Who Do You Trust?

Credits Indira Cornelio, Alma Uguarte Perez Last Updated 2017-06

In this exercise, you will lead participants through a process of reflection with the goal of identifying perceived allies and adversaries in each of their individual contexts. The allies and adversaries identified in this quick exercise will help you facilitate a training that is more relevant to your participants, as you will be able to better contextualize different sessions to their specific context(s).

Have feedback on this content? Does something need updating?

Leave a note anywhere on this page - look for the Hypothes.is toolbar in the upper right-hand corner.

Have content you'd like to share with other trainers?

Email us at levelup@riseup.net (GPG public key here) or read our guide on Contributing to LevelUp.

 

This session was developed for, and should be attributed to, the Institute for War & Peace Reporting resource “Cyberwomen: Holistic Digital Security Training Curriculum for Women Human Rights Defenders” under a Creative Commons Attribution-Share Alike 4.0 International CC BY-SA 4.0 License

Materials to Prepare:

  • Several large sheets of flipchart paper

Running the Exercise:

Step 1 | Give each participant one sheet of flipchart paper; then, give the group the following prompt as a contextualizing introduction to the exercise:

Nobody trusts everyone, but nobody doesn’t trust anyone

Step 2 | Give everybody 5 minutes to answer the following questions individually; as they do so, also ask them to identify for each whether their response might change when answered in a personal context versus when answered in a work/activism context:

  • Who do you trust?
  • With whom do you think you could trust your information?
  • With whom do you think you could not trust your information?
  • Who do you think could be spying on you?
  • Who is not spying on you?

Examples of people or adversaries that may come up in response are government actors (e.g. state security), private companies (e.g. Facebook or Google), Internet Service Providers, close partners and friends, or even colleagues.

Step 3 | Once time is up, split participants up into groups of 3-4 people (maximum) to discuss their answers with each other – after 10 minutes have passed, each group should then share with the rest of the participants what they discussed.

Step 4 | Now, you can close out the exercise by explaining that over the course of this training – based on the adversaries the group has begun to identify in this exercise - you will be able to highlight practices and tools which are more relevant to their specific contexts.