Risk assessment for social media
 
Reading 2
Reading 2Reading 2
Reading 2
 
DigComp - Konferens om skolans digitalisering, 8 sep, Stockholm
DigComp - Konferens om skolans digitalisering, 8 sep, StockholmDigComp - Konferens om skolans digitalisering, 8 sep, Stockholm
DigComp - Konferens om skolans digitalisering, 8 sep, Stockholm
 
Youth Privacy
Youth PrivacyYouth Privacy
Youth Privacy
 
Fostering an Ecosystem for Smartphone Privacy
Fostering an Ecosystem for Smartphone PrivacyFostering an Ecosystem for Smartphone Privacy
Fostering an Ecosystem for Smartphone Privacy
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Personally Identifiable Information
Personally Identifiable InformationPersonally Identifiable Information
Personally Identifiable Information
 
Sup de Co Rennes - planning 2014-2015
Sup de Co Rennes - planning 2014-2015Sup de Co Rennes - planning 2014-2015
Sup de Co Rennes - planning 2014-2015
 
Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011
Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011
Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011
 
Need for Data Protection Training - How E-learning Can Help?
Need for Data Protection Training - How E-learning Can Help?Need for Data Protection Training - How E-learning Can Help?
Need for Data Protection Training - How E-learning Can Help?
 
Uses of internet
Uses of internetUses of internet
Uses of internet
 

More from Global Voices

Live Broadcasting Center, Bahrain Experience, by Hussain Yousif
Live Broadcasting Center, Bahrain Experience, by Hussain YousifLive Broadcasting Center, Bahrain Experience, by Hussain Yousif
Live Broadcasting Center, Bahrain Experience, by Hussain Yousif
Global Voices
 

More from Global Voices (17)

do censorship & repression kill content online?
do censorship & repression kill content online?do censorship & repression kill content online?
do censorship & repression kill content online?
 
Digital activism & online free speech
Digital activism & online free speechDigital activism & online free speech
Digital activism & online free speech
 
Live Broadcasting Center, Bahrain Experience, by Hussain Yousif
Live Broadcasting Center, Bahrain Experience, by Hussain YousifLive Broadcasting Center, Bahrain Experience, by Hussain Yousif
Live Broadcasting Center, Bahrain Experience, by Hussain Yousif
 
Yemen Portal Presentation
Yemen Portal PresentationYemen Portal Presentation
Yemen Portal Presentation
 

بروز الصحافة المواطِنة في المغرب

بروز الصحافة المواطِنة في المغرب
بروز الصحافة المواطِنة في المغرب

بروز الصحافة المواطِنة في المغرب
 
FOSS: Technologies Communities And Society
FOSS: Technologies Communities And SocietyFOSS: Technologies Communities And Society
FOSS: Technologies Communities And Society
 
Meedan Presentation, by Anas Tawileh
Meedan Presentation, by Anas TawilehMeedan Presentation, by Anas Tawileh
Meedan Presentation, by Anas Tawileh
 
Live Broadcasting
Live  BroadcastingLive  Broadcasting
Live Broadcasting
 
A game of cat and mouse
A game of cat and mouseA game of cat and mouse
A game of cat and mouse
 
Belarusian Internet filtering
Belarusian Internet filteringBelarusian Internet filtering
Belarusian Internet filtering
 
Filteringfinal
FilteringfinalFilteringfinal
Filteringfinal
 
Living with censorship
Living with censorshipLiving with censorship
Living with censorship
 
Self Censorship in media Role of citizen journalists
Self Censorship in media  Role of citizen journalistsSelf Censorship in media  Role of citizen journalists
Self Censorship in media Role of citizen journalists
 
Formation of a post-colonial censorship regime
Formation of a  post-colonial censorship regimeFormation of a  post-colonial censorship regime
Formation of a post-colonial censorship regime
 
Exposing Corruption on YouTube “Targuist Sniper”
Exposing Corruption on YouTube “Targuist Sniper”Exposing Corruption on YouTube “Targuist Sniper”
Exposing Corruption on YouTube “Targuist Sniper”
 
Filtering final
Filtering finalFiltering final
Filtering final
 
Bloguer Anonymement
Bloguer AnonymementBloguer Anonymement
Bloguer Anonymement
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 

Stephanie Hankey talks about Tactical Technology Collective

  • 1.  
  • 2. Tactical Tech works to give rights advocates working with marginalised communities the tools and tactics they need for effective advocacy . We work with Human Rights Defenders, anti-corruption advocates and independent journalists who deal with freedom of expression issues as a means to an end Tactical Tech's Digital Security program - Started in 2004 - In partnership with Frontline Human Rights Defenders - Focused on making Rights advocates aware of their security vulnerabilities and providing them with the skills and tools to work as safely as possible
  • 3. 1,554 toolkits distributed and downloaded in 2007 (more copied)‏ 165,000 visits to the toolkit website in 2007 Toolkit “ in-a-box”, “on-line” and “on-a-stick” - Attempt to pool expertise of leading practitioners - Peer review (language + expert teams)‏ - Available in 5 languages (French, Spanish, Arabic Russian and English) translated and localised. Covering; anonymity and circumvention, but also... - keeping your computer safe and stable - communicating privately - keeping data confidential and backed-up - mobile security - working from an internet cafe New version to be launched in September 2008
  • 4. Training - Four experts/trainers in the core project team - Network of 14 trainers During 2007 7 dedicated workshops 257 advocates trained Nearly 1500 advocates and independent journalists trained to date Trainings in... Belarus, Former Soviet Union, Uganda, Kenya, DRC, Uzbekistan, Ethiopia, Indonesia, Iran, Syria, Tunisia Thailand/Burmese, Yemen and many global events Publishing this curricula at the end of 2008
  • 5. Reaching rights advocates working on the ground: Giving them the tips, tools and tactics they need to do their work Why we train (tooklits and workshops) and some of the things we've learnt... 1. Helping advocates find solutions There is a percentage of the internet that knows about circumvention and a percentage who does not - Many HRDs don't know, don't move in those circles, but are facing the same challenges as bloggers e.g. Tunisian group hadn't been able to access their website for 5 yrs
  • 6. 2. Problems with using tools - Knowing which tools to use, where and when - Tools don't always work; important to be able to help advocates trouble shoot and show them what it looks like - Rumours; people say its broken or can be traced, people don't know if it's really safe - Censorship can be opaque or inconsistent; for example different ISPs or points of access blocked - There is safety in numbers; if your going to stick your neck out, helpful to know that others are doing it too - People don't always have contacts e.g. Psiphon, trainer can act as a point of contact, we depend on TOR as it is less dependent on social networks, but it is more complicated to use.
  • 7. 3. Helping to make the tools available and usable - localisation of tools and materials - but also working with developers giving them feedback (they listen, we hope!, because our feedback is based on use in the field, and the feedback of people who use their technology)‏
  • 8. 4. Helping advocates make their own decisions Giving advocates enough understanding so that they can decide how to use digital security for themselves – how it works, what's possible, when they should rely on it, when not, build their confidence, and help them to make their own decisions.
  • 9. 5. Content censorship – the blessing and the curse of web 2.0 The tools that are the easiest to use are the ones most likely to be blocked or content taken down. Services have been a great breakthrough, but for most of the HRD's we work with they are not a viable option. Sex Worker Health and Rights Advocates
  • 10. 6. Freedom of expression and self censorship Shouldn't forget that HRDs and advocates share information, publish and organise a lot still through non-web formats. Email and IM, increasingly by mobiles We give people alternatives like riseup.net, vaultletsoft and pidgin 7. Anonymity – hosting your own content Trying to host content anonymously is difficult and there are hidden challenges to this (e.g. – contacting the owners of the site)‏