As lawmakers and politicians across the country seek to rob trans youth and their families of their rights, how do we respond to this political moment with a better understanding
As lawmakers and politicians across the country seek to rob trans youth and their families of their rights, how do we respond to this political moment with a better understanding of how these attacks are part of right wing political strategies spanning at least the last four decades? How has philanthropy’s own historical patterns of investing in and failing to invest in LGBTQ and wider social justice organizing in these regions impacted movement efforts–for good and bad? How can we use this insight to support critical strategies for long-term organizing?
Join us to hear from Southern-based movement organizations that are responding to this political climate with clarity about the historical patterns of discrimination and violence that have brought us here. Our speakers will share how Southern movement organizations are responding to the urgency of the moment, while continuing to nurture the infrastructure we need for long-haul work to build political power. Join us to learn how funders can adapt their funding strategies to cause less harm and move resources in ways that are more responsive to movement efforts.
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.