Our Programmes

 
 
 
We began our preparations for the Info Activism Camp with a meeting for facilitators.
A repository of information activism campaign examples is now available in Arabic with new material from the Arab world.
Tactical Tech recently returned from OKFest. Read our take on the hype around open data.
This project worked with a sex workers' collective in India to do evidence-based advocacy about mistreatment.
The project helps you explore the digital shadows you cast, and provides you with means to change their size and shape.

This year, the FTX @ AWID Forum 2012 is a one-day event on 18 April 2012.

 

A searchable repository of 50+ info-activism case studies from around the world in English and Arabic.
unstitched screenshot_homepage.png
Tactical Tech's second camp, in collaboration with Aspiration, on 'Evidence & Influence'.
IA Camp tents
Read stories and discussion about how groups and individuals are (re)claiming citizenship from the ground up.
10 Tactics Remixed
An illustrated guide to understanding how the internet, mobile phones and computers can work for you.
digital_ survival_guide
This project works with sex workers groups in India and Cambodia to do evidence-based advocacy about mistreatment.
documentation_pic.jpg
An introduction to practical tools and online resources for visualising evidence in campaigning.
drawing by numbers
An introduction to visual communication techniques for campaigning and advocacy work.
info-design pack shot
What can you communicate with a map? A basic guide to this useful technique for advocacy.
Maps pack shot
Our digital security handbook for activists, produced with Frontline Human Rights Defenders, translated into Arabic.
Security in-a-box Arabic
This website helps you explore the digital shadows you cast, and provides you with means to change their size and shape.
Me and My Shadow
An animation series about the digital shadows you create when using new technologies and how to erase them.
animation1.jpg
This toolkit gives you the knowledge you need to recognise digital security threats and the tools to address them.
securityinaboxtoolkit.png