EnGENDERing digital security workshop - Circumvention Tech Festival, Spain

From Gender and Tech Resources

Title EnGENDERing Privacy and Digital Security workshop
Category Digital Security Gender and Tech
Start 2015/03/01
End 2015/03/01
Hours 4
Scale Valencia, Spain
Loading map...
Organisation Circumvention Tech Festival
Website https://openitp.org/festival/circumvention-tech-festival.html
Target audience Open
Number of participants 10
Context and motivations [[Motivations for organizing training::Do current threat modeling approaches work for everyone on the planet? One-size fits all? What do risk assessment and security planning look like with a gender analysis, conflict dynamics analysis, or in scarce electricity contexts? Gender identity, conflict dynamics, and access to resources affect humanitarian practitioners, journalists, activists, and whistleblowers, and their collaborators. Threats to their digital, physical and psychosocial security come offline and online from governments, non-state actors, and a myriad of groups and individuals--all negotiating for power and control whether from the ground up or top down. Women are too often trapped in a situations where a basic mobile phone or internet connection is crucial to their work--whether for investigations, reporting, coordinating actions, or leaking sensitive information publicly, confidentially or anonymously. The personal is political for women, and feminist and LGBTQI rights defenders who are surveilled, harassed and punished for speaking out in ALL spheres of life, breaking the so-called 'public/private' binary and calling for new understandings of privacy and security.

Too often, our work is censored or self-censored-- actively prevented from being seen, heard, read, or amplified powerfully. Lacking digital and holistic security for feminists and activists leads to violations of the right to freedom of expression and association, and to privacy, with deleterious effects on sustaining work, relationships, health and well-being. The aim of this session is to try out new ways of assessing and responding to privacy and digital security threats integrating a gender and diversity analysis.

Available Gender-based Violence (GBV) definitions generally recognize the phrase as an umbrella term encompassing forms of physical, psychological, emotional, sexual, economic or political violence—that are perpetrated on the basis of gendered power relations underpinned by socially normative gender roles and responsibilities, or what it means to be a proper ‘girl’, ‘boy’, ‘woman’ or ‘man’ in a given society. Gender-based violence therefore includes all forms of violence against women and girls perpetrated on the basis of their identity and social position as a ‘woman’ or a ‘girl’ in a given family, group, community, or nation. This module concerns itself purposefully with all forms of violence against women and girls as GBV in recognition that some also affect men and boys, but significantly less often than women and girls.

Article 1 of the United Nations (UN) 1993 Declaration on the Elimination of Violence against Women, treats the term ‘violence against women’ explicitly as a form of GBV:

“[…] the term ‘violence against women’ means any act of gender-based violence that results in, or is likely to result in, physical, sexual or psychological harm or suffering to women, including threats of such acts, coercion or arbitrary deprivation of liberty, whether occurring in public or in private life.”

Article 2 of the UN 1993 declaration defines ‘violence against women’ as including, but not limited to: (a) Physical, sexual and psychological violence occurring in the family, including battering, sexual abuse of female children in the household, dowry-related violence, marital rape, female genital mutilation and other traditional practices harmful to women, non-spousal violence and violence related to exploitation; (b) Physical, sexual and psychological violence occurring within the general community, including rape, sexual abuse, sexual harassment and intimidation at work, in educational institutions and elsewhere, trafficking in women and forced prostitution; (c) Physical, sexual and psychological violence perpetrated or condoned by the State, wherever it occurs.]]

Topics DST, Spain, Circumvention Tech
Links http://www.circumventionfestival.es/espacio/Articles, videos, photos on-line, ...
Media [[File:]]
Agenda 1. Facilitator intros, quick intros if small enough group (20-30 people?)

2. Defining terms: (20 minutes) 3. What is gender-based violence? (15 minutes) 4. Threat modeling questions: (10 minutes) 5. Full group activity: (15 minutes) 6. Individual reflection activity: (15 minutes) 7. Facilitator questions to the group: (10-15 minutes) 8. Small group activity: Develop a case study (30 minutes) 9. Report cases out in plenary (~30 minutes total) 10. Sum up 11. Closing exercise.

Methodologies Threat modeling questionsː

What’s threat modeling? What are the basic questions it asks? (Take responses from group, write on flipchart)

Share: Usual main questions include: 1. What do you want to protect? (assets) 2. Who do you want to protect it from? 3. How likely is it that you will need to protect it? 4. How bad are the consequences if you fail? 5. How much trouble are you willing to go through in order to try to prevent those?