If you’re taking to the streets to demand justice for the victims of police brutality and homicide, you may want to leave your phone at home. At the same time, it’s a good idea to bring a phone to a protest so you can record what’s happening and get the message out on social media. To reconcile this tension — between wanting to protect your privacy and wanting to digitally document protests and police misdeeds — the safest option is to leave your primary phone, which contains a massive amount of private information about you, at home and instead bring a specially-prepared burner phone to protests. The Intercept’s Micah Lee discusses how to do this at length in this video.
390 results found
Removing symbols of the Confederacy from public spaces in your community can be daunting, but with proper planning, you can launch a successful campaign. This guide provides tools for building a campaign, including: Step-by-step instructions for organizing a campaign, Advice for countering objections to the removal of a symbol, Useful information about the Confederacy and its symbols, and Removing offensive Confederate symbols may be a long and difficult task.
This toolkit was created to collate, condense and share the lessons Black Lives Matter activists have learned in ensuring that their direct actions are centered on healing justice. This toolkit is a beta version; it will develop in real time as they continue to uncover the implications for healing justice in their organizing.
As feminists – organizations and activists, working across global movements centered on human rights, sustainable development, and economic and social justice – they have come together in a moment of collective organizing to outline key principles for a just and resilient recovery from the ongoing global pandemic, as well as to track responses and uplift collective action of feminists around the world.
There’s a deluge of apps that detect your covid-19 exposure, often with little transparency. This Covid Tracing Tracker project will document them. When they began comparing apps around the world, they realized there was no central repository of information; just incomplete, constantly changing data spread across a wide range of sources. Nor was there a single, standard approach being taken by developers and policymakers: citizens of different countries were seeing radically different levels of surveillance and transparency. So to help monitor this fast-evolving situation, they are gathering the information into a single place for the first time with this Covid Tracing Tracker—a database to capture details of every significant automated contact tracing effort around the world.
Systems mapping is an important element of any strategy for systemic change. Since systems are made up of a complex web of forces and relationships, and underpinned by mental models (values, beliefs and assumptions), then “mapping” these forces, relationships and mental models can be a key step towards developing an understanding of the system you want to change and developing effective strategies to shift it. This guide dives into three tools that can be used for this purpose as part of a campaign design process: system maps, network maps and narrative power analysis.
Defending the jungles, mountains, forests and rivers of Latin America has never been this dangerous. Six of the ten most hostile countries for leaders and communities defending the environment and their ancestral lands are located in Latin America, according to UN Special Rapporteur Michel Forst’s 2016 report to United Nations. This is why 50 journalists, developers and photo/videographers from ten countries (Argentina, Bolivia, Brazil, Colombia, Ecuador, Guatemala, Honduras, Mexico, Peru and Venezuela) teamed up to document to report on episodes of violence against environmental leaders and their communities. The result is this special investigative project with a database compiling 2,367 attacks spanning eleven years (2009-2019) and 29 in-depth stories on individual cases.
“A security culture is a set of customs shared by a community whose members may be targeted by the government, designed to minimize risk.” This zine is an excellent introductory piece on security culture. It defines what a security culture is, gives practical examples of how it can be used and implemented, and addresses numerous other components of security culture.