CreditsLast Updated 2017-06
In this exercise, you will lead participants through a process of reflection with the goal of identifying perceived allies and adversaries in each of their individual contexts. The allies and adversaries identified in this quick exercise will help you facilitate a training that is more relevant to your participants, as you will be able to better contextualize different sessions to their specific context(s).
Leave a note anywhere on this page - look for the Hypothes.is toolbar in the upper right-hand corner.
This session was developed for, and should be attributed to, the Institute for War & Peace Reporting resource “Cyberwomen: Holistic Digital Security Training Curriculum for Women Human Rights Defenders” under a Creative Commons Attribution-Share Alike 4.0 International CC BY-SA 4.0 License
Step 1 | Give each participant one sheet of flipchart paper; then, give the group the following prompt as a contextualizing introduction to the exercise:
Nobody trusts everyone, but nobody doesn’t trust anyone
Step 2 | Give everybody 5 minutes to answer the following questions individually; as they do so, also ask them to identify for each whether their response might change when answered in a personal context versus when answered in a work/activism context:
Examples of people or adversaries that may come up in response are government actors (e.g. state security), private companies (e.g. Facebook or Google), Internet Service Providers, close partners and friends, or even colleagues.
Step 3 | Once time is up, split participants up into groups of 3-4 people (maximum) to discuss their answers with each other – after 10 minutes have passed, each group should then share with the rest of the participants what they discussed.
Step 4 | Now, you can close out the exercise by explaining that over the course of this training – based on the adversaries the group has begun to identify in this exercise - you will be able to highlight practices and tools which are more relevant to their specific contexts.