<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.digitalrights.community/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Kristin1</id>
	<title>TCU Wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.digitalrights.community/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Kristin1"/>
	<link rel="alternate" type="text/html" href="https://wiki.digitalrights.community/index.php?title=Special:Contributions/Kristin1"/>
	<updated>2026-05-02T20:04:40Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.42.3</generator>
	<entry>
		<id>https://wiki.digitalrights.community/index.php?title=Protection_tips_for_immigrants&amp;diff=52847</id>
		<title>Protection tips for immigrants</title>
		<link rel="alternate" type="text/html" href="https://wiki.digitalrights.community/index.php?title=Protection_tips_for_immigrants&amp;diff=52847"/>
		<updated>2025-04-01T12:35:45Z</updated>

		<summary type="html">&lt;p&gt;Kristin1: Created page with &amp;quot;New York  The Legal Aid Society’s Immigration Law Unit has a proven track record of providing comprehensive, high-quality immigration assistance to low-income New Yorkers. In these uncertain times, they have compiled a [https://legalaidnyc.org/news/critical-resources-immigrant-communities/ series of resources] to help navigate the new administration.&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;New York&lt;br /&gt;
&lt;br /&gt;
The Legal Aid Society’s Immigration Law Unit has a proven track record of providing comprehensive, high-quality immigration assistance to low-income New Yorkers. In these uncertain times, they have compiled a [https://legalaidnyc.org/news/critical-resources-immigrant-communities/ series of resources] to help navigate the new administration.&lt;/div&gt;</summary>
		<author><name>Kristin1</name></author>
	</entry>
	<entry>
		<id>https://wiki.digitalrights.community/index.php?title=Security_resources_organized_by_topic&amp;diff=52573</id>
		<title>Security resources organized by topic</title>
		<link rel="alternate" type="text/html" href="https://wiki.digitalrights.community/index.php?title=Security_resources_organized_by_topic&amp;diff=52573"/>
		<updated>2025-02-22T21:59:37Z</updated>

		<summary type="html">&lt;p&gt;Kristin1: /* Security planning on specific topics */ adding a page on protecting immigrants&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Building awareness of how we respond to threat and stress ==&lt;br /&gt;
&#039;&#039;Developing a useful security strategy is heavily dependent on our perception – we need to be able to identify and analyse threats in order to implement ways of avoiding or reducing them. But we all perceive the world around us differently based on our circumstances, experiences and many other factors. As a result, our perception can sometimes be hindered: threats which may be evident to some people may go unrecognised by others; similarly, we also need to be able to tell the difference between threats which are genuinely possible and those which we falsely perceive, called &#039;unfounded fears&#039;. It&#039;s a good idea to become familiar with factors that condition our perceptions of threat, and consider ways that we can take these into account in our security planning.&#039;&#039; (Source: [https://holistic-security.tacticaltech.org/chapters/prepare/1-2-individual-responses-to-threat.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Resources:&lt;br /&gt;
&lt;br /&gt;
* [https://holistic-security.tacticaltech.org/chapters/prepare/1-2-individual-responses-to-threat.html &#039;&#039;&#039;Exploring individual responses to threat&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
* [https://holistic-security.tacticaltech.org/chapters/prepare/1-4-team-and-peer-responses-to-threat.html &#039;&#039;&#039;Exploring group responses to threat&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
* [https://holistic-security.tacticaltech.org/chapters/prepare/1-5-communicating-about-threats-in-teams-and-organisations.html &#039;&#039;&#039;Communicating about security in teams and organizations&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
&lt;br /&gt;
== Understanding our threats and context ==&lt;br /&gt;
&lt;br /&gt;
=== Situation monitoring and analysis ===&lt;br /&gt;
Situation monitoring and analysis is the broadest kind of analysis of our context: observing the political, economic, social, technological, legal and environmental developments in society which are relevant to our work, and may impact our security situation. (Source: [https://holistic-security.tacticaltech.org/chapters/explore/2-2-situation-monitoring-and-analysis.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Exercise: [https://holistic-security.tacticaltech.org/exercises/explore/situational-monitoring-a-quick-pestle-analysis.html &#039;&#039;&#039;Pestle analysis&#039;&#039;&#039;] (Holistic Security Manual) &lt;br /&gt;
&lt;br /&gt;
Tool: &#039;&#039;&#039;[https://tnr-research.uwazi.io/ Research Database on transnational repression]&#039;&#039;&#039; - This collection of research reports on transnational repression can help human rights defenders better understand: &lt;br /&gt;
&lt;br /&gt;
* Transnational Repression (TNR) threats that are possible, to determine appropriate mitigation techniques&lt;br /&gt;
* Which TNR threats are unlikely, in order to alleviate fear&lt;br /&gt;
* What exiled HRDs can expect from a host country in terms of protection measures&lt;br /&gt;
* Existing campaigns to strengthen protection for exiled HRDs&lt;br /&gt;
&lt;br /&gt;
=== Identifying, analyzing and prioritizing threats ===&lt;br /&gt;
&lt;br /&gt;
==== Map the actors ====&lt;br /&gt;
&#039;&#039;It is valuable to get a clear picture of all the actors in our environment (individuals, institutions, organizations, etc). Threats almost always come from someone or something. Knowing as much as we can about the actors in our context improves our perception of our environment and thereby, our ability to carry out activities to maintain or expand our space for work.&#039;&#039; (Source: [https://holistic-security.tacticaltech.org/chapters/explore/2-3-vision-strategy-and-actors.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Exercise:&lt;br /&gt;
&lt;br /&gt;
* [https://holistic-security.tacticaltech.org/exercises/explore/visual-actor-mapping-part-1.html &#039;&#039;&#039;Spectrum of allies&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
* [https://newtactics.org/resource/exercises-identifying-allies-opponents &#039;&#039;&#039;Spectrum of allies&#039;&#039;&#039;] (New Tactics in Human Rights project)&lt;br /&gt;
&lt;br /&gt;
==== Brainstorm threats ====&lt;br /&gt;
This exercise is a first attempt at identifying the threats to yourself, your group or organization and your work in defense of human rights. This initial list of threats can then be refined so as to focus in more depth on the threats which are most likely or potentially most harmful. (Source: [https://holistic-security.tacticaltech.org/exercises/explore/threat-brainstorm.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Exercise: [https://holistic-security.tacticaltech.org/exercises/explore/threat-brainstorm.html &#039;&#039;&#039;Threat brainstorm&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
&lt;br /&gt;
==== Analyzing risk, prioritizing threats ====&lt;br /&gt;
Threats can be viewed and categorized in light of the following: the likelihood that the threat will take place, and the impact if and when it does. Likelihood and impact are concepts which help us determine risk: the higher the likelihood or impact of a threat, the higher the risk. Categorizing threats can help to keep us from feeling overwhelmed and keep our perception of threats realistic. (Source: [https://holistic-security.tacticaltech.org/chapters/explore/2-8-identifying-and-analysing-threats.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Exercise: [https://holistic-security.tacticaltech.org/chapters/explore/2-8-identifying-and-analysing-threats.html &#039;&#039;&#039;Threat matrix&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
&lt;br /&gt;
==== Analyze threats ====&lt;br /&gt;
This exercise will help you prioritize threats and divine the causes, ramifications, sources as well as the required resources, existing actions and possible next steps.&lt;br /&gt;
&lt;br /&gt;
Exercise: [https://holistic-security.tacticaltech.org/exercises/explore/threat-inventory.html &#039;&#039;&#039;Threat inventory&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
&lt;br /&gt;
== Risk mitigation ==&lt;br /&gt;
In order to build a response to the threats we face, we can consider them in terms of the factors which make us more or less susceptible to them. Read more in [https://holistic-security.tacticaltech.org/chapters/strategise/3-1-responding-to-threats.html this chapter of the Holistic Security Manual]. &lt;br /&gt;
&lt;br /&gt;
=== Digital security assessment tools ===&lt;br /&gt;
[https://digiresilience.org/solutions/wellness-check/ &#039;&#039;&#039;Digital Wellness Check&#039;&#039;&#039;] by the Center for Digital Resilience - The Wellness Check Report Generator is a tool to help the community create beautiful risk assessments. You can download the tool directly from [https://gitlab.com/digiresilience/digital-wellness/wellness-check-report-generator Gitlab]. &lt;br /&gt;
&lt;br /&gt;
The Ford Foundation’s [https://www.fordfoundation.org/work/our-grants/building-institutions-and-networks/cybersecurity-assessment-tool/ &#039;&#039;&#039;Cybersecurity Assessment Tool (CAT)&#039;&#039;&#039;] is designed to measure the maturity, resiliency, and strength of an organization’s cybersecurity efforts. We have created this questionnaire with busy nontechnical grant makers, grantee partners, civil society organizations, and nonprofits in mind, and we hope it helps shine some light on a recommended path forward for any organization undertaking a cybersecurity journey &lt;br /&gt;
&lt;br /&gt;
=== Mitigation techniques for common threats to information ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
! Threat&lt;br /&gt;
!Mitigation techniques and links to guidance &lt;br /&gt;
|-&lt;br /&gt;
|Data loss&lt;br /&gt;
|&lt;br /&gt;
* [[Ways to securely store and share files|Have your information securely in the cloud or on a server]]&lt;br /&gt;
* Have a backup process&lt;br /&gt;
|-&lt;br /&gt;
|Compromised accounts&lt;br /&gt;
|&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa|Use two factor authentication for all accounts]]&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa|Use unique, complex passwords for all accounts]]&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa|Use a password manager to create, store and protect those passwords]]&lt;br /&gt;
|-&lt;br /&gt;
|Device inspection at checkpoints&lt;br /&gt;
|&lt;br /&gt;
* [[Use a secure messaging app#Tip: use automatic disappearing messages|Use automated disappearing messages on your messaging apps]]&lt;br /&gt;
* [[Ways to securely store and share files|Have your sensitive information stored safely in the cloud and off of your device]]&lt;br /&gt;
* Hide or delete any apps that would provide access to this information (you can restore that app later)&lt;br /&gt;
|-&lt;br /&gt;
|Device confiscation or theft&lt;br /&gt;
|&lt;br /&gt;
* [[Secure your devices#Full disk encryption|Encrypt your devices]]&lt;br /&gt;
* And, review and adapt the same advice above for “device inspection” threat&lt;br /&gt;
|-&lt;br /&gt;
|Information handover&lt;br /&gt;
|&lt;br /&gt;
* [[Trusted hosting companies in the human rights community|Host your information with a company you trust]], who will not turn over information to your opponents (via subpoena, request, etc)&lt;br /&gt;
|-&lt;br /&gt;
|Targeted malware or spyware&lt;br /&gt;
|&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa#Be aware of spear phishing attacks|Protect yourselves against (spear) phishing attacks]]&lt;br /&gt;
* Use a second device for sensitive activities&lt;br /&gt;
* [[How to mitigate your risk of being subject to Pegasus surveillance|Restart your device regularly to disrupt spyware]]&lt;br /&gt;
* [[Secure your devices|Use anti virus]]&lt;br /&gt;
* [[How to mitigate your risk of being subject to Pegasus surveillance]], and other spyware&lt;br /&gt;
* [[Guidance for purchasing devices with strong security features]]&lt;br /&gt;
|-&lt;br /&gt;
|Surveillance and monitoring&lt;br /&gt;
|&lt;br /&gt;
* [[Safe internet browsing using VPN and Tor browser|Use a VPN and/or Tor browser]]&lt;br /&gt;
* [[Use a secure messaging app]]&lt;br /&gt;
* [[How to collect and store information in a secure way]]&lt;br /&gt;
* [[Ways to securely store and share files|How to use Google Drive safely and alternatives to Google Drive]]&lt;br /&gt;
* [[Use a Faraday cage to block electromagnetic transmissions from a device]]&lt;br /&gt;
|-&lt;br /&gt;
|Website hacking and takeover&lt;br /&gt;
|&lt;br /&gt;
* [[Protect your website|Protect your website from DDOS attacks]]&lt;br /&gt;
* [[Trusted hosting companies in the human rights community|Use a host company that you trust]]&lt;br /&gt;
* And, review and adapt the same advice above for &amp;quot;compromised accounts&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
Other important considerations when collecting, storing, using sensitive information:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Consideration&lt;br /&gt;
!Resources&lt;br /&gt;
|-&lt;br /&gt;
|Make sure you have informed consent from the people you are collecting information&lt;br /&gt;
|[[Guidance on informed consent]]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
* [[Information Security for Human Rights Defenders]]&lt;br /&gt;
&lt;br /&gt;
===Mitigation techniques for online harassment===&lt;br /&gt;
[[How to deal with online harassment and threats]]&lt;br /&gt;
&lt;br /&gt;
==Security planning ==&lt;br /&gt;
Once we have clarity about the threats we face during our activities, we can begin to organize our security protocols into security plans or agreements. There are three main areas to consider when developing any security plans: &lt;br /&gt;
&lt;br /&gt;
# &#039;&#039;&#039;PREPARE: Prevention of threats&#039;&#039;&#039; - Most security plans will include tactics which aim to prevent identified threats from taking place (i.e. reducing their likelihood). This will include:&lt;br /&gt;
## Identify &amp;amp; assess the threats and your vulnerabilities&lt;br /&gt;
## Develop security policies and procedures&lt;br /&gt;
## Implement preventive measures&lt;br /&gt;
## Invest in Security Awareness Programs&lt;br /&gt;
## Conduct Security testing&lt;br /&gt;
# &#039;&#039;&#039;RESPOND: Emergency responses&#039;&#039;&#039; - Emergency plans, also called contingency plans, are the actions which we take in response to a threat becoming a reality. This will include:&lt;br /&gt;
## Build Incident Response Plan&lt;br /&gt;
## Communication Strategy&lt;br /&gt;
## Business continuity plan&lt;br /&gt;
## Disaster recovery plan (Data Backups and Recovery)&lt;br /&gt;
## Communication and Collaboration&lt;br /&gt;
# &#039;&#039;&#039;TREAT: Well-being considerations&#039;&#039;&#039; - Actions we take to maintain our physical energy and a mindful approach to our work and our security –it may include such considerations as where and when we will eat, sleep, relax and enjoy ourselves in the course of our work. This will include: &lt;br /&gt;
## Analyze lessons learned&lt;br /&gt;
## Recovery and Remediation&lt;br /&gt;
## Psychological safety considerations,&lt;br /&gt;
## Review and update your security plans and approach&lt;br /&gt;
For more information, read &#039;&#039;&#039;[[General guidance for creating security plans and agreements]]&#039;&#039;&#039; and review [https://holistic-security.tacticaltech.org/chapters/strategise/3-3-creating-security-plans-and-agreements.html this chapter of the Holistic Security Manual]. &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Additional resources:  &lt;br /&gt;
&lt;br /&gt;
* Consumer Reports [https://securityplanner.consumerreports.org/ &#039;&#039;&#039;Security Planner&#039;&#039;&#039;] is a free, easy-to-use guide to staying safer online. It provides personalized recommendations and expert advice on topics such as keeping social media accounts from being hacked, locking down devices ranging from smartphones to home security cameras, and reducing intrusive tracking by websites.&lt;br /&gt;
* [https://www.nist.gov/itl/smallbusinesscyber/nist-cybersecurity-framework-0 &#039;&#039;&#039;NIST Cybersecurity Framework 2.0&#039;&#039;&#039;]:  Small Business Quick Start Guide - provides small-to-medium sized businesses (SMB), specifically those who have modest or no cybersecurity plans in place, with considerations to kick-start their cybersecurity risk management strategy using the NIST Cybersecurity Framework (CSF) 2.0. (by the &#039;&#039;National Institute of Standards and Technology)&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Security planning on specific topics===&lt;br /&gt;
&lt;br /&gt;
* [[General tips for international travel]]&lt;br /&gt;
* [[General tips for home security]]&lt;br /&gt;
* [[General tips for office security]]&lt;br /&gt;
* [[Protection tips for immigrants]]&lt;br /&gt;
&lt;br /&gt;
== Building a culture of security within a team ==&lt;br /&gt;
[https://level-up.cc/ &#039;&#039;&#039;LevelUp&#039;&#039;&#039;] is a collection of resources for the global digital safety training community.&lt;br /&gt;
&lt;br /&gt;
[https://wiki.orgsec.community/ &#039;&#039;&#039;Organisational security community wiki&#039;&#039;&#039;] is a resource created by and for security practitioners from all backgrounds to share useful resources and document innovative approaches to long-term security work. &lt;br /&gt;
&lt;br /&gt;
==Resource collections related to security ==&lt;br /&gt;
[https://digitalfirstaid.org/ &#039;&#039;&#039;Digital First Aid Kit&#039;&#039;&#039;] - The Digital First Aid Kit is a free resource to help rapid responders, digital security trainers, and tech-savvy activists to better protect themselves and the communities they support against the most common types of digital emergencies. It can also be used by activists, human rights defenders, bloggers, journalists or media activists who want to learn more about how they can protect themselves and support others. If you or someone you are assisting is experiencing a digital emergency, the Digital First Aid Kit will guide you in diagnosing the issues you are facing, and refer you to support providers for further help if needed.&lt;br /&gt;
&lt;br /&gt;
[https://communitydocs.accessnow.org/ &#039;&#039;&#039;Access Now Help Desk documentation&#039;&#039;&#039;]&lt;br /&gt;
&lt;br /&gt;
[https://cyber-star.org/ &#039;&#039;&#039;CyberSTAR&#039;&#039;&#039;], by SecDev, makes it easier for small organizations and individuals to understand and manage digital safety by organizing it around six themes. This site presents learning resources to help you be safer online—plus teaching resources for digital safety trainers.&lt;br /&gt;
&lt;br /&gt;
[https://totem-project.org/ &#039;&#039;&#039;Totem project&#039;&#039;&#039;] - Developed in collaboration by Greenhost and Free Press Unlimited, Totem is a &#039;&#039;&#039;free&#039;&#039;&#039; &#039;&#039;&#039;online learning platform&#039;&#039;&#039; that offers educational courses about digital security and privacy, and related tools and tactics for journalists, activists and human rights defenders in a safe, online classroom environment.&lt;br /&gt;
&lt;br /&gt;
[https://advocacyassembly.org/en/courses?category=1 &#039;&#039;&#039;Advocacy Assembly&#039;&#039;&#039; online courses related to digital security] - Advocacy Assembly is a &#039;&#039;&#039;free e-learning platform&#039;&#039;&#039; featuring dozens of courses for human rights activists, campaigners and journalists.&lt;br /&gt;
&lt;br /&gt;
[https://www.saferedge.com/learning &#039;&#039;&#039;Safer Edge&#039;&#039;&#039; online courses] (not free) - Safer Edge works with security, safeguarding and risk advisory professionals with a wide range of expertise, skills and experience. Team and consultants have experience working internationally in the humanitarian and development contexts in a range of risk contexts. In-house team speaks English, French, Spanish, Portuguese, Arabic and Russian.&lt;br /&gt;
&lt;br /&gt;
[https://academy.amnesty.org/ &#039;&#039;&#039;Amnesty International&#039;s Human Rights Academy&#039;&#039;&#039;] is a free online learning platform that allows participants to embark on a self-paced learning journey to understand the principles of human rights and how to use them as a tool for positive change. We believe that knowledge of rights is essential for claiming them, defending them, and promoting them and hope that our courses will inspire you to take action.&lt;br /&gt;
&lt;br /&gt;
[https://www.protectioninternational.org/tools/protection-manuals/ &#039;&#039;&#039;Protection International&#039;s Protection Manuals&#039;&#039;&#039;] for Human Rights Defenders - These manuals were developed to provide human rights defenders with additional knowledge and tools to improve their understanding of security and protection.&lt;br /&gt;
&lt;br /&gt;
[https://www.frontlinedefenders.org/en/digital-protection-resources &#039;&#039;&#039;Front Line Defenders Digital Protection Resources&#039;&#039;&#039;] - Front Line Defenders Digital Protection programme responds to the digital security environment facing HRDs and develops tools, guides and reosources to complement its training and consultation programming.&lt;br /&gt;
&lt;br /&gt;
[https://ssd.eff.org/ &#039;&#039;&#039;Surveillance Self-Defense&#039;&#039;&#039;] toolkit by Electronic Frontier Foundation - &amp;quot;We’re the Electronic Frontier Foundation, an independent non-profit working to protect online privacy for over thirty years. This is Surveillance Self-Defense: our expert guide to protecting you and your friends from online spying.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[https://securityinabox.org/en/ &#039;&#039;&#039;Security in a Box&#039;&#039;&#039;] primarily aims to help a global community of human rights defenders whose work puts them at risk. It has been recognized worldwide as a foundational resource for helping people at risk protect their digital security and privacy.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[https://www.frontlinedefenders.org/en/resource-publication/workbook-security-practical-steps-human-rights-defenders-risk Front Line Defenders Workbook on Security]&#039;&#039;&#039; has been inspired by the hundreds of HRDs from over 50 countries who have attended Front Line Defenders workshops on security and protection. The Workbook takes you through the steps to producing a security plan – for yourself and for your organisation (for those HRDs who are working in organisations). It follows a systematic approach for assessing your security situation and developing risk and vulnerability reduction strategies and tactics. Manual available in French, Spanish, Russian, Arabic, Turkish, Portuguese, Urdu, Somali, Dari, and Chinese.&lt;/div&gt;</summary>
		<author><name>Kristin1</name></author>
	</entry>
	<entry>
		<id>https://wiki.digitalrights.community/index.php?title=Use_a_secure_messaging_app&amp;diff=52427</id>
		<title>Use a secure messaging app</title>
		<link rel="alternate" type="text/html" href="https://wiki.digitalrights.community/index.php?title=Use_a_secure_messaging_app&amp;diff=52427"/>
		<updated>2025-01-15T19:56:22Z</updated>

		<summary type="html">&lt;p&gt;Kristin1: /* Recommendation: Use Signal */ updates on signal features&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Tool Recommendation: Signal ==&lt;br /&gt;
If you are trying to decide between using Signal, WhatsApp or Telegram, most sources would say that Signal has a better reputation for security then the others. Here are a few reasons to choose Signal (source: [https://www.pcmag.com/picks/best-secure-messaging-apps The Best Secure Messaging Apps for 2024] PC Mag)&lt;br /&gt;
&lt;br /&gt;
# All of your messages are secured with E2EE and Signal is a nonprofit, so there&#039;s no reason to harvest any user data. &lt;br /&gt;
# The underlying technology of Signal is so successful it has been implemented by Google and Meta.&lt;br /&gt;
&lt;br /&gt;
=== Reasons to avoid using WhatsApp ===&lt;br /&gt;
* &#039;&#039;&#039;Requires phone number&#039;&#039;&#039; and contacts list to function (However, there are [https://www.wikihow.com/Use-WhatsApp-Without-a-Phone-Number ways around] using your actual phone number)&lt;br /&gt;
* &#039;&#039;&#039;Backups (especially iCloud) may be vulnerable to surveillance&#039;&#039;&#039; (Source: [https://freedom.press/digisec/blog/icloud-security/#:~:text=If%20not%20encrypted%2C%20law%20enforcement,case%20showing%20subpoenaed%20WhatsApp%20messages. Freedom of the Press Foundation])&lt;br /&gt;
* &#039;&#039;&#039;Privacy of content sent via WhatsApp is questionable&#039;&#039;&#039;, and there are reasons to not trust Meta and their contractors with your content (Source: [https://www.theregister.com/2021/09/07/whatsapp_privacy_propublica/ The Register])&lt;br /&gt;
* &#039;&#039;&#039;Hackers can break WhatsApp&#039;&#039;&#039; by tricking users into giving away verification codes, using spyware, sending malware as attachments, or even cloning your phone or WhatsApp account. (Source: [https://www.bitdefender.com/blog/hotforsecurity/how-scammers-gain-access-and-hack-your-whatsapp-account-and-what-you-can-do-to-protect-yourself/ BitDefender blog])&lt;br /&gt;
* &#039;&#039;&#039;Unofficial versions of WhatsApp are almost indistinguishable from the real version of WhatsApp&#039;&#039;&#039;. Unofficial versions of WhatsApp are insecure and compromise the privacy and security of communication. Having one person using an unofficial version of WhatsApp within a group makes all group communications vulnerable. [https://faq.whatsapp.com/1293093778117781 Here&#039;s how to know if you are using the official WhatsApp program].&lt;br /&gt;
&lt;br /&gt;
== Tip: Configure your privacy settings ==&lt;br /&gt;
Here are features to make your phone number more private on Signal (source: [https://support.signal.org/hc/en-us/articles/6712070553754-Phone-Number-Privacy-and-Usernames Signal Support]):&lt;br /&gt;
&lt;br /&gt;
# As a new default, your phone number will no longer be visible to everyone in Signal. You can [https://support.signal.org/hc/articles/6712070553754#see_me opt to display your phone number]. However, people who have your number saved in their phone’s contacts will still see your phone number, regardless of your settings, since they already know it.&lt;br /&gt;
# Limit [https://support.signal.org/hc/articles/6712070553754#find_me who can connect with you] on Signal via your phone number.&lt;br /&gt;
# Create a [https://support.signal.org/hc/articles/6712070553754#username username] to share instead of or in addition to using your phone number to connect on Signal.&lt;br /&gt;
&lt;br /&gt;
=== More on Signal usernames ===&lt;br /&gt;
Usernames in Signal do not function like usernames on social media platforms. Signal usernames are not logins or handles that you’ll be known by on the app – they’re simply a quick way to connect without sharing a phone number. Your profile name remains whatever you set it to. Your username is not displayed on your Profile Details page, and people you message can’t see or find your username without your sharing it. Put another way, someone will need to know your exact unique username in order to start a chat with you on Signal. And Signal does not provide a searchable directory of usernames.&lt;br /&gt;
&lt;br /&gt;
Usernames in Signal are designed to be easily changeable. For example, you can make a username to connect with people at a conference or to plan a group trip. Then, when it’s over, change it if you want to. Just click on your username from your Profile Details page to make the changes you want. When you change your username, your Signal contacts are not notified because your username is not visible to the people you are chatting with 1-1 or in groups.&lt;br /&gt;
&lt;br /&gt;
== Tip: Use automatic disappearing messages on Signal ==&lt;br /&gt;
Disappearing messages (also known as Vanish mode) is a feature that makes your messages disappear once a recipient reads them or after a certain period of time. It’s a great tool for privacy protection and chat hygiene. It&#039;s an excellent feature to use if there&#039;s a risk that your phone will be viewed by someone who may be against your human rights work. &lt;br /&gt;
&lt;br /&gt;
=== Disappearing messages in Signal ===&lt;br /&gt;
Use [https://support.signal.org/hc/en-us/articles/360007320771-Set-and-manage-disappearing-messages disappearing messages (in Signal)] to keep your message history tidy. The message will disappear from your devices after the timer has elapsed. This is not for situations where your contact is your adversary — after all, if someone who receives a disappearing message really wants a record of it, they can always use another camera to take a photo of the screen before the message disappears.&lt;br /&gt;
&lt;br /&gt;
* Disappearing messages can be managed by anyone in the chat.&lt;br /&gt;
* The setting applies to any new messaging after the timer has been set or modified.&lt;br /&gt;
* Changes to the timer will sync with your linked devices.&lt;br /&gt;
&lt;br /&gt;
=== Disappearing messages in WhatsApp ===&lt;br /&gt;
[https://faq.whatsapp.com/673193694148537 Disappearing messages] is an optional feature you can turn on for more privacy. You can set messages to disappear 24 hours, 7 days, or 90 days after they&#039;re sent unless that message is kept. The duration you choose only affects new messages in the chat, not messages you&#039;ve already sent or received. &lt;br /&gt;
&lt;br /&gt;
=== Disappearing messages in Messenger (Facebook) ===&lt;br /&gt;
[https://nordvpn.com/blog/vanish-mode/#:~:text=Vanish%20mode%20on%20Messenger%20automatically,what%20Facebook%20knows%20about%20you. Vanish mode on Messenger] automatically clears messages after the recipient has viewed them and closed the chat. This advanced feature offers Messenger users more private communication and media sharing and limits what Facebook knows about you.&lt;br /&gt;
&lt;br /&gt;
== Online courses ==&lt;br /&gt;
Totem course on &#039;&#039;&#039;Secure messaging apps&#039;&#039;&#039; (available in [https://learn.totem-project.org/courses/course-v1:Totem+TP_SM_001+course/about EN], [https://learn.totem-project.org/courses/course-v1:Totem+TP_SM_FR+cours/about FR], [https://learn.totem-project.org/courses/course-v1:Totem+TP_SM_ES+001/about ES], [https://learn.totem-project.org/courses/course-v1:Totem+TP_SM_RU+001/about RU])&lt;br /&gt;
&lt;br /&gt;
You should walk away from this course knowing&amp;lt;blockquote&amp;gt;&lt;br /&gt;
* What secure messaging actually is&lt;br /&gt;
* How to choose which secure messaging app is the best for you&lt;br /&gt;
* How to activate security measures, including:&lt;br /&gt;
&lt;br /&gt;
* End-to-end encryption&lt;br /&gt;
* Disappearing messages&lt;br /&gt;
&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Articles ==&lt;br /&gt;
[https://www.securemessagingapps.com/ Secure Messaging Apps Comparison] &lt;br /&gt;
&lt;br /&gt;
[https://www.pcmag.com/picks/best-secure-messaging-apps The Best Secure Messaging Apps for 2024] (PC Mag)&lt;/div&gt;</summary>
		<author><name>Kristin1</name></author>
	</entry>
	<entry>
		<id>https://wiki.digitalrights.community/index.php?title=General_tips_for_office_security&amp;diff=52357</id>
		<title>General tips for office security</title>
		<link rel="alternate" type="text/html" href="https://wiki.digitalrights.community/index.php?title=General_tips_for_office_security&amp;diff=52357"/>
		<updated>2025-01-02T20:22:04Z</updated>

		<summary type="html">&lt;p&gt;Kristin1: Created page with &amp;quot; == Check list: Office Security == &amp;#039;&amp;#039;(Source: Appendix 5 of the [https://www.frontlinedefenders.org/en/resource-publication/workbook-security-practical-steps-human-rights-defenders-risk Workbook on Security by Front Line Defenders])&amp;#039;&amp;#039;  This check list is not intended to be a blueprint for security. Your own context is the key determining factor. Consider the risks and threats you face, and any vulnerabilities you have in order to supplement and personalise this list.  1....&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Check list: Office Security ==&lt;br /&gt;
&#039;&#039;(Source: Appendix 5 of the [https://www.frontlinedefenders.org/en/resource-publication/workbook-security-practical-steps-human-rights-defenders-risk Workbook on Security by Front Line Defenders])&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
This check list is not intended to be a blueprint for security. Your own context is the key determining factor. Consider the risks and threats you face, and any vulnerabilities you have in order to supplement and personalise this list.&lt;br /&gt;
&lt;br /&gt;
1. Emergency Contacts&lt;br /&gt;
&lt;br /&gt;
* Is there a handy and up to date list with telephone numbers and addresses of other local NGOs, emergency hospitals, police, fire brigade and ambulance?&lt;br /&gt;
&lt;br /&gt;
2. Technical and physical boundaries (external, internal and interior)&lt;br /&gt;
&lt;br /&gt;
* Check condition and working order of external gates / fences, doors to the building, windows, walls and roof&lt;br /&gt;
* Check condition and working order of external lighting, alarms, cameras or video entrance phones&lt;br /&gt;
* Check key procedures, including that keys are kept securely and code-labelled, assignment of responsibility for controlling keys and copies, and that keys and copies are in good working order. Make sure locks are changed when keys are lost or stolen, and that such incidents are logged&lt;br /&gt;
* Do you have a special ‘safe’ room?&lt;br /&gt;
* Can the sign with your office name on it be taken down in times of increased threat to reduce your vulnerability to attack?&lt;br /&gt;
&lt;br /&gt;
3. Office personnel&lt;br /&gt;
&lt;br /&gt;
* Do you recruit only trustworthy people, including guards, and take up their references?&lt;br /&gt;
* Are all personnel trained in the relevant security plans?&lt;br /&gt;
* Do you have a plan in case the office is raided by the authorities, or other groups?&lt;br /&gt;
* Do you operate a ‘need-to-know’ policy about the most sensitive work?&lt;br /&gt;
* Do you maintain good dialogue with all staff, especially if you know they have financial problems or are under other pressures? (Disgruntled staff can make dangerous enemies.)&lt;br /&gt;
* When someone leaves the organisation, do you change security measures, passwords, keys as appropriate?&lt;br /&gt;
&lt;br /&gt;
4. Visitor Admission procedures and ‘filters’&lt;br /&gt;
&lt;br /&gt;
* Are admission procedures in operation for all types of visitors? Are all staff familiar with them?&lt;br /&gt;
* Do ask those staff members who usually carry out admission procedures if the procedures are working properly and what improvements are needed&lt;br /&gt;
* Do staff know what to do if an unexpected parcel arrives? (eg isolate it, do not open, call authorities)&lt;br /&gt;
* Do you note the names of visitors (including those attending meetings at your office)? If yes, is this information sensitive and how do you protect it? (for example by codes or encrypted files)&lt;br /&gt;
&lt;br /&gt;
5. Information security (see also Appendix 14, Computer and Phone Security)&lt;br /&gt;
&lt;br /&gt;
* Do you carry out regular back-ups and keep the back-ups in a safe place outside of the office?&lt;br /&gt;
* Do staff know not to leave any sensitive information on their desks?&lt;br /&gt;
* Do you have a secure system for recording confidential information, eg about clients or witnesses?&lt;br /&gt;
* Do you give your (physical and electronic) sensitive files secure names so they are not immediately identifiable?&lt;br /&gt;
&lt;br /&gt;
6. Security in case of accidents&lt;br /&gt;
&lt;br /&gt;
* Check the condition of fire extinguishers, gas valves/pipes and water taps, electricity plugs and cables and elecricity generators (where applicable)&lt;br /&gt;
&lt;br /&gt;
7. Responsibility and training&lt;br /&gt;
&lt;br /&gt;
* Has responsibility for office security been assigned? Is it effective?&lt;br /&gt;
* Is there an office security training programme? Does it cover all the areas&lt;/div&gt;</summary>
		<author><name>Kristin1</name></author>
	</entry>
	<entry>
		<id>https://wiki.digitalrights.community/index.php?title=Security_resources_organized_by_topic&amp;diff=52356</id>
		<title>Security resources organized by topic</title>
		<link rel="alternate" type="text/html" href="https://wiki.digitalrights.community/index.php?title=Security_resources_organized_by_topic&amp;diff=52356"/>
		<updated>2025-01-02T20:16:47Z</updated>

		<summary type="html">&lt;p&gt;Kristin1: /* Security planning on specific topics */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Building awareness of how we respond to threat and stress ==&lt;br /&gt;
&#039;&#039;Developing a useful security strategy is heavily dependent on our perception – we need to be able to identify and analyse threats in order to implement ways of avoiding or reducing them. But we all perceive the world around us differently based on our circumstances, experiences and many other factors. As a result, our perception can sometimes be hindered: threats which may be evident to some people may go unrecognised by others; similarly, we also need to be able to tell the difference between threats which are genuinely possible and those which we falsely perceive, called &#039;unfounded fears&#039;. It&#039;s a good idea to become familiar with factors that condition our perceptions of threat, and consider ways that we can take these into account in our security planning.&#039;&#039; (Source: [https://holistic-security.tacticaltech.org/chapters/prepare/1-2-individual-responses-to-threat.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Resources:&lt;br /&gt;
&lt;br /&gt;
* [https://holistic-security.tacticaltech.org/chapters/prepare/1-2-individual-responses-to-threat.html &#039;&#039;&#039;Exploring individual responses to threat&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
* [https://holistic-security.tacticaltech.org/chapters/prepare/1-4-team-and-peer-responses-to-threat.html &#039;&#039;&#039;Exploring group responses to threat&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
* [https://holistic-security.tacticaltech.org/chapters/prepare/1-5-communicating-about-threats-in-teams-and-organisations.html &#039;&#039;&#039;Communicating about security in teams and organizations&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
&lt;br /&gt;
== Understanding our threats and context ==&lt;br /&gt;
&lt;br /&gt;
=== Situation monitoring and analysis ===&lt;br /&gt;
Situation monitoring and analysis is the broadest kind of analysis of our context: observing the political, economic, social, technological, legal and environmental developments in society which are relevant to our work, and may impact our security situation. (Source: [https://holistic-security.tacticaltech.org/chapters/explore/2-2-situation-monitoring-and-analysis.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Exercise: [https://holistic-security.tacticaltech.org/exercises/explore/situational-monitoring-a-quick-pestle-analysis.html &#039;&#039;&#039;Pestle analysis&#039;&#039;&#039;] (Holistic Security Manual) &lt;br /&gt;
&lt;br /&gt;
Tool: &#039;&#039;&#039;[https://tnr-research.uwazi.io/ Research Database on transnational repression]&#039;&#039;&#039; - This collection of research reports on transnational repression can help human rights defenders better understand: &lt;br /&gt;
&lt;br /&gt;
* Transnational Repression (TNR) threats that are possible, to determine appropriate mitigation techniques&lt;br /&gt;
* Which TNR threats are unlikely, in order to alleviate fear&lt;br /&gt;
* What exiled HRDs can expect from a host country in terms of protection measures&lt;br /&gt;
* Existing campaigns to strengthen protection for exiled HRDs&lt;br /&gt;
&lt;br /&gt;
=== Identifying, analyzing and prioritizing threats ===&lt;br /&gt;
&lt;br /&gt;
==== Map the actors ====&lt;br /&gt;
&#039;&#039;It is valuable to get a clear picture of all the actors in our environment (individuals, institutions, organizations, etc). Threats almost always come from someone or something. Knowing as much as we can about the actors in our context improves our perception of our environment and thereby, our ability to carry out activities to maintain or expand our space for work.&#039;&#039; (Source: [https://holistic-security.tacticaltech.org/chapters/explore/2-3-vision-strategy-and-actors.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Exercise:&lt;br /&gt;
&lt;br /&gt;
* [https://holistic-security.tacticaltech.org/exercises/explore/visual-actor-mapping-part-1.html &#039;&#039;&#039;Spectrum of allies&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
* [https://newtactics.org/resource/exercises-identifying-allies-opponents &#039;&#039;&#039;Spectrum of allies&#039;&#039;&#039;] (New Tactics in Human Rights project)&lt;br /&gt;
&lt;br /&gt;
==== Brainstorm threats ====&lt;br /&gt;
This exercise is a first attempt at identifying the threats to yourself, your group or organization and your work in defense of human rights. This initial list of threats can then be refined so as to focus in more depth on the threats which are most likely or potentially most harmful. (Source: [https://holistic-security.tacticaltech.org/exercises/explore/threat-brainstorm.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Exercise: [https://holistic-security.tacticaltech.org/exercises/explore/threat-brainstorm.html &#039;&#039;&#039;Threat brainstorm&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
&lt;br /&gt;
==== Analyzing risk, prioritizing threats ====&lt;br /&gt;
Threats can be viewed and categorized in light of the following: the likelihood that the threat will take place, and the impact if and when it does. Likelihood and impact are concepts which help us determine risk: the higher the likelihood or impact of a threat, the higher the risk. Categorizing threats can help to keep us from feeling overwhelmed and keep our perception of threats realistic. (Source: [https://holistic-security.tacticaltech.org/chapters/explore/2-8-identifying-and-analysing-threats.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Exercise: [https://holistic-security.tacticaltech.org/chapters/explore/2-8-identifying-and-analysing-threats.html &#039;&#039;&#039;Threat matrix&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
&lt;br /&gt;
==== Analyze threats ====&lt;br /&gt;
This exercise will help you prioritize threats and divine the causes, ramifications, sources as well as the required resources, existing actions and possible next steps.&lt;br /&gt;
&lt;br /&gt;
Exercise: [https://holistic-security.tacticaltech.org/exercises/explore/threat-inventory.html &#039;&#039;&#039;Threat inventory&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
&lt;br /&gt;
== Risk mitigation ==&lt;br /&gt;
In order to build a response to the threats we face, we can consider them in terms of the factors which make us more or less susceptible to them. Read more in [https://holistic-security.tacticaltech.org/chapters/strategise/3-1-responding-to-threats.html this chapter of the Holistic Security Manual]. &lt;br /&gt;
&lt;br /&gt;
=== Digital security assessment tools ===&lt;br /&gt;
[https://digiresilience.org/solutions/wellness-check/ &#039;&#039;&#039;Digital Wellness Check&#039;&#039;&#039;] by the Center for Digital Resilience - The Wellness Check Report Generator is a tool to help the community create beautiful risk assessments. You can download the tool directly from [https://gitlab.com/digiresilience/digital-wellness/wellness-check-report-generator Gitlab]. &lt;br /&gt;
&lt;br /&gt;
The Ford Foundation’s [https://www.fordfoundation.org/work/our-grants/building-institutions-and-networks/cybersecurity-assessment-tool/ &#039;&#039;&#039;Cybersecurity Assessment Tool (CAT)&#039;&#039;&#039;] is designed to measure the maturity, resiliency, and strength of an organization’s cybersecurity efforts. We have created this questionnaire with busy nontechnical grant makers, grantee partners, civil society organizations, and nonprofits in mind, and we hope it helps shine some light on a recommended path forward for any organization undertaking a cybersecurity journey &lt;br /&gt;
&lt;br /&gt;
=== Mitigation techniques for common threats to information ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
! Threat&lt;br /&gt;
!Mitigation techniques and links to guidance &lt;br /&gt;
|-&lt;br /&gt;
|Data loss&lt;br /&gt;
|&lt;br /&gt;
* [[Ways to securely store and share files|Have your information securely in the cloud or on a server]]&lt;br /&gt;
* Have a backup process&lt;br /&gt;
|-&lt;br /&gt;
|Compromised accounts&lt;br /&gt;
|&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa|Use two factor authentication for all accounts]]&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa|Use unique, complex passwords for all accounts]]&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa|Use a password manager to create, store and protect those passwords]]&lt;br /&gt;
|-&lt;br /&gt;
|Device inspection at checkpoints&lt;br /&gt;
|&lt;br /&gt;
* [[Use a secure messaging app#Tip: use automatic disappearing messages|Use automated disappearing messages on your messaging apps]]&lt;br /&gt;
* [[Ways to securely store and share files|Have your sensitive information stored safely in the cloud and off of your device]]&lt;br /&gt;
* Hide or delete any apps that would provide access to this information (you can restore that app later)&lt;br /&gt;
|-&lt;br /&gt;
|Device confiscation or theft&lt;br /&gt;
|&lt;br /&gt;
* [[Secure your devices#Full disk encryption|Encrypt your devices]]&lt;br /&gt;
* And, review and adapt the same advice above for “device inspection” threat&lt;br /&gt;
|-&lt;br /&gt;
|Information handover&lt;br /&gt;
|&lt;br /&gt;
* [[Trusted hosting companies in the human rights community|Host your information with a company you trust]], who will not turn over information to your opponents (via subpoena, request, etc)&lt;br /&gt;
|-&lt;br /&gt;
|Targeted malware or spyware&lt;br /&gt;
|&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa#Be aware of spear phishing attacks|Protect yourselves against (spear) phishing attacks]]&lt;br /&gt;
* Use a second device for sensitive activities&lt;br /&gt;
* [[How to mitigate your risk of being subject to Pegasus surveillance|Restart your device regularly to disrupt spyware]]&lt;br /&gt;
* [[Secure your devices|Use anti virus]]&lt;br /&gt;
* [[How to mitigate your risk of being subject to Pegasus surveillance]], and other spyware&lt;br /&gt;
* [[Guidance for purchasing devices with strong security features]]&lt;br /&gt;
|-&lt;br /&gt;
|Surveillance and monitoring&lt;br /&gt;
|&lt;br /&gt;
* [[Safe internet browsing using VPN and Tor browser|Use a VPN and/or Tor browser]]&lt;br /&gt;
* [[Use a secure messaging app]]&lt;br /&gt;
* [[How to collect and store information in a secure way]]&lt;br /&gt;
* [[Ways to securely store and share files|How to use Google Drive safely and alternatives to Google Drive]]&lt;br /&gt;
* [[Use a Faraday cage to block electromagnetic transmissions from a device]]&lt;br /&gt;
|-&lt;br /&gt;
|Website hacking and takeover&lt;br /&gt;
|&lt;br /&gt;
* [[Protect your website|Protect your website from DDOS attacks]]&lt;br /&gt;
* [[Trusted hosting companies in the human rights community|Use a host company that you trust]]&lt;br /&gt;
* And, review and adapt the same advice above for &amp;quot;compromised accounts&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
Other important considerations when collecting, storing, using sensitive information:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Consideration&lt;br /&gt;
!Resources&lt;br /&gt;
|-&lt;br /&gt;
|Make sure you have informed consent from the people you are collecting information&lt;br /&gt;
|[[Guidance on informed consent]]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
* [[Information Security for Human Rights Defenders]]&lt;br /&gt;
&lt;br /&gt;
===Mitigation techniques for online harassment===&lt;br /&gt;
[[How to deal with online harassment and threats]]&lt;br /&gt;
&lt;br /&gt;
==Security planning ==&lt;br /&gt;
Once we have clarity about the threats we face during our activities, we can begin to organize our security protocols into security plans or agreements. There are three main areas to consider when developing any security plans: &lt;br /&gt;
&lt;br /&gt;
# &#039;&#039;&#039;PREPARE: Prevention of threats&#039;&#039;&#039; - Most security plans will include tactics which aim to prevent identified threats from taking place (i.e. reducing their likelihood). This will include:&lt;br /&gt;
## Identify &amp;amp; assess the threats and your vulnerabilities&lt;br /&gt;
## Develop security policies and procedures&lt;br /&gt;
## Implement preventive measures&lt;br /&gt;
## Invest in Security Awareness Programs&lt;br /&gt;
## Conduct Security testing&lt;br /&gt;
# &#039;&#039;&#039;RESPOND: Emergency responses&#039;&#039;&#039; - Emergency plans, also called contingency plans, are the actions which we take in response to a threat becoming a reality. This will include:&lt;br /&gt;
## Build Incident Response Plan&lt;br /&gt;
## Communication Strategy&lt;br /&gt;
## Business continuity plan&lt;br /&gt;
## Disaster recovery plan (Data Backups and Recovery)&lt;br /&gt;
## Communication and Collaboration&lt;br /&gt;
# &#039;&#039;&#039;TREAT: Well-being considerations&#039;&#039;&#039; - Actions we take to maintain our physical energy and a mindful approach to our work and our security –it may include such considerations as where and when we will eat, sleep, relax and enjoy ourselves in the course of our work. This will include: &lt;br /&gt;
## Analyze lessons learned&lt;br /&gt;
## Recovery and Remediation&lt;br /&gt;
## Psychological safety considerations,&lt;br /&gt;
## Review and update your security plans and approach&lt;br /&gt;
For more information, read &#039;&#039;&#039;[[General guidance for creating security plans and agreements]]&#039;&#039;&#039; and review [https://holistic-security.tacticaltech.org/chapters/strategise/3-3-creating-security-plans-and-agreements.html this chapter of the Holistic Security Manual]. &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Additional resources:  &lt;br /&gt;
&lt;br /&gt;
* Consumer Reports [https://securityplanner.consumerreports.org/ &#039;&#039;&#039;Security Planner&#039;&#039;&#039;] is a free, easy-to-use guide to staying safer online. It provides personalized recommendations and expert advice on topics such as keeping social media accounts from being hacked, locking down devices ranging from smartphones to home security cameras, and reducing intrusive tracking by websites.&lt;br /&gt;
* [https://www.nist.gov/itl/smallbusinesscyber/nist-cybersecurity-framework-0 &#039;&#039;&#039;NIST Cybersecurity Framework 2.0&#039;&#039;&#039;]:  Small Business Quick Start Guide - provides small-to-medium sized businesses (SMB), specifically those who have modest or no cybersecurity plans in place, with considerations to kick-start their cybersecurity risk management strategy using the NIST Cybersecurity Framework (CSF) 2.0. (by the &#039;&#039;National Institute of Standards and Technology)&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Security planning on specific topics===&lt;br /&gt;
&lt;br /&gt;
* [[General tips for international travel]]&lt;br /&gt;
* [[General tips for home security]]&lt;br /&gt;
* [[General tips for office security]]&lt;br /&gt;
&lt;br /&gt;
== Building a culture of security within a team ==&lt;br /&gt;
[https://level-up.cc/ &#039;&#039;&#039;LevelUp&#039;&#039;&#039;] is a collection of resources for the global digital safety training community.&lt;br /&gt;
&lt;br /&gt;
[https://wiki.orgsec.community/ &#039;&#039;&#039;Organisational security community wiki&#039;&#039;&#039;] is a resource created by and for security practitioners from all backgrounds to share useful resources and document innovative approaches to long-term security work. &lt;br /&gt;
&lt;br /&gt;
==Resource collections related to security ==&lt;br /&gt;
[https://digitalfirstaid.org/ &#039;&#039;&#039;Digital First Aid Kit&#039;&#039;&#039;] - The Digital First Aid Kit is a free resource to help rapid responders, digital security trainers, and tech-savvy activists to better protect themselves and the communities they support against the most common types of digital emergencies. It can also be used by activists, human rights defenders, bloggers, journalists or media activists who want to learn more about how they can protect themselves and support others. If you or someone you are assisting is experiencing a digital emergency, the Digital First Aid Kit will guide you in diagnosing the issues you are facing, and refer you to support providers for further help if needed.&lt;br /&gt;
&lt;br /&gt;
[https://communitydocs.accessnow.org/ &#039;&#039;&#039;Access Now Help Desk documentation&#039;&#039;&#039;]&lt;br /&gt;
&lt;br /&gt;
[https://cyber-star.org/ &#039;&#039;&#039;CyberSTAR&#039;&#039;&#039;], by SecDev, makes it easier for small organizations and individuals to understand and manage digital safety by organizing it around six themes. This site presents learning resources to help you be safer online—plus teaching resources for digital safety trainers.&lt;br /&gt;
&lt;br /&gt;
[https://totem-project.org/ &#039;&#039;&#039;Totem project&#039;&#039;&#039;] - Developed in collaboration by Greenhost and Free Press Unlimited, Totem is a &#039;&#039;&#039;free&#039;&#039;&#039; &#039;&#039;&#039;online learning platform&#039;&#039;&#039; that offers educational courses about digital security and privacy, and related tools and tactics for journalists, activists and human rights defenders in a safe, online classroom environment.&lt;br /&gt;
&lt;br /&gt;
[https://advocacyassembly.org/en/courses?category=1 &#039;&#039;&#039;Advocacy Assembly&#039;&#039;&#039; online courses related to digital security] - Advocacy Assembly is a &#039;&#039;&#039;free e-learning platform&#039;&#039;&#039; featuring dozens of courses for human rights activists, campaigners and journalists.&lt;br /&gt;
&lt;br /&gt;
[https://www.saferedge.com/learning &#039;&#039;&#039;Safer Edge&#039;&#039;&#039; online courses] (not free) - Safer Edge works with security, safeguarding and risk advisory professionals with a wide range of expertise, skills and experience. Team and consultants have experience working internationally in the humanitarian and development contexts in a range of risk contexts. In-house team speaks English, French, Spanish, Portuguese, Arabic and Russian.&lt;br /&gt;
&lt;br /&gt;
[https://academy.amnesty.org/ &#039;&#039;&#039;Amnesty International&#039;s Human Rights Academy&#039;&#039;&#039;] is a free online learning platform that allows participants to embark on a self-paced learning journey to understand the principles of human rights and how to use them as a tool for positive change. We believe that knowledge of rights is essential for claiming them, defending them, and promoting them and hope that our courses will inspire you to take action.&lt;br /&gt;
&lt;br /&gt;
[https://www.protectioninternational.org/tools/protection-manuals/ &#039;&#039;&#039;Protection International&#039;s Protection Manuals&#039;&#039;&#039;] for Human Rights Defenders - These manuals were developed to provide human rights defenders with additional knowledge and tools to improve their understanding of security and protection.&lt;br /&gt;
&lt;br /&gt;
[https://www.frontlinedefenders.org/en/digital-protection-resources &#039;&#039;&#039;Front Line Defenders Digital Protection Resources&#039;&#039;&#039;] - Front Line Defenders Digital Protection programme responds to the digital security environment facing HRDs and develops tools, guides and reosources to complement its training and consultation programming.&lt;br /&gt;
&lt;br /&gt;
[https://ssd.eff.org/ &#039;&#039;&#039;Surveillance Self-Defense&#039;&#039;&#039;] toolkit by Electronic Frontier Foundation - &amp;quot;We’re the Electronic Frontier Foundation, an independent non-profit working to protect online privacy for over thirty years. This is Surveillance Self-Defense: our expert guide to protecting you and your friends from online spying.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[https://securityinabox.org/en/ &#039;&#039;&#039;Security in a Box&#039;&#039;&#039;] primarily aims to help a global community of human rights defenders whose work puts them at risk. It has been recognized worldwide as a foundational resource for helping people at risk protect their digital security and privacy.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[https://www.frontlinedefenders.org/en/resource-publication/workbook-security-practical-steps-human-rights-defenders-risk Front Line Defenders Workbook on Security]&#039;&#039;&#039; has been inspired by the hundreds of HRDs from over 50 countries who have attended Front Line Defenders workshops on security and protection. The Workbook takes you through the steps to producing a security plan – for yourself and for your organisation (for those HRDs who are working in organisations). It follows a systematic approach for assessing your security situation and developing risk and vulnerability reduction strategies and tactics. Manual available in French, Spanish, Russian, Arabic, Turkish, Portuguese, Urdu, Somali, Dari, and Chinese.&lt;/div&gt;</summary>
		<author><name>Kristin1</name></author>
	</entry>
	<entry>
		<id>https://wiki.digitalrights.community/index.php?title=Research_on_transnational_repression&amp;diff=52355</id>
		<title>Research on transnational repression</title>
		<link rel="alternate" type="text/html" href="https://wiki.digitalrights.community/index.php?title=Research_on_transnational_repression&amp;diff=52355"/>
		<updated>2024-12-31T19:02:07Z</updated>

		<summary type="html">&lt;p&gt;Kristin1: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Introduction ==&lt;br /&gt;
What is transnational repression? It is governments reaching across borders to silence dissent among diasporas and exiles, including through assassinations, illegal deportations, abductions, digital threats, Interpol abuse, and family intimidation.&lt;br /&gt;
&lt;br /&gt;
It is a daily assault on civilians everywhere — including in democracies like the United States, United Kingdom, Canada, Germany, Australia, and South Africa.&lt;br /&gt;
&lt;br /&gt;
Source: https://freedomhouse.org/report/transnational-repression&lt;br /&gt;
&lt;br /&gt;
== Videos ==&lt;br /&gt;
* [https://www.youtube.com/watch?v=FkPCec7jG5I Digital Transnational Repression Explained], by Citizen Lab&lt;br /&gt;
* [https://www.youtube.com/watch?v=8YcHajYQLSw Digital Transnational Repression Explained: Activists], by Citizen Lab&lt;br /&gt;
* [https://www.youtube.com/watch?v=N72UV-aD9r4 Gender-based Digital Transnational Repression Explained], by Citizen Lab&lt;br /&gt;
* [https://www.youtube.com/watch?v=3D4EjMq5FK4 Responding to Transnational Repression] - recorded panel discussion from Dec 2021 &lt;br /&gt;
* [https://www.orionpolicy.org/orionforum/111/transnational-repression-the-long-arm-of-authoritarianism Transnational Repression: The Long Arm of Authoritarianism] (parts 1 and 2) - recorded panel discussion from Sept/Oct 2022. &lt;br /&gt;
* [https://www.youtube.com/watch?v=86Q_9IUosCE&amp;amp;t=71s Defending Democracy in Exile: Policy Responses to Transnational Repression] by Freedom House&lt;br /&gt;
&lt;br /&gt;
== Reports ==&lt;br /&gt;
&lt;br /&gt;
=== Research Database on Transnational Repression (TNR) ===&lt;br /&gt;
https://tnr-research.uwazi.io/en/ &lt;br /&gt;
&lt;br /&gt;
This collection of research reports can help human rights defenders better understand:&lt;br /&gt;
&lt;br /&gt;
* Which TNR threats are likely or possible based on the existing evidence, to determine appropriate mitigation techniques&lt;br /&gt;
* Which TNR threats are unlikely, in order to alleviate fear&lt;br /&gt;
* What exiled HRDs can expect from a host country in terms of protection measures&lt;br /&gt;
* Existing campaigns to strengthen protection for exiled HRDs&lt;br /&gt;
&lt;br /&gt;
This database was developed and curated by the Center for Victims of Torture. To contribute to this research, email research@freedomhouse.org&lt;br /&gt;
&lt;br /&gt;
Reports in this database include:&lt;br /&gt;
&lt;br /&gt;
* Defending Democracy in Exile: Policy Responses to Transnational Repression, report by Freedom House&lt;br /&gt;
* Silencing Across Borders: Transnational Repression and Digital Threats Against Exiled Activists, report by Marcus Michaelsen&lt;br /&gt;
* Psychological and Emotional War: Digital Transnational Repression in Canada, report by Citizen Lab&lt;br /&gt;
* Going after the family: Transnational repression and the proxy punishment of Middle Eastern diasporas, article co-authored with Dana M. Moss &amp;amp; Gillian Kennedy. &lt;br /&gt;
&lt;br /&gt;
== Books ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The Arab Spring Abroad: Diaspora Activism against Authoritarian Regimes&#039;&#039;&#039;, book by Dana Moss. You can download this book for free here: https://www.cambridge.org/core/books/arab-spring-abroad/D7EC15ED46D37A2DB8CDDB83F06CC591#overview&lt;br /&gt;
&lt;br /&gt;
== TNR threat categories ==&lt;br /&gt;
&lt;br /&gt;
* Unlawful deportation, extradition, rendition, Interpol abuse, legal cases&lt;br /&gt;
** Examples: trial in absentia, initiate a criminal case in order to carry out deportation or extradition&lt;br /&gt;
*Physical intimidation, assault, etc&lt;br /&gt;
* Coercion by proxy / Threats against in-country relatives&lt;br /&gt;
** Examples: Opponent may harass, threaten, prosecute, and imprison family or colleagues&lt;br /&gt;
*Account and device hacking&lt;br /&gt;
** Examples: Opponents hack social media or email accounts&lt;br /&gt;
* Monitoring and surveillance&lt;br /&gt;
** Examples: Tracking and identifying HRDs, monitor family members’ conversations so they can access communications, infiltration of network through informants,  surveil/monitor communication to ascertain location and activities&lt;br /&gt;
* Slander, harassment, disinformation campaigns&lt;br /&gt;
** Examples: Smear campaigns, hate speech and harassment in social media&lt;br /&gt;
&lt;br /&gt;
== TNR mitigation techniques ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Threat category&lt;br /&gt;
!Mitigation techniques&lt;br /&gt;
!Resources and research&lt;br /&gt;
|-&lt;br /&gt;
|Unlawful deportation, extradition, rendition, Interpol abuse, legal cases&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|Physical intimidation, assault, etc&lt;br /&gt;
|Personal safety awareness (see Umbrella app)&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|Coercion by proxy / Threats against in-country relatives&lt;br /&gt;
|&lt;br /&gt;
|[https://tnr-research.uwazi.io/en/entity/s0hrhs72n7n Going after the family: Transnational repression and the proxy punishment of Middle Eastern diasporas] (Moss, Michaelsen, Kennedy (2022))&lt;br /&gt;
|-&lt;br /&gt;
|Account and device hacking&lt;br /&gt;
|&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa|Use two factor authentication for all accounts]]&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa|Use unique, complex passwords for all accounts]]&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa|Use a password manager to create, store and protect those passwords]]&lt;br /&gt;
* [[Protect your website|Protect your website from DDOS attacks]]&lt;br /&gt;
* [[Trusted hosting companies in the human rights community|Use a host company that you trust]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|Monitoring and surveillance&lt;br /&gt;
|&lt;br /&gt;
* [[Safe internet browsing using VPN and Tor browser|Use a VPN and/or Tor browser]]&lt;br /&gt;
* [[Use a secure messaging app]]&lt;br /&gt;
* [[How to collect and store information in a secure way]]&lt;br /&gt;
&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa#Be aware of spear phishing attacks|Protect yourselves against (spear) phishing attacks]]&lt;br /&gt;
* Use a second device for sensitive activities&lt;br /&gt;
* [[How to mitigate your risk of being subject to Pegasus surveillance|Restart your device regularly to disrupt spyware]]&lt;br /&gt;
* [[Secure your devices|Use anti virus]]&lt;br /&gt;
* [[How to mitigate your risk of being subject to Pegasus surveillance]], and other spyware&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|Slander, harassment, disinformation campaigns&lt;br /&gt;
|[[How to deal with online harassment and threats]]&lt;br /&gt;
|&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Kristin1</name></author>
	</entry>
	<entry>
		<id>https://wiki.digitalrights.community/index.php?title=Security_resources_organized_by_topic&amp;diff=52354</id>
		<title>Security resources organized by topic</title>
		<link rel="alternate" type="text/html" href="https://wiki.digitalrights.community/index.php?title=Security_resources_organized_by_topic&amp;diff=52354"/>
		<updated>2024-12-27T20:25:24Z</updated>

		<summary type="html">&lt;p&gt;Kristin1: /* Risk mitigation */ added digital security assessment tools&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Building awareness of how we respond to threat and stress ==&lt;br /&gt;
&#039;&#039;Developing a useful security strategy is heavily dependent on our perception – we need to be able to identify and analyse threats in order to implement ways of avoiding or reducing them. But we all perceive the world around us differently based on our circumstances, experiences and many other factors. As a result, our perception can sometimes be hindered: threats which may be evident to some people may go unrecognised by others; similarly, we also need to be able to tell the difference between threats which are genuinely possible and those which we falsely perceive, called &#039;unfounded fears&#039;. It&#039;s a good idea to become familiar with factors that condition our perceptions of threat, and consider ways that we can take these into account in our security planning.&#039;&#039; (Source: [https://holistic-security.tacticaltech.org/chapters/prepare/1-2-individual-responses-to-threat.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Resources:&lt;br /&gt;
&lt;br /&gt;
* [https://holistic-security.tacticaltech.org/chapters/prepare/1-2-individual-responses-to-threat.html &#039;&#039;&#039;Exploring individual responses to threat&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
* [https://holistic-security.tacticaltech.org/chapters/prepare/1-4-team-and-peer-responses-to-threat.html &#039;&#039;&#039;Exploring group responses to threat&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
* [https://holistic-security.tacticaltech.org/chapters/prepare/1-5-communicating-about-threats-in-teams-and-organisations.html &#039;&#039;&#039;Communicating about security in teams and organizations&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
&lt;br /&gt;
== Understanding our threats and context ==&lt;br /&gt;
&lt;br /&gt;
=== Situation monitoring and analysis ===&lt;br /&gt;
Situation monitoring and analysis is the broadest kind of analysis of our context: observing the political, economic, social, technological, legal and environmental developments in society which are relevant to our work, and may impact our security situation. (Source: [https://holistic-security.tacticaltech.org/chapters/explore/2-2-situation-monitoring-and-analysis.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Exercise: [https://holistic-security.tacticaltech.org/exercises/explore/situational-monitoring-a-quick-pestle-analysis.html &#039;&#039;&#039;Pestle analysis&#039;&#039;&#039;] (Holistic Security Manual) &lt;br /&gt;
&lt;br /&gt;
Tool: &#039;&#039;&#039;[https://tnr-research.uwazi.io/ Research Database on transnational repression]&#039;&#039;&#039; - This collection of research reports on transnational repression can help human rights defenders better understand: &lt;br /&gt;
&lt;br /&gt;
* Transnational Repression (TNR) threats that are possible, to determine appropriate mitigation techniques&lt;br /&gt;
* Which TNR threats are unlikely, in order to alleviate fear&lt;br /&gt;
* What exiled HRDs can expect from a host country in terms of protection measures&lt;br /&gt;
* Existing campaigns to strengthen protection for exiled HRDs&lt;br /&gt;
&lt;br /&gt;
=== Identifying, analyzing and prioritizing threats ===&lt;br /&gt;
&lt;br /&gt;
==== Map the actors ====&lt;br /&gt;
&#039;&#039;It is valuable to get a clear picture of all the actors in our environment (individuals, institutions, organizations, etc). Threats almost always come from someone or something. Knowing as much as we can about the actors in our context improves our perception of our environment and thereby, our ability to carry out activities to maintain or expand our space for work.&#039;&#039; (Source: [https://holistic-security.tacticaltech.org/chapters/explore/2-3-vision-strategy-and-actors.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Exercise:&lt;br /&gt;
&lt;br /&gt;
* [https://holistic-security.tacticaltech.org/exercises/explore/visual-actor-mapping-part-1.html &#039;&#039;&#039;Spectrum of allies&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
* [https://newtactics.org/resource/exercises-identifying-allies-opponents &#039;&#039;&#039;Spectrum of allies&#039;&#039;&#039;] (New Tactics in Human Rights project)&lt;br /&gt;
&lt;br /&gt;
==== Brainstorm threats ====&lt;br /&gt;
This exercise is a first attempt at identifying the threats to yourself, your group or organization and your work in defense of human rights. This initial list of threats can then be refined so as to focus in more depth on the threats which are most likely or potentially most harmful. (Source: [https://holistic-security.tacticaltech.org/exercises/explore/threat-brainstorm.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Exercise: [https://holistic-security.tacticaltech.org/exercises/explore/threat-brainstorm.html &#039;&#039;&#039;Threat brainstorm&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
&lt;br /&gt;
==== Analyzing risk, prioritizing threats ====&lt;br /&gt;
Threats can be viewed and categorized in light of the following: the likelihood that the threat will take place, and the impact if and when it does. Likelihood and impact are concepts which help us determine risk: the higher the likelihood or impact of a threat, the higher the risk. Categorizing threats can help to keep us from feeling overwhelmed and keep our perception of threats realistic. (Source: [https://holistic-security.tacticaltech.org/chapters/explore/2-8-identifying-and-analysing-threats.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Exercise: [https://holistic-security.tacticaltech.org/chapters/explore/2-8-identifying-and-analysing-threats.html &#039;&#039;&#039;Threat matrix&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
&lt;br /&gt;
==== Analyze threats ====&lt;br /&gt;
This exercise will help you prioritize threats and divine the causes, ramifications, sources as well as the required resources, existing actions and possible next steps.&lt;br /&gt;
&lt;br /&gt;
Exercise: [https://holistic-security.tacticaltech.org/exercises/explore/threat-inventory.html &#039;&#039;&#039;Threat inventory&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
&lt;br /&gt;
== Risk mitigation ==&lt;br /&gt;
In order to build a response to the threats we face, we can consider them in terms of the factors which make us more or less susceptible to them. Read more in [https://holistic-security.tacticaltech.org/chapters/strategise/3-1-responding-to-threats.html this chapter of the Holistic Security Manual]. &lt;br /&gt;
&lt;br /&gt;
=== Digital security assessment tools ===&lt;br /&gt;
[https://digiresilience.org/solutions/wellness-check/ &#039;&#039;&#039;Digital Wellness Check&#039;&#039;&#039;] by the Center for Digital Resilience - The Wellness Check Report Generator is a tool to help the community create beautiful risk assessments. You can download the tool directly from [https://gitlab.com/digiresilience/digital-wellness/wellness-check-report-generator Gitlab]. &lt;br /&gt;
&lt;br /&gt;
The Ford Foundation’s [https://www.fordfoundation.org/work/our-grants/building-institutions-and-networks/cybersecurity-assessment-tool/ &#039;&#039;&#039;Cybersecurity Assessment Tool (CAT)&#039;&#039;&#039;] is designed to measure the maturity, resiliency, and strength of an organization’s cybersecurity efforts. We have created this questionnaire with busy nontechnical grant makers, grantee partners, civil society organizations, and nonprofits in mind, and we hope it helps shine some light on a recommended path forward for any organization undertaking a cybersecurity journey &lt;br /&gt;
&lt;br /&gt;
=== Mitigation techniques for common threats to information ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
! Threat&lt;br /&gt;
!Mitigation techniques and links to guidance &lt;br /&gt;
|-&lt;br /&gt;
|Data loss&lt;br /&gt;
|&lt;br /&gt;
* [[Ways to securely store and share files|Have your information securely in the cloud or on a server]]&lt;br /&gt;
* Have a backup process&lt;br /&gt;
|-&lt;br /&gt;
|Compromised accounts&lt;br /&gt;
|&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa|Use two factor authentication for all accounts]]&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa|Use unique, complex passwords for all accounts]]&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa|Use a password manager to create, store and protect those passwords]]&lt;br /&gt;
|-&lt;br /&gt;
|Device inspection at checkpoints&lt;br /&gt;
|&lt;br /&gt;
* [[Use a secure messaging app#Tip: use automatic disappearing messages|Use automated disappearing messages on your messaging apps]]&lt;br /&gt;
* [[Ways to securely store and share files|Have your sensitive information stored safely in the cloud and off of your device]]&lt;br /&gt;
* Hide or delete any apps that would provide access to this information (you can restore that app later)&lt;br /&gt;
|-&lt;br /&gt;
|Device confiscation or theft&lt;br /&gt;
|&lt;br /&gt;
* [[Secure your devices#Full disk encryption|Encrypt your devices]]&lt;br /&gt;
* And, review and adapt the same advice above for “device inspection” threat&lt;br /&gt;
|-&lt;br /&gt;
|Information handover&lt;br /&gt;
|&lt;br /&gt;
* [[Trusted hosting companies in the human rights community|Host your information with a company you trust]], who will not turn over information to your opponents (via subpoena, request, etc)&lt;br /&gt;
|-&lt;br /&gt;
|Targeted malware or spyware&lt;br /&gt;
|&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa#Be aware of spear phishing attacks|Protect yourselves against (spear) phishing attacks]]&lt;br /&gt;
* Use a second device for sensitive activities&lt;br /&gt;
* [[How to mitigate your risk of being subject to Pegasus surveillance|Restart your device regularly to disrupt spyware]]&lt;br /&gt;
* [[Secure your devices|Use anti virus]]&lt;br /&gt;
* [[How to mitigate your risk of being subject to Pegasus surveillance]], and other spyware&lt;br /&gt;
* [[Guidance for purchasing devices with strong security features]]&lt;br /&gt;
|-&lt;br /&gt;
|Surveillance and monitoring&lt;br /&gt;
|&lt;br /&gt;
* [[Safe internet browsing using VPN and Tor browser|Use a VPN and/or Tor browser]]&lt;br /&gt;
* [[Use a secure messaging app]]&lt;br /&gt;
* [[How to collect and store information in a secure way]]&lt;br /&gt;
* [[Ways to securely store and share files|How to use Google Drive safely and alternatives to Google Drive]]&lt;br /&gt;
* [[Use a Faraday cage to block electromagnetic transmissions from a device]]&lt;br /&gt;
|-&lt;br /&gt;
|Website hacking and takeover&lt;br /&gt;
|&lt;br /&gt;
* [[Protect your website|Protect your website from DDOS attacks]]&lt;br /&gt;
* [[Trusted hosting companies in the human rights community|Use a host company that you trust]]&lt;br /&gt;
* And, review and adapt the same advice above for &amp;quot;compromised accounts&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
Other important considerations when collecting, storing, using sensitive information:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Consideration&lt;br /&gt;
!Resources&lt;br /&gt;
|-&lt;br /&gt;
|Make sure you have informed consent from the people you are collecting information&lt;br /&gt;
|[[Guidance on informed consent]]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
* [[Information Security for Human Rights Defenders]]&lt;br /&gt;
&lt;br /&gt;
===Mitigation techniques for online harassment===&lt;br /&gt;
[[How to deal with online harassment and threats]]&lt;br /&gt;
&lt;br /&gt;
==Security planning ==&lt;br /&gt;
Once we have clarity about the threats we face during our activities, we can begin to organize our security protocols into security plans or agreements. There are three main areas to consider when developing any security plans: &lt;br /&gt;
&lt;br /&gt;
# &#039;&#039;&#039;PREPARE: Prevention of threats&#039;&#039;&#039; - Most security plans will include tactics which aim to prevent identified threats from taking place (i.e. reducing their likelihood). This will include:&lt;br /&gt;
## Identify &amp;amp; assess the threats and your vulnerabilities&lt;br /&gt;
## Develop security policies and procedures&lt;br /&gt;
## Implement preventive measures&lt;br /&gt;
## Invest in Security Awareness Programs&lt;br /&gt;
## Conduct Security testing&lt;br /&gt;
# &#039;&#039;&#039;RESPOND: Emergency responses&#039;&#039;&#039; - Emergency plans, also called contingency plans, are the actions which we take in response to a threat becoming a reality. This will include:&lt;br /&gt;
## Build Incident Response Plan&lt;br /&gt;
## Communication Strategy&lt;br /&gt;
## Business continuity plan&lt;br /&gt;
## Disaster recovery plan (Data Backups and Recovery)&lt;br /&gt;
## Communication and Collaboration&lt;br /&gt;
# &#039;&#039;&#039;TREAT: Well-being considerations&#039;&#039;&#039; - Actions we take to maintain our physical energy and a mindful approach to our work and our security –it may include such considerations as where and when we will eat, sleep, relax and enjoy ourselves in the course of our work. This will include: &lt;br /&gt;
## Analyze lessons learned&lt;br /&gt;
## Recovery and Remediation&lt;br /&gt;
## Psychological safety considerations,&lt;br /&gt;
## Review and update your security plans and approach&lt;br /&gt;
For more information, read &#039;&#039;&#039;[[General guidance for creating security plans and agreements]]&#039;&#039;&#039; and review [https://holistic-security.tacticaltech.org/chapters/strategise/3-3-creating-security-plans-and-agreements.html this chapter of the Holistic Security Manual]. &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Additional resources:  &lt;br /&gt;
&lt;br /&gt;
* Consumer Reports [https://securityplanner.consumerreports.org/ &#039;&#039;&#039;Security Planner&#039;&#039;&#039;] is a free, easy-to-use guide to staying safer online. It provides personalized recommendations and expert advice on topics such as keeping social media accounts from being hacked, locking down devices ranging from smartphones to home security cameras, and reducing intrusive tracking by websites.&lt;br /&gt;
* [https://www.nist.gov/itl/smallbusinesscyber/nist-cybersecurity-framework-0 &#039;&#039;&#039;NIST Cybersecurity Framework 2.0&#039;&#039;&#039;]:  Small Business Quick Start Guide - provides small-to-medium sized businesses (SMB), specifically those who have modest or no cybersecurity plans in place, with considerations to kick-start their cybersecurity risk management strategy using the NIST Cybersecurity Framework (CSF) 2.0. (by the &#039;&#039;National Institute of Standards and Technology)&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Security planning on specific topics===&lt;br /&gt;
&lt;br /&gt;
* [[General tips for international travel]]&lt;br /&gt;
* [[General tips for home security]]&lt;br /&gt;
&lt;br /&gt;
== Building a culture of security within a team ==&lt;br /&gt;
[https://level-up.cc/ &#039;&#039;&#039;LevelUp&#039;&#039;&#039;] is a collection of resources for the global digital safety training community.&lt;br /&gt;
&lt;br /&gt;
[https://wiki.orgsec.community/ &#039;&#039;&#039;Organisational security community wiki&#039;&#039;&#039;] is a resource created by and for security practitioners from all backgrounds to share useful resources and document innovative approaches to long-term security work. &lt;br /&gt;
&lt;br /&gt;
==Resource collections related to security ==&lt;br /&gt;
[https://digitalfirstaid.org/ &#039;&#039;&#039;Digital First Aid Kit&#039;&#039;&#039;] - The Digital First Aid Kit is a free resource to help rapid responders, digital security trainers, and tech-savvy activists to better protect themselves and the communities they support against the most common types of digital emergencies. It can also be used by activists, human rights defenders, bloggers, journalists or media activists who want to learn more about how they can protect themselves and support others. If you or someone you are assisting is experiencing a digital emergency, the Digital First Aid Kit will guide you in diagnosing the issues you are facing, and refer you to support providers for further help if needed.&lt;br /&gt;
&lt;br /&gt;
[https://communitydocs.accessnow.org/ &#039;&#039;&#039;Access Now Help Desk documentation&#039;&#039;&#039;]&lt;br /&gt;
&lt;br /&gt;
[https://cyber-star.org/ &#039;&#039;&#039;CyberSTAR&#039;&#039;&#039;], by SecDev, makes it easier for small organizations and individuals to understand and manage digital safety by organizing it around six themes. This site presents learning resources to help you be safer online—plus teaching resources for digital safety trainers.&lt;br /&gt;
&lt;br /&gt;
[https://totem-project.org/ &#039;&#039;&#039;Totem project&#039;&#039;&#039;] - Developed in collaboration by Greenhost and Free Press Unlimited, Totem is a &#039;&#039;&#039;free&#039;&#039;&#039; &#039;&#039;&#039;online learning platform&#039;&#039;&#039; that offers educational courses about digital security and privacy, and related tools and tactics for journalists, activists and human rights defenders in a safe, online classroom environment.&lt;br /&gt;
&lt;br /&gt;
[https://advocacyassembly.org/en/courses?category=1 &#039;&#039;&#039;Advocacy Assembly&#039;&#039;&#039; online courses related to digital security] - Advocacy Assembly is a &#039;&#039;&#039;free e-learning platform&#039;&#039;&#039; featuring dozens of courses for human rights activists, campaigners and journalists.&lt;br /&gt;
&lt;br /&gt;
[https://www.saferedge.com/learning &#039;&#039;&#039;Safer Edge&#039;&#039;&#039; online courses] (not free) - Safer Edge works with security, safeguarding and risk advisory professionals with a wide range of expertise, skills and experience. Team and consultants have experience working internationally in the humanitarian and development contexts in a range of risk contexts. In-house team speaks English, French, Spanish, Portuguese, Arabic and Russian.&lt;br /&gt;
&lt;br /&gt;
[https://academy.amnesty.org/ &#039;&#039;&#039;Amnesty International&#039;s Human Rights Academy&#039;&#039;&#039;] is a free online learning platform that allows participants to embark on a self-paced learning journey to understand the principles of human rights and how to use them as a tool for positive change. We believe that knowledge of rights is essential for claiming them, defending them, and promoting them and hope that our courses will inspire you to take action.&lt;br /&gt;
&lt;br /&gt;
[https://www.protectioninternational.org/tools/protection-manuals/ &#039;&#039;&#039;Protection International&#039;s Protection Manuals&#039;&#039;&#039;] for Human Rights Defenders - These manuals were developed to provide human rights defenders with additional knowledge and tools to improve their understanding of security and protection.&lt;br /&gt;
&lt;br /&gt;
[https://www.frontlinedefenders.org/en/digital-protection-resources &#039;&#039;&#039;Front Line Defenders Digital Protection Resources&#039;&#039;&#039;] - Front Line Defenders Digital Protection programme responds to the digital security environment facing HRDs and develops tools, guides and reosources to complement its training and consultation programming.&lt;br /&gt;
&lt;br /&gt;
[https://ssd.eff.org/ &#039;&#039;&#039;Surveillance Self-Defense&#039;&#039;&#039;] toolkit by Electronic Frontier Foundation - &amp;quot;We’re the Electronic Frontier Foundation, an independent non-profit working to protect online privacy for over thirty years. This is Surveillance Self-Defense: our expert guide to protecting you and your friends from online spying.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[https://securityinabox.org/en/ &#039;&#039;&#039;Security in a Box&#039;&#039;&#039;] primarily aims to help a global community of human rights defenders whose work puts them at risk. It has been recognized worldwide as a foundational resource for helping people at risk protect their digital security and privacy.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[https://www.frontlinedefenders.org/en/resource-publication/workbook-security-practical-steps-human-rights-defenders-risk Front Line Defenders Workbook on Security]&#039;&#039;&#039; has been inspired by the hundreds of HRDs from over 50 countries who have attended Front Line Defenders workshops on security and protection. The Workbook takes you through the steps to producing a security plan – for yourself and for your organisation (for those HRDs who are working in organisations). It follows a systematic approach for assessing your security situation and developing risk and vulnerability reduction strategies and tactics. Manual available in French, Spanish, Russian, Arabic, Turkish, Portuguese, Urdu, Somali, Dari, and Chinese.&lt;/div&gt;</summary>
		<author><name>Kristin1</name></author>
	</entry>
	<entry>
		<id>https://wiki.digitalrights.community/index.php?title=Use_a_Faraday_cage_to_block_electromagnetic_transmissions_from_a_device&amp;diff=52353</id>
		<title>Use a Faraday cage to block electromagnetic transmissions from a device</title>
		<link rel="alternate" type="text/html" href="https://wiki.digitalrights.community/index.php?title=Use_a_Faraday_cage_to_block_electromagnetic_transmissions_from_a_device&amp;diff=52353"/>
		<updated>2024-12-19T17:51:05Z</updated>

		<summary type="html">&lt;p&gt;Kristin1: Created page with &amp;quot;A &amp;#039;&amp;#039;&amp;#039;Faraday cage&amp;#039;&amp;#039;&amp;#039; or &amp;#039;&amp;#039;&amp;#039;Faraday shield&amp;#039;&amp;#039;&amp;#039; is an enclosure used to block some electromagnetic fields. A Faraday shield may be formed by a continuous covering of conductive material, or in the case of a Faraday cage, by a mesh of such materials. (Source: Wikipedia)  Faraday bags are portable containers fabricated with metallic materials that are used to contain devices in order to protect them from electromagnetic transmissions for a wide rang...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;A &#039;&#039;&#039;Faraday cage&#039;&#039;&#039; or &#039;&#039;&#039;Faraday shield&#039;&#039;&#039; is an enclosure used to block some electromagnetic fields. A Faraday shield may be formed by a continuous covering of conductive material, or in the case of a Faraday cage, by a mesh of such materials. (Source: [[wikipedia:Faraday_cage|Wikipedia]])&lt;br /&gt;
&lt;br /&gt;
Faraday bags are portable containers fabricated with metallic materials that are used to contain devices in order to protect them from electromagnetic transmissions for a wide range of applications, from enhancing digital privacy of cell telephones to protecting credit cards from RFID skimming. (Source: [[wikipedia:Faraday_cage|Wikipedia]])&lt;br /&gt;
&lt;br /&gt;
There are many products out there that claim to be a Faraday cage/bag, so it&#039;s important to verify that the product adheres to the [https://standards.ieee.org/ieee/299/3090/ IEEE Standard Method for Measuring the Effectiveness of Electromagnetic Shielding Enclosures]. Make sure that the product is certified to shielding effectiveness standards &#039;&#039;&#039;MIL STD 188-125&#039;&#039;&#039; and &#039;&#039;&#039;IEEE 299-2006&#039;&#039;&#039;.&lt;/div&gt;</summary>
		<author><name>Kristin1</name></author>
	</entry>
	<entry>
		<id>https://wiki.digitalrights.community/index.php?title=Security_resources_organized_by_topic&amp;diff=52352</id>
		<title>Security resources organized by topic</title>
		<link rel="alternate" type="text/html" href="https://wiki.digitalrights.community/index.php?title=Security_resources_organized_by_topic&amp;diff=52352"/>
		<updated>2024-12-19T17:45:46Z</updated>

		<summary type="html">&lt;p&gt;Kristin1: /* Mitigation techniques for common threats to information */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Building awareness of how we respond to threat and stress ==&lt;br /&gt;
&#039;&#039;Developing a useful security strategy is heavily dependent on our perception – we need to be able to identify and analyse threats in order to implement ways of avoiding or reducing them. But we all perceive the world around us differently based on our circumstances, experiences and many other factors. As a result, our perception can sometimes be hindered: threats which may be evident to some people may go unrecognised by others; similarly, we also need to be able to tell the difference between threats which are genuinely possible and those which we falsely perceive, called &#039;unfounded fears&#039;. It&#039;s a good idea to become familiar with factors that condition our perceptions of threat, and consider ways that we can take these into account in our security planning.&#039;&#039; (Source: [https://holistic-security.tacticaltech.org/chapters/prepare/1-2-individual-responses-to-threat.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Resources:&lt;br /&gt;
&lt;br /&gt;
* [https://holistic-security.tacticaltech.org/chapters/prepare/1-2-individual-responses-to-threat.html &#039;&#039;&#039;Exploring individual responses to threat&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
* [https://holistic-security.tacticaltech.org/chapters/prepare/1-4-team-and-peer-responses-to-threat.html &#039;&#039;&#039;Exploring group responses to threat&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
* [https://holistic-security.tacticaltech.org/chapters/prepare/1-5-communicating-about-threats-in-teams-and-organisations.html &#039;&#039;&#039;Communicating about security in teams and organizations&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
&lt;br /&gt;
== Understanding our threats and context ==&lt;br /&gt;
&lt;br /&gt;
=== Situation monitoring and analysis ===&lt;br /&gt;
Situation monitoring and analysis is the broadest kind of analysis of our context: observing the political, economic, social, technological, legal and environmental developments in society which are relevant to our work, and may impact our security situation. (Source: [https://holistic-security.tacticaltech.org/chapters/explore/2-2-situation-monitoring-and-analysis.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Exercise: [https://holistic-security.tacticaltech.org/exercises/explore/situational-monitoring-a-quick-pestle-analysis.html &#039;&#039;&#039;Pestle analysis&#039;&#039;&#039;] (Holistic Security Manual) &lt;br /&gt;
&lt;br /&gt;
Tool: &#039;&#039;&#039;[https://tnr-research.uwazi.io/ Research Database on transnational repression]&#039;&#039;&#039; - This collection of research reports on transnational repression can help human rights defenders better understand: &lt;br /&gt;
&lt;br /&gt;
* Transnational Repression (TNR) threats that are possible, to determine appropriate mitigation techniques&lt;br /&gt;
* Which TNR threats are unlikely, in order to alleviate fear&lt;br /&gt;
* What exiled HRDs can expect from a host country in terms of protection measures&lt;br /&gt;
* Existing campaigns to strengthen protection for exiled HRDs&lt;br /&gt;
&lt;br /&gt;
=== Identifying, analyzing and prioritizing threats ===&lt;br /&gt;
&lt;br /&gt;
==== Map the actors ====&lt;br /&gt;
&#039;&#039;It is valuable to get a clear picture of all the actors in our environment (individuals, institutions, organizations, etc). Threats almost always come from someone or something. Knowing as much as we can about the actors in our context improves our perception of our environment and thereby, our ability to carry out activities to maintain or expand our space for work.&#039;&#039; (Source: [https://holistic-security.tacticaltech.org/chapters/explore/2-3-vision-strategy-and-actors.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Exercise:&lt;br /&gt;
&lt;br /&gt;
* [https://holistic-security.tacticaltech.org/exercises/explore/visual-actor-mapping-part-1.html &#039;&#039;&#039;Spectrum of allies&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
* [https://newtactics.org/resource/exercises-identifying-allies-opponents &#039;&#039;&#039;Spectrum of allies&#039;&#039;&#039;] (New Tactics in Human Rights project)&lt;br /&gt;
&lt;br /&gt;
==== Brainstorm threats ====&lt;br /&gt;
This exercise is a first attempt at identifying the threats to yourself, your group or organization and your work in defense of human rights. This initial list of threats can then be refined so as to focus in more depth on the threats which are most likely or potentially most harmful. (Source: [https://holistic-security.tacticaltech.org/exercises/explore/threat-brainstorm.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Exercise: [https://holistic-security.tacticaltech.org/exercises/explore/threat-brainstorm.html &#039;&#039;&#039;Threat brainstorm&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
&lt;br /&gt;
==== Analyzing risk, prioritizing threats ====&lt;br /&gt;
Threats can be viewed and categorized in light of the following: the likelihood that the threat will take place, and the impact if and when it does. Likelihood and impact are concepts which help us determine risk: the higher the likelihood or impact of a threat, the higher the risk. Categorizing threats can help to keep us from feeling overwhelmed and keep our perception of threats realistic. (Source: [https://holistic-security.tacticaltech.org/chapters/explore/2-8-identifying-and-analysing-threats.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Exercise: [https://holistic-security.tacticaltech.org/chapters/explore/2-8-identifying-and-analysing-threats.html &#039;&#039;&#039;Threat matrix&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
&lt;br /&gt;
Tools:&lt;br /&gt;
&lt;br /&gt;
* The Ford Foundation’s [https://www.fordfoundation.org/work/our-grants/building-institutions-and-networks/cybersecurity-assessment-tool/ &#039;&#039;&#039;Cybersecurity Assessment Tool (CAT)&#039;&#039;&#039;] is designed to measure the maturity, resiliency, and strength of an organization’s cybersecurity efforts. We have created this questionnaire with busy nontechnical grant makers, grantee partners, civil society organizations, and nonprofits in mind, and we hope it helps shine some light on a recommended path forward for any organization undertaking a cybersecurity journey&lt;br /&gt;
&lt;br /&gt;
==== Analyze threats ====&lt;br /&gt;
This exercise will help you prioritize threats and divine the causes, ramifications, sources as well as the required resources, existing actions and possible next steps.&lt;br /&gt;
&lt;br /&gt;
Exercise: [https://holistic-security.tacticaltech.org/exercises/explore/threat-inventory.html &#039;&#039;&#039;Threat inventory&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
&lt;br /&gt;
== Risk mitigation ==&lt;br /&gt;
In order to build a response to the threats we face, we can consider them in terms of the factors which make us more or less susceptible to them. Read more in [https://holistic-security.tacticaltech.org/chapters/strategise/3-1-responding-to-threats.html this chapter of the Holistic Security Manual]. &lt;br /&gt;
&lt;br /&gt;
=== Mitigation techniques for common threats to information ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
! Threat&lt;br /&gt;
!Mitigation techniques and links to guidance &lt;br /&gt;
|-&lt;br /&gt;
|Data loss&lt;br /&gt;
|&lt;br /&gt;
* [[Ways to securely store and share files|Have your information securely in the cloud or on a server]]&lt;br /&gt;
* Have a backup process&lt;br /&gt;
|-&lt;br /&gt;
|Compromised accounts&lt;br /&gt;
|&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa|Use two factor authentication for all accounts]]&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa|Use unique, complex passwords for all accounts]]&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa|Use a password manager to create, store and protect those passwords]]&lt;br /&gt;
|-&lt;br /&gt;
|Device inspection at checkpoints&lt;br /&gt;
|&lt;br /&gt;
* [[Use a secure messaging app#Tip: use automatic disappearing messages|Use automated disappearing messages on your messaging apps]]&lt;br /&gt;
* [[Ways to securely store and share files|Have your sensitive information stored safely in the cloud and off of your device]]&lt;br /&gt;
* Hide or delete any apps that would provide access to this information (you can restore that app later)&lt;br /&gt;
|-&lt;br /&gt;
|Device confiscation or theft&lt;br /&gt;
|&lt;br /&gt;
* [[Secure your devices#Full disk encryption|Encrypt your devices]]&lt;br /&gt;
* And, review and adapt the same advice above for “device inspection” threat&lt;br /&gt;
|-&lt;br /&gt;
|Information handover&lt;br /&gt;
|&lt;br /&gt;
* [[Trusted hosting companies in the human rights community|Host your information with a company you trust]], who will not turn over information to your opponents (via subpoena, request, etc)&lt;br /&gt;
|-&lt;br /&gt;
|Targeted malware or spyware&lt;br /&gt;
|&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa#Be aware of spear phishing attacks|Protect yourselves against (spear) phishing attacks]]&lt;br /&gt;
* Use a second device for sensitive activities&lt;br /&gt;
* [[How to mitigate your risk of being subject to Pegasus surveillance|Restart your device regularly to disrupt spyware]]&lt;br /&gt;
* [[Secure your devices|Use anti virus]]&lt;br /&gt;
* [[How to mitigate your risk of being subject to Pegasus surveillance]], and other spyware&lt;br /&gt;
* [[Guidance for purchasing devices with strong security features]]&lt;br /&gt;
|-&lt;br /&gt;
|Surveillance and monitoring&lt;br /&gt;
|&lt;br /&gt;
* [[Safe internet browsing using VPN and Tor browser|Use a VPN and/or Tor browser]]&lt;br /&gt;
* [[Use a secure messaging app]]&lt;br /&gt;
* [[How to collect and store information in a secure way]]&lt;br /&gt;
* [[Ways to securely store and share files|How to use Google Drive safely and alternatives to Google Drive]]&lt;br /&gt;
* [[Use a Faraday cage to block electromagnetic transmissions from a device]]&lt;br /&gt;
|-&lt;br /&gt;
|Website hacking and takeover&lt;br /&gt;
|&lt;br /&gt;
* [[Protect your website|Protect your website from DDOS attacks]]&lt;br /&gt;
* [[Trusted hosting companies in the human rights community|Use a host company that you trust]]&lt;br /&gt;
* And, review and adapt the same advice above for &amp;quot;compromised accounts&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
Other important considerations when collecting, storing, using sensitive information:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Consideration&lt;br /&gt;
!Resources&lt;br /&gt;
|-&lt;br /&gt;
|Make sure you have informed consent from the people you are collecting information&lt;br /&gt;
|[[Guidance on informed consent]]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
* [[Information Security for Human Rights Defenders]]&lt;br /&gt;
&lt;br /&gt;
===Mitigation techniques for online harassment===&lt;br /&gt;
[[How to deal with online harassment and threats]]&lt;br /&gt;
&lt;br /&gt;
==Security planning ==&lt;br /&gt;
Once we have clarity about the threats we face during our activities, we can begin to organize our security protocols into security plans or agreements. There are three main areas to consider when developing any security plans: &lt;br /&gt;
&lt;br /&gt;
# &#039;&#039;&#039;PREPARE: Prevention of threats&#039;&#039;&#039; - Most security plans will include tactics which aim to prevent identified threats from taking place (i.e. reducing their likelihood). This will include:&lt;br /&gt;
## Identify &amp;amp; assess the threats and your vulnerabilities&lt;br /&gt;
## Develop security policies and procedures&lt;br /&gt;
## Implement preventive measures&lt;br /&gt;
## Invest in Security Awareness Programs&lt;br /&gt;
## Conduct Security testing&lt;br /&gt;
# &#039;&#039;&#039;RESPOND: Emergency responses&#039;&#039;&#039; - Emergency plans, also called contingency plans, are the actions which we take in response to a threat becoming a reality. This will include:&lt;br /&gt;
## Build Incident Response Plan&lt;br /&gt;
## Communication Strategy&lt;br /&gt;
## Business continuity plan&lt;br /&gt;
## Disaster recovery plan (Data Backups and Recovery)&lt;br /&gt;
## Communication and Collaboration&lt;br /&gt;
# &#039;&#039;&#039;TREAT: Well-being considerations&#039;&#039;&#039; - Actions we take to maintain our physical energy and a mindful approach to our work and our security –it may include such considerations as where and when we will eat, sleep, relax and enjoy ourselves in the course of our work. This will include: &lt;br /&gt;
## Analyze lessons learned&lt;br /&gt;
## Recovery and Remediation&lt;br /&gt;
## Psychological safety considerations,&lt;br /&gt;
## Review and update your security plans and approach&lt;br /&gt;
For more information, read &#039;&#039;&#039;[[General guidance for creating security plans and agreements]]&#039;&#039;&#039; and review [https://holistic-security.tacticaltech.org/chapters/strategise/3-3-creating-security-plans-and-agreements.html this chapter of the Holistic Security Manual]. &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Additional resources:  &lt;br /&gt;
&lt;br /&gt;
* Consumer Reports [https://securityplanner.consumerreports.org/ &#039;&#039;&#039;Security Planner&#039;&#039;&#039;] is a free, easy-to-use guide to staying safer online. It provides personalized recommendations and expert advice on topics such as keeping social media accounts from being hacked, locking down devices ranging from smartphones to home security cameras, and reducing intrusive tracking by websites.&lt;br /&gt;
* [https://www.nist.gov/itl/smallbusinesscyber/nist-cybersecurity-framework-0 &#039;&#039;&#039;NIST Cybersecurity Framework 2.0&#039;&#039;&#039;]:  Small Business Quick Start Guide - provides small-to-medium sized businesses (SMB), specifically those who have modest or no cybersecurity plans in place, with considerations to kick-start their cybersecurity risk management strategy using the NIST Cybersecurity Framework (CSF) 2.0. (by the &#039;&#039;National Institute of Standards and Technology)&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Security planning on specific topics===&lt;br /&gt;
&lt;br /&gt;
* [[General tips for international travel]]&lt;br /&gt;
* [[General tips for home security]]&lt;br /&gt;
&lt;br /&gt;
== Building a culture of security within a team ==&lt;br /&gt;
[https://level-up.cc/ &#039;&#039;&#039;LevelUp&#039;&#039;&#039;] is a collection of resources for the global digital safety training community.&lt;br /&gt;
&lt;br /&gt;
[https://wiki.orgsec.community/ &#039;&#039;&#039;Organisational security community wiki&#039;&#039;&#039;] is a resource created by and for security practitioners from all backgrounds to share useful resources and document innovative approaches to long-term security work. &lt;br /&gt;
&lt;br /&gt;
==Resource collections related to security ==&lt;br /&gt;
[https://digitalfirstaid.org/ &#039;&#039;&#039;Digital First Aid Kit&#039;&#039;&#039;] - The Digital First Aid Kit is a free resource to help rapid responders, digital security trainers, and tech-savvy activists to better protect themselves and the communities they support against the most common types of digital emergencies. It can also be used by activists, human rights defenders, bloggers, journalists or media activists who want to learn more about how they can protect themselves and support others. If you or someone you are assisting is experiencing a digital emergency, the Digital First Aid Kit will guide you in diagnosing the issues you are facing, and refer you to support providers for further help if needed.&lt;br /&gt;
&lt;br /&gt;
[https://communitydocs.accessnow.org/ &#039;&#039;&#039;Access Now Help Desk documentation&#039;&#039;&#039;]&lt;br /&gt;
&lt;br /&gt;
[https://cyber-star.org/ &#039;&#039;&#039;CyberSTAR&#039;&#039;&#039;], by SecDev, makes it easier for small organizations and individuals to understand and manage digital safety by organizing it around six themes. This site presents learning resources to help you be safer online—plus teaching resources for digital safety trainers.&lt;br /&gt;
&lt;br /&gt;
[https://totem-project.org/ &#039;&#039;&#039;Totem project&#039;&#039;&#039;] - Developed in collaboration by Greenhost and Free Press Unlimited, Totem is a &#039;&#039;&#039;free&#039;&#039;&#039; &#039;&#039;&#039;online learning platform&#039;&#039;&#039; that offers educational courses about digital security and privacy, and related tools and tactics for journalists, activists and human rights defenders in a safe, online classroom environment.&lt;br /&gt;
&lt;br /&gt;
[https://advocacyassembly.org/en/courses?category=1 &#039;&#039;&#039;Advocacy Assembly&#039;&#039;&#039; online courses related to digital security] - Advocacy Assembly is a &#039;&#039;&#039;free e-learning platform&#039;&#039;&#039; featuring dozens of courses for human rights activists, campaigners and journalists.&lt;br /&gt;
&lt;br /&gt;
[https://www.saferedge.com/learning &#039;&#039;&#039;Safer Edge&#039;&#039;&#039; online courses] (not free) - Safer Edge works with security, safeguarding and risk advisory professionals with a wide range of expertise, skills and experience. Team and consultants have experience working internationally in the humanitarian and development contexts in a range of risk contexts. In-house team speaks English, French, Spanish, Portuguese, Arabic and Russian.&lt;br /&gt;
&lt;br /&gt;
[https://academy.amnesty.org/ &#039;&#039;&#039;Amnesty International&#039;s Human Rights Academy&#039;&#039;&#039;] is a free online learning platform that allows participants to embark on a self-paced learning journey to understand the principles of human rights and how to use them as a tool for positive change. We believe that knowledge of rights is essential for claiming them, defending them, and promoting them and hope that our courses will inspire you to take action.&lt;br /&gt;
&lt;br /&gt;
[https://www.protectioninternational.org/tools/protection-manuals/ &#039;&#039;&#039;Protection International&#039;s Protection Manuals&#039;&#039;&#039;] for Human Rights Defenders - These manuals were developed to provide human rights defenders with additional knowledge and tools to improve their understanding of security and protection.&lt;br /&gt;
&lt;br /&gt;
[https://www.frontlinedefenders.org/en/digital-protection-resources &#039;&#039;&#039;Front Line Defenders Digital Protection Resources&#039;&#039;&#039;] - Front Line Defenders Digital Protection programme responds to the digital security environment facing HRDs and develops tools, guides and reosources to complement its training and consultation programming.&lt;br /&gt;
&lt;br /&gt;
[https://ssd.eff.org/ &#039;&#039;&#039;Surveillance Self-Defense&#039;&#039;&#039;] toolkit by Electronic Frontier Foundation - &amp;quot;We’re the Electronic Frontier Foundation, an independent non-profit working to protect online privacy for over thirty years. This is Surveillance Self-Defense: our expert guide to protecting you and your friends from online spying.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[https://securityinabox.org/en/ &#039;&#039;&#039;Security in a Box&#039;&#039;&#039;] primarily aims to help a global community of human rights defenders whose work puts them at risk. It has been recognized worldwide as a foundational resource for helping people at risk protect their digital security and privacy.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[https://www.frontlinedefenders.org/en/resource-publication/workbook-security-practical-steps-human-rights-defenders-risk Front Line Defenders Workbook on Security]&#039;&#039;&#039; has been inspired by the hundreds of HRDs from over 50 countries who have attended Front Line Defenders workshops on security and protection. The Workbook takes you through the steps to producing a security plan – for yourself and for your organisation (for those HRDs who are working in organisations). It follows a systematic approach for assessing your security situation and developing risk and vulnerability reduction strategies and tactics. Manual available in French, Spanish, Russian, Arabic, Turkish, Portuguese, Urdu, Somali, Dari, and Chinese.&lt;/div&gt;</summary>
		<author><name>Kristin1</name></author>
	</entry>
	<entry>
		<id>https://wiki.digitalrights.community/index.php?title=Guidance_for_purchasing_devices_with_strong_security_features&amp;diff=52348</id>
		<title>Guidance for purchasing devices with strong security features</title>
		<link rel="alternate" type="text/html" href="https://wiki.digitalrights.community/index.php?title=Guidance_for_purchasing_devices_with_strong_security_features&amp;diff=52348"/>
		<updated>2024-12-19T16:39:33Z</updated>

		<summary type="html">&lt;p&gt;Kristin1: /* Phones */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Thinking of purchasing a new device and want some guidance on what to look for? Here is some advice, collected from a number of practitioners. (Last updated Dec 2024)&lt;br /&gt;
&lt;br /&gt;
== Phones ==&lt;br /&gt;
When it comes to phones, it&#039;s best to get a modern phone with advanced protections on the account enabled. Most likely, this means flagship phones from &#039;&#039;&#039;Apple&#039;&#039;&#039; and &#039;&#039;&#039;Google&#039;&#039;&#039;. Both companies provide security patches and software updates for their devices for around seven years. (see [https://endoflife.date/iphone Apple iPhone end of life dates], and [https://support.google.com/nexus/answer/4457705?hl=en Google Pixel end of life dates]) &lt;br /&gt;
&lt;br /&gt;
Phone recommendations (based on internet search in Dec 2024):&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Apple iPhone&#039;&#039;&#039;: The iPhone series, particularly the Pro Max models, are consistently considered one of the most secure smartphones due to Apple&#039;s strong security practices and updates.&lt;br /&gt;
* &#039;&#039;&#039;Google Pixel&#039;&#039;&#039;: Google Pixel phones are another top choice with excellent security features thanks to Google&#039;s commitment to security updates and the Titan M security chip.&lt;br /&gt;
* &#039;&#039;&#039;Purism Librem 5&#039;&#039;&#039;: This phone is specifically designed for maximum privacy with hardware kill switches to physically disconnect components like the microphone and cellular network, making it ideal for users prioritizing extreme security.&lt;br /&gt;
&lt;br /&gt;
There are some helpful articles on [https://www.techradar.com/best/secure-smartphones TechRadar] and [https://cybermagazine.com/articles/top-10-phones-for-cybersecurity Cyber Magazine] on this topic. &lt;br /&gt;
&lt;br /&gt;
== Laptops ==&lt;br /&gt;
Laptop recommendations (based on [https://www.inacom-sby.com/most-secure-business-laptops/ internet search] in Dec 2024):&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Apple MacBook Pro&#039;&#039;&#039; (2023) and &#039;&#039;&#039;MacBook Air with an M1 chip&#039;&#039;&#039; are good options for human rights defenders because it has many built-in security features (full disk encryption, protection from malware, etc). (Mac operating system)&lt;br /&gt;
* &#039;&#039;&#039;Lenovo IdeaPad Flex 5i Chromebook Plus&#039;&#039;&#039; is an affordable option that is secure and easy to use. (Chrome operating system)&lt;br /&gt;
* &#039;&#039;&#039;Lenovo ThinkPad&#039;&#039;&#039; X1 Carbon (11th Gen) is reliable and secure. (Windows operating system)&lt;br /&gt;
* For users of Linux operating systems, &#039;&#039;&#039;Purism Librem 14&#039;&#039;&#039; is highly recommended. (Linux operating system)&lt;/div&gt;</summary>
		<author><name>Kristin1</name></author>
	</entry>
	<entry>
		<id>https://wiki.digitalrights.community/index.php?title=Guidance_for_purchasing_devices_with_strong_security_features&amp;diff=52346</id>
		<title>Guidance for purchasing devices with strong security features</title>
		<link rel="alternate" type="text/html" href="https://wiki.digitalrights.community/index.php?title=Guidance_for_purchasing_devices_with_strong_security_features&amp;diff=52346"/>
		<updated>2024-12-19T16:35:20Z</updated>

		<summary type="html">&lt;p&gt;Kristin1: Created page with &amp;quot;Thinking of purchasing a new device and want some guidance on what to look for? Here is some advice, collected from a number of practitioners. (Last updated Dec 2024)  == Phones == When it comes to phones, it&amp;#039;s best to get a modern phone with advanced protections on the account enabled. Most likely, this means flagship phones from Apple and Google.   Apple is good about providing support with security patches and software updates [https://endoflife.date/iphone for about...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Thinking of purchasing a new device and want some guidance on what to look for? Here is some advice, collected from a number of practitioners. (Last updated Dec 2024)&lt;br /&gt;
&lt;br /&gt;
== Phones ==&lt;br /&gt;
When it comes to phones, it&#039;s best to get a modern phone with advanced protections on the account enabled. Most likely, this means flagship phones from Apple and Google. &lt;br /&gt;
&lt;br /&gt;
Apple is good about providing support with security patches and software updates [https://endoflife.date/iphone for about seven years] after the device is purchased. &lt;br /&gt;
&lt;br /&gt;
Google Pixel phones are also supported for [https://support.google.com/nexus/answer/4457705?hl=en about seven years]. &lt;br /&gt;
&lt;br /&gt;
Phone recommendations (based on internet search in Dec 2024):&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Apple iPhone&#039;&#039;&#039;: The iPhone series, particularly the Pro Max models, are consistently considered one of the most secure smartphones due to Apple&#039;s strong security practices and updates.&lt;br /&gt;
* &#039;&#039;&#039;Google Pixel&#039;&#039;&#039;: Google Pixel phones are another top choice with excellent security features thanks to Google&#039;s commitment to security updates and the Titan M security chip.&lt;br /&gt;
* &#039;&#039;&#039;Purism Librem 5&#039;&#039;&#039;: This phone is specifically designed for maximum privacy with hardware kill switches to physically disconnect components like the microphone and cellular network, making it ideal for users prioritizing extreme security.&lt;br /&gt;
&lt;br /&gt;
There are some helpful articles on [https://www.techradar.com/best/secure-smartphones TechRadar] and [https://cybermagazine.com/articles/top-10-phones-for-cybersecurity Cyber Magazine] on this topic. &lt;br /&gt;
&lt;br /&gt;
== Laptops ==&lt;br /&gt;
Laptop recommendations (based on [https://www.inacom-sby.com/most-secure-business-laptops/ internet search] in Dec 2024):&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Apple MacBook Pro&#039;&#039;&#039; (2023) and &#039;&#039;&#039;MacBook Air with an M1 chip&#039;&#039;&#039; are good options for human rights defenders because it has many built-in security features (full disk encryption, protection from malware, etc). (Mac operating system)&lt;br /&gt;
* &#039;&#039;&#039;Lenovo IdeaPad Flex 5i Chromebook Plus&#039;&#039;&#039; is an affordable option that is secure and easy to use. (Chrome operating system)&lt;br /&gt;
* &#039;&#039;&#039;Lenovo ThinkPad&#039;&#039;&#039; X1 Carbon (11th Gen) is reliable and secure. (Windows operating system)&lt;br /&gt;
* For users of Linux operating systems, &#039;&#039;&#039;Purism Librem 14&#039;&#039;&#039; is highly recommended. (Linux operating system)&lt;/div&gt;</summary>
		<author><name>Kristin1</name></author>
	</entry>
	<entry>
		<id>https://wiki.digitalrights.community/index.php?title=Security_resources_organized_by_topic&amp;diff=52345</id>
		<title>Security resources organized by topic</title>
		<link rel="alternate" type="text/html" href="https://wiki.digitalrights.community/index.php?title=Security_resources_organized_by_topic&amp;diff=52345"/>
		<updated>2024-12-19T16:23:52Z</updated>

		<summary type="html">&lt;p&gt;Kristin1: /* Mitigation techniques for common threats to information */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Building awareness of how we respond to threat and stress ==&lt;br /&gt;
&#039;&#039;Developing a useful security strategy is heavily dependent on our perception – we need to be able to identify and analyse threats in order to implement ways of avoiding or reducing them. But we all perceive the world around us differently based on our circumstances, experiences and many other factors. As a result, our perception can sometimes be hindered: threats which may be evident to some people may go unrecognised by others; similarly, we also need to be able to tell the difference between threats which are genuinely possible and those which we falsely perceive, called &#039;unfounded fears&#039;. It&#039;s a good idea to become familiar with factors that condition our perceptions of threat, and consider ways that we can take these into account in our security planning.&#039;&#039; (Source: [https://holistic-security.tacticaltech.org/chapters/prepare/1-2-individual-responses-to-threat.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Resources:&lt;br /&gt;
&lt;br /&gt;
* [https://holistic-security.tacticaltech.org/chapters/prepare/1-2-individual-responses-to-threat.html &#039;&#039;&#039;Exploring individual responses to threat&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
* [https://holistic-security.tacticaltech.org/chapters/prepare/1-4-team-and-peer-responses-to-threat.html &#039;&#039;&#039;Exploring group responses to threat&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
* [https://holistic-security.tacticaltech.org/chapters/prepare/1-5-communicating-about-threats-in-teams-and-organisations.html &#039;&#039;&#039;Communicating about security in teams and organizations&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
&lt;br /&gt;
== Understanding our threats and context ==&lt;br /&gt;
&lt;br /&gt;
=== Situation monitoring and analysis ===&lt;br /&gt;
Situation monitoring and analysis is the broadest kind of analysis of our context: observing the political, economic, social, technological, legal and environmental developments in society which are relevant to our work, and may impact our security situation. (Source: [https://holistic-security.tacticaltech.org/chapters/explore/2-2-situation-monitoring-and-analysis.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Exercise: [https://holistic-security.tacticaltech.org/exercises/explore/situational-monitoring-a-quick-pestle-analysis.html &#039;&#039;&#039;Pestle analysis&#039;&#039;&#039;] (Holistic Security Manual) &lt;br /&gt;
&lt;br /&gt;
Tool: &#039;&#039;&#039;[https://tnr-research.uwazi.io/ Research Database on transnational repression]&#039;&#039;&#039; - This collection of research reports on transnational repression can help human rights defenders better understand: &lt;br /&gt;
&lt;br /&gt;
* Transnational Repression (TNR) threats that are possible, to determine appropriate mitigation techniques&lt;br /&gt;
* Which TNR threats are unlikely, in order to alleviate fear&lt;br /&gt;
* What exiled HRDs can expect from a host country in terms of protection measures&lt;br /&gt;
* Existing campaigns to strengthen protection for exiled HRDs&lt;br /&gt;
&lt;br /&gt;
=== Identifying, analyzing and prioritizing threats ===&lt;br /&gt;
&lt;br /&gt;
==== Map the actors ====&lt;br /&gt;
&#039;&#039;It is valuable to get a clear picture of all the actors in our environment (individuals, institutions, organizations, etc). Threats almost always come from someone or something. Knowing as much as we can about the actors in our context improves our perception of our environment and thereby, our ability to carry out activities to maintain or expand our space for work.&#039;&#039; (Source: [https://holistic-security.tacticaltech.org/chapters/explore/2-3-vision-strategy-and-actors.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Exercise:&lt;br /&gt;
&lt;br /&gt;
* [https://holistic-security.tacticaltech.org/exercises/explore/visual-actor-mapping-part-1.html &#039;&#039;&#039;Spectrum of allies&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
* [https://newtactics.org/resource/exercises-identifying-allies-opponents &#039;&#039;&#039;Spectrum of allies&#039;&#039;&#039;] (New Tactics in Human Rights project)&lt;br /&gt;
&lt;br /&gt;
==== Brainstorm threats ====&lt;br /&gt;
This exercise is a first attempt at identifying the threats to yourself, your group or organization and your work in defense of human rights. This initial list of threats can then be refined so as to focus in more depth on the threats which are most likely or potentially most harmful. (Source: [https://holistic-security.tacticaltech.org/exercises/explore/threat-brainstorm.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Exercise: [https://holistic-security.tacticaltech.org/exercises/explore/threat-brainstorm.html &#039;&#039;&#039;Threat brainstorm&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
&lt;br /&gt;
==== Analyzing risk, prioritizing threats ====&lt;br /&gt;
Threats can be viewed and categorized in light of the following: the likelihood that the threat will take place, and the impact if and when it does. Likelihood and impact are concepts which help us determine risk: the higher the likelihood or impact of a threat, the higher the risk. Categorizing threats can help to keep us from feeling overwhelmed and keep our perception of threats realistic. (Source: [https://holistic-security.tacticaltech.org/chapters/explore/2-8-identifying-and-analysing-threats.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Exercise: [https://holistic-security.tacticaltech.org/chapters/explore/2-8-identifying-and-analysing-threats.html &#039;&#039;&#039;Threat matrix&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
&lt;br /&gt;
Tools:&lt;br /&gt;
&lt;br /&gt;
* The Ford Foundation’s [https://www.fordfoundation.org/work/our-grants/building-institutions-and-networks/cybersecurity-assessment-tool/ &#039;&#039;&#039;Cybersecurity Assessment Tool (CAT)&#039;&#039;&#039;] is designed to measure the maturity, resiliency, and strength of an organization’s cybersecurity efforts. We have created this questionnaire with busy nontechnical grant makers, grantee partners, civil society organizations, and nonprofits in mind, and we hope it helps shine some light on a recommended path forward for any organization undertaking a cybersecurity journey&lt;br /&gt;
&lt;br /&gt;
==== Analyze threats ====&lt;br /&gt;
This exercise will help you prioritize threats and divine the causes, ramifications, sources as well as the required resources, existing actions and possible next steps.&lt;br /&gt;
&lt;br /&gt;
Exercise: [https://holistic-security.tacticaltech.org/exercises/explore/threat-inventory.html &#039;&#039;&#039;Threat inventory&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
&lt;br /&gt;
== Risk mitigation ==&lt;br /&gt;
In order to build a response to the threats we face, we can consider them in terms of the factors which make us more or less susceptible to them. Read more in [https://holistic-security.tacticaltech.org/chapters/strategise/3-1-responding-to-threats.html this chapter of the Holistic Security Manual]. &lt;br /&gt;
&lt;br /&gt;
=== Mitigation techniques for common threats to information ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
! Threat&lt;br /&gt;
!Mitigation techniques and links to guidance &lt;br /&gt;
|-&lt;br /&gt;
|Data loss&lt;br /&gt;
|&lt;br /&gt;
* [[Ways to securely store and share files|Have your information securely in the cloud or on a server]]&lt;br /&gt;
* Have a backup process&lt;br /&gt;
|-&lt;br /&gt;
|Compromised accounts&lt;br /&gt;
|&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa|Use two factor authentication for all accounts]]&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa|Use unique, complex passwords for all accounts]]&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa|Use a password manager to create, store and protect those passwords]]&lt;br /&gt;
|-&lt;br /&gt;
|Device inspection at checkpoints&lt;br /&gt;
|&lt;br /&gt;
* [[Use a secure messaging app#Tip: use automatic disappearing messages|Use automated disappearing messages on your messaging apps]]&lt;br /&gt;
* [[Ways to securely store and share files|Have your sensitive information stored safely in the cloud and off of your device]]&lt;br /&gt;
* Hide or delete any apps that would provide access to this information (you can restore that app later)&lt;br /&gt;
|-&lt;br /&gt;
|Device confiscation or theft&lt;br /&gt;
|&lt;br /&gt;
* [[Secure your devices#Full disk encryption|Encrypt your devices]]&lt;br /&gt;
* And, review and adapt the same advice above for “device inspection” threat&lt;br /&gt;
|-&lt;br /&gt;
|Information handover&lt;br /&gt;
|&lt;br /&gt;
* [[Trusted hosting companies in the human rights community|Host your information with a company you trust]], who will not turn over information to your opponents (via subpoena, request, etc)&lt;br /&gt;
|-&lt;br /&gt;
|Targeted malware or spyware&lt;br /&gt;
|&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa#Be aware of spear phishing attacks|Protect yourselves against (spear) phishing attacks]]&lt;br /&gt;
* Use a second device for sensitive activities&lt;br /&gt;
* [[How to mitigate your risk of being subject to Pegasus surveillance|Restart your device regularly to disrupt spyware]]&lt;br /&gt;
* [[Secure your devices|Use anti virus]]&lt;br /&gt;
* [[How to mitigate your risk of being subject to Pegasus surveillance]], and other spyware&lt;br /&gt;
* [[Guidance for purchasing devices with strong security features]]&lt;br /&gt;
|-&lt;br /&gt;
|Surveillance and monitoring&lt;br /&gt;
|&lt;br /&gt;
* [[Safe internet browsing using VPN and Tor browser|Use a VPN and/or Tor browser]]&lt;br /&gt;
* [[Use a secure messaging app]]&lt;br /&gt;
* [[How to collect and store information in a secure way]]&lt;br /&gt;
* [[Ways to securely store and share files|How to use Google Drive safely and alternatives to Google Drive]]&lt;br /&gt;
|-&lt;br /&gt;
|Website hacking and takeover&lt;br /&gt;
|&lt;br /&gt;
* [[Protect your website|Protect your website from DDOS attacks]]&lt;br /&gt;
* [[Trusted hosting companies in the human rights community|Use a host company that you trust]]&lt;br /&gt;
* And, review and adapt the same advice above for &amp;quot;compromised accounts&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
Other important considerations when collecting, storing, using sensitive information:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Consideration&lt;br /&gt;
!Resources&lt;br /&gt;
|-&lt;br /&gt;
|Make sure you have informed consent from the people you are collecting information&lt;br /&gt;
|[[Guidance on informed consent]]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
* [[Information Security for Human Rights Defenders]]&lt;br /&gt;
&lt;br /&gt;
===Mitigation techniques for online harassment===&lt;br /&gt;
[[How to deal with online harassment and threats]]&lt;br /&gt;
&lt;br /&gt;
==Security planning ==&lt;br /&gt;
Once we have clarity about the threats we face during our activities, we can begin to organize our security protocols into security plans or agreements. There are three main areas to consider when developing any security plans: &lt;br /&gt;
&lt;br /&gt;
# &#039;&#039;&#039;PREPARE: Prevention of threats&#039;&#039;&#039; - Most security plans will include tactics which aim to prevent identified threats from taking place (i.e. reducing their likelihood). This will include:&lt;br /&gt;
## Identify &amp;amp; assess the threats and your vulnerabilities&lt;br /&gt;
## Develop security policies and procedures&lt;br /&gt;
## Implement preventive measures&lt;br /&gt;
## Invest in Security Awareness Programs&lt;br /&gt;
## Conduct Security testing&lt;br /&gt;
# &#039;&#039;&#039;RESPOND: Emergency responses&#039;&#039;&#039; - Emergency plans, also called contingency plans, are the actions which we take in response to a threat becoming a reality. This will include:&lt;br /&gt;
## Build Incident Response Plan&lt;br /&gt;
## Communication Strategy&lt;br /&gt;
## Business continuity plan&lt;br /&gt;
## Disaster recovery plan (Data Backups and Recovery)&lt;br /&gt;
## Communication and Collaboration&lt;br /&gt;
# &#039;&#039;&#039;TREAT: Well-being considerations&#039;&#039;&#039; - Actions we take to maintain our physical energy and a mindful approach to our work and our security –it may include such considerations as where and when we will eat, sleep, relax and enjoy ourselves in the course of our work. This will include: &lt;br /&gt;
## Analyze lessons learned&lt;br /&gt;
## Recovery and Remediation&lt;br /&gt;
## Psychological safety considerations,&lt;br /&gt;
## Review and update your security plans and approach&lt;br /&gt;
For more information, read &#039;&#039;&#039;[[General guidance for creating security plans and agreements]]&#039;&#039;&#039; and review [https://holistic-security.tacticaltech.org/chapters/strategise/3-3-creating-security-plans-and-agreements.html this chapter of the Holistic Security Manual]. &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Additional resources:  &lt;br /&gt;
&lt;br /&gt;
* Consumer Reports [https://securityplanner.consumerreports.org/ &#039;&#039;&#039;Security Planner&#039;&#039;&#039;] is a free, easy-to-use guide to staying safer online. It provides personalized recommendations and expert advice on topics such as keeping social media accounts from being hacked, locking down devices ranging from smartphones to home security cameras, and reducing intrusive tracking by websites.&lt;br /&gt;
* [https://www.nist.gov/itl/smallbusinesscyber/nist-cybersecurity-framework-0 &#039;&#039;&#039;NIST Cybersecurity Framework 2.0&#039;&#039;&#039;]:  Small Business Quick Start Guide - provides small-to-medium sized businesses (SMB), specifically those who have modest or no cybersecurity plans in place, with considerations to kick-start their cybersecurity risk management strategy using the NIST Cybersecurity Framework (CSF) 2.0. (by the &#039;&#039;National Institute of Standards and Technology)&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Security planning on specific topics===&lt;br /&gt;
&lt;br /&gt;
* [[General tips for international travel]]&lt;br /&gt;
* [[General tips for home security]]&lt;br /&gt;
&lt;br /&gt;
== Building a culture of security within a team ==&lt;br /&gt;
[https://level-up.cc/ &#039;&#039;&#039;LevelUp&#039;&#039;&#039;] is a collection of resources for the global digital safety training community.&lt;br /&gt;
&lt;br /&gt;
[https://wiki.orgsec.community/ &#039;&#039;&#039;Organisational security community wiki&#039;&#039;&#039;] is a resource created by and for security practitioners from all backgrounds to share useful resources and document innovative approaches to long-term security work. &lt;br /&gt;
&lt;br /&gt;
==Resource collections related to security ==&lt;br /&gt;
[https://digitalfirstaid.org/ &#039;&#039;&#039;Digital First Aid Kit&#039;&#039;&#039;] - The Digital First Aid Kit is a free resource to help rapid responders, digital security trainers, and tech-savvy activists to better protect themselves and the communities they support against the most common types of digital emergencies. It can also be used by activists, human rights defenders, bloggers, journalists or media activists who want to learn more about how they can protect themselves and support others. If you or someone you are assisting is experiencing a digital emergency, the Digital First Aid Kit will guide you in diagnosing the issues you are facing, and refer you to support providers for further help if needed.&lt;br /&gt;
&lt;br /&gt;
[https://communitydocs.accessnow.org/ &#039;&#039;&#039;Access Now Help Desk documentation&#039;&#039;&#039;]&lt;br /&gt;
&lt;br /&gt;
[https://cyber-star.org/ &#039;&#039;&#039;CyberSTAR&#039;&#039;&#039;], by SecDev, makes it easier for small organizations and individuals to understand and manage digital safety by organizing it around six themes. This site presents learning resources to help you be safer online—plus teaching resources for digital safety trainers.&lt;br /&gt;
&lt;br /&gt;
[https://totem-project.org/ &#039;&#039;&#039;Totem project&#039;&#039;&#039;] - Developed in collaboration by Greenhost and Free Press Unlimited, Totem is a &#039;&#039;&#039;free&#039;&#039;&#039; &#039;&#039;&#039;online learning platform&#039;&#039;&#039; that offers educational courses about digital security and privacy, and related tools and tactics for journalists, activists and human rights defenders in a safe, online classroom environment.&lt;br /&gt;
&lt;br /&gt;
[https://advocacyassembly.org/en/courses?category=1 &#039;&#039;&#039;Advocacy Assembly&#039;&#039;&#039; online courses related to digital security] - Advocacy Assembly is a &#039;&#039;&#039;free e-learning platform&#039;&#039;&#039; featuring dozens of courses for human rights activists, campaigners and journalists.&lt;br /&gt;
&lt;br /&gt;
[https://www.saferedge.com/learning &#039;&#039;&#039;Safer Edge&#039;&#039;&#039; online courses] (not free) - Safer Edge works with security, safeguarding and risk advisory professionals with a wide range of expertise, skills and experience. Team and consultants have experience working internationally in the humanitarian and development contexts in a range of risk contexts. In-house team speaks English, French, Spanish, Portuguese, Arabic and Russian.&lt;br /&gt;
&lt;br /&gt;
[https://academy.amnesty.org/ &#039;&#039;&#039;Amnesty International&#039;s Human Rights Academy&#039;&#039;&#039;] is a free online learning platform that allows participants to embark on a self-paced learning journey to understand the principles of human rights and how to use them as a tool for positive change. We believe that knowledge of rights is essential for claiming them, defending them, and promoting them and hope that our courses will inspire you to take action.&lt;br /&gt;
&lt;br /&gt;
[https://www.protectioninternational.org/tools/protection-manuals/ &#039;&#039;&#039;Protection International&#039;s Protection Manuals&#039;&#039;&#039;] for Human Rights Defenders - These manuals were developed to provide human rights defenders with additional knowledge and tools to improve their understanding of security and protection.&lt;br /&gt;
&lt;br /&gt;
[https://www.frontlinedefenders.org/en/digital-protection-resources &#039;&#039;&#039;Front Line Defenders Digital Protection Resources&#039;&#039;&#039;] - Front Line Defenders Digital Protection programme responds to the digital security environment facing HRDs and develops tools, guides and reosources to complement its training and consultation programming.&lt;br /&gt;
&lt;br /&gt;
[https://ssd.eff.org/ &#039;&#039;&#039;Surveillance Self-Defense&#039;&#039;&#039;] toolkit by Electronic Frontier Foundation - &amp;quot;We’re the Electronic Frontier Foundation, an independent non-profit working to protect online privacy for over thirty years. This is Surveillance Self-Defense: our expert guide to protecting you and your friends from online spying.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[https://securityinabox.org/en/ &#039;&#039;&#039;Security in a Box&#039;&#039;&#039;] primarily aims to help a global community of human rights defenders whose work puts them at risk. It has been recognized worldwide as a foundational resource for helping people at risk protect their digital security and privacy.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[https://www.frontlinedefenders.org/en/resource-publication/workbook-security-practical-steps-human-rights-defenders-risk Front Line Defenders Workbook on Security]&#039;&#039;&#039; has been inspired by the hundreds of HRDs from over 50 countries who have attended Front Line Defenders workshops on security and protection. The Workbook takes you through the steps to producing a security plan – for yourself and for your organisation (for those HRDs who are working in organisations). It follows a systematic approach for assessing your security situation and developing risk and vulnerability reduction strategies and tactics. Manual available in French, Spanish, Russian, Arabic, Turkish, Portuguese, Urdu, Somali, Dari, and Chinese.&lt;/div&gt;</summary>
		<author><name>Kristin1</name></author>
	</entry>
	<entry>
		<id>https://wiki.digitalrights.community/index.php?title=Use_a_secure_messaging_app&amp;diff=52342</id>
		<title>Use a secure messaging app</title>
		<link rel="alternate" type="text/html" href="https://wiki.digitalrights.community/index.php?title=Use_a_secure_messaging_app&amp;diff=52342"/>
		<updated>2024-12-18T19:09:03Z</updated>

		<summary type="html">&lt;p&gt;Kristin1: /* Reasons to avoid using WhatsApp */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Recommendation: Use Signal ==&lt;br /&gt;
If you are trying to decide between using Signal, WhatsApp or Telegram, most sources would say that Signal has a better reputation for security then the others. Here are a few reasons to choose Signal (source: [https://www.pcmag.com/picks/best-secure-messaging-apps The Best Secure Messaging Apps for 2024] PC Mag)&lt;br /&gt;
&lt;br /&gt;
# All of your messages are secured with E2EE and Signal is a nonprofit, so there&#039;s no reason to harvest any user data. &lt;br /&gt;
# The underlying technology of Signal is so successful it has been implemented by Google and Meta.&lt;br /&gt;
&lt;br /&gt;
== Reasons to avoid using WhatsApp ==&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Requires phone number&#039;&#039;&#039; and contacts list to function (However, there are [https://www.wikihow.com/Use-WhatsApp-Without-a-Phone-Number ways around] using your actual phone number)&lt;br /&gt;
* &#039;&#039;&#039;Backups (especially iCloud) may be vulnerable to surveillance&#039;&#039;&#039; (Source: [https://freedom.press/digisec/blog/icloud-security/#:~:text=If%20not%20encrypted%2C%20law%20enforcement,case%20showing%20subpoenaed%20WhatsApp%20messages. Freedom of the Press Foundation])&lt;br /&gt;
* &#039;&#039;&#039;Privacy of content sent via WhatsApp is questionable&#039;&#039;&#039;, and there are reasons to not trust Meta and their contractors with your content (Source: [https://www.theregister.com/2021/09/07/whatsapp_privacy_propublica/ The Register])&lt;br /&gt;
* &#039;&#039;&#039;Hackers can break WhatsApp&#039;&#039;&#039; by tricking users into giving away verification codes, using spyware, sending malware as attachments, or even cloning your phone or WhatsApp account. (Source: [https://www.bitdefender.com/blog/hotforsecurity/how-scammers-gain-access-and-hack-your-whatsapp-account-and-what-you-can-do-to-protect-yourself/ BitDefender blog])&lt;br /&gt;
* &#039;&#039;&#039;Unofficial versions of WhatsApp are almost indistinguishable from the real version of WhatsApp&#039;&#039;&#039;. Unofficial versions of WhatsApp are insecure and compromise the privacy and security of communication. Having one person using an unofficial version of WhatsApp within a group makes all group communications vulnerable. [https://faq.whatsapp.com/1293093778117781 Here&#039;s how to know if you are using the official WhatsApp program].&lt;br /&gt;
&lt;br /&gt;
== Tip: use automatic disappearing messages ==&lt;br /&gt;
Disappearing messages (also known as Vanish mode) is a feature that makes your messages disappear once a recipient reads them or after a certain period of time. It’s a great tool for privacy protection and chat hygiene. It&#039;s an excellent feature to use if there&#039;s a risk that your phone will be viewed by someone who may be against your human rights work. &lt;br /&gt;
&lt;br /&gt;
=== Disappearing messages in Signal ===&lt;br /&gt;
Use [https://support.signal.org/hc/en-us/articles/360007320771-Set-and-manage-disappearing-messages disappearing messages (in Signal)] to keep your message history tidy. The message will disappear from your devices after the timer has elapsed. This is not for situations where your contact is your adversary — after all, if someone who receives a disappearing message really wants a record of it, they can always use another camera to take a photo of the screen before the message disappears.&lt;br /&gt;
&lt;br /&gt;
* Disappearing messages can be managed by anyone in the chat.&lt;br /&gt;
* The setting applies to any new messaging after the timer has been set or modified.&lt;br /&gt;
* Changes to the timer will sync with your linked devices.&lt;br /&gt;
&lt;br /&gt;
=== Disappearing messages in WhatsApp ===&lt;br /&gt;
[https://faq.whatsapp.com/673193694148537 Disappearing messages] is an optional feature you can turn on for more privacy. You can set messages to disappear 24 hours, 7 days, or 90 days after they&#039;re sent unless that message is kept. The duration you choose only affects new messages in the chat, not messages you&#039;ve already sent or received. &lt;br /&gt;
&lt;br /&gt;
=== Disappearing messages in Messenger (Facebook) ===&lt;br /&gt;
[https://nordvpn.com/blog/vanish-mode/#:~:text=Vanish%20mode%20on%20Messenger%20automatically,what%20Facebook%20knows%20about%20you. Vanish mode on Messenger] automatically clears messages after the recipient has viewed them and closed the chat. This advanced feature offers Messenger users more private communication and media sharing and limits what Facebook knows about you.&lt;br /&gt;
&lt;br /&gt;
== Online courses ==&lt;br /&gt;
Totem course on &#039;&#039;&#039;Secure messaging apps&#039;&#039;&#039; (available in [https://learn.totem-project.org/courses/course-v1:Totem+TP_SM_001+course/about EN], [https://learn.totem-project.org/courses/course-v1:Totem+TP_SM_FR+cours/about FR], [https://learn.totem-project.org/courses/course-v1:Totem+TP_SM_ES+001/about ES], [https://learn.totem-project.org/courses/course-v1:Totem+TP_SM_RU+001/about RU])&lt;br /&gt;
&lt;br /&gt;
You should walk away from this course knowing&amp;lt;blockquote&amp;gt;&lt;br /&gt;
* What secure messaging actually is&lt;br /&gt;
* How to choose which secure messaging app is the best for you&lt;br /&gt;
* How to activate security measures, including:&lt;br /&gt;
&lt;br /&gt;
* End-to-end encryption&lt;br /&gt;
* Disappearing messages&lt;br /&gt;
&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Articles ==&lt;br /&gt;
[https://www.securemessagingapps.com/ Secure Messaging Apps Comparison] &lt;br /&gt;
&lt;br /&gt;
[https://www.pcmag.com/picks/best-secure-messaging-apps The Best Secure Messaging Apps for 2024] (PC Mag)&lt;/div&gt;</summary>
		<author><name>Kristin1</name></author>
	</entry>
	<entry>
		<id>https://wiki.digitalrights.community/index.php?title=Secure_your_devices&amp;diff=52341</id>
		<title>Secure your devices</title>
		<link rel="alternate" type="text/html" href="https://wiki.digitalrights.community/index.php?title=Secure_your_devices&amp;diff=52341"/>
		<updated>2024-12-18T16:39:38Z</updated>

		<summary type="html">&lt;p&gt;Kristin1: /* Keep your device or operating system up-to-date with software updates */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Secure your device&#039;s operating system ==&lt;br /&gt;
&lt;br /&gt;
=== Avoid pirated copies of operating systems ===&lt;br /&gt;
It is very important that you use a &#039;&#039;licensed&#039;&#039; operating system, such as Linux, Windows or Mac. A &amp;quot;pirated copy&amp;quot; of an operating system refers to a version of the OS that is illegally obtained. These pirated copies do not have a valid license and do not receive critical updates, therefore, it exposes users to security risks and potential legal issues.&lt;br /&gt;
&lt;br /&gt;
=== Keep your devices or operating system up-to-date with software updates ===&lt;br /&gt;
Keep your licensed operating systems (and devices) up-to-date with software updates. Updates will often fix security problems in older code that attacks can exploit. Note that some older phones and operating systems may no longer be supported, even for security updates. In particular, Microsoft has made it clear that versions of Windows Vista, XP, and below will not receive fixes for even severe security problems. This means that if you use these, you cannot expect them to be secure from attackers. The same is true for OS X before 10.11 or El Capitan. (Source: [https://ssd.eff.org/module/choosing-your-tools Electronic Frontier SSD]) &lt;br /&gt;
&lt;br /&gt;
=== Free, open source operating systems ===&lt;br /&gt;
If you cannot afford to purchase a licensed Windows or Mac operating system, you can use a free and open source operating system, such as: &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[https://www.linuxmint.com/ Linux Mint]&#039;&#039;&#039; is an operating system for desktop and laptop computers. It is designed to work &#039;out of the box&#039; and comes fully equipped with the apps most people need. Linux Mint works on most computers. It can also be run from a live USB stick to make sure everything works fine without having to install anything. &lt;br /&gt;
&lt;br /&gt;
[https://tails.net/ &#039;&#039;&#039;Tails&#039;&#039;&#039;] is a portable operating system that protects against surveillance and censorship. To use Tails, shut down the computer and start on your Tails USB stick instead of starting on Windows, macOS, or Linux. You can temporarily turn your own computer into a secure machine. You can also &#039;&#039;&#039;.&#039;&#039;&#039; You can also stay safe while using the computer of somebody else&#039;&#039;&#039;.&#039;&#039;&#039; Tails is a 1.4 GB download and takes ½ hour to install. Tails can be installed on any USB stick of 8 GB minimum. Tails works on most computers less than 10 years old. You can start again on the other operating system after you s t down Tails. You don&#039;t have to worry about the computer having viruses because Tails runs independently from the other operating system and never uses the hard disk. But, Tails cannot always protect you if you install it from a computer with viruses or if you use it on a computer with malicious hardware, like keyloggers. &lt;br /&gt;
&lt;br /&gt;
== Use antivirus or anti-malware ==&lt;br /&gt;
&lt;br /&gt;
=== Good practices ===&lt;br /&gt;
1. Know how to check if your antivirus or anti-malware app is working and updating itself.&lt;br /&gt;
&lt;br /&gt;
2. Perform periodic manual scans.&lt;br /&gt;
&lt;br /&gt;
3. Choose and run only one anti-malware app; if you run more than one on a device, they may interfere with each other.&lt;br /&gt;
&lt;br /&gt;
[https://freedom.press/training/blog/what-about-antivirus/ What about antivirus?] Article by David Huerta (2020) of the Freedom of the Press Foundation Here&#039;s a good article &lt;br /&gt;
Excerpt: &amp;quot;Antivirus software is one of the oldest offerings available from the now billion-dollar cybersecurity industry. But what does antivirus software do to help protect our devices, what does it not do, and do we really need it?&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== Antivirus software options ===&lt;br /&gt;
&lt;br /&gt;
==== Windows ====&lt;br /&gt;
On Windows 10, Security in a Box recommends to turn on Windows&#039;s own anti-malware protection [https://securityplanner.consumerreports.org/tool/turn-on-windows-defender-antivirus Windows Defender]&lt;br /&gt;
&lt;br /&gt;
==== Linux ====&lt;br /&gt;
On Linux you can manually scan your device for malware with [https://www.clamav.net/ ClamAV]. But be aware it is only a scanner, and will not monitor your system to protect you from infection. You can use it to determine whether or not a file or directory contains known malware — and it can be run from a USB memory stick in case you do not have permission to install software on the suspect computer. You may also consider using paid antivirus (e.g. ESET NOD32)&lt;br /&gt;
&lt;br /&gt;
==== Windows, Linux, Mac, iOS, Android ====&lt;br /&gt;
Software available on multiple operating systems that offer free versions:&lt;br /&gt;
* [https://www.bitdefender.com BitDefender] (Android, iOS, Mac, Windows) - Warning: This can be a heavy program for many computers. &lt;br /&gt;
* [https://www.malwarebytes.com/ Malwarebytes] (Android, iOS, Mac, Windows). Malwarebytes full version is free for 2 week, but you can manually scan your device without time limits.&lt;br /&gt;
* [https://www.avast.com/ Avast antivirus] (Android, iOS, Mac, Windows)&lt;br /&gt;
&lt;br /&gt;
Not recommended:&lt;br /&gt;
* [https://www.avg.com/ AVG antivirus] (Android, iOS, Mac, Windows)&lt;br /&gt;
* [https://www.avira.com/en/free-antivirus Avira antivirus] (Android, iOS, Mac, Windows)&lt;br /&gt;
&lt;br /&gt;
From the community: AVG, Avira were found to be running mining operations on consumers PC and they don&#039;t offer proper protection.&lt;br /&gt;
&lt;br /&gt;
Note that all antivirus and anti-malware apps collect information on how the protected devices are being used. Some of this information may be shared with companies which own them. There have been cases where this information was sold to third parties.&lt;br /&gt;
&lt;br /&gt;
== Full disk encryption ==&lt;br /&gt;
&lt;br /&gt;
=== For computers ===&lt;br /&gt;
&#039;&#039;&#039;Apple&#039;&#039;&#039; provides a built-in, full-disk encryption feature on macOS called [[wikipedia:FileVault|FileVault]]. Guide: How to encrypt your [https://ssd.eff.org/module/how-encrypt-your-iphone iPhone] (available in 10+ languages)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Linux&#039;&#039;&#039; distributions usually offer full-disk encryption when you first set up your system.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Windows Vista or later&#039;&#039;&#039; includes a full-disk encryption feature called [https://learn.microsoft.com/en-us/windows/security/operating-system-security/data-protection/bitlocker/ BitLocker]. Guide: How to encrypt your [https://ssd.eff.org/module/how-encrypt-your-windows-device Windows device] (available in 10+ languages)&lt;br /&gt;
&lt;br /&gt;
=== For smartphones and tablets ===&lt;br /&gt;
&#039;&#039;&#039;Apple&#039;&#039;&#039; devices such as the iPhone and iPad describe it as “Data Protection” and turn it on if you set a passcode.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Android&#039;&#039;&#039; offers full-disk encryption when you first set up your device on newer devices, or anytime afterwards under its “Security” settings for all devices.&lt;br /&gt;
&lt;br /&gt;
=== Disk encryption vulnerabilities ===&lt;br /&gt;
There are some risks related to disk encryption that you need to consider before moving forward, and find ways to mitigate these risks:&lt;br /&gt;
# Data is exposed as soon as it leaves the protected disk&lt;br /&gt;
# Data is exposed in the clear if a user session is hijacked &lt;br /&gt;
# Data is exposed if device credentials are compromised&lt;br /&gt;
# All data is protected by a single key, which means that if you lose that one key, you lose access to the device&lt;br /&gt;
&lt;br /&gt;
== Disable features that create vulnerabilities (Lockdown Mode) ==&lt;br /&gt;
&#039;&#039;&#039;iPhone and Mac devices offers [https://support.apple.com/en-us/HT212650 Lockdown Mode]&#039;&#039;&#039; - &amp;quot;When Lockdown Mode is enabled, your device won’t function like it typically does. To reduce the attack surface that potentially could be exploited by highly targeted mercenary spyware, certain apps, websites, and features are strictly limited for security and some experiences might not be available at all. Lockdown Mode is available in iOS 16, iPadOS 16, and macOS Ventura.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Lockdown Mode covers a lot of different scenarios and reduce attack surface for attacks: remove JIT from browser, disable a lot of webkit features, block calls from unknown contacts in iMessage, remove many file types in messages etc. You can read a [https://blacktop.github.io/presentations/0x41con_2023/HTML/index.html#0 2023 analysis presentation by Blacktop]. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Android also offers a version of [https://www.zdnet.com/article/how-to-use-the-android-lockdown-mode-and-why-you-should/ Lockdown Mode]&#039;&#039;&#039; - &amp;quot;When lockdown mode is enabled, fingerprint sensors, facial recognition, and voice recognition do not function. Once you&#039;ve activated lockdown mode, the only way to gain access to your device is either via PIN, password, or pattern. One thing you must know about lockdown mode is that it&#039;s a one-time thing. In other words, once you&#039;ve enabled it, it will immediately be disabled upon successful login. That means you have to re-enable lockdown mode every time you want to use it.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
== Separate your phone number from your device ==&lt;br /&gt;
[https://theintercept.com/2017/09/28/signal-tutorial-second-phone-number/ How to use signal without giving out your phone number] (article) - A step-by-step guide to protecting your private phone number while enjoying the security of encrypted texting app Signal.&lt;br /&gt;
----&lt;br /&gt;
&#039;&#039;Last updated June 18, 2024&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Source for this content: [https://securityinabox.org/en/phones-and-computers/malware/#use-antivirus-or-anti-malware Security in a Box]&#039;&#039; , [https://ssd.eff.org/ Electronic Frontier SSD], and discussions with human rights security practitioners.&#039;&#039;&lt;/div&gt;</summary>
		<author><name>Kristin1</name></author>
	</entry>
	<entry>
		<id>https://wiki.digitalrights.community/index.php?title=Research_on_transnational_repression&amp;diff=52335</id>
		<title>Research on transnational repression</title>
		<link rel="alternate" type="text/html" href="https://wiki.digitalrights.community/index.php?title=Research_on_transnational_repression&amp;diff=52335"/>
		<updated>2024-12-17T20:45:27Z</updated>

		<summary type="html">&lt;p&gt;Kristin1: /* TNR mitigation techniques */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Videos ==&lt;br /&gt;
* [https://www.youtube.com/watch?v=FkPCec7jG5I Digital Transnational Repression Explained], by Citizen Lab&lt;br /&gt;
* [https://www.youtube.com/watch?v=8YcHajYQLSw Digital Transnational Repression Explained: Activists], by Citizen Lab&lt;br /&gt;
* [https://www.youtube.com/watch?v=N72UV-aD9r4 Gender-based Digital Transnational Repression Explained], by Citizen Lab&lt;br /&gt;
* [https://www.youtube.com/watch?v=3D4EjMq5FK4 Responding to Transnational Repression] - recorded panel discussion from Dec 2021 &lt;br /&gt;
* [https://www.orionpolicy.org/orionforum/111/transnational-repression-the-long-arm-of-authoritarianism Transnational Repression: The Long Arm of Authoritarianism] (parts 1 and 2) - recorded panel discussion from Sept/Oct 2022. &lt;br /&gt;
* [https://www.youtube.com/watch?v=86Q_9IUosCE&amp;amp;t=71s Defending Democracy in Exile: Policy Responses to Transnational Repression] by Freedom House&lt;br /&gt;
&lt;br /&gt;
== Reports ==&lt;br /&gt;
&lt;br /&gt;
=== Research Database on Transnational Repression (TNR) ===&lt;br /&gt;
https://tnr-research.uwazi.io/en/ &lt;br /&gt;
&lt;br /&gt;
This collection of research reports can help human rights defenders better understand:&lt;br /&gt;
&lt;br /&gt;
* Which TNR threats are likely or possible based on the existing evidence, to determine appropriate mitigation techniques&lt;br /&gt;
* Which TNR threats are unlikely, in order to alleviate fear&lt;br /&gt;
* What exiled HRDs can expect from a host country in terms of protection measures&lt;br /&gt;
* Existing campaigns to strengthen protection for exiled HRDs&lt;br /&gt;
&lt;br /&gt;
This database was developed and curated by the Center for Victims of Torture. To contribute to this research, email research@freedomhouse.org&lt;br /&gt;
&lt;br /&gt;
Reports in this database include:&lt;br /&gt;
&lt;br /&gt;
* Defending Democracy in Exile: Policy Responses to Transnational Repression, report by Freedom House&lt;br /&gt;
* Silencing Across Borders: Transnational Repression and Digital Threats Against Exiled Activists, report by Marcus Michaelsen&lt;br /&gt;
* Psychological and Emotional War: Digital Transnational Repression in Canada, report by Citizen Lab&lt;br /&gt;
* Going after the family: Transnational repression and the proxy punishment of Middle Eastern diasporas, article co-authored with Dana M. Moss &amp;amp; Gillian Kennedy. &lt;br /&gt;
&lt;br /&gt;
== Books ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The Arab Spring Abroad: Diaspora Activism against Authoritarian Regimes&#039;&#039;&#039;, book by Dana Moss. You can download this book for free here: https://www.cambridge.org/core/books/arab-spring-abroad/D7EC15ED46D37A2DB8CDDB83F06CC591#overview&lt;br /&gt;
&lt;br /&gt;
== TNR threat categories ==&lt;br /&gt;
&lt;br /&gt;
* Unlawful deportation, extradition, rendition, Interpol abuse, legal cases&lt;br /&gt;
** Examples: trial in absentia, initiate a criminal case in order to carry out deportation or extradition&lt;br /&gt;
*Physical intimidation, assault, etc&lt;br /&gt;
* Coercion by proxy / Threats against in-country relatives&lt;br /&gt;
** Examples: Opponent may harass, threaten, prosecute, and imprison family or colleagues&lt;br /&gt;
*Account and device hacking&lt;br /&gt;
** Examples: Opponents hack social media or email accounts&lt;br /&gt;
* Monitoring and surveillance&lt;br /&gt;
** Examples: Tracking and identifying HRDs, monitor family members’ conversations so they can access communications, infiltration of network through informants,  surveil/monitor communication to ascertain location and activities&lt;br /&gt;
* Slander, harassment, disinformation campaigns&lt;br /&gt;
** Examples: Smear campaigns, hate speech and harassment in social media&lt;br /&gt;
&lt;br /&gt;
== TNR mitigation techniques ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Threat category&lt;br /&gt;
!Mitigation techniques&lt;br /&gt;
!Resources and research&lt;br /&gt;
|-&lt;br /&gt;
|Unlawful deportation, extradition, rendition, Interpol abuse, legal cases&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|Physical intimidation, assault, etc&lt;br /&gt;
|Personal safety awareness (see Umbrella app)&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|Coercion by proxy / Threats against in-country relatives&lt;br /&gt;
|&lt;br /&gt;
|[https://tnr-research.uwazi.io/en/entity/s0hrhs72n7n Going after the family: Transnational repression and the proxy punishment of Middle Eastern diasporas] (Moss, Michaelsen, Kennedy (2022))&lt;br /&gt;
|-&lt;br /&gt;
|Account and device hacking&lt;br /&gt;
|&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa|Use two factor authentication for all accounts]]&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa|Use unique, complex passwords for all accounts]]&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa|Use a password manager to create, store and protect those passwords]]&lt;br /&gt;
* [[Protect your website|Protect your website from DDOS attacks]]&lt;br /&gt;
* [[Trusted hosting companies in the human rights community|Use a host company that you trust]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|Monitoring and surveillance&lt;br /&gt;
|&lt;br /&gt;
* [[Safe internet browsing using VPN and Tor browser|Use a VPN and/or Tor browser]]&lt;br /&gt;
* [[Use a secure messaging app]]&lt;br /&gt;
* [[How to collect and store information in a secure way]]&lt;br /&gt;
&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa#Be aware of spear phishing attacks|Protect yourselves against (spear) phishing attacks]]&lt;br /&gt;
* Use a second device for sensitive activities&lt;br /&gt;
* [[How to mitigate your risk of being subject to Pegasus surveillance|Restart your device regularly to disrupt spyware]]&lt;br /&gt;
* [[Secure your devices|Use anti virus]]&lt;br /&gt;
* [[How to mitigate your risk of being subject to Pegasus surveillance]], and other spyware&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|Slander, harassment, disinformation campaigns&lt;br /&gt;
|[[How to deal with online harassment and threats]]&lt;br /&gt;
|&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Kristin1</name></author>
	</entry>
	<entry>
		<id>https://wiki.digitalrights.community/index.php?title=Research_on_transnational_repression&amp;diff=52334</id>
		<title>Research on transnational repression</title>
		<link rel="alternate" type="text/html" href="https://wiki.digitalrights.community/index.php?title=Research_on_transnational_repression&amp;diff=52334"/>
		<updated>2024-12-17T20:43:13Z</updated>

		<summary type="html">&lt;p&gt;Kristin1: /* TNR mitigation techniques */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Videos ==&lt;br /&gt;
* [https://www.youtube.com/watch?v=FkPCec7jG5I Digital Transnational Repression Explained], by Citizen Lab&lt;br /&gt;
* [https://www.youtube.com/watch?v=8YcHajYQLSw Digital Transnational Repression Explained: Activists], by Citizen Lab&lt;br /&gt;
* [https://www.youtube.com/watch?v=N72UV-aD9r4 Gender-based Digital Transnational Repression Explained], by Citizen Lab&lt;br /&gt;
* [https://www.youtube.com/watch?v=3D4EjMq5FK4 Responding to Transnational Repression] - recorded panel discussion from Dec 2021 &lt;br /&gt;
* [https://www.orionpolicy.org/orionforum/111/transnational-repression-the-long-arm-of-authoritarianism Transnational Repression: The Long Arm of Authoritarianism] (parts 1 and 2) - recorded panel discussion from Sept/Oct 2022. &lt;br /&gt;
* [https://www.youtube.com/watch?v=86Q_9IUosCE&amp;amp;t=71s Defending Democracy in Exile: Policy Responses to Transnational Repression] by Freedom House&lt;br /&gt;
&lt;br /&gt;
== Reports ==&lt;br /&gt;
&lt;br /&gt;
=== Research Database on Transnational Repression (TNR) ===&lt;br /&gt;
https://tnr-research.uwazi.io/en/ &lt;br /&gt;
&lt;br /&gt;
This collection of research reports can help human rights defenders better understand:&lt;br /&gt;
&lt;br /&gt;
* Which TNR threats are likely or possible based on the existing evidence, to determine appropriate mitigation techniques&lt;br /&gt;
* Which TNR threats are unlikely, in order to alleviate fear&lt;br /&gt;
* What exiled HRDs can expect from a host country in terms of protection measures&lt;br /&gt;
* Existing campaigns to strengthen protection for exiled HRDs&lt;br /&gt;
&lt;br /&gt;
This database was developed and curated by the Center for Victims of Torture. To contribute to this research, email research@freedomhouse.org&lt;br /&gt;
&lt;br /&gt;
Reports in this database include:&lt;br /&gt;
&lt;br /&gt;
* Defending Democracy in Exile: Policy Responses to Transnational Repression, report by Freedom House&lt;br /&gt;
* Silencing Across Borders: Transnational Repression and Digital Threats Against Exiled Activists, report by Marcus Michaelsen&lt;br /&gt;
* Psychological and Emotional War: Digital Transnational Repression in Canada, report by Citizen Lab&lt;br /&gt;
* Going after the family: Transnational repression and the proxy punishment of Middle Eastern diasporas, article co-authored with Dana M. Moss &amp;amp; Gillian Kennedy. &lt;br /&gt;
&lt;br /&gt;
== Books ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The Arab Spring Abroad: Diaspora Activism against Authoritarian Regimes&#039;&#039;&#039;, book by Dana Moss. You can download this book for free here: https://www.cambridge.org/core/books/arab-spring-abroad/D7EC15ED46D37A2DB8CDDB83F06CC591#overview&lt;br /&gt;
&lt;br /&gt;
== TNR threat categories ==&lt;br /&gt;
&lt;br /&gt;
* Unlawful deportation, extradition, rendition, Interpol abuse, legal cases&lt;br /&gt;
** Examples: trial in absentia, initiate a criminal case in order to carry out deportation or extradition&lt;br /&gt;
*Physical intimidation, assault, etc&lt;br /&gt;
* Coercion by proxy / Threats against in-country relatives&lt;br /&gt;
** Examples: Opponent may harass, threaten, prosecute, and imprison family or colleagues&lt;br /&gt;
*Account and device hacking&lt;br /&gt;
** Examples: Opponents hack social media or email accounts&lt;br /&gt;
* Monitoring and surveillance&lt;br /&gt;
** Examples: Tracking and identifying HRDs, monitor family members’ conversations so they can access communications, infiltration of network through informants,  surveil/monitor communication to ascertain location and activities&lt;br /&gt;
* Slander, harassment, disinformation campaigns&lt;br /&gt;
** Examples: Smear campaigns, hate speech and harassment in social media&lt;br /&gt;
&lt;br /&gt;
== TNR mitigation techniques ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Threat category&lt;br /&gt;
!Mitigation techniques&lt;br /&gt;
!Resources and research&lt;br /&gt;
|-&lt;br /&gt;
|Unlawful deportation, extradition, rendition, Interpol abuse, legal cases&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|Physical intimidation, assault, etc&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|Coercion by proxy / Threats against in-country relatives&lt;br /&gt;
|&lt;br /&gt;
|[https://tnr-research.uwazi.io/en/entity/s0hrhs72n7n Going after the family: Transnational repression and the proxy punishment of Middle Eastern diasporas] (Moss, Michaelsen, Kennedy (2022))&lt;br /&gt;
|-&lt;br /&gt;
|Account and device hacking&lt;br /&gt;
|&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa|Use two factor authentication for all accounts]]&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa|Use unique, complex passwords for all accounts]]&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa|Use a password manager to create, store and protect those passwords]]&lt;br /&gt;
* [[Protect your website|Protect your website from DDOS attacks]]&lt;br /&gt;
* [[Trusted hosting companies in the human rights community|Use a host company that you trust]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|Monitoring and surveillance&lt;br /&gt;
|&lt;br /&gt;
* [[Safe internet browsing using VPN and Tor browser|Use a VPN and/or Tor browser]]&lt;br /&gt;
* [[Use a secure messaging app]]&lt;br /&gt;
* [[How to collect and store information in a secure way]]&lt;br /&gt;
&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa#Be aware of spear phishing attacks|Protect yourselves against (spear) phishing attacks]]&lt;br /&gt;
* Use a second device for sensitive activities&lt;br /&gt;
* [[How to mitigate your risk of being subject to Pegasus surveillance|Restart your device regularly to disrupt spyware]]&lt;br /&gt;
* [[Secure your devices|Use anti virus]]&lt;br /&gt;
* [[How to mitigate your risk of being subject to Pegasus surveillance]], and other spyware&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|Slander, harassment, disinformation campaigns&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Kristin1</name></author>
	</entry>
	<entry>
		<id>https://wiki.digitalrights.community/index.php?title=Research_on_transnational_repression&amp;diff=52333</id>
		<title>Research on transnational repression</title>
		<link rel="alternate" type="text/html" href="https://wiki.digitalrights.community/index.php?title=Research_on_transnational_repression&amp;diff=52333"/>
		<updated>2024-12-17T20:41:49Z</updated>

		<summary type="html">&lt;p&gt;Kristin1: /* TNR threat categories */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Videos ==&lt;br /&gt;
* [https://www.youtube.com/watch?v=FkPCec7jG5I Digital Transnational Repression Explained], by Citizen Lab&lt;br /&gt;
* [https://www.youtube.com/watch?v=8YcHajYQLSw Digital Transnational Repression Explained: Activists], by Citizen Lab&lt;br /&gt;
* [https://www.youtube.com/watch?v=N72UV-aD9r4 Gender-based Digital Transnational Repression Explained], by Citizen Lab&lt;br /&gt;
* [https://www.youtube.com/watch?v=3D4EjMq5FK4 Responding to Transnational Repression] - recorded panel discussion from Dec 2021 &lt;br /&gt;
* [https://www.orionpolicy.org/orionforum/111/transnational-repression-the-long-arm-of-authoritarianism Transnational Repression: The Long Arm of Authoritarianism] (parts 1 and 2) - recorded panel discussion from Sept/Oct 2022. &lt;br /&gt;
* [https://www.youtube.com/watch?v=86Q_9IUosCE&amp;amp;t=71s Defending Democracy in Exile: Policy Responses to Transnational Repression] by Freedom House&lt;br /&gt;
&lt;br /&gt;
== Reports ==&lt;br /&gt;
&lt;br /&gt;
=== Research Database on Transnational Repression (TNR) ===&lt;br /&gt;
https://tnr-research.uwazi.io/en/ &lt;br /&gt;
&lt;br /&gt;
This collection of research reports can help human rights defenders better understand:&lt;br /&gt;
&lt;br /&gt;
* Which TNR threats are likely or possible based on the existing evidence, to determine appropriate mitigation techniques&lt;br /&gt;
* Which TNR threats are unlikely, in order to alleviate fear&lt;br /&gt;
* What exiled HRDs can expect from a host country in terms of protection measures&lt;br /&gt;
* Existing campaigns to strengthen protection for exiled HRDs&lt;br /&gt;
&lt;br /&gt;
This database was developed and curated by the Center for Victims of Torture. To contribute to this research, email research@freedomhouse.org&lt;br /&gt;
&lt;br /&gt;
Reports in this database include:&lt;br /&gt;
&lt;br /&gt;
* Defending Democracy in Exile: Policy Responses to Transnational Repression, report by Freedom House&lt;br /&gt;
* Silencing Across Borders: Transnational Repression and Digital Threats Against Exiled Activists, report by Marcus Michaelsen&lt;br /&gt;
* Psychological and Emotional War: Digital Transnational Repression in Canada, report by Citizen Lab&lt;br /&gt;
* Going after the family: Transnational repression and the proxy punishment of Middle Eastern diasporas, article co-authored with Dana M. Moss &amp;amp; Gillian Kennedy. &lt;br /&gt;
&lt;br /&gt;
== Books ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The Arab Spring Abroad: Diaspora Activism against Authoritarian Regimes&#039;&#039;&#039;, book by Dana Moss. You can download this book for free here: https://www.cambridge.org/core/books/arab-spring-abroad/D7EC15ED46D37A2DB8CDDB83F06CC591#overview&lt;br /&gt;
&lt;br /&gt;
== TNR threat categories ==&lt;br /&gt;
&lt;br /&gt;
* Unlawful deportation, extradition, rendition, Interpol abuse, legal cases&lt;br /&gt;
** Examples: trial in absentia, initiate a criminal case in order to carry out deportation or extradition&lt;br /&gt;
*Physical intimidation, assault, etc&lt;br /&gt;
* Coercion by proxy / Threats against in-country relatives&lt;br /&gt;
** Examples: Opponent may harass, threaten, prosecute, and imprison family or colleagues&lt;br /&gt;
*Account and device hacking&lt;br /&gt;
** Examples: Opponents hack social media or email accounts&lt;br /&gt;
* Monitoring and surveillance&lt;br /&gt;
** Examples: Tracking and identifying HRDs, monitor family members’ conversations so they can access communications, infiltration of network through informants,  surveil/monitor communication to ascertain location and activities&lt;br /&gt;
* Slander, harassment, disinformation campaigns&lt;br /&gt;
** Examples: Smear campaigns, hate speech and harassment in social media&lt;br /&gt;
&lt;br /&gt;
== TNR mitigation techniques ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Threat category&lt;br /&gt;
!Mitigation techniques&lt;br /&gt;
!Resources and research&lt;br /&gt;
|-&lt;br /&gt;
|Unlawful deportation, extradition, rendition, Interpol abuse, legal cases&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|Physical intimidation, assault, etc&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|Coercion by proxy / Threats against in-country relatives&lt;br /&gt;
|&lt;br /&gt;
|[https://tnr-research.uwazi.io/en/entity/s0hrhs72n7n Going after the family: Transnational repression and the proxy punishment of Middle Eastern diasporas] (Moss, Michaelsen, Kennedy (2022))&lt;br /&gt;
|-&lt;br /&gt;
|Account and device hacking&lt;br /&gt;
|&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa|Use two factor authentication for all accounts]]&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa|Use unique, complex passwords for all accounts]]&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa|Use a password manager to create, store and protect those passwords]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|Monitoring and surveillance&lt;br /&gt;
|&lt;br /&gt;
* [[Safe internet browsing using VPN and Tor browser|Use a VPN and/or Tor browser]]&lt;br /&gt;
* [[Use a secure messaging app]]&lt;br /&gt;
* [[How to collect and store information in a secure way]]&lt;br /&gt;
&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa#Be aware of spear phishing attacks|Protect yourselves against (spear) phishing attacks]]&lt;br /&gt;
* Use a second device for sensitive activities&lt;br /&gt;
* [[How to mitigate your risk of being subject to Pegasus surveillance|Restart your device regularly to disrupt spyware]]&lt;br /&gt;
* [[Secure your devices|Use anti virus]]&lt;br /&gt;
* [[How to mitigate your risk of being subject to Pegasus surveillance]], and other spyware&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|Slander, harassment, disinformation campaigns&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Kristin1</name></author>
	</entry>
	<entry>
		<id>https://wiki.digitalrights.community/index.php?title=Research_on_transnational_repression&amp;diff=52332</id>
		<title>Research on transnational repression</title>
		<link rel="alternate" type="text/html" href="https://wiki.digitalrights.community/index.php?title=Research_on_transnational_repression&amp;diff=52332"/>
		<updated>2024-12-17T20:34:50Z</updated>

		<summary type="html">&lt;p&gt;Kristin1: /* TNR threat categories */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Videos ==&lt;br /&gt;
* [https://www.youtube.com/watch?v=FkPCec7jG5I Digital Transnational Repression Explained], by Citizen Lab&lt;br /&gt;
* [https://www.youtube.com/watch?v=8YcHajYQLSw Digital Transnational Repression Explained: Activists], by Citizen Lab&lt;br /&gt;
* [https://www.youtube.com/watch?v=N72UV-aD9r4 Gender-based Digital Transnational Repression Explained], by Citizen Lab&lt;br /&gt;
* [https://www.youtube.com/watch?v=3D4EjMq5FK4 Responding to Transnational Repression] - recorded panel discussion from Dec 2021 &lt;br /&gt;
* [https://www.orionpolicy.org/orionforum/111/transnational-repression-the-long-arm-of-authoritarianism Transnational Repression: The Long Arm of Authoritarianism] (parts 1 and 2) - recorded panel discussion from Sept/Oct 2022. &lt;br /&gt;
* [https://www.youtube.com/watch?v=86Q_9IUosCE&amp;amp;t=71s Defending Democracy in Exile: Policy Responses to Transnational Repression] by Freedom House&lt;br /&gt;
&lt;br /&gt;
== Reports ==&lt;br /&gt;
&lt;br /&gt;
=== Research Database on Transnational Repression (TNR) ===&lt;br /&gt;
https://tnr-research.uwazi.io/en/ &lt;br /&gt;
&lt;br /&gt;
This collection of research reports can help human rights defenders better understand:&lt;br /&gt;
&lt;br /&gt;
* Which TNR threats are likely or possible based on the existing evidence, to determine appropriate mitigation techniques&lt;br /&gt;
* Which TNR threats are unlikely, in order to alleviate fear&lt;br /&gt;
* What exiled HRDs can expect from a host country in terms of protection measures&lt;br /&gt;
* Existing campaigns to strengthen protection for exiled HRDs&lt;br /&gt;
&lt;br /&gt;
This database was developed and curated by the Center for Victims of Torture. To contribute to this research, email research@freedomhouse.org&lt;br /&gt;
&lt;br /&gt;
Reports in this database include:&lt;br /&gt;
&lt;br /&gt;
* Defending Democracy in Exile: Policy Responses to Transnational Repression, report by Freedom House&lt;br /&gt;
* Silencing Across Borders: Transnational Repression and Digital Threats Against Exiled Activists, report by Marcus Michaelsen&lt;br /&gt;
* Psychological and Emotional War: Digital Transnational Repression in Canada, report by Citizen Lab&lt;br /&gt;
* Going after the family: Transnational repression and the proxy punishment of Middle Eastern diasporas, article co-authored with Dana M. Moss &amp;amp; Gillian Kennedy. &lt;br /&gt;
&lt;br /&gt;
== Books ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The Arab Spring Abroad: Diaspora Activism against Authoritarian Regimes&#039;&#039;&#039;, book by Dana Moss. You can download this book for free here: https://www.cambridge.org/core/books/arab-spring-abroad/D7EC15ED46D37A2DB8CDDB83F06CC591#overview&lt;br /&gt;
&lt;br /&gt;
== TNR threat categories ==&lt;br /&gt;
&lt;br /&gt;
* Unlawful deportation, extradition, rendition, Interpol abuse, legal cases&lt;br /&gt;
** Examples: trial in absentia, initiate a criminal case in order to carry out deportation or extradition&lt;br /&gt;
*Physical intimidation, assault, etc&lt;br /&gt;
* Coercion by proxy / Threats against in-country relatives&lt;br /&gt;
** Examples: Opponent may harass, threaten, prosecute, and imprison family or colleagues&lt;br /&gt;
*Account and device hacking&lt;br /&gt;
** Examples: Opponents hack social media or email accounts&lt;br /&gt;
* Monitoring and surveillance&lt;br /&gt;
** Examples: Tracking and identifying HRDs, monitor family members’ conversations so they can access communications, infiltration of network through informants,  surveil/monitor communication to ascertain location and activities&lt;br /&gt;
* Slander, harassment, disinformation campaigns&lt;br /&gt;
** Examples: Smear campaigns, hate speech and harassment in social media&lt;/div&gt;</summary>
		<author><name>Kristin1</name></author>
	</entry>
	<entry>
		<id>https://wiki.digitalrights.community/index.php?title=Research_on_transnational_repression&amp;diff=52331</id>
		<title>Research on transnational repression</title>
		<link rel="alternate" type="text/html" href="https://wiki.digitalrights.community/index.php?title=Research_on_transnational_repression&amp;diff=52331"/>
		<updated>2024-12-16T17:31:12Z</updated>

		<summary type="html">&lt;p&gt;Kristin1: /* TNR threat categories */ added physical intimidation&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Videos ==&lt;br /&gt;
* [https://www.youtube.com/watch?v=FkPCec7jG5I Digital Transnational Repression Explained], by Citizen Lab&lt;br /&gt;
* [https://www.youtube.com/watch?v=8YcHajYQLSw Digital Transnational Repression Explained: Activists], by Citizen Lab&lt;br /&gt;
* [https://www.youtube.com/watch?v=N72UV-aD9r4 Gender-based Digital Transnational Repression Explained], by Citizen Lab&lt;br /&gt;
* [https://www.youtube.com/watch?v=3D4EjMq5FK4 Responding to Transnational Repression] - recorded panel discussion from Dec 2021 &lt;br /&gt;
* [https://www.orionpolicy.org/orionforum/111/transnational-repression-the-long-arm-of-authoritarianism Transnational Repression: The Long Arm of Authoritarianism] (parts 1 and 2) - recorded panel discussion from Sept/Oct 2022. &lt;br /&gt;
* [https://www.youtube.com/watch?v=86Q_9IUosCE&amp;amp;t=71s Defending Democracy in Exile: Policy Responses to Transnational Repression] by Freedom House&lt;br /&gt;
&lt;br /&gt;
== Reports ==&lt;br /&gt;
&lt;br /&gt;
=== Research Database on Transnational Repression (TNR) ===&lt;br /&gt;
https://tnr-research.uwazi.io/en/ &lt;br /&gt;
&lt;br /&gt;
This collection of research reports can help human rights defenders better understand:&lt;br /&gt;
&lt;br /&gt;
* Which TNR threats are likely or possible based on the existing evidence, to determine appropriate mitigation techniques&lt;br /&gt;
* Which TNR threats are unlikely, in order to alleviate fear&lt;br /&gt;
* What exiled HRDs can expect from a host country in terms of protection measures&lt;br /&gt;
* Existing campaigns to strengthen protection for exiled HRDs&lt;br /&gt;
&lt;br /&gt;
This database was developed and curated by the Center for Victims of Torture. To contribute to this research, email research@freedomhouse.org&lt;br /&gt;
&lt;br /&gt;
Reports in this database include:&lt;br /&gt;
&lt;br /&gt;
* Defending Democracy in Exile: Policy Responses to Transnational Repression, report by Freedom House&lt;br /&gt;
* Silencing Across Borders: Transnational Repression and Digital Threats Against Exiled Activists, report by Marcus Michaelsen&lt;br /&gt;
* Psychological and Emotional War: Digital Transnational Repression in Canada, report by Citizen Lab&lt;br /&gt;
* Going after the family: Transnational repression and the proxy punishment of Middle Eastern diasporas, article co-authored with Dana M. Moss &amp;amp; Gillian Kennedy. &lt;br /&gt;
&lt;br /&gt;
== Books ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The Arab Spring Abroad: Diaspora Activism against Authoritarian Regimes&#039;&#039;&#039;, book by Dana Moss. You can download this book for free here: https://www.cambridge.org/core/books/arab-spring-abroad/D7EC15ED46D37A2DB8CDDB83F06CC591#overview&lt;br /&gt;
&lt;br /&gt;
== TNR threat categories ==&lt;br /&gt;
&lt;br /&gt;
* Unlawful deportation, extradition, rendition, interpol abuse, legal cases&lt;br /&gt;
** Trial in absentia&lt;br /&gt;
** Opponent may initiate a criminal case in order to carry out deportation or extradition&lt;br /&gt;
** Opponent may use Interpol notice in order to carry out deportation or extradition&lt;br /&gt;
*Physical intimidation, assault, etc&lt;br /&gt;
* Coercion by proxy / Threats against in-country relatives&lt;br /&gt;
** Opponent may harass, threaten, prosecute, and imprison family or colleagues&lt;br /&gt;
*Account and device hacking&lt;br /&gt;
** Opponents hack social media or email accounts&lt;br /&gt;
* Monitoring and surveillance&lt;br /&gt;
** Tracking and identifying HRDs&lt;br /&gt;
** Opponent may monitor family members’ conversations so they can access communications&lt;br /&gt;
** Infiltration of network through informants&lt;br /&gt;
** Opponent may surveil/monitor communication to ascertain location and activities&lt;br /&gt;
* Slander, harassment, disinformation campaigns&lt;br /&gt;
** Smear campaigns, hate speech and harassment in social media&lt;br /&gt;
** Opponent may carry out a defamation and smear campaign&lt;br /&gt;
** Reputation marring, through informant activists&lt;/div&gt;</summary>
		<author><name>Kristin1</name></author>
	</entry>
	<entry>
		<id>https://wiki.digitalrights.community/index.php?title=Resources_for_At-Risk_Digital_Rights_Defenders&amp;diff=52328</id>
		<title>Resources for At-Risk Digital Rights Defenders</title>
		<link rel="alternate" type="text/html" href="https://wiki.digitalrights.community/index.php?title=Resources_for_At-Risk_Digital_Rights_Defenders&amp;diff=52328"/>
		<updated>2024-12-16T13:52:15Z</updated>

		<summary type="html">&lt;p&gt;Kristin1: /* Relocation and resettlement support specifically for HRDs at risk */ added mccain institute&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;Team CommUNITY attempts to recommend evergreen resources, due to changing and variable funding landscapes, resources may appear out of date.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Well-being and Resilience ==&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Programs that provide mental health services&#039;&#039;&#039; ===&lt;br /&gt;
&#039;&#039;&#039;ipso-care&#039;&#039;&#039;: empathy international (Global) - [https://ipso-care.com/home.html ipso-care] offers personal, strictly confidential client-orientated tele-video sessions through the client portal. (Global)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Open Briefing&#039;&#039;&#039; (Global) - [https://www.openbriefing.org/support/referral/ Open Briefing] operates a rapid response mechanism to provide fully-funded holistic security mentoring and remote accompaniment to human rights defenders and other civic society actors at risk of physical, digital, or psychological harm. (Global)&lt;br /&gt;
&lt;br /&gt;
Other:&lt;br /&gt;
* [https://vita-activa.org/ Vita Activa] is a helpline that provides online support and strategic solutions for women and LGBTIQ+ journalists, activists and gender, land and labor rights, and freedom of expression defenders. If you are experiencing stress, trauma, crisis, burnout and/or if you are facing gender based violence, contact them: apoyo@vita-activa.org (ESP) | support@vita-activa.org (ENG) | +52155-8171-1117 (Signal, Whatsapp, Telegram) (Focus is on Latin America)&lt;br /&gt;
* [https://irct.org/our-members/ Global list of torture treatment centers] from the International Rehabilitation Council for Torture Victims (IRCT) (Global)&lt;br /&gt;
* [https://www.hrresilience.org/programs.html List of mental health programs and centers] curated by The Human Rights Resilience Project&lt;br /&gt;
* [https://nqttcn.com/en/community-resources/ The National Queer and Trans Therapists of Color Network (NQTTCN) community resources] (United States resources)&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Resources, research and guides&#039;&#039;&#039; ===&lt;br /&gt;
Self-guided, &#039;&#039;&#039;free online courses and guides&#039;&#039;&#039; designed for HRDs and journalists, available in various languages:&lt;br /&gt;
[[File:Tree in Turku, Finland by Miikka A..png|thumb|Miikka A.]]&lt;br /&gt;
* [https://learn.totem-project.org/courses/course-v1:IWPR+IWPR_AH_EN+001/about Taking care of your mental health] - In this course by Totem Project, you will learn different techniques to manage stress and thus acquire tools with which to regulate emotions and perform better in your work and personal life. These techniques will help you to attain a better quality of life and better understand the importance of mental hygiene.&lt;br /&gt;
* [https://www.frontlinedefenders.org/en/resources-wellbeing-stress-management Resources for Wellbeing &amp;amp; Stress Management] by Front Line Defenders&lt;br /&gt;
* [https://learn.totem-project.org/courses/course-v1:IWPR+IWPR_PAP_EN+001/about Psychological First Aid] - Take this course if you want to learn how to help those who need psychological support and to know what tools you should use to safeguard your own mental health in situations so requiring. &lt;br /&gt;
* [https://learn.totem-project.org/courses/course-v1:IWPR+IWPR_PPC_EN+001/about Psychological preparation before and after a reporting assignment] by Totem Project - This course will help you systematize and become aware of the steps, strategies and tools needed for safe news reporting from a psycho-emotional perspective and, in turn, help you emotionally detach yourself from the event.&lt;br /&gt;
* An online collection of [https://proqol.org/self-care-tools-1 self-care protocols] by the Center for Victims of Torture.&lt;br /&gt;
* Facilitated online course titled [https://thekairosproject.org/virtual-programme-series/building-resilience/ Being well; building resilience] hosted by the Kairos Project.&lt;br /&gt;
* [https://coping-with-prison.org/ Coping with Prison] - A collection of resources for HRDs who are preparing to go to prison, and for their families, lawyers and supporters.&lt;br /&gt;
* [https://integratedsecuritymanual.org/what-is-integrated-security The Integrated Security Manual] is a collection of group activities for facilitators interested in opening up a space to talk about the connection between human rights work, well-being and security. &lt;br /&gt;
* [https://sur.conectas.org/en/self-care-as-a-political-strategy/ Self-Care as a Political Strategy] (article) - Adopting a self-care approach not only ensures the sustainability of social movements, but also constitutes an ethical-political viewpoint that looks at the practices and relations established at work at the personal and collective level. This article also discusses the experience of Casa La Serena, a place of rest and healing for women human rights defenders. &lt;br /&gt;
* [https://www.iwmf.org/mental-health-guide/ Mental Health Guide for Journalists Facing Online Violence] by the International Women’s Media Foundation provides:&lt;br /&gt;
** Downloadable exercises to help manage the mental health toll of online abuse&lt;br /&gt;
** Information to understand the psychological reasons why abusers attack online&lt;br /&gt;
** Self-assessments to address how online violence affects one’s well being  &lt;br /&gt;
** Resources and organizations that can support journalists when facing online violence&lt;br /&gt;
&lt;br /&gt;
==== Research articles and reports: ====&lt;br /&gt;
&lt;br /&gt;
* [https://hrlr.law.columbia.edu/hrlr-online/trauma-depression-and-burnout-in-the-human-rights-field-identifying-barriers-and-pathways-to-resilient-advocacy/ Trauma, Depression, and Burnout in the Human Rights Field: Identifying Barriers and Pathways to Resilient Advocacy] (2018)&lt;br /&gt;
* [https://www.hrresilience.org/uploads/1/1/6/2/116243539/190820_executive_summary_from_a_culture_of_unwellness_bluebooked.pdf From a “Culture of Unwellness” to Sustainable Advocacy: Organizational Responses to Mental Health Risks in the Human Rights Field] (2019) - This study examines how organizations may respond to HRDs mental health. It also addresses some steps that organizations can take to improve the well-being of human rights advocates.&lt;br /&gt;
* [https://static1.squarespace.com/static/5f5274d8c4e54f6ba3b7f7d4/t/60e5c4718b8e5a01c01653b9/1625670778427/Community+Report+2020_Building+Stronger+Communities_FINAL.pdf Community Health Report 2020: The case for mental health support for digital rights defenders by Team CommUNITY]&lt;br /&gt;
* [https://static1.squarespace.com/static/5f5274d8c4e54f6ba3b7f7d4/t/628bcd743e43ad3d0070bd09/1653329271383/Pathways+to+Organizational+Recovery-CHR-23May22-Final.pdf Pathways to Organizational Recovery] (2022) by Team CommUNITY&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Well-being and resilience grants for HRDs&#039;&#039;&#039; ===&lt;br /&gt;
[https://www.csolifeline.org/resiliency-grants &#039;&#039;&#039;Lifeline rapid response resiliency grants&#039;&#039;&#039;] provide support to at-risk CSOs to proactively avoid or mitigate the threats they face and help them continue to work in high-risk environments. These grants are highly flexible and support a range of activities including digital or physical security training; technical training on how to respond to restrictive CSO legislation; building peer-to-peer support networks, or establishing temporary collaborative space to help CSOs return to work.&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Temporary relocation programs for study, rest and respite&#039;&#039;&#039; ===&lt;br /&gt;
[[File:Matese Fields.png|thumb|Matese Fields]]&lt;br /&gt;
[https://sheltercity.org/about-us/ &#039;&#039;&#039;Shelter City&#039;&#039;&#039;] is a global movement of cities, organizations and people who stand side by side with human rights defenders at risk. We offer them a safe and inspiring space where they re-energize, receive tailormade support and engage with allies to reinforce their local actions for change.&lt;br /&gt;
&lt;br /&gt;
[https://icorn.org/what-icorn &#039;&#039;&#039;The International Cities of Refuge Network (ICORN)&#039;&#039;&#039;] is an independent organization of cities and regions offering shelter to writers and artists at risk, advancing freedom of expression, defending democratic values and promoting international solidarity. ICORN Member Cities offer long-term, but temporary, shelter to those put at risk as a direct consequence of their creative activities.&lt;br /&gt;
&lt;br /&gt;
[https://www.ifa.de/en/funding/elisabeth-selbert-initiative/ &#039;&#039;&#039;The Elisabeth-Selbert-Initiative&#039;&#039;&#039;] provides threatened human rights defenders with a safe place to recuperate, cope with trauma, and when possible, to network and further develop their professional skills.&lt;br /&gt;
&lt;br /&gt;
[https://www.york.ac.uk/cahr/human-rights-defenders/protective-fellowship/ &#039;&#039;&#039;Protective Fellowship Scheme for Human Rights Defenders at Risk&#039;&#039;&#039;] at the Centre for Applied Human Rights at the University of York (United Kingdom) - Human rights defenders are invited to come to York for periods ranging from three to six months. During this time, they benefit both from time away from a difficult environment, and from educational resources designed to increase their effectiveness and their ability to influence policy and practice when they return home.&lt;br /&gt;
&lt;br /&gt;
[https://www.scholarsatrisk.org/get-help/ &#039;&#039;&#039;Scholars at Risk&#039;&#039;&#039;] works with its global network of higher education institutions around the world to arrange short-term, temporary research and teaching positions for threatened scholars. They also provide advisory, referral, and career support services for scholars.&lt;br /&gt;
&lt;br /&gt;
[https://www.frontlinedefenders.org/en/programme/rest-respite &#039;&#039;&#039;Front Line Defenders Rest &amp;amp; Respite Programme&#039;&#039;&#039;] enables human rights defenders to take some time out and to recharge their batteries in a safe environment while at the same time enhancing their skills so that they can work more effectively when they return home. Rest &amp;amp; Respite opportunities are offered on an invitation-only basis. &lt;br /&gt;
&lt;br /&gt;
[https://www.initiativemarianne.fr/en/a-propos/ &#039;&#039;&#039;The Marianne Initiative has a Solidarity Fund for Innovative Projects&#039;&#039;&#039;] (for HRDs in France), and selects fellows who will benefit from personalized support within a place of exchange and training, open to all those involved in the cause of human rights.&lt;br /&gt;
&lt;br /&gt;
== Security and Protection ==&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Resources: guides, online courses, helplines, communities of practice&#039;&#039;&#039; ===&lt;br /&gt;
[https://www.accessnow.org/help/ &#039;&#039;&#039;Access Now’s Digital Security Helpline&#039;&#039;&#039;] works with individuals and organizations around the world to keep them safe online. If you’re at risk, we can help you improve your digital security practices to keep out of harm’s way. If you’re already under attack, we provide rapid-response emergency assistance. 24/7 services are available with support in nine languages: English, Spanish, French, German, Portuguese, Russian, Tagalog, Arabic, and Italian. They respond to all requests within two hours.&lt;br /&gt;
[[File:Lucas Faragosa.png|thumb|Lucas Faragosa]]&lt;br /&gt;
[https://ssd.eff.org/ &#039;&#039;&#039;Surveillance Self-Defense: Tips, Tools and How-tos for Safer Online Communications&#039;&#039;&#039;] - This is an online resource from the Electronic Frontier Foundation that provides up-to-date guidance on basic digital security techniques, tools and further learning. It&#039;s very helpful! Resources are available in: EN, ES, AR, FA, FR, RU, Bur, Vie, and many more&lt;br /&gt;
&lt;br /&gt;
[https://learn.totem-project.org/courses &#039;&#039;&#039;Totem Project&#039;&#039;&#039;] is a collection of online courses designed by human rights and journalist organizations from around the world. It is maintained and hosted by Greenhost and Free Press Unlimited. I have personally worked with them on a course related to human rights documentation. Many of their courses are related to digital security and privacy. This is a great way to learn about good security practices, and understanding why certain techniques are recommended. Courses are available in: EN, ES, AR, FA, FR, RU&lt;br /&gt;
&lt;br /&gt;
[https://holistic-security.org/ &#039;&#039;&#039;Holistic Security&#039;&#039;&#039;] is a strategy manual to help human rights defenders maintain their well-being in action. The holistic approach integrates self-care, well-being, digital security, and information security into traditional security management practices.&lt;br /&gt;
&lt;br /&gt;
[https://cpj.org/emergency-response/resource-center/ &#039;&#039;&#039;Committee to Protect Journalists&#039;&#039;&#039;]’ resource center shares critical resources to help journalists prepare for an assignment or respond to an emergency. &lt;br /&gt;
&lt;br /&gt;
[https://digitalfirstaid.org/en/index.html &#039;&#039;&#039;Digital First Aid Kit&#039;&#039;&#039;] is a free resource to help rapid responders, digital security trainers, and tech-savvy activists to better protect themselves and the communities they support against the most common types of digital emergencies.&lt;br /&gt;
&lt;br /&gt;
[https://freedom.press/training/ &#039;&#039;&#039;Freedom of the Press Foundation Guides and Training&#039;&#039;&#039;] on digital security&lt;br /&gt;
&lt;br /&gt;
[https://wiki.orgsec.community/ &#039;&#039;&#039;Organisational security community wiki&#039;&#039;&#039;] - a resource created by and for security practitioners from all backgrounds to share useful resources and document innovative approaches to long-term security work.&lt;br /&gt;
&lt;br /&gt;
[https://www.alunapsicosocial.org/single-post/risk-assessment-in-human-rights-defense-methodological-guide-from-the-psychosocial-approach &#039;&#039;&#039;Risk Assessment in Human Rights Defense Methodological Guide from the Psychosocial Approach&#039;&#039;&#039;], by Aluna - This guide’s content is based on international methodologies from organizations such as Protection International and Front Line Defenders, among others. Accordingly, we have incorporated some of these tools, complementing them with the accompaniment model proposed by Aluna and adapting them to the specificities of the contexts and the political subjects whom we accompany. Available in [https://www.alunapsicosocial.org/single-post/risk-assessment-in-human-rights-defense-methodological-guide-from-the-psychosocial-approach EN], [https://www.alunapsicosocial.org/single-post/valoraci%C3%B3n-del-riesgo-en-la-defensa-de-ddhh-gu%C3%ADa-metodol%C3%B3gica-desde-elenfoque-psicosocial ES]&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Regional protection networks for digital rights defenders&#039;&#039;&#039; ===&lt;br /&gt;
&lt;br /&gt;
==== Africa ====&lt;br /&gt;
&lt;br /&gt;
* [https://defenddefenders.org/ DefendDefenders] promotes, protects, &amp;amp; strengthens the work of human rights defenders in the East &amp;amp; Horn of Africa sub-region.&lt;br /&gt;
* [https://westafricadefenders.org/ West African Human Rights Defenders Network] (Réseau Ouest Africain des Défenseurs des Droits Humains)&lt;br /&gt;
* [https://southerndefenders.africa/ Southern Defenders] - Southern Africa Human Rights Defenders Network&lt;br /&gt;
* [https://digitalsociety.africa/ Digital Society of Africa (DSA)] works to strengthen the resilience and ability of frontline activists; human rights defenders and other at-risk groups in the region to independently recognize and respond to digital threats and attacks. They seek to achieve this using the holistic security approach; through a range of activities including: organisational security audits; risk assessment; trainings, sustainable security accompaniment; security policy formulation and tech support.&lt;br /&gt;
&lt;br /&gt;
==== Asia ====&lt;br /&gt;
&lt;br /&gt;
* [https://docs.google.com/spreadsheets/d/1J2Nj2HFpLIp6t2U1Jy1iOdz7ZIv9XAO5lFMeG_Y0Wzo/htmlview?hl=en# List of protection and support funding for HRDs] (Myanmar)&lt;br /&gt;
* [https://ocf.tw/en/p/cscs/ Civil Society Cyber Shield, Open Culture Foundation] (Taiwan)&lt;br /&gt;
&lt;br /&gt;
==== MENA/SWANA ====&lt;br /&gt;
&lt;br /&gt;
* [https://whrdmena.org/ Regional Coalition for Women Human Rights Defenders in MENA]&lt;br /&gt;
* [https://www.gc4hr.org/get-help/ Gulf Centre for Human Rights Emergency Resources Hub] - an independent NGO that provides protection for human rights defenders, including journalists and Internet activists, and enhances their effectiveness online and offline in the Gulf and neighboring countries.  &lt;br /&gt;
* [https://smex.org/helpdesk/ SMEX Digital Safety Helpdesk] (MENA and digital protection-focused)&lt;br /&gt;
&lt;br /&gt;
==== Latin America and the Caribbean ====&lt;br /&gt;
&lt;br /&gt;
* [https://im-defensoras.org/es/ The Mesoamerican Women Human Rights Defenders Initiative (IM-Defensoras)] is a local to regional alliance of diverse women human rights defenders (WHRDs), organizations and networks.&lt;br /&gt;
* [https://pbi-mexico.org/ Peace Brigades International] - Mexico&lt;br /&gt;
* [https://socialtic.org/ SocialTic] is a Mexican non-profit organization dedicated to research, training, and promoting digital technology or information with social purposes.&lt;br /&gt;
&lt;br /&gt;
==== Europe ====&lt;br /&gt;
&lt;br /&gt;
* [https://www.holistic-protection.eu/ Holistic Protection Collective] - an independent collective of security practitioners that aims to improve the security of Rights-based organizations, initiatives, foundations and activist collectives. &lt;br /&gt;
&lt;br /&gt;
==== Global ====&lt;br /&gt;
&lt;br /&gt;
* [https://www.frontlinedefenders.org/ Front Line Defenders Emergency Contact]&lt;br /&gt;
* [https://www.protectioninternational.org/ Protection International]&lt;br /&gt;
* [http://freepressunlimited.org/en/projects/reporters-respond-emergency-and-legal-support Reporters Respond: emergency support by Free Press Unlimited]&lt;br /&gt;
* [https://www.ifj.org/safety-fund The IFJ Safety Fund]&lt;br /&gt;
* [https://www.peacebrigades.org/ Peace Brigades International]&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Legal support&#039;&#039;&#039; ===&lt;br /&gt;
[https://www.amerainternational.org/pro-bono-directory/ &#039;&#039;&#039;Amera International Pro Bono Directory&#039;&#039;&#039;] - list of organizations and individuals that provide free legal assistance and support refugees (and asylum seekers) in the listed countries.&lt;br /&gt;
[[File:Asia Pacific Refugee Rights Network.png|right|frameless|163x163px]]&lt;br /&gt;
[https://aprrn.org/ &#039;&#039;&#039;Asia Pacific Refugee Rights Network&#039;&#039;&#039;] works to advance the rights and inclusion of refugees and other people in need of protection in the Asia Pacific region—including refugees, asylum seekers, torture survivors and complainants, trafficked persons, IDPs, stateless persons, migrants in vulnerable situations, and returnees—so they may have equal and adequate access to assistance and protection, and to timely durable solutions. &lt;br /&gt;
&lt;br /&gt;
[https://elsc.support/ &#039;&#039;&#039;European Legal Support Center (ELSC)&#039;&#039;&#039;] (Europe and UK) an independent organization that provides free legal advice and assistance to associations, human rights NGOs, groups and individuals advocating for Palestinian rights in mainland Europe and the United Kingdom.&lt;br /&gt;
&lt;br /&gt;
[https://systemicjustice.ngo/ &#039;&#039;&#039;System Justice&#039;&#039;&#039;] (Europe) - an independent NGO that focuses on community-driven litigation for racial, social, and economic justice across Europe&lt;br /&gt;
[[File:FDPN.png|right|frameless]]&lt;br /&gt;
[https://fdpn.org.au/ &#039;&#039;&#039;Forcibly Displaced People Network (FDPN)&#039;&#039;&#039;] (Australia) is the first registered LGBTIQ+ refugee-led organization in Australia. We work to support LGBTIQ+ people seeking asylum, refugees and migrants from non-Western countries to be safe in Australia. &lt;br /&gt;
&lt;br /&gt;
[https://circlegreen.org.au/humanitarian/ &#039;&#039;&#039;Circle Green&#039;&#039;&#039;] (Australia) helps people new to Australia who need professional legal migration advice and are disadvantaged in accessing legal services.&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Emergency grants&#039;&#039;&#039; ===&lt;br /&gt;
[[File:Lifeline.png|right|frameless|270x270px]]&lt;br /&gt;
[https://www.csolifeline.org/emergency-assistance &#039;&#039;&#039;Lifeline&#039;&#039;&#039;] (an initiative by Freedom House and Front Line Defenders) provides small, short-term emergency grants to CSOs threatened because of their human rights work. Lifeline grants can address security, medical expenses, legal representation, prison visits, trial monitoring, temporary relocation, equipment replacement, and other urgently needed expenses.&lt;br /&gt;
[[File:Front Line Defenders Protection.png|right|frameless|273x273px]]&lt;br /&gt;
[https://www.frontlinedefenders.org/en/programme/protection-grants &#039;&#039;&#039;Front Line Defenders Protection Grants&#039;&#039;&#039;] can pay for provisions (grants are for amounts up to a maximum of €7,500) to improve the security and protection of human rights defenders and their organizations including, but not limited to:&lt;br /&gt;
&lt;br /&gt;
* improving physical security of an organization or individual, digital security and communication security;&lt;br /&gt;
* supporting legal fees for HRDs who are being judicially harassed;&lt;br /&gt;
* paying for medical fees for HRDs who have been attacked or who have suffered a medical condition as a result of their peaceful human rights activities;&lt;br /&gt;
* providing family assistance for imprisoned HRDs or family members who are at risk because of a HRD&#039;s activities.&lt;br /&gt;
[[File:Urgent Action Fund.png|right|frameless|295x295px]]&lt;br /&gt;
[[File:Protect Defenders EU.png|right|frameless]]&lt;br /&gt;
[https://urgentactionfund.org/apply-for-a-grant/criteriado-i-fit/ &#039;&#039;&#039;Urgent Action Fund’s Rapid Response Grants&#039;&#039;&#039;] resource the resilience of human rights and gender justice movements by supporting the security and advocacy interventions of activists when a swift response is needed. Specifically, Rapid Response Grants offer quick, flexible funding to respond to security threats or unexpected advocacy opportunities experienced by women, transgender, or gender non-conforming, activists and human rights defenders.&lt;br /&gt;
&lt;br /&gt;
[https://www.civicus.org/index.php/what-we-do/defend/crisis-response-fund &#039;&#039;&#039;CIVICUS Crisis Response Fund&#039;&#039;&#039;] welcomes applications from formal or informal civil society actors &amp;amp; consortia, including social movements. Grants must be for a 3-6 month period. Amount: US$10,000 - US$20,000 for Advocacy Grants or Resiliency Grants. &lt;br /&gt;
&lt;br /&gt;
[https://wphfund.org/whrds/ &#039;&#039;&#039;The Women’s Peace and Humanitarian Fund&#039;&#039;&#039;] provides rapid, flexible funding and direct logistical support to women HRDs from/working in crisis and conflict-affected areas, working at community, national, regional or international levels. For individuals they have an Advocacy Support Stream and a Safety Net Stream.  &lt;br /&gt;
&lt;br /&gt;
[https://www.mccaininstitute.org/programs/democracy-programs/human-rights-defenders-program/ &#039;&#039;&#039;McCain Institute&#039;s Human Rights Defender Program&#039;&#039;&#039;] (under the Democracy Program) provides temporary, transitional support to activists who are forced to work underground or flee their countries so they can continue to fight in the human rights arena.  &lt;br /&gt;
&lt;br /&gt;
[https://www.dignitylgbti.org/ &#039;&#039;&#039;The Dignity for All: LGBTQI+ Assistance Program&#039;&#039;&#039;] is a consortium of six leading human rights and LGBTQI+ organizations that provides emergency assistance, advocacy funding, and security support to human rights defenders and civil society organizations under threat or attack due to their work for LGBTQI+ rights.  &lt;br /&gt;
&lt;br /&gt;
[https://protectdefenders.eu/protecting-defenders/ &#039;&#039;&#039;ProtectDefenders.eu&#039;&#039;&#039;] provides a range of services to human rights defenders at risk, including an emergency helpline (run by Front Line Defenders), emergency grants, and temporary relocation.  &lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Relocation and resettlement support specifically for HRDs at risk&#039;&#039;&#039; ===&lt;br /&gt;
&#039;&#039;&#039;[https://www.mccaininstitute.org/programs/democracy-programs/human-rights-defenders-program/ Human Rights Defenders Program, McCain Institute]&#039;&#039;&#039; - Through the Human Rights Defenders program, the McCain Institute provides funding, logistical assistance and referrals to human rights defenders in distress, helping them to: &lt;br /&gt;
&lt;br /&gt;
* Settle into a safe environment&lt;br /&gt;
* Receive training involving extra security precautions, networking, and career development if unable to return home any time soon&lt;br /&gt;
* Find sustainable employment as a means to continue their human rights work throughout the time they are unable to return to their home countries&lt;br /&gt;
&lt;br /&gt;
[https://www.frontlinedefenders.org/en/canada-program &#039;&#039;&#039;Canada Global Refugee Stream for Human Rights Defenders&#039;&#039;&#039;] - The Canadian government has established a dedicated refugee stream for human rights defenders for resettlement to Canada. &lt;br /&gt;
&lt;br /&gt;
[https://www.rainbowrailroad.org/request-help &#039;&#039;&#039;Rainbow Railroad&#039;&#039;&#039;] is a global not-for-profit organization that helps at-risk LGBTQI+ people get to safety worldwide.  &lt;br /&gt;
&lt;br /&gt;
[https://cpj.org/emergency-response/post-incident-assistance/#emergency-relocation &#039;&#039;&#039;Journalists in Distress Network&#039;&#039;&#039;] resources for journalists who have received serious threats or are in distress in relation to their work, and may need emergency relocation&lt;br /&gt;
&lt;br /&gt;
== Strategic Advocacy ==&lt;br /&gt;
[[File:Iris Wang.png|thumb|414x414px|Iris Wang]]&lt;br /&gt;
[https://newtactics.org/toolkit/strategy-toolkit New Tactics in Human Rights Strategy Toolkit] - activities and resources for developing an advocacy strategy. available in EN and AR&lt;br /&gt;
&lt;br /&gt;
[https://www.csolifeline.org/advocacy-toolkit Advocacy in Restricted Spaces: A Toolkit for Civil Society Organizations] is a practical resource that emphasizes that advocacy is possible even in restrictive contexts. The toolkit places the planning process within the context of risk assessment and mitigation, which is essential in these environments.  Available in AR, FR, ES, RU, VI, FA, EN&lt;br /&gt;
&lt;br /&gt;
[https://toolkit.video4change.org/ Video for Change Impact Toolkit] by Engage Media - This toolkit will show you how to design and strategize for impact in your progressive social change initiatives. It is designed for documentary or journalist video-makers, established Video for Change organizations, and nonprofit organizations that are using or thinking about using video to engage their communities.&lt;br /&gt;
&lt;br /&gt;
== Localization ==&lt;br /&gt;
[[File:Localization Lab.png|right|frameless]]&lt;br /&gt;
[https://www.localizationlab.org/ Localization Lab] - a community of &#039;&#039;&#039;7000+&#039;&#039;&#039; contributors working on making FLOSS technology and internet freedom resources accessible in &#039;&#039;&#039;200+&#039;&#039;&#039; languages including Azerbaijani, Basque, Shona, Chinese and Arabic, through collaboration with developers, organizations, end users, and communities in need. &lt;br /&gt;
[[File:Engage Media.png|right|frameless]]&lt;br /&gt;
[https://engagemedia.org/ Engage Media] -  a nonprofit that promotes digital rights, open and secure technology, and social issue documentary. Combining video, technology, knowledge, and networks, they support Asia-Pacific and global changemakers advocating for human rights. Engage Media has been working on regional localization efforts for Thai, Burmese, Indonesian, Khmer and Filipino.&lt;/div&gt;</summary>
		<author><name>Kristin1</name></author>
	</entry>
	<entry>
		<id>https://wiki.digitalrights.community/index.php?title=Research_on_transnational_repression&amp;diff=52325</id>
		<title>Research on transnational repression</title>
		<link rel="alternate" type="text/html" href="https://wiki.digitalrights.community/index.php?title=Research_on_transnational_repression&amp;diff=52325"/>
		<updated>2024-12-12T16:18:17Z</updated>

		<summary type="html">&lt;p&gt;Kristin1: added database, added threat categories&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Videos ==&lt;br /&gt;
* [https://www.youtube.com/watch?v=FkPCec7jG5I Digital Transnational Repression Explained], by Citizen Lab&lt;br /&gt;
* [https://www.youtube.com/watch?v=8YcHajYQLSw Digital Transnational Repression Explained: Activists], by Citizen Lab&lt;br /&gt;
* [https://www.youtube.com/watch?v=N72UV-aD9r4 Gender-based Digital Transnational Repression Explained], by Citizen Lab&lt;br /&gt;
* [https://www.youtube.com/watch?v=3D4EjMq5FK4 Responding to Transnational Repression] - recorded panel discussion from Dec 2021 &lt;br /&gt;
* [https://www.orionpolicy.org/orionforum/111/transnational-repression-the-long-arm-of-authoritarianism Transnational Repression: The Long Arm of Authoritarianism] (parts 1 and 2) - recorded panel discussion from Sept/Oct 2022. &lt;br /&gt;
* [https://www.youtube.com/watch?v=86Q_9IUosCE&amp;amp;t=71s Defending Democracy in Exile: Policy Responses to Transnational Repression] by Freedom House&lt;br /&gt;
&lt;br /&gt;
== Reports ==&lt;br /&gt;
&lt;br /&gt;
=== Research Database on Transnational Repression (TNR) ===&lt;br /&gt;
https://tnr-research.uwazi.io/en/ &lt;br /&gt;
&lt;br /&gt;
This collection of research reports can help human rights defenders better understand:&lt;br /&gt;
&lt;br /&gt;
* Which TNR threats are likely or possible based on the existing evidence, to determine appropriate mitigation techniques&lt;br /&gt;
* Which TNR threats are unlikely, in order to alleviate fear&lt;br /&gt;
* What exiled HRDs can expect from a host country in terms of protection measures&lt;br /&gt;
* Existing campaigns to strengthen protection for exiled HRDs&lt;br /&gt;
&lt;br /&gt;
This database was developed and curated by the Center for Victims of Torture. To contribute to this research, email research@freedomhouse.org&lt;br /&gt;
&lt;br /&gt;
Reports in this database include:&lt;br /&gt;
&lt;br /&gt;
* Defending Democracy in Exile: Policy Responses to Transnational Repression, report by Freedom House&lt;br /&gt;
* Silencing Across Borders: Transnational Repression and Digital Threats Against Exiled Activists, report by Marcus Michaelsen&lt;br /&gt;
* Psychological and Emotional War: Digital Transnational Repression in Canada, report by Citizen Lab&lt;br /&gt;
* Going after the family: Transnational repression and the proxy punishment of Middle Eastern diasporas, article co-authored with Dana M. Moss &amp;amp; Gillian Kennedy. &lt;br /&gt;
&lt;br /&gt;
== Books ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The Arab Spring Abroad: Diaspora Activism against Authoritarian Regimes&#039;&#039;&#039;, book by Dana Moss. You can download this book for free here: https://www.cambridge.org/core/books/arab-spring-abroad/D7EC15ED46D37A2DB8CDDB83F06CC591#overview&lt;br /&gt;
&lt;br /&gt;
== TNR threat categories ==&lt;br /&gt;
&lt;br /&gt;
* Unlawful deportation, extradition, rendition, interpol abuse, legal cases&lt;br /&gt;
** Trial in absentia&lt;br /&gt;
** Opponent may initiate a criminal case in order to carry out deportation or extradition&lt;br /&gt;
** Opponent may use Interpol notice in order to carry out deportation or extradition&lt;br /&gt;
* Account and device hacking&lt;br /&gt;
** Opponents hack social media or email accounts&lt;br /&gt;
* Coercion by proxy / Threats against in-country relatives&lt;br /&gt;
** Opponent may harass, threaten, prosecute, and imprison family or colleagues&lt;br /&gt;
* Monitoring and surveillance&lt;br /&gt;
** Tracking and identifying HRDs&lt;br /&gt;
** Opponent may monitor family members’ conversations so they can access communications&lt;br /&gt;
** Infiltration of network through informants&lt;br /&gt;
** Opponent may surveil/monitor communication to ascertain location and activities&lt;br /&gt;
* Slander, harassment&lt;br /&gt;
** Smear campaigns, hate speech and harassment in social media&lt;br /&gt;
** Opponent may carry out a defamation and smear campaign&lt;br /&gt;
** Reputation marring, through informant activists&lt;/div&gt;</summary>
		<author><name>Kristin1</name></author>
	</entry>
	<entry>
		<id>https://wiki.digitalrights.community/index.php?title=Research_on_transnational_repression&amp;diff=52314</id>
		<title>Research on transnational repression</title>
		<link rel="alternate" type="text/html" href="https://wiki.digitalrights.community/index.php?title=Research_on_transnational_repression&amp;diff=52314"/>
		<updated>2024-12-06T18:31:10Z</updated>

		<summary type="html">&lt;p&gt;Kristin1: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;Explanatory videos:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* [https://www.youtube.com/watch?v=FkPCec7jG5I Digital Transnational Repression Explained], by Citizen Lab&lt;br /&gt;
* [https://www.youtube.com/watch?v=8YcHajYQLSw Digital Transnational Repression Explained: Activists], by Citizen Lab&lt;br /&gt;
* [https://www.youtube.com/watch?v=N72UV-aD9r4 Gender-based Digital Transnational Repression Explained], by Citizen Lab&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Defending Democracy in Exile: Policy Responses to Transnational Repression&#039;&#039;&#039;, report by Freedom House&lt;br /&gt;
&lt;br /&gt;
Freedom House is engaged in a multiyear study of transnational repression. Its latest report, Defending Democracy in Exile, published in June 2022, examines what is being done to protect exiles and diaspora members who are being intimidated and attacked by the governments from which they fled. The report assesses the responses mounted by host governments, international organizations, and technology companies. It builds on the findings of Out of Sight, Not Out of Reach: The Global Scale and Scope of Transnational Repression—the first global study of this dangerous practice, which Freedom House released in February 2021.&lt;br /&gt;
&lt;br /&gt;
* https://www.youtube.com/watch?v=86Q_9IUosCE&amp;amp;t=71s [video]&lt;br /&gt;
* https://freedomhouse.org/report/transnational-repression [overview and report]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Silencing Across Borders: Transnational Repression and Digital Threats Against Exiled Activists&#039;&#039;&#039;, report by Marcus Michaelsen&lt;br /&gt;
&lt;br /&gt;
Marcus Michaelsen’s report examines the online efforts of authoritarian regimes to intimidate activists living abroad. Hivos is proud to have acted as a host organization for the one-year research project leading to the publication of this report. What tools actually exist in these new digital “toolkits” of transnational repression? And how successful are they in disrupting cross-border information flows? Using the online efforts of Syria and Iran as examples, Marcus Michaelsen set out to find answers.&lt;br /&gt;
&lt;br /&gt;
https://hivos.org/the-silencing-effect-of-digital-transnational-repression/ [overview and report]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Psychological and Emotional War: Digital Transnational Repression in Canada&#039;&#039;&#039;, report by Citizen Lab&lt;br /&gt;
&lt;br /&gt;
In this report, we describe how Canadian activists and dissidents living in exile in Canada are impacted by digital transnational repression. We conclude that digital transnational repression has a serious impact on these communities, including their ability to undertake transnational advocacy work related to human rights.&lt;br /&gt;
&lt;br /&gt;
https://citizenlab.ca/2022/03/psychological-emotional-war-digital-transnational-repression-canada/ [video, overview and report] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Responding to Transnational Repression&#039;&#039;&#039; [video] - recorded panel discussion from Dec 2021 https://www.youtube.com/watch?v=3D4EjMq5FK4 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Going after the family: Transnational repression and the proxy punishment of Middle Eastern diasporas&#039;&#039;&#039;, article co-authored with Dana M. Moss &amp;amp; Gillian Kennedy. Available here (https://onlinelibrary.wiley.com/doi/10.1111/glob.12372) via institutions or for purchase &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The Arab Spring Abroad: Diaspora Activism against Authoritarian Regimes&#039;&#039;&#039;, book by Dana Moss. You can download this book for free here: https://www.cambridge.org/core/books/arab-spring-abroad/D7EC15ED46D37A2DB8CDDB83F06CC591#overview &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Transnational Repression: The Long Arm of Authoritarianism&#039;&#039;&#039; (parts 1 and 2) - recorded panel discussion from Sept/Oct 2022. Watch the videos here https://www.orionpolicy.org/orionforum/111/transnational-repression-the-long-arm-of-authoritarianism&lt;/div&gt;</summary>
		<author><name>Kristin1</name></author>
	</entry>
	<entry>
		<id>https://wiki.digitalrights.community/index.php?title=How_to_mitigate_your_risk_of_being_subject_to_Pegasus_surveillance&amp;diff=52276</id>
		<title>How to mitigate your risk of being subject to Pegasus surveillance</title>
		<link rel="alternate" type="text/html" href="https://wiki.digitalrights.community/index.php?title=How_to_mitigate_your_risk_of_being_subject_to_Pegasus_surveillance&amp;diff=52276"/>
		<updated>2024-11-14T19:45:18Z</updated>

		<summary type="html">&lt;p&gt;Kristin1: added lockdown mode&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Over 30,000 human rights activists, journalists and lawyers across the world may have been targeted using Pegasus (source: [https://www.amnesty.org/en/latest/press-release/2021/07/the-pegasus-project/ The Pegasus Project, 2021]). While it&#039;s important to note that Pegasus is an expensive toolkit ($2.5 million for an Android zero-click infection chain with persistence), if a human rights defender is an important target for a country, it is likely just a matter of time and resources before this HRD&#039;s device gets infected.  &lt;br /&gt;
&lt;br /&gt;
== Mitigation techniques ==&lt;br /&gt;
Government-grade spyware can be more difficult to detect. However, as noted in [https://www.kaspersky.com/blog/how-to-protect-from-pegasus-spyware/43453/ a guide on Pegasus published by Kaspersky], there are some actions you can take to mitigate the risk of being subject to such surveillance, based on current research and findings: &lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Enable Lockdown Mode&#039;&#039;&#039; to disable features that create vulnerabilities to spyware - see [[Secure your devices#Disable features that create vulnerabilities (Lockdown Mode)]]&lt;br /&gt;
* &#039;&#039;&#039;Reboots:&#039;&#039;&#039; Reboot your device daily to prevent persistence from taking hold. The majority of infections have appeared to be based on zero-day exploits with little persistence and so rebooting can hamper attackers.&lt;br /&gt;
* &#039;&#039;&#039;Disable iMessage and FaceTime (iOS):&#039;&#039;&#039; As features enabled by default, iMessage and FaceTime are attractive avenues for exploitation. A number of new Safari and iMessage exploits have been developed in recent years. &lt;br /&gt;
* &#039;&#039;&#039;Use an alternative browser other than Safari or default Chrome:&#039;&#039;&#039; Some exploits do not work well on alternatives such as Firefox Focus. &lt;br /&gt;
* Use a trusted, paid &#039;&#039;&#039;VPN service&#039;&#039;&#039;, and install an app that warns when your device has been &#039;&#039;&#039;jailbroken&#039;&#039;&#039;. Some AV apps will perform this check.  &lt;br /&gt;
&lt;br /&gt;
It is also recommended that individuals who suspect a Pegasus infection make use of a secondary device, preferably running GrapheneOS, for secure communication. ([https://www.zdnet.com/article/how-to-find-and-remove-spyware-from-your-phone/ source])&lt;br /&gt;
&lt;br /&gt;
If you think you may have spyware on your device, you can contact &#039;&#039;&#039;share@amnesty.tech&#039;&#039;&#039; to ask about next steps/what to do. You can also reach out to the Access Now Helpline anytime (24/7) https://www.accessnow.org/help/&lt;br /&gt;
== Countries known to have purchased and used &#039;&#039;Pegasus&#039;&#039; or &#039;&#039;Predator&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
=== Americas ===&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;El Salvador&#039;&#039;&#039; - Pegasus found on devices of journalists &#039;&#039;(Source: [[wikipedia:Pegasus_(spyware)|Wikipedia]])&#039;&#039;&lt;br /&gt;
* &#039;&#039;&#039;Dominican Republic&#039;&#039;&#039; - Pegasus found on devices of journalists &#039;&#039;(Source: [https://www.amnesty.org/en/latest/news/2023/05/dominican-republic-pegasus-spyware-journalists-phone/ Amnesty International])&#039;&#039; &lt;br /&gt;
* &#039;&#039;&#039;Mexico&#039;&#039;&#039; - Pegasus found on devices of political opposition, activists &#039;&#039;(Source: [[wikipedia:Pegasus_(spyware)|Wikipedia]])&#039;&#039;&lt;br /&gt;
* &#039;&#039;&#039;Panama&#039;&#039;&#039; - Pegasus found on devices of political opposition &#039;&#039;(Source: [[wikipedia:Pegasus_(spyware)|Wikipedia]])&#039;&#039;&lt;br /&gt;
* &#039;&#039;&#039;Trinidad Tobago&#039;&#039;&#039; - Evidence of the use of Predator &#039;&#039;(Source: [https://www.recordedfuture.com/predator-spyware-operators-rebuild-multi-tier-infrastructure-target-mobile-devices Recorded Future])&#039;&#039;&lt;br /&gt;
* &#039;&#039;&#039;United States&#039;&#039;&#039; - &amp;quot;In the United States, the FBI confirmed the purchase of a &amp;quot;limited license&amp;quot; of the spyware but said there had been &amp;quot;no operational use in support of any investigation,&amp;quot; and that it used the software &amp;quot;for product testing and evaluation only.&amp;quot;&amp;quot; &#039;&#039;(Source: [https://forbiddenstories.org/pegasus-project-impacts-map/ Forbidden Stories])&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
=== Africa ===&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Angola&#039;&#039;&#039; - Evidence of the use of Predator &#039;&#039;(Source: [https://www.recordedfuture.com/predator-spyware-operators-rebuild-multi-tier-infrastructure-target-mobile-devices Recorded Future])&#039;&#039;&lt;br /&gt;
* &#039;&#039;&#039;Botswana&#039;&#039;&#039; - Evidence of the use of Predator &#039;&#039;(Source: [https://www.recordedfuture.com/predator-spyware-operators-rebuild-multi-tier-infrastructure-target-mobile-devices Recorded Future])&#039;&#039;&lt;br /&gt;
* &#039;&#039;&#039;Djibouti&#039;&#039;&#039; - In 2018, the U.S. Central Intelligence Agency purchased Pegasus for the Djibouti government to conduct counter-terrorism operations (despite Djibouti&#039;s poor human rights record). &#039;&#039;(Source: [[wikipedia:Pegasus_(spyware)|Wikipedia]])&#039;&#039;&lt;br /&gt;
* &#039;&#039;&#039;Rwanda&#039;&#039;&#039; - Pegasus found on devices of activists &#039;&#039;(Source: [[wikipedia:Pegasus_(spyware)|Wikipedia]])&#039;&#039;&lt;br /&gt;
* &#039;&#039;&#039;Togo&#039;&#039;&#039; - Pegasus found on devices of political opposition &#039;&#039;(Source: [[wikipedia:Pegasus_(spyware)|Wikipedia]])&#039;&#039;&lt;br /&gt;
* &#039;&#039;&#039;Uganda&#039;&#039;&#039; - Pegasus found on devices of foreign diplomats &#039;&#039;(Source: [[wikipedia:Pegasus_(spyware)|Wikipedia]])&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
=== Middle East, North Africa and Gulf ===&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Bahrain&#039;&#039;&#039; - Pegasus found on devices of activists, bloggers &#039;&#039;(Source: [[wikipedia:Pegasus_(spyware)|Wikipedia]])&#039;&#039;&lt;br /&gt;
* &#039;&#039;&#039;Egypt&#039;&#039;&#039; - Evidence of the use of Predator &#039;&#039;(Source: [https://www.recordedfuture.com/predator-spyware-operators-rebuild-multi-tier-infrastructure-target-mobile-devices Recorded Future])&#039;&#039;&lt;br /&gt;
* &#039;&#039;&#039;Iraq&#039;&#039;&#039; - Pegasus found on devices of political opposition, journalists, activists &#039;&#039;(Source: [[wikipedia:Pegasus_(spyware)|Wikipedia]])&#039;&#039;&lt;br /&gt;
* &#039;&#039;&#039;Israel/Palestine&#039;&#039;&#039; - Pegasus found on devices of journalists, activists &#039;&#039;(Source: [https://www.amnesty.org/en/latest/research/2021/11/devices-of-palestinian-human-rights-defenders-hacked-with-nso-groups-pegasus-spyware-2/ Amnesty International])&#039;&#039;&lt;br /&gt;
* &#039;&#039;&#039;Jordan&#039;&#039;&#039; - Pegasus found on devices of activists &#039;&#039;(Source: [[wikipedia:Pegasus_(spyware)|Wikipedia]])&#039;&#039;&lt;br /&gt;
* &#039;&#039;&#039;Morocco&#039;&#039;&#039; - Pegasus found on devices of political opposition, activists &#039;&#039;(Source: [[wikipedia:Pegasus_(spyware)|Wikipedia]])&#039;&#039;&lt;br /&gt;
* &#039;&#039;&#039;Oman&#039;&#039;&#039; - Evidence of the use of Predator &#039;&#039;(Source: [https://www.recordedfuture.com/predator-spyware-operators-rebuild-multi-tier-infrastructure-target-mobile-devices Recorded Future])&#039;&#039;&lt;br /&gt;
* &#039;&#039;&#039;Saudi Arabia&#039;&#039;&#039; - Pegasus found on devices of political opposition, activists, journalists &#039;&#039;(Source: [[wikipedia:Pegasus_(spyware)|Wikipedia]]),&#039;&#039; Evidence of the use of Predator &#039;&#039;(Source: [https://www.recordedfuture.com/predator-spyware-operators-rebuild-multi-tier-infrastructure-target-mobile-devices Recorded Future])&#039;&#039;&lt;br /&gt;
* &#039;&#039;&#039;United Arab Emirates&#039;&#039;&#039; - Pegasus found on devices of activists, journalists, lawyers &#039;&#039;(Source: [[wikipedia:Pegasus_(spyware)|Wikipedia]])&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
=== Europe and Central Asia ===&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Armenia&#039;&#039;&#039; - Pegasus found on devices of political opposition &#039;&#039;(Source: [[wikipedia:Pegasus_(spyware)|Wikipedia]]),&#039;&#039; Evidence of the use of Predator &#039;&#039;(Source: [https://www.recordedfuture.com/predator-spyware-operators-rebuild-multi-tier-infrastructure-target-mobile-devices Recorded Future])&#039;&#039;&lt;br /&gt;
* &#039;&#039;&#039;Azerbaijan&#039;&#039;&#039; - Pegasus found on devices of journalists and activists &#039;&#039;(Source: [[wikipedia:Pegasus_(spyware)|Wikipedia]])&#039;&#039;&lt;br /&gt;
* &#039;&#039;&#039;Germany&#039;&#039;&#039; - Pegasus is in use by German Federal Criminal Police Office (BKA) &#039;&#039;(Source: [[wikipedia:Pegasus_(spyware)|Wikipedia]])&#039;&#039;&lt;br /&gt;
* &#039;&#039;&#039;Hungary&#039;&#039;&#039; - Pegasus found on devices of political opposition, journalists, lawyers &#039;&#039;(Source: [[wikipedia:Pegasus_(spyware)|Wikipedia]])&#039;&#039;&lt;br /&gt;
* &#039;&#039;&#039;Kazakhstan&#039;&#039;&#039; - Pegasus found on devices of journalists, activists &#039;&#039;(Source: [[wikipedia:Pegasus_(spyware)|Wikipedia]]),&#039;&#039; Evidence of the use of Predator &#039;&#039;(Source: [https://www.recordedfuture.com/predator-spyware-operators-rebuild-multi-tier-infrastructure-target-mobile-devices Recorded Future])&#039;&#039;&lt;br /&gt;
* &#039;&#039;&#039;Netherlands&#039;&#039;&#039; - Pegasus used to spy on a high profile criminal &#039;&#039;(Source: [[wikipedia:Pegasus_(spyware)|Wikipedia]])&#039;&#039;&lt;br /&gt;
* &#039;&#039;&#039;Poland&#039;&#039;&#039; - Pegasus found on devices of political opposition, journalists &#039;&#039;(Source: [[wikipedia:Pegasus_(spyware)|Wikipedia]])&#039;&#039;&lt;br /&gt;
* &#039;&#039;&#039;Spain&#039;&#039;&#039; - Pegasus found on devices of political opposition &#039;&#039;(Source: [[wikipedia:Pegasus_(spyware)|Wikipedia]])&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
=== Asia ===&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;India&#039;&#039;&#039; - Pegasus found on devices of political opposition, activists &#039;&#039;(Source: [[wikipedia:Pegasus_(spyware)|Wikipedia]])&#039;&#039;&lt;br /&gt;
* &#039;&#039;&#039;Indonesia&#039;&#039;&#039; - Evidence of the use of Predator &#039;&#039;(Source: [https://www.recordedfuture.com/predator-spyware-operators-rebuild-multi-tier-infrastructure-target-mobile-devices Recorded Future])&#039;&#039;&lt;br /&gt;
* &#039;&#039;&#039;Mongolia&#039;&#039;&#039; - Evidence of the use of Predator &#039;&#039;(Source: [https://www.recordedfuture.com/predator-spyware-operators-rebuild-multi-tier-infrastructure-target-mobile-devices Recorded Future])&#039;&#039;&lt;br /&gt;
* &#039;&#039;&#039;The Philippines&#039;&#039;&#039; - Evidence of the use of Predator &#039;&#039;(Source: [https://www.recordedfuture.com/predator-spyware-operators-rebuild-multi-tier-infrastructure-target-mobile-devices Recorded Future])&#039;&#039;&lt;br /&gt;
* &#039;&#039;&#039;Thailand&#039;&#039;&#039; - Pegasus found on devices of political opposition, activists &#039;&#039;(Source: [[wikipedia:Pegasus_(spyware)|Wikipedia]])&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Research on Pegasus ==&lt;br /&gt;
[https://citizenlab.ca/tag/pegasus/ Research by Citizen Lab on the use of Pegasus] to monitor human rights defenders and journalists. &lt;br /&gt;
&lt;br /&gt;
[https://www.amnesty.org/en/latest/research/2021/07/forensic-methodology-report-how-to-catch-nso-groups-pegasus/ Forensic Methodology Report: How to catch NSO Group’s Pegasus] (2021), by Amnesty International. And this [https://securitylab.amnesty.org/latest/2023/10/global-predator-files-investigation-reveals-catastrophic-failure-to-regulate-surveillance-trade/ blog post] summarizing the latest investigation that the team worked on, focused on the company widely known as the ‘Intellexa Alliance’.&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/spreadsheets/d/1lUv-hoQWGZagZi-8DbX9bLiC_WUWpL-o3f7NRyZmA04/edit#gid=1547057674 Pegasus Project - Individuals listed, targeted, or compromised] - This spreadsheet tracks individuals targeted with NSO’s Pegasus. This includes individuals who are (a) on a list as a person of interest, (b) known to have been targeted, and (c) known to have been compromised.&lt;br /&gt;
&lt;br /&gt;
A 10-minute [https://www.youtube.com/watch?v=8r8MkMfvaPU&amp;amp;t=1s video about how Pegasus Spyware works], from the 2021 Pegasus Project&lt;br /&gt;
&lt;br /&gt;
Granitt tracks and updates this published list of Pegasus victims research here https://github.com/GranittHQ/data-pegasus-victims&lt;br /&gt;
&lt;br /&gt;
== Research on QuaDream (iPhone spyware) ==&lt;br /&gt;
A new investigation reveals how QuaDream, an Israeli cyber mercenary company with close ties to Israeli intelligence agencies, used malicious calendar invites to [https://techcrunch.com/2023/04/11/quadream-spyware-hacked-iphones-calendar-invites/?guccounter=1 hack civil society] in various regions, including West Asia and North Africa. Full report by Citizen Lab can be found [https://citizenlab.ca/2023/04/spyware-vendor-quadream-exploits-victims-customers/ here]. &lt;br /&gt;
&lt;br /&gt;
== Research on BouldSpy (Android spyware) ==&lt;br /&gt;
The Iranian government has been using the BouldSpy Android malware to spy on minority groups in the country and monitor arms, alcohol, and drugs trafficking. &#039;&#039;(Source: [https://www.securityweek.com/bouldspy-android-malware-used-in-iranian-government-surveillance-operations/ Security Week])&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Research on Predator (Android spyware) ==&lt;br /&gt;
Predator is a commercial Android spyware, which is marketed by the Israeli company Intellexa. &#039;&#039;(Source: [https://thehackernews.com/2023/05/predator-android-spyware-researchers.html Hacker News])&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;New research from Recorded Future’s Insikt Group examines newly discovered infrastructure related to the operators of Predator, a mercenary mobile spyware. This infrastructure is believed to be in use in at least eleven countries, including Angola, Armenia, Botswana, Egypt, Indonesia, Kazakhstan, Mongolia, Oman, the Philippines, Saudi Arabia, and Trinidad and Tobago. Notably, this is the first identification of Predator customers in Botswana and the Philippines. Despite being marketed for counterterrorism and law enforcement, Predator is often used against civil society, targeting journalists, politicians, and activists, with no specific victims or targets currently identified in this latest activity.&#039;&#039; &#039;&#039;(Source: [https://www.recordedfuture.com/predator-spyware-operators-rebuild-multi-tier-infrastructure-target-mobile-devices Recorded Future])&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Granitt tracks and updates this published list of Predator victims research here https://github.com/GranittHQ/data-predator-victims. &lt;br /&gt;
&lt;br /&gt;
== Research on Candiru (iPhones, Androids, Macs, PCs, and cloud accounts) ==&lt;br /&gt;
&#039;&#039;Candiru is a secretive Israel-based company that sells spyware exclusively to governments. Reportedly, their spyware can infect and monitor iPhones, Androids, Macs, PCs, and cloud accounts. As part of their investigation, Microsoft observed at least 100 victims in Palestine, Israel, Iran, Lebanon, Yemen, Spain, United Kingdom, Turkey, Armenia, and Singapore. Victims include human rights defenders, dissidents, journalists, activists, and politicians.&#039;&#039; &#039;&#039;(Source: [https://citizenlab.ca/2021/07/hooking-candiru-another-mercenary-spyware-vendor-comes-into-focus/ The Citizen Lab])&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Granitt tracks and updates this published list of Candiru victims research here https://github.com/GranittHQ/data-candiru-victims&lt;br /&gt;
&lt;br /&gt;
== Research on BadBazaar (Android spyware) ==&lt;br /&gt;
&#039;&#039;Security researchers have uncovered malicious apps masquerading as Signal and Telegram apps. The apps are being distributed on the Google Play Store and the Samsung Galaxy store. The fake apps, “Signal Plus Messenger” and “Flygram”, both impersonate the Signal app and the Telegram app respectively, and are both aimed at delivering the “BadBazaar” spyware, which has been attributed to a Chinese state actor. BadBazaar has been found to track and monitor victims while exfiltrating sensitive data such as call logs, messages and location information. Once a device is infected, the attacker can link and collect data from the real Signal and Telegram apps on the victim’s phone without any further action by the victim. So far, victims have been detected in Germany, Poland, The United States, Ukraine, Australia, Brazil, Denmark, Congo-Kinshasa, Hong Kong, Hungary, Lithuania, the Netherlands, Portugal, Singapore, Spain, and Yemen.&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;What Can You Do? If you have downloaded apps such as Signal Plus Messenger or Flygram either from a Telegram channel or the Google or Samsung stores, then you may have been seriously compromised. Delete the application immediately then install a good antivirus solution and perform a root scan. Notify your contacts and associates that you may have been compromised so that they can take measures to protect themselves as well.  Also, pay attention to the logos and names of apps you are downloading and make sure they are not fake apps with either the name or logo (lookalike) of a popular app. Lastly, do not download or “update” apps from Telegram channels or unofficial distribution sites&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
(Source: [https://mailchi.mp/c61f8d11d65e/cdr-loop-july-2023-edition-15732520?e=bf72ac7dae Center for Digital Resilience Aug 2023 newsletter])&lt;/div&gt;</summary>
		<author><name>Kristin1</name></author>
	</entry>
	<entry>
		<id>https://wiki.digitalrights.community/index.php?title=Secure_your_devices&amp;diff=52275</id>
		<title>Secure your devices</title>
		<link rel="alternate" type="text/html" href="https://wiki.digitalrights.community/index.php?title=Secure_your_devices&amp;diff=52275"/>
		<updated>2024-11-14T19:43:26Z</updated>

		<summary type="html">&lt;p&gt;Kristin1: /* Disable features that create vulnerabilities */ added link to black top presentation&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Keep your device or operating system up-to-date with software updates ==&lt;br /&gt;
When you buy a device or an operating system, keep it up-to-date with software updates. Updates will often fix security problems in older code that attacks can exploit. Note that some older phones and operating systems may no longer be supported, even for security updates. In particular, Microsoft has made it clear that versions of Windows Vista, XP, and below will not receive fixes for even severe security problems. This means that if you use these, you cannot expect them to be secure from attackers. The same is true for OS X before 10.11 or El Capitan. (Source: [https://ssd.eff.org/module/choosing-your-tools Electronic Frontier SSD]) &lt;br /&gt;
&lt;br /&gt;
=== Free, open source operating systems ===&lt;br /&gt;
If you cannot afford to purchase a licensed Windows or Mac operating system, you can use a free and open source operating system, such as: &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[https://www.linuxmint.com/ Linux Mint]&#039;&#039;&#039; is an operating system for desktop and laptop computers. It is designed to work &#039;out of the box&#039; and comes fully equipped with the apps most people need. Linux Mint works on most computers. It can also be run from a live USB stick to make sure everything works fine without having to install anything. &lt;br /&gt;
&lt;br /&gt;
[https://tails.net/ &#039;&#039;&#039;Tails&#039;&#039;&#039;] is a portable operating system that protects against surveillance and censorship. To use Tails, shut down the computer and start on your Tails USB stick instead of starting on Windows, macOS, or Linux. You can temporarily turn your own computer into a secure machine. You can also &#039;&#039;&#039;.&#039;&#039;&#039; You can also stay safe while using the computer of somebody else&#039;&#039;&#039;.&#039;&#039;&#039; Tails is a 1.4 GB download and takes ½ hour to install. Tails can be installed on any USB stick of 8 GB minimum. Tails works on most computers less than 10 years old. You can start again on the other operating system after you s t down Tails. You don&#039;t have to worry about the computer having viruses because Tails runs independently from the other operating system and never uses the hard disk. But, Tails cannot always protect you if you install it from a computer with viruses or if you use it on a computer with malicious hardware, like keyloggers. &lt;br /&gt;
&lt;br /&gt;
== Use antivirus or anti-malware ==&lt;br /&gt;
&lt;br /&gt;
=== Advice ===&lt;br /&gt;
1. Know how to check if your antivirus or anti-malware app is working and updating itself.&lt;br /&gt;
&lt;br /&gt;
2. Perform periodic manual scans.&lt;br /&gt;
&lt;br /&gt;
3. Choose and run only one anti-malware app; if you run more than one on a device, they may interfere with each other.&lt;br /&gt;
&lt;br /&gt;
[https://freedom.press/training/blog/what-about-antivirus/ What about antivirus?] Article by David Huerta (2020) of the Freedom of the Press Foundation Here&#039;s a good article &lt;br /&gt;
Excerpt: &amp;quot;Antivirus software is one of the oldest offerings available from the now billion-dollar cybersecurity industry. But what does antivirus software do to help protect our devices, what does it not do, and do we really need it?&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== Antivirus software options ===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Windows&#039;&#039;&#039;&lt;br /&gt;
On Windows 10, Security in a Box recommends to turn on Windows&#039;s own anti-malware protection [https://securityplanner.consumerreports.org/tool/turn-on-windows-defender-antivirus Windows Defender]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Linux&#039;&#039;&#039;&lt;br /&gt;
On Linux you can manually scan your device for malware with [https://www.clamav.net/ ClamAV]. But be aware it is only a scanner, and will not monitor your system to protect you from infection. You can use it to determine whether or not a file or directory contains known malware — and it can be run from a USB memory stick in case you do not have permission to install software on the suspect computer. You may also consider using paid antivirus (e.g. ESET NOD32)&lt;br /&gt;
&lt;br /&gt;
Software available on multiple operating systems that offer free versions:&lt;br /&gt;
* [https://www.bitdefender.com BitDefender] (Android, iOS, Mac, Windows) - Warning: This can be a heavy program for many computers. &lt;br /&gt;
* [https://www.malwarebytes.com/ Malwarebytes] (Android, iOS, Mac, Windows). Malwarebytes full version is free for 2 week, but you can manually scan your device without time limits.&lt;br /&gt;
* [https://www.avast.com/ Avast antivirus] (Android, iOS, Mac, Windows)&lt;br /&gt;
&lt;br /&gt;
Not recommended:&lt;br /&gt;
* [https://www.avg.com/ AVG antivirus] (Android, iOS, Mac, Windows)&lt;br /&gt;
* [https://www.avira.com/en/free-antivirus Avira antivirus] (Android, iOS, Mac, Windows)&lt;br /&gt;
&lt;br /&gt;
From the community: AVG, Avira were found to be running mining operations on consumers PC and they don&#039;t offer proper protection.&lt;br /&gt;
&lt;br /&gt;
Note that all antivirus and anti-malware apps collect information on how the protected devices are being used. Some of this information may be shared with companies which own them. There have been cases where this information was sold to third parties.&lt;br /&gt;
&lt;br /&gt;
== Full disk encryption ==&lt;br /&gt;
&lt;br /&gt;
=== For computers ===&lt;br /&gt;
&#039;&#039;&#039;Apple&#039;&#039;&#039; provides a built-in, full-disk encryption feature on macOS called [[wikipedia:FileVault|FileVault]]. Guide: How to encrypt your [https://ssd.eff.org/module/how-encrypt-your-iphone iPhone] (available in 10+ languages)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Linux&#039;&#039;&#039; distributions usually offer full-disk encryption when you first set up your system.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Windows Vista or later&#039;&#039;&#039; includes a full-disk encryption feature called [https://learn.microsoft.com/en-us/windows/security/operating-system-security/data-protection/bitlocker/ BitLocker]. Guide: How to encrypt your [https://ssd.eff.org/module/how-encrypt-your-windows-device Windows device] (available in 10+ languages)&lt;br /&gt;
&lt;br /&gt;
=== For smartphones and tablets ===&lt;br /&gt;
&#039;&#039;&#039;Apple&#039;&#039;&#039; devices such as the iPhone and iPad describe it as “Data Protection” and turn it on if you set a passcode.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Android&#039;&#039;&#039; offers full-disk encryption when you first set up your device on newer devices, or anytime afterwards under its “Security” settings for all devices.&lt;br /&gt;
&lt;br /&gt;
=== Disk encryption vulnerabilities ===&lt;br /&gt;
There are some risks related to disk encryption that you need to consider before moving forward, and find ways to mitigate these risks:&lt;br /&gt;
# Data is exposed as soon as it leaves the protected disk&lt;br /&gt;
# Data is exposed in the clear if a user session is hijacked &lt;br /&gt;
# Data is exposed if device credentials are compromised&lt;br /&gt;
# All data is protected by a single key, which means that if you lose that one key, you lose access to the device&lt;br /&gt;
&lt;br /&gt;
== Disable features that create vulnerabilities (Lockdown Mode) ==&lt;br /&gt;
&#039;&#039;&#039;iPhone and Mac devices offers [https://support.apple.com/en-us/HT212650 Lockdown Mode]&#039;&#039;&#039; - &amp;quot;When Lockdown Mode is enabled, your device won’t function like it typically does. To reduce the attack surface that potentially could be exploited by highly targeted mercenary spyware, certain apps, websites, and features are strictly limited for security and some experiences might not be available at all. Lockdown Mode is available in iOS 16, iPadOS 16, and macOS Ventura.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Lockdown Mode covers a lot of different scenarios and reduce attack surface for attacks: remove JIT from browser, disable a lot of webkit features, block calls from unknown contacts in iMessage, remove many file types in messages etc. You can read a [https://blacktop.github.io/presentations/0x41con_2023/HTML/index.html#0 2023 analysis presentation by Blacktop]. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Android also offers a version of [https://www.zdnet.com/article/how-to-use-the-android-lockdown-mode-and-why-you-should/ Lockdown Mode]&#039;&#039;&#039; - &amp;quot;When lockdown mode is enabled, fingerprint sensors, facial recognition, and voice recognition do not function. Once you&#039;ve activated lockdown mode, the only way to gain access to your device is either via PIN, password, or pattern. One thing you must know about lockdown mode is that it&#039;s a one-time thing. In other words, once you&#039;ve enabled it, it will immediately be disabled upon successful login. That means you have to re-enable lockdown mode every time you want to use it.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
== Separate your phone number from your device ==&lt;br /&gt;
[https://theintercept.com/2017/09/28/signal-tutorial-second-phone-number/ How to use signal without giving out your phone number] (article) - A step-by-step guide to protecting your private phone number while enjoying the security of encrypted texting app Signal.&lt;br /&gt;
----&lt;br /&gt;
&#039;&#039;Last updated June 18, 2024&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Source for this content: [https://securityinabox.org/en/phones-and-computers/malware/#use-antivirus-or-anti-malware Security in a Box]&#039;&#039; , [https://ssd.eff.org/ Electronic Frontier SSD], and discussions with human rights security practitioners.&#039;&#039;&lt;/div&gt;</summary>
		<author><name>Kristin1</name></author>
	</entry>
	<entry>
		<id>https://wiki.digitalrights.community/index.php?title=Security_resources_organized_by_topic&amp;diff=52251</id>
		<title>Security resources organized by topic</title>
		<link rel="alternate" type="text/html" href="https://wiki.digitalrights.community/index.php?title=Security_resources_organized_by_topic&amp;diff=52251"/>
		<updated>2024-11-07T17:49:54Z</updated>

		<summary type="html">&lt;p&gt;Kristin1: /* Resource collections related to security */ added front line workbook&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Building awareness of how we respond to threat and stress ==&lt;br /&gt;
&#039;&#039;Developing a useful security strategy is heavily dependent on our perception – we need to be able to identify and analyse threats in order to implement ways of avoiding or reducing them. But we all perceive the world around us differently based on our circumstances, experiences and many other factors. As a result, our perception can sometimes be hindered: threats which may be evident to some people may go unrecognised by others; similarly, we also need to be able to tell the difference between threats which are genuinely possible and those which we falsely perceive, called &#039;unfounded fears&#039;. It&#039;s a good idea to become familiar with factors that condition our perceptions of threat, and consider ways that we can take these into account in our security planning.&#039;&#039; (Source: [https://holistic-security.tacticaltech.org/chapters/prepare/1-2-individual-responses-to-threat.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Resources:&lt;br /&gt;
&lt;br /&gt;
* [https://holistic-security.tacticaltech.org/chapters/prepare/1-2-individual-responses-to-threat.html &#039;&#039;&#039;Exploring individual responses to threat&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
* [https://holistic-security.tacticaltech.org/chapters/prepare/1-4-team-and-peer-responses-to-threat.html &#039;&#039;&#039;Exploring group responses to threat&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
* [https://holistic-security.tacticaltech.org/chapters/prepare/1-5-communicating-about-threats-in-teams-and-organisations.html &#039;&#039;&#039;Communicating about security in teams and organizations&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
&lt;br /&gt;
== Understanding our threats and context ==&lt;br /&gt;
&lt;br /&gt;
=== Situation monitoring and analysis ===&lt;br /&gt;
Situation monitoring and analysis is the broadest kind of analysis of our context: observing the political, economic, social, technological, legal and environmental developments in society which are relevant to our work, and may impact our security situation. (Source: [https://holistic-security.tacticaltech.org/chapters/explore/2-2-situation-monitoring-and-analysis.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Exercise: [https://holistic-security.tacticaltech.org/exercises/explore/situational-monitoring-a-quick-pestle-analysis.html &#039;&#039;&#039;Pestle analysis&#039;&#039;&#039;] (Holistic Security Manual) &lt;br /&gt;
&lt;br /&gt;
Tool: &#039;&#039;&#039;[https://tnr-research.uwazi.io/ Research Database on transnational repression]&#039;&#039;&#039; - This collection of research reports on transnational repression can help human rights defenders better understand: &lt;br /&gt;
&lt;br /&gt;
* Transnational Repression (TNR) threats that are possible, to determine appropriate mitigation techniques&lt;br /&gt;
* Which TNR threats are unlikely, in order to alleviate fear&lt;br /&gt;
* What exiled HRDs can expect from a host country in terms of protection measures&lt;br /&gt;
* Existing campaigns to strengthen protection for exiled HRDs&lt;br /&gt;
&lt;br /&gt;
=== Identifying, analyzing and prioritizing threats ===&lt;br /&gt;
&lt;br /&gt;
==== Map the actors ====&lt;br /&gt;
&#039;&#039;It is valuable to get a clear picture of all the actors in our environment (individuals, institutions, organizations, etc). Threats almost always come from someone or something. Knowing as much as we can about the actors in our context improves our perception of our environment and thereby, our ability to carry out activities to maintain or expand our space for work.&#039;&#039; (Source: [https://holistic-security.tacticaltech.org/chapters/explore/2-3-vision-strategy-and-actors.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Exercise:&lt;br /&gt;
&lt;br /&gt;
* [https://holistic-security.tacticaltech.org/exercises/explore/visual-actor-mapping-part-1.html &#039;&#039;&#039;Spectrum of allies&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
* [https://newtactics.org/resource/exercises-identifying-allies-opponents &#039;&#039;&#039;Spectrum of allies&#039;&#039;&#039;] (New Tactics in Human Rights project)&lt;br /&gt;
&lt;br /&gt;
==== Brainstorm threats ====&lt;br /&gt;
This exercise is a first attempt at identifying the threats to yourself, your group or organization and your work in defense of human rights. This initial list of threats can then be refined so as to focus in more depth on the threats which are most likely or potentially most harmful. (Source: [https://holistic-security.tacticaltech.org/exercises/explore/threat-brainstorm.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Exercise: [https://holistic-security.tacticaltech.org/exercises/explore/threat-brainstorm.html &#039;&#039;&#039;Threat brainstorm&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
&lt;br /&gt;
==== Analyzing risk, prioritizing threats ====&lt;br /&gt;
Threats can be viewed and categorized in light of the following: the likelihood that the threat will take place, and the impact if and when it does. Likelihood and impact are concepts which help us determine risk: the higher the likelihood or impact of a threat, the higher the risk. Categorizing threats can help to keep us from feeling overwhelmed and keep our perception of threats realistic. (Source: [https://holistic-security.tacticaltech.org/chapters/explore/2-8-identifying-and-analysing-threats.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Exercise: [https://holistic-security.tacticaltech.org/chapters/explore/2-8-identifying-and-analysing-threats.html &#039;&#039;&#039;Threat matrix&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
&lt;br /&gt;
Tools:&lt;br /&gt;
&lt;br /&gt;
* The Ford Foundation’s [https://www.fordfoundation.org/work/our-grants/building-institutions-and-networks/cybersecurity-assessment-tool/ &#039;&#039;&#039;Cybersecurity Assessment Tool (CAT)&#039;&#039;&#039;] is designed to measure the maturity, resiliency, and strength of an organization’s cybersecurity efforts. We have created this questionnaire with busy nontechnical grant makers, grantee partners, civil society organizations, and nonprofits in mind, and we hope it helps shine some light on a recommended path forward for any organization undertaking a cybersecurity journey&lt;br /&gt;
&lt;br /&gt;
==== Analyze threats ====&lt;br /&gt;
This exercise will help you prioritize threats and divine the causes, ramifications, sources as well as the required resources, existing actions and possible next steps.&lt;br /&gt;
&lt;br /&gt;
Exercise: [https://holistic-security.tacticaltech.org/exercises/explore/threat-inventory.html &#039;&#039;&#039;Threat inventory&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
&lt;br /&gt;
== Risk mitigation ==&lt;br /&gt;
In order to build a response to the threats we face, we can consider them in terms of the factors which make us more or less susceptible to them. Read more in [https://holistic-security.tacticaltech.org/chapters/strategise/3-1-responding-to-threats.html this chapter of the Holistic Security Manual]. &lt;br /&gt;
&lt;br /&gt;
=== Mitigation techniques for common threats to information ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
! Threat&lt;br /&gt;
!Mitigation techniques and links to guidance &lt;br /&gt;
|-&lt;br /&gt;
|Data loss&lt;br /&gt;
|&lt;br /&gt;
* [[Ways to securely store and share files|Have your information securely in the cloud or on a server]]&lt;br /&gt;
* Have a backup process&lt;br /&gt;
|-&lt;br /&gt;
|Compromised accounts&lt;br /&gt;
|&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa|Use two factor authentication for all accounts]]&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa|Use unique, complex passwords for all accounts]]&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa|Use a password manager to create, store and protect those passwords]]&lt;br /&gt;
|-&lt;br /&gt;
|Device inspection at checkpoints&lt;br /&gt;
|&lt;br /&gt;
* [[Use a secure messaging app#Tip: use automatic disappearing messages|Use automated disappearing messages on your messaging apps]]&lt;br /&gt;
* [[Ways to securely store and share files|Have your sensitive information stored safely in the cloud and off of your device]]&lt;br /&gt;
* Hide or delete any apps that would provide access to this information (you can restore that app later)&lt;br /&gt;
|-&lt;br /&gt;
|Device confiscation or theft&lt;br /&gt;
|&lt;br /&gt;
* [[Secure your devices#Full disk encryption|Encrypt your devices]]&lt;br /&gt;
* And, review and adapt the same advice above for “device inspection” threat&lt;br /&gt;
|-&lt;br /&gt;
|Information handover&lt;br /&gt;
|&lt;br /&gt;
* [[Trusted hosting companies in the human rights community|Host your information with a company you trust]], who will not turn over information to your opponents (via subpoena, request, etc)&lt;br /&gt;
|-&lt;br /&gt;
|Targeted malware or spyware&lt;br /&gt;
|&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa#Be aware of spear phishing attacks|Protect yourselves against (spear) phishing attacks]]&lt;br /&gt;
* Use a second device for sensitive activities&lt;br /&gt;
* [[How to mitigate your risk of being subject to Pegasus surveillance|Restart your device regularly to disrupt spyware]]&lt;br /&gt;
* [[Secure your devices|Use anti virus]]&lt;br /&gt;
* [[How to mitigate your risk of being subject to Pegasus surveillance]], and other spyware&lt;br /&gt;
|-&lt;br /&gt;
|Surveillance and monitoring&lt;br /&gt;
|&lt;br /&gt;
* [[Safe internet browsing using VPN and Tor browser|Use a VPN and/or Tor browser]]&lt;br /&gt;
* [[Use a secure messaging app]]&lt;br /&gt;
* [[How to collect and store information in a secure way]]&lt;br /&gt;
* [[Ways to securely store and share files|How to use Google Drive safely and alternatives to Google Drive]]&lt;br /&gt;
|-&lt;br /&gt;
|Website hacking and takeover&lt;br /&gt;
|&lt;br /&gt;
* [[Protect your website|Protect your website from DDOS attacks]]&lt;br /&gt;
* [[Trusted hosting companies in the human rights community|Use a host company that you trust]]&lt;br /&gt;
* And, review and adapt the same advice above for &amp;quot;compromised accounts&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
Other important considerations when collecting, storing, using sensitive information:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Consideration&lt;br /&gt;
!Resources&lt;br /&gt;
|-&lt;br /&gt;
|Make sure you have informed consent from the people you are collecting information&lt;br /&gt;
|[[Guidance on informed consent]]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
* [[Information Security for Human Rights Defenders]]&lt;br /&gt;
&lt;br /&gt;
===Mitigation techniques for online harassment===&lt;br /&gt;
[[How to deal with online harassment and threats]]&lt;br /&gt;
&lt;br /&gt;
==Security planning ==&lt;br /&gt;
Once we have clarity about the threats we face during our activities, we can begin to organize our security protocols into security plans or agreements. There are three main areas to consider when developing any security plans: &lt;br /&gt;
&lt;br /&gt;
# &#039;&#039;&#039;PREPARE: Prevention of threats&#039;&#039;&#039; - Most security plans will include tactics which aim to prevent identified threats from taking place (i.e. reducing their likelihood). This will include:&lt;br /&gt;
## Identify &amp;amp; assess the threats and your vulnerabilities&lt;br /&gt;
## Develop security policies and procedures&lt;br /&gt;
## Implement preventive measures&lt;br /&gt;
## Invest in Security Awareness Programs&lt;br /&gt;
## Conduct Security testing&lt;br /&gt;
# &#039;&#039;&#039;RESPOND: Emergency responses&#039;&#039;&#039; - Emergency plans, also called contingency plans, are the actions which we take in response to a threat becoming a reality. This will include:&lt;br /&gt;
## Build Incident Response Plan&lt;br /&gt;
## Communication Strategy&lt;br /&gt;
## Business continuity plan&lt;br /&gt;
## Disaster recovery plan (Data Backups and Recovery)&lt;br /&gt;
## Communication and Collaboration&lt;br /&gt;
# &#039;&#039;&#039;TREAT: Well-being considerations&#039;&#039;&#039; - Actions we take to maintain our physical energy and a mindful approach to our work and our security –it may include such considerations as where and when we will eat, sleep, relax and enjoy ourselves in the course of our work. This will include: &lt;br /&gt;
## Analyze lessons learned&lt;br /&gt;
## Recovery and Remediation&lt;br /&gt;
## Psychological safety considerations,&lt;br /&gt;
## Review and update your security plans and approach&lt;br /&gt;
For more information, read &#039;&#039;&#039;[[General guidance for creating security plans and agreements]]&#039;&#039;&#039; and review [https://holistic-security.tacticaltech.org/chapters/strategise/3-3-creating-security-plans-and-agreements.html this chapter of the Holistic Security Manual]. &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Additional resources:  &lt;br /&gt;
&lt;br /&gt;
* Consumer Reports [https://securityplanner.consumerreports.org/ &#039;&#039;&#039;Security Planner&#039;&#039;&#039;] is a free, easy-to-use guide to staying safer online. It provides personalized recommendations and expert advice on topics such as keeping social media accounts from being hacked, locking down devices ranging from smartphones to home security cameras, and reducing intrusive tracking by websites.&lt;br /&gt;
* [https://www.nist.gov/itl/smallbusinesscyber/nist-cybersecurity-framework-0 &#039;&#039;&#039;NIST Cybersecurity Framework 2.0&#039;&#039;&#039;]:  Small Business Quick Start Guide - provides small-to-medium sized businesses (SMB), specifically those who have modest or no cybersecurity plans in place, with considerations to kick-start their cybersecurity risk management strategy using the NIST Cybersecurity Framework (CSF) 2.0. (by the &#039;&#039;National Institute of Standards and Technology)&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Security planning on specific topics===&lt;br /&gt;
&lt;br /&gt;
* [[General tips for international travel]]&lt;br /&gt;
* [[General tips for home security]]&lt;br /&gt;
&lt;br /&gt;
== Building a culture of security within a team ==&lt;br /&gt;
[https://level-up.cc/ &#039;&#039;&#039;LevelUp&#039;&#039;&#039;] is a collection of resources for the global digital safety training community.&lt;br /&gt;
&lt;br /&gt;
[https://wiki.orgsec.community/ &#039;&#039;&#039;Organisational security community wiki&#039;&#039;&#039;] is a resource created by and for security practitioners from all backgrounds to share useful resources and document innovative approaches to long-term security work. &lt;br /&gt;
&lt;br /&gt;
==Resource collections related to security ==&lt;br /&gt;
[https://digitalfirstaid.org/ &#039;&#039;&#039;Digital First Aid Kit&#039;&#039;&#039;] - The Digital First Aid Kit is a free resource to help rapid responders, digital security trainers, and tech-savvy activists to better protect themselves and the communities they support against the most common types of digital emergencies. It can also be used by activists, human rights defenders, bloggers, journalists or media activists who want to learn more about how they can protect themselves and support others. If you or someone you are assisting is experiencing a digital emergency, the Digital First Aid Kit will guide you in diagnosing the issues you are facing, and refer you to support providers for further help if needed.&lt;br /&gt;
&lt;br /&gt;
[https://communitydocs.accessnow.org/ &#039;&#039;&#039;Access Now Help Desk documentation&#039;&#039;&#039;]&lt;br /&gt;
&lt;br /&gt;
[https://cyber-star.org/ &#039;&#039;&#039;CyberSTAR&#039;&#039;&#039;], by SecDev, makes it easier for small organizations and individuals to understand and manage digital safety by organizing it around six themes. This site presents learning resources to help you be safer online—plus teaching resources for digital safety trainers.&lt;br /&gt;
&lt;br /&gt;
[https://totem-project.org/ &#039;&#039;&#039;Totem project&#039;&#039;&#039;] - Developed in collaboration by Greenhost and Free Press Unlimited, Totem is a &#039;&#039;&#039;free&#039;&#039;&#039; &#039;&#039;&#039;online learning platform&#039;&#039;&#039; that offers educational courses about digital security and privacy, and related tools and tactics for journalists, activists and human rights defenders in a safe, online classroom environment.&lt;br /&gt;
&lt;br /&gt;
[https://advocacyassembly.org/en/courses?category=1 &#039;&#039;&#039;Advocacy Assembly&#039;&#039;&#039; online courses related to digital security] - Advocacy Assembly is a &#039;&#039;&#039;free e-learning platform&#039;&#039;&#039; featuring dozens of courses for human rights activists, campaigners and journalists.&lt;br /&gt;
&lt;br /&gt;
[https://www.saferedge.com/learning &#039;&#039;&#039;Safer Edge&#039;&#039;&#039; online courses] (not free) - Safer Edge works with security, safeguarding and risk advisory professionals with a wide range of expertise, skills and experience. Team and consultants have experience working internationally in the humanitarian and development contexts in a range of risk contexts. In-house team speaks English, French, Spanish, Portuguese, Arabic and Russian.&lt;br /&gt;
&lt;br /&gt;
[https://academy.amnesty.org/ &#039;&#039;&#039;Amnesty International&#039;s Human Rights Academy&#039;&#039;&#039;] is a free online learning platform that allows participants to embark on a self-paced learning journey to understand the principles of human rights and how to use them as a tool for positive change. We believe that knowledge of rights is essential for claiming them, defending them, and promoting them and hope that our courses will inspire you to take action.&lt;br /&gt;
&lt;br /&gt;
[https://www.protectioninternational.org/tools/protection-manuals/ &#039;&#039;&#039;Protection International&#039;s Protection Manuals&#039;&#039;&#039;] for Human Rights Defenders - These manuals were developed to provide human rights defenders with additional knowledge and tools to improve their understanding of security and protection.&lt;br /&gt;
&lt;br /&gt;
[https://www.frontlinedefenders.org/en/digital-protection-resources &#039;&#039;&#039;Front Line Defenders Digital Protection Resources&#039;&#039;&#039;] - Front Line Defenders Digital Protection programme responds to the digital security environment facing HRDs and develops tools, guides and reosources to complement its training and consultation programming.&lt;br /&gt;
&lt;br /&gt;
[https://ssd.eff.org/ &#039;&#039;&#039;Surveillance Self-Defense&#039;&#039;&#039;] toolkit by Electronic Frontier Foundation - &amp;quot;We’re the Electronic Frontier Foundation, an independent non-profit working to protect online privacy for over thirty years. This is Surveillance Self-Defense: our expert guide to protecting you and your friends from online spying.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[https://securityinabox.org/en/ &#039;&#039;&#039;Security in a Box&#039;&#039;&#039;] primarily aims to help a global community of human rights defenders whose work puts them at risk. It has been recognized worldwide as a foundational resource for helping people at risk protect their digital security and privacy.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[https://www.frontlinedefenders.org/en/resource-publication/workbook-security-practical-steps-human-rights-defenders-risk Front Line Defenders Workbook on Security]&#039;&#039;&#039; has been inspired by the hundreds of HRDs from over 50 countries who have attended Front Line Defenders workshops on security and protection. The Workbook takes you through the steps to producing a security plan – for yourself and for your organisation (for those HRDs who are working in organisations). It follows a systematic approach for assessing your security situation and developing risk and vulnerability reduction strategies and tactics. Manual available in French, Spanish, Russian, Arabic, Turkish, Portuguese, Urdu, Somali, Dari, and Chinese.&lt;/div&gt;</summary>
		<author><name>Kristin1</name></author>
	</entry>
	<entry>
		<id>https://wiki.digitalrights.community/index.php?title=Security_resources_organized_by_topic&amp;diff=52250</id>
		<title>Security resources organized by topic</title>
		<link rel="alternate" type="text/html" href="https://wiki.digitalrights.community/index.php?title=Security_resources_organized_by_topic&amp;diff=52250"/>
		<updated>2024-11-07T17:46:49Z</updated>

		<summary type="html">&lt;p&gt;Kristin1: /* Resource collections related to security */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Building awareness of how we respond to threat and stress ==&lt;br /&gt;
&#039;&#039;Developing a useful security strategy is heavily dependent on our perception – we need to be able to identify and analyse threats in order to implement ways of avoiding or reducing them. But we all perceive the world around us differently based on our circumstances, experiences and many other factors. As a result, our perception can sometimes be hindered: threats which may be evident to some people may go unrecognised by others; similarly, we also need to be able to tell the difference between threats which are genuinely possible and those which we falsely perceive, called &#039;unfounded fears&#039;. It&#039;s a good idea to become familiar with factors that condition our perceptions of threat, and consider ways that we can take these into account in our security planning.&#039;&#039; (Source: [https://holistic-security.tacticaltech.org/chapters/prepare/1-2-individual-responses-to-threat.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Resources:&lt;br /&gt;
&lt;br /&gt;
* [https://holistic-security.tacticaltech.org/chapters/prepare/1-2-individual-responses-to-threat.html &#039;&#039;&#039;Exploring individual responses to threat&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
* [https://holistic-security.tacticaltech.org/chapters/prepare/1-4-team-and-peer-responses-to-threat.html &#039;&#039;&#039;Exploring group responses to threat&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
* [https://holistic-security.tacticaltech.org/chapters/prepare/1-5-communicating-about-threats-in-teams-and-organisations.html &#039;&#039;&#039;Communicating about security in teams and organizations&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
&lt;br /&gt;
== Understanding our threats and context ==&lt;br /&gt;
&lt;br /&gt;
=== Situation monitoring and analysis ===&lt;br /&gt;
Situation monitoring and analysis is the broadest kind of analysis of our context: observing the political, economic, social, technological, legal and environmental developments in society which are relevant to our work, and may impact our security situation. (Source: [https://holistic-security.tacticaltech.org/chapters/explore/2-2-situation-monitoring-and-analysis.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Exercise: [https://holistic-security.tacticaltech.org/exercises/explore/situational-monitoring-a-quick-pestle-analysis.html &#039;&#039;&#039;Pestle analysis&#039;&#039;&#039;] (Holistic Security Manual) &lt;br /&gt;
&lt;br /&gt;
Tool: &#039;&#039;&#039;[https://tnr-research.uwazi.io/ Research Database on transnational repression]&#039;&#039;&#039; - This collection of research reports on transnational repression can help human rights defenders better understand: &lt;br /&gt;
&lt;br /&gt;
* Transnational Repression (TNR) threats that are possible, to determine appropriate mitigation techniques&lt;br /&gt;
* Which TNR threats are unlikely, in order to alleviate fear&lt;br /&gt;
* What exiled HRDs can expect from a host country in terms of protection measures&lt;br /&gt;
* Existing campaigns to strengthen protection for exiled HRDs&lt;br /&gt;
&lt;br /&gt;
=== Identifying, analyzing and prioritizing threats ===&lt;br /&gt;
&lt;br /&gt;
==== Map the actors ====&lt;br /&gt;
&#039;&#039;It is valuable to get a clear picture of all the actors in our environment (individuals, institutions, organizations, etc). Threats almost always come from someone or something. Knowing as much as we can about the actors in our context improves our perception of our environment and thereby, our ability to carry out activities to maintain or expand our space for work.&#039;&#039; (Source: [https://holistic-security.tacticaltech.org/chapters/explore/2-3-vision-strategy-and-actors.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Exercise:&lt;br /&gt;
&lt;br /&gt;
* [https://holistic-security.tacticaltech.org/exercises/explore/visual-actor-mapping-part-1.html &#039;&#039;&#039;Spectrum of allies&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
* [https://newtactics.org/resource/exercises-identifying-allies-opponents &#039;&#039;&#039;Spectrum of allies&#039;&#039;&#039;] (New Tactics in Human Rights project)&lt;br /&gt;
&lt;br /&gt;
==== Brainstorm threats ====&lt;br /&gt;
This exercise is a first attempt at identifying the threats to yourself, your group or organization and your work in defense of human rights. This initial list of threats can then be refined so as to focus in more depth on the threats which are most likely or potentially most harmful. (Source: [https://holistic-security.tacticaltech.org/exercises/explore/threat-brainstorm.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Exercise: [https://holistic-security.tacticaltech.org/exercises/explore/threat-brainstorm.html &#039;&#039;&#039;Threat brainstorm&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
&lt;br /&gt;
==== Analyzing risk, prioritizing threats ====&lt;br /&gt;
Threats can be viewed and categorized in light of the following: the likelihood that the threat will take place, and the impact if and when it does. Likelihood and impact are concepts which help us determine risk: the higher the likelihood or impact of a threat, the higher the risk. Categorizing threats can help to keep us from feeling overwhelmed and keep our perception of threats realistic. (Source: [https://holistic-security.tacticaltech.org/chapters/explore/2-8-identifying-and-analysing-threats.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Exercise: [https://holistic-security.tacticaltech.org/chapters/explore/2-8-identifying-and-analysing-threats.html &#039;&#039;&#039;Threat matrix&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
&lt;br /&gt;
Tools:&lt;br /&gt;
&lt;br /&gt;
* The Ford Foundation’s [https://www.fordfoundation.org/work/our-grants/building-institutions-and-networks/cybersecurity-assessment-tool/ &#039;&#039;&#039;Cybersecurity Assessment Tool (CAT)&#039;&#039;&#039;] is designed to measure the maturity, resiliency, and strength of an organization’s cybersecurity efforts. We have created this questionnaire with busy nontechnical grant makers, grantee partners, civil society organizations, and nonprofits in mind, and we hope it helps shine some light on a recommended path forward for any organization undertaking a cybersecurity journey&lt;br /&gt;
&lt;br /&gt;
==== Analyze threats ====&lt;br /&gt;
This exercise will help you prioritize threats and divine the causes, ramifications, sources as well as the required resources, existing actions and possible next steps.&lt;br /&gt;
&lt;br /&gt;
Exercise: [https://holistic-security.tacticaltech.org/exercises/explore/threat-inventory.html &#039;&#039;&#039;Threat inventory&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
&lt;br /&gt;
== Risk mitigation ==&lt;br /&gt;
In order to build a response to the threats we face, we can consider them in terms of the factors which make us more or less susceptible to them. Read more in [https://holistic-security.tacticaltech.org/chapters/strategise/3-1-responding-to-threats.html this chapter of the Holistic Security Manual]. &lt;br /&gt;
&lt;br /&gt;
=== Mitigation techniques for common threats to information ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
! Threat&lt;br /&gt;
!Mitigation techniques and links to guidance &lt;br /&gt;
|-&lt;br /&gt;
|Data loss&lt;br /&gt;
|&lt;br /&gt;
* [[Ways to securely store and share files|Have your information securely in the cloud or on a server]]&lt;br /&gt;
* Have a backup process&lt;br /&gt;
|-&lt;br /&gt;
|Compromised accounts&lt;br /&gt;
|&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa|Use two factor authentication for all accounts]]&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa|Use unique, complex passwords for all accounts]]&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa|Use a password manager to create, store and protect those passwords]]&lt;br /&gt;
|-&lt;br /&gt;
|Device inspection at checkpoints&lt;br /&gt;
|&lt;br /&gt;
* [[Use a secure messaging app#Tip: use automatic disappearing messages|Use automated disappearing messages on your messaging apps]]&lt;br /&gt;
* [[Ways to securely store and share files|Have your sensitive information stored safely in the cloud and off of your device]]&lt;br /&gt;
* Hide or delete any apps that would provide access to this information (you can restore that app later)&lt;br /&gt;
|-&lt;br /&gt;
|Device confiscation or theft&lt;br /&gt;
|&lt;br /&gt;
* [[Secure your devices#Full disk encryption|Encrypt your devices]]&lt;br /&gt;
* And, review and adapt the same advice above for “device inspection” threat&lt;br /&gt;
|-&lt;br /&gt;
|Information handover&lt;br /&gt;
|&lt;br /&gt;
* [[Trusted hosting companies in the human rights community|Host your information with a company you trust]], who will not turn over information to your opponents (via subpoena, request, etc)&lt;br /&gt;
|-&lt;br /&gt;
|Targeted malware or spyware&lt;br /&gt;
|&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa#Be aware of spear phishing attacks|Protect yourselves against (spear) phishing attacks]]&lt;br /&gt;
* Use a second device for sensitive activities&lt;br /&gt;
* [[How to mitigate your risk of being subject to Pegasus surveillance|Restart your device regularly to disrupt spyware]]&lt;br /&gt;
* [[Secure your devices|Use anti virus]]&lt;br /&gt;
* [[How to mitigate your risk of being subject to Pegasus surveillance]], and other spyware&lt;br /&gt;
|-&lt;br /&gt;
|Surveillance and monitoring&lt;br /&gt;
|&lt;br /&gt;
* [[Safe internet browsing using VPN and Tor browser|Use a VPN and/or Tor browser]]&lt;br /&gt;
* [[Use a secure messaging app]]&lt;br /&gt;
* [[How to collect and store information in a secure way]]&lt;br /&gt;
* [[Ways to securely store and share files|How to use Google Drive safely and alternatives to Google Drive]]&lt;br /&gt;
|-&lt;br /&gt;
|Website hacking and takeover&lt;br /&gt;
|&lt;br /&gt;
* [[Protect your website|Protect your website from DDOS attacks]]&lt;br /&gt;
* [[Trusted hosting companies in the human rights community|Use a host company that you trust]]&lt;br /&gt;
* And, review and adapt the same advice above for &amp;quot;compromised accounts&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
Other important considerations when collecting, storing, using sensitive information:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Consideration&lt;br /&gt;
!Resources&lt;br /&gt;
|-&lt;br /&gt;
|Make sure you have informed consent from the people you are collecting information&lt;br /&gt;
|[[Guidance on informed consent]]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
* [[Information Security for Human Rights Defenders]]&lt;br /&gt;
&lt;br /&gt;
===Mitigation techniques for online harassment===&lt;br /&gt;
[[How to deal with online harassment and threats]]&lt;br /&gt;
&lt;br /&gt;
==Security planning ==&lt;br /&gt;
Once we have clarity about the threats we face during our activities, we can begin to organize our security protocols into security plans or agreements. There are three main areas to consider when developing any security plans: &lt;br /&gt;
&lt;br /&gt;
# &#039;&#039;&#039;PREPARE: Prevention of threats&#039;&#039;&#039; - Most security plans will include tactics which aim to prevent identified threats from taking place (i.e. reducing their likelihood). This will include:&lt;br /&gt;
## Identify &amp;amp; assess the threats and your vulnerabilities&lt;br /&gt;
## Develop security policies and procedures&lt;br /&gt;
## Implement preventive measures&lt;br /&gt;
## Invest in Security Awareness Programs&lt;br /&gt;
## Conduct Security testing&lt;br /&gt;
# &#039;&#039;&#039;RESPOND: Emergency responses&#039;&#039;&#039; - Emergency plans, also called contingency plans, are the actions which we take in response to a threat becoming a reality. This will include:&lt;br /&gt;
## Build Incident Response Plan&lt;br /&gt;
## Communication Strategy&lt;br /&gt;
## Business continuity plan&lt;br /&gt;
## Disaster recovery plan (Data Backups and Recovery)&lt;br /&gt;
## Communication and Collaboration&lt;br /&gt;
# &#039;&#039;&#039;TREAT: Well-being considerations&#039;&#039;&#039; - Actions we take to maintain our physical energy and a mindful approach to our work and our security –it may include such considerations as where and when we will eat, sleep, relax and enjoy ourselves in the course of our work. This will include: &lt;br /&gt;
## Analyze lessons learned&lt;br /&gt;
## Recovery and Remediation&lt;br /&gt;
## Psychological safety considerations,&lt;br /&gt;
## Review and update your security plans and approach&lt;br /&gt;
For more information, read &#039;&#039;&#039;[[General guidance for creating security plans and agreements]]&#039;&#039;&#039; and review [https://holistic-security.tacticaltech.org/chapters/strategise/3-3-creating-security-plans-and-agreements.html this chapter of the Holistic Security Manual]. &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Additional resources:  &lt;br /&gt;
&lt;br /&gt;
* Consumer Reports [https://securityplanner.consumerreports.org/ &#039;&#039;&#039;Security Planner&#039;&#039;&#039;] is a free, easy-to-use guide to staying safer online. It provides personalized recommendations and expert advice on topics such as keeping social media accounts from being hacked, locking down devices ranging from smartphones to home security cameras, and reducing intrusive tracking by websites.&lt;br /&gt;
* [https://www.nist.gov/itl/smallbusinesscyber/nist-cybersecurity-framework-0 &#039;&#039;&#039;NIST Cybersecurity Framework 2.0&#039;&#039;&#039;]:  Small Business Quick Start Guide - provides small-to-medium sized businesses (SMB), specifically those who have modest or no cybersecurity plans in place, with considerations to kick-start their cybersecurity risk management strategy using the NIST Cybersecurity Framework (CSF) 2.0. (by the &#039;&#039;National Institute of Standards and Technology)&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Security planning on specific topics===&lt;br /&gt;
&lt;br /&gt;
* [[General tips for international travel]]&lt;br /&gt;
* [[General tips for home security]]&lt;br /&gt;
&lt;br /&gt;
== Building a culture of security within a team ==&lt;br /&gt;
[https://level-up.cc/ &#039;&#039;&#039;LevelUp&#039;&#039;&#039;] is a collection of resources for the global digital safety training community.&lt;br /&gt;
&lt;br /&gt;
[https://wiki.orgsec.community/ &#039;&#039;&#039;Organisational security community wiki&#039;&#039;&#039;] is a resource created by and for security practitioners from all backgrounds to share useful resources and document innovative approaches to long-term security work. &lt;br /&gt;
&lt;br /&gt;
==Resource collections related to security ==&lt;br /&gt;
[https://digitalfirstaid.org/ &#039;&#039;&#039;Digital First Aid Kit&#039;&#039;&#039;] - The Digital First Aid Kit is a free resource to help rapid responders, digital security trainers, and tech-savvy activists to better protect themselves and the communities they support against the most common types of digital emergencies. It can also be used by activists, human rights defenders, bloggers, journalists or media activists who want to learn more about how they can protect themselves and support others. If you or someone you are assisting is experiencing a digital emergency, the Digital First Aid Kit will guide you in diagnosing the issues you are facing, and refer you to support providers for further help if needed.&lt;br /&gt;
&lt;br /&gt;
[https://communitydocs.accessnow.org/ &#039;&#039;&#039;Access Now Help Desk documentation&#039;&#039;&#039;]&lt;br /&gt;
&lt;br /&gt;
[https://cyber-star.org/ &#039;&#039;&#039;CyberSTAR&#039;&#039;&#039;], by SecDev, makes it easier for small organizations and individuals to understand and manage digital safety by organizing it around six themes. This site presents learning resources to help you be safer online—plus teaching resources for digital safety trainers.&lt;br /&gt;
&lt;br /&gt;
[https://totem-project.org/ &#039;&#039;&#039;Totem project&#039;&#039;&#039;] - Developed in collaboration by Greenhost and Free Press Unlimited, Totem is a &#039;&#039;&#039;free&#039;&#039;&#039; &#039;&#039;&#039;online learning platform&#039;&#039;&#039; that offers educational courses about digital security and privacy, and related tools and tactics for journalists, activists and human rights defenders in a safe, online classroom environment.&lt;br /&gt;
&lt;br /&gt;
[https://advocacyassembly.org/en/courses?category=1 &#039;&#039;&#039;Advocacy Assembly&#039;&#039;&#039; online courses related to digital security] - Advocacy Assembly is a &#039;&#039;&#039;free e-learning platform&#039;&#039;&#039; featuring dozens of courses for human rights activists, campaigners and journalists.&lt;br /&gt;
&lt;br /&gt;
[https://www.saferedge.com/learning &#039;&#039;&#039;Safer Edge&#039;&#039;&#039; online courses] (not free) - Safer Edge works with security, safeguarding and risk advisory professionals with a wide range of expertise, skills and experience. Team and consultants have experience working internationally in the humanitarian and development contexts in a range of risk contexts. In-house team speaks English, French, Spanish, Portuguese, Arabic and Russian.&lt;br /&gt;
&lt;br /&gt;
[https://academy.amnesty.org/ &#039;&#039;&#039;Amnesty International&#039;s Human Rights Academy&#039;&#039;&#039;] is a free online learning platform that allows participants to embark on a self-paced learning journey to understand the principles of human rights and how to use them as a tool for positive change. We believe that knowledge of rights is essential for claiming them, defending them, and promoting them and hope that our courses will inspire you to take action.&lt;br /&gt;
&lt;br /&gt;
[https://www.protectioninternational.org/tools/protection-manuals/ &#039;&#039;&#039;Protection International&#039;s Protection Manuals&#039;&#039;&#039;] for Human Rights Defenders - These manuals were developed to provide human rights defenders with additional knowledge and tools to improve their understanding of security and protection.&lt;br /&gt;
&lt;br /&gt;
[https://www.frontlinedefenders.org/en/digital-protection-resources &#039;&#039;&#039;Front Line Defenders Digital Protection Resources&#039;&#039;&#039;] - Front Line Defenders Digital Protection programme responds to the digital security environment facing HRDs and develops tools, guides and reosources to complement its training and consultation programming.&lt;br /&gt;
&lt;br /&gt;
[https://ssd.eff.org/ &#039;&#039;&#039;Surveillance Self-Defense&#039;&#039;&#039;] toolkit by Electronic Frontier Foundation - &amp;quot;We’re the Electronic Frontier Foundation, an independent non-profit working to protect online privacy for over thirty years. This is Surveillance Self-Defense: our expert guide to protecting you and your friends from online spying.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[https://securityinabox.org/en/ &#039;&#039;&#039;Security in a Box&#039;&#039;&#039;] primarily aims to help a global community of human rights defenders whose work puts them at risk. It has been recognized worldwide as a foundational resource for helping people at risk protect their digital security and privacy.&lt;/div&gt;</summary>
		<author><name>Kristin1</name></author>
	</entry>
	<entry>
		<id>https://wiki.digitalrights.community/index.php?title=Security_resources_organized_by_topic&amp;diff=52249</id>
		<title>Security resources organized by topic</title>
		<link rel="alternate" type="text/html" href="https://wiki.digitalrights.community/index.php?title=Security_resources_organized_by_topic&amp;diff=52249"/>
		<updated>2024-11-07T17:45:40Z</updated>

		<summary type="html">&lt;p&gt;Kristin1: /* Resource collections related to security */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Building awareness of how we respond to threat and stress ==&lt;br /&gt;
&#039;&#039;Developing a useful security strategy is heavily dependent on our perception – we need to be able to identify and analyse threats in order to implement ways of avoiding or reducing them. But we all perceive the world around us differently based on our circumstances, experiences and many other factors. As a result, our perception can sometimes be hindered: threats which may be evident to some people may go unrecognised by others; similarly, we also need to be able to tell the difference between threats which are genuinely possible and those which we falsely perceive, called &#039;unfounded fears&#039;. It&#039;s a good idea to become familiar with factors that condition our perceptions of threat, and consider ways that we can take these into account in our security planning.&#039;&#039; (Source: [https://holistic-security.tacticaltech.org/chapters/prepare/1-2-individual-responses-to-threat.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Resources:&lt;br /&gt;
&lt;br /&gt;
* [https://holistic-security.tacticaltech.org/chapters/prepare/1-2-individual-responses-to-threat.html &#039;&#039;&#039;Exploring individual responses to threat&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
* [https://holistic-security.tacticaltech.org/chapters/prepare/1-4-team-and-peer-responses-to-threat.html &#039;&#039;&#039;Exploring group responses to threat&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
* [https://holistic-security.tacticaltech.org/chapters/prepare/1-5-communicating-about-threats-in-teams-and-organisations.html &#039;&#039;&#039;Communicating about security in teams and organizations&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
&lt;br /&gt;
== Understanding our threats and context ==&lt;br /&gt;
&lt;br /&gt;
=== Situation monitoring and analysis ===&lt;br /&gt;
Situation monitoring and analysis is the broadest kind of analysis of our context: observing the political, economic, social, technological, legal and environmental developments in society which are relevant to our work, and may impact our security situation. (Source: [https://holistic-security.tacticaltech.org/chapters/explore/2-2-situation-monitoring-and-analysis.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Exercise: [https://holistic-security.tacticaltech.org/exercises/explore/situational-monitoring-a-quick-pestle-analysis.html &#039;&#039;&#039;Pestle analysis&#039;&#039;&#039;] (Holistic Security Manual) &lt;br /&gt;
&lt;br /&gt;
Tool: &#039;&#039;&#039;[https://tnr-research.uwazi.io/ Research Database on transnational repression]&#039;&#039;&#039; - This collection of research reports on transnational repression can help human rights defenders better understand: &lt;br /&gt;
&lt;br /&gt;
* Transnational Repression (TNR) threats that are possible, to determine appropriate mitigation techniques&lt;br /&gt;
* Which TNR threats are unlikely, in order to alleviate fear&lt;br /&gt;
* What exiled HRDs can expect from a host country in terms of protection measures&lt;br /&gt;
* Existing campaigns to strengthen protection for exiled HRDs&lt;br /&gt;
&lt;br /&gt;
=== Identifying, analyzing and prioritizing threats ===&lt;br /&gt;
&lt;br /&gt;
==== Map the actors ====&lt;br /&gt;
&#039;&#039;It is valuable to get a clear picture of all the actors in our environment (individuals, institutions, organizations, etc). Threats almost always come from someone or something. Knowing as much as we can about the actors in our context improves our perception of our environment and thereby, our ability to carry out activities to maintain or expand our space for work.&#039;&#039; (Source: [https://holistic-security.tacticaltech.org/chapters/explore/2-3-vision-strategy-and-actors.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Exercise:&lt;br /&gt;
&lt;br /&gt;
* [https://holistic-security.tacticaltech.org/exercises/explore/visual-actor-mapping-part-1.html &#039;&#039;&#039;Spectrum of allies&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
* [https://newtactics.org/resource/exercises-identifying-allies-opponents &#039;&#039;&#039;Spectrum of allies&#039;&#039;&#039;] (New Tactics in Human Rights project)&lt;br /&gt;
&lt;br /&gt;
==== Brainstorm threats ====&lt;br /&gt;
This exercise is a first attempt at identifying the threats to yourself, your group or organization and your work in defense of human rights. This initial list of threats can then be refined so as to focus in more depth on the threats which are most likely or potentially most harmful. (Source: [https://holistic-security.tacticaltech.org/exercises/explore/threat-brainstorm.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Exercise: [https://holistic-security.tacticaltech.org/exercises/explore/threat-brainstorm.html &#039;&#039;&#039;Threat brainstorm&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
&lt;br /&gt;
==== Analyzing risk, prioritizing threats ====&lt;br /&gt;
Threats can be viewed and categorized in light of the following: the likelihood that the threat will take place, and the impact if and when it does. Likelihood and impact are concepts which help us determine risk: the higher the likelihood or impact of a threat, the higher the risk. Categorizing threats can help to keep us from feeling overwhelmed and keep our perception of threats realistic. (Source: [https://holistic-security.tacticaltech.org/chapters/explore/2-8-identifying-and-analysing-threats.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Exercise: [https://holistic-security.tacticaltech.org/chapters/explore/2-8-identifying-and-analysing-threats.html &#039;&#039;&#039;Threat matrix&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
&lt;br /&gt;
Tools:&lt;br /&gt;
&lt;br /&gt;
* The Ford Foundation’s [https://www.fordfoundation.org/work/our-grants/building-institutions-and-networks/cybersecurity-assessment-tool/ &#039;&#039;&#039;Cybersecurity Assessment Tool (CAT)&#039;&#039;&#039;] is designed to measure the maturity, resiliency, and strength of an organization’s cybersecurity efforts. We have created this questionnaire with busy nontechnical grant makers, grantee partners, civil society organizations, and nonprofits in mind, and we hope it helps shine some light on a recommended path forward for any organization undertaking a cybersecurity journey&lt;br /&gt;
&lt;br /&gt;
==== Analyze threats ====&lt;br /&gt;
This exercise will help you prioritize threats and divine the causes, ramifications, sources as well as the required resources, existing actions and possible next steps.&lt;br /&gt;
&lt;br /&gt;
Exercise: [https://holistic-security.tacticaltech.org/exercises/explore/threat-inventory.html &#039;&#039;&#039;Threat inventory&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
&lt;br /&gt;
== Risk mitigation ==&lt;br /&gt;
In order to build a response to the threats we face, we can consider them in terms of the factors which make us more or less susceptible to them. Read more in [https://holistic-security.tacticaltech.org/chapters/strategise/3-1-responding-to-threats.html this chapter of the Holistic Security Manual]. &lt;br /&gt;
&lt;br /&gt;
=== Mitigation techniques for common threats to information ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
! Threat&lt;br /&gt;
!Mitigation techniques and links to guidance &lt;br /&gt;
|-&lt;br /&gt;
|Data loss&lt;br /&gt;
|&lt;br /&gt;
* [[Ways to securely store and share files|Have your information securely in the cloud or on a server]]&lt;br /&gt;
* Have a backup process&lt;br /&gt;
|-&lt;br /&gt;
|Compromised accounts&lt;br /&gt;
|&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa|Use two factor authentication for all accounts]]&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa|Use unique, complex passwords for all accounts]]&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa|Use a password manager to create, store and protect those passwords]]&lt;br /&gt;
|-&lt;br /&gt;
|Device inspection at checkpoints&lt;br /&gt;
|&lt;br /&gt;
* [[Use a secure messaging app#Tip: use automatic disappearing messages|Use automated disappearing messages on your messaging apps]]&lt;br /&gt;
* [[Ways to securely store and share files|Have your sensitive information stored safely in the cloud and off of your device]]&lt;br /&gt;
* Hide or delete any apps that would provide access to this information (you can restore that app later)&lt;br /&gt;
|-&lt;br /&gt;
|Device confiscation or theft&lt;br /&gt;
|&lt;br /&gt;
* [[Secure your devices#Full disk encryption|Encrypt your devices]]&lt;br /&gt;
* And, review and adapt the same advice above for “device inspection” threat&lt;br /&gt;
|-&lt;br /&gt;
|Information handover&lt;br /&gt;
|&lt;br /&gt;
* [[Trusted hosting companies in the human rights community|Host your information with a company you trust]], who will not turn over information to your opponents (via subpoena, request, etc)&lt;br /&gt;
|-&lt;br /&gt;
|Targeted malware or spyware&lt;br /&gt;
|&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa#Be aware of spear phishing attacks|Protect yourselves against (spear) phishing attacks]]&lt;br /&gt;
* Use a second device for sensitive activities&lt;br /&gt;
* [[How to mitigate your risk of being subject to Pegasus surveillance|Restart your device regularly to disrupt spyware]]&lt;br /&gt;
* [[Secure your devices|Use anti virus]]&lt;br /&gt;
* [[How to mitigate your risk of being subject to Pegasus surveillance]], and other spyware&lt;br /&gt;
|-&lt;br /&gt;
|Surveillance and monitoring&lt;br /&gt;
|&lt;br /&gt;
* [[Safe internet browsing using VPN and Tor browser|Use a VPN and/or Tor browser]]&lt;br /&gt;
* [[Use a secure messaging app]]&lt;br /&gt;
* [[How to collect and store information in a secure way]]&lt;br /&gt;
* [[Ways to securely store and share files|How to use Google Drive safely and alternatives to Google Drive]]&lt;br /&gt;
|-&lt;br /&gt;
|Website hacking and takeover&lt;br /&gt;
|&lt;br /&gt;
* [[Protect your website|Protect your website from DDOS attacks]]&lt;br /&gt;
* [[Trusted hosting companies in the human rights community|Use a host company that you trust]]&lt;br /&gt;
* And, review and adapt the same advice above for &amp;quot;compromised accounts&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
Other important considerations when collecting, storing, using sensitive information:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Consideration&lt;br /&gt;
!Resources&lt;br /&gt;
|-&lt;br /&gt;
|Make sure you have informed consent from the people you are collecting information&lt;br /&gt;
|[[Guidance on informed consent]]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
* [[Information Security for Human Rights Defenders]]&lt;br /&gt;
&lt;br /&gt;
===Mitigation techniques for online harassment===&lt;br /&gt;
[[How to deal with online harassment and threats]]&lt;br /&gt;
&lt;br /&gt;
==Security planning ==&lt;br /&gt;
Once we have clarity about the threats we face during our activities, we can begin to organize our security protocols into security plans or agreements. There are three main areas to consider when developing any security plans: &lt;br /&gt;
&lt;br /&gt;
# &#039;&#039;&#039;PREPARE: Prevention of threats&#039;&#039;&#039; - Most security plans will include tactics which aim to prevent identified threats from taking place (i.e. reducing their likelihood). This will include:&lt;br /&gt;
## Identify &amp;amp; assess the threats and your vulnerabilities&lt;br /&gt;
## Develop security policies and procedures&lt;br /&gt;
## Implement preventive measures&lt;br /&gt;
## Invest in Security Awareness Programs&lt;br /&gt;
## Conduct Security testing&lt;br /&gt;
# &#039;&#039;&#039;RESPOND: Emergency responses&#039;&#039;&#039; - Emergency plans, also called contingency plans, are the actions which we take in response to a threat becoming a reality. This will include:&lt;br /&gt;
## Build Incident Response Plan&lt;br /&gt;
## Communication Strategy&lt;br /&gt;
## Business continuity plan&lt;br /&gt;
## Disaster recovery plan (Data Backups and Recovery)&lt;br /&gt;
## Communication and Collaboration&lt;br /&gt;
# &#039;&#039;&#039;TREAT: Well-being considerations&#039;&#039;&#039; - Actions we take to maintain our physical energy and a mindful approach to our work and our security –it may include such considerations as where and when we will eat, sleep, relax and enjoy ourselves in the course of our work. This will include: &lt;br /&gt;
## Analyze lessons learned&lt;br /&gt;
## Recovery and Remediation&lt;br /&gt;
## Psychological safety considerations,&lt;br /&gt;
## Review and update your security plans and approach&lt;br /&gt;
For more information, read &#039;&#039;&#039;[[General guidance for creating security plans and agreements]]&#039;&#039;&#039; and review [https://holistic-security.tacticaltech.org/chapters/strategise/3-3-creating-security-plans-and-agreements.html this chapter of the Holistic Security Manual]. &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Additional resources:  &lt;br /&gt;
&lt;br /&gt;
* Consumer Reports [https://securityplanner.consumerreports.org/ &#039;&#039;&#039;Security Planner&#039;&#039;&#039;] is a free, easy-to-use guide to staying safer online. It provides personalized recommendations and expert advice on topics such as keeping social media accounts from being hacked, locking down devices ranging from smartphones to home security cameras, and reducing intrusive tracking by websites.&lt;br /&gt;
* [https://www.nist.gov/itl/smallbusinesscyber/nist-cybersecurity-framework-0 &#039;&#039;&#039;NIST Cybersecurity Framework 2.0&#039;&#039;&#039;]:  Small Business Quick Start Guide - provides small-to-medium sized businesses (SMB), specifically those who have modest or no cybersecurity plans in place, with considerations to kick-start their cybersecurity risk management strategy using the NIST Cybersecurity Framework (CSF) 2.0. (by the &#039;&#039;National Institute of Standards and Technology)&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Security planning on specific topics===&lt;br /&gt;
&lt;br /&gt;
* [[General tips for international travel]]&lt;br /&gt;
* [[General tips for home security]]&lt;br /&gt;
&lt;br /&gt;
== Building a culture of security within a team ==&lt;br /&gt;
[https://level-up.cc/ &#039;&#039;&#039;LevelUp&#039;&#039;&#039;] is a collection of resources for the global digital safety training community.&lt;br /&gt;
&lt;br /&gt;
[https://wiki.orgsec.community/ &#039;&#039;&#039;Organisational security community wiki&#039;&#039;&#039;] is a resource created by and for security practitioners from all backgrounds to share useful resources and document innovative approaches to long-term security work. &lt;br /&gt;
&lt;br /&gt;
==Resource collections related to security ==&lt;br /&gt;
[https://digitalfirstaid.org/ &#039;&#039;&#039;Digital First Aid Kit&#039;&#039;&#039;] - The Digital First Aid Kit is a free resource to help rapid responders, digital security trainers, and tech-savvy activists to better protect themselves and the communities they support against the most common types of digital emergencies. It can also be used by activists, human rights defenders, bloggers, journalists or media activists who want to learn more about how they can protect themselves and support others. If you or someone you are assisting is experiencing a digital emergency, the Digital First Aid Kit will guide you in diagnosing the issues you are facing, and refer you to support providers for further help if needed.&lt;br /&gt;
&lt;br /&gt;
[https://communitydocs.accessnow.org/ &#039;&#039;&#039;Access Now Help Desk documentation&#039;&#039;&#039;]&lt;br /&gt;
&lt;br /&gt;
[https://cyber-star.org/ &#039;&#039;&#039;CyberSTAR&#039;&#039;&#039;], by SecDev, makes it easier for small organizations and individuals to understand and manage digital safety by organizing it around six themes. This site presents learning resources to help you be safer online—plus teaching resources for digital safety trainers.&lt;br /&gt;
&lt;br /&gt;
[https://totem-project.org/ &#039;&#039;&#039;Totem project&#039;&#039;&#039;] - Developed in collaboration by Greenhost and Free Press Unlimited, Totem is a &#039;&#039;&#039;free&#039;&#039;&#039; &#039;&#039;&#039;online learning platform&#039;&#039;&#039; that offers educational courses about digital security and privacy, and related tools and tactics for journalists, activists and human rights defenders in a safe, online classroom environment.&lt;br /&gt;
&lt;br /&gt;
[https://advocacyassembly.org/en/courses?category=1 &#039;&#039;&#039;Advocacy Assembly&#039;&#039;&#039; online courses related to digital security] - Advocacy Assembly is a &#039;&#039;&#039;free e-learning platform&#039;&#039;&#039; featuring dozens of courses for human rights activists, campaigners and journalists.&lt;br /&gt;
&lt;br /&gt;
[https://www.saferedge.com/learning &#039;&#039;&#039;Safer Edge&#039;&#039;&#039; online courses] (not free) - Safer Edge works with security, safeguarding and risk advisory professionals with a wide range of expertise, skills and experience. Team and consultants have experience working internationally in the humanitarian and development contexts in a range of risk contexts. In-house team speaks English, French, Spanish, Portuguese, Arabic and Russian.&lt;br /&gt;
&lt;br /&gt;
[https://academy.amnesty.org/ &#039;&#039;&#039;Amnesty International&#039;s Human Rights Academy&#039;&#039;&#039;] is a free online learning platform that allows participants to embark on a self-paced learning journey to understand the principles of human rights and how to use them as a tool for positive change. We believe that knowledge of rights is essential for claiming them, defending them, and promoting them and hope that our courses will inspire you to take action.&lt;br /&gt;
&lt;br /&gt;
[https://www.protectioninternational.org/tools/protection-manuals/ &#039;&#039;&#039;Protection International&#039;s Protection Manuals&#039;&#039;&#039;] for Human Rights Defenders - These manuals were developed to provide human rights defenders with additional knowledge and tools to improve their understanding of security and protection.&lt;br /&gt;
&lt;br /&gt;
[https://www.frontlinedefenders.org/en/digital-protection-resources &#039;&#039;&#039;Front Line Defenders Digital Protection Resources&#039;&#039;&#039;] - Front Line Defenders Digital Protection programme responds to the digital security environment facing HRDs and develops tools, guides and reosources to complement its training and consultation programming.&lt;br /&gt;
&lt;br /&gt;
[https://ssd.eff.org/ &#039;&#039;&#039;Surveillance Self-Defense&#039;&#039;&#039;] toolkit by Electronic Frontier Foundation - &amp;quot;We’re the Electronic Frontier Foundation, an independent non-profit working to protect online privacy for over thirty years. This is Surveillance Self-Defense: our expert guide to protecting you and your friends from online spying.&amp;quot;&lt;/div&gt;</summary>
		<author><name>Kristin1</name></author>
	</entry>
	<entry>
		<id>https://wiki.digitalrights.community/index.php?title=Security_resources_organized_by_topic&amp;diff=52248</id>
		<title>Security resources organized by topic</title>
		<link rel="alternate" type="text/html" href="https://wiki.digitalrights.community/index.php?title=Security_resources_organized_by_topic&amp;diff=52248"/>
		<updated>2024-11-07T17:40:29Z</updated>

		<summary type="html">&lt;p&gt;Kristin1: /* Resource collections related to security */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Building awareness of how we respond to threat and stress ==&lt;br /&gt;
&#039;&#039;Developing a useful security strategy is heavily dependent on our perception – we need to be able to identify and analyse threats in order to implement ways of avoiding or reducing them. But we all perceive the world around us differently based on our circumstances, experiences and many other factors. As a result, our perception can sometimes be hindered: threats which may be evident to some people may go unrecognised by others; similarly, we also need to be able to tell the difference between threats which are genuinely possible and those which we falsely perceive, called &#039;unfounded fears&#039;. It&#039;s a good idea to become familiar with factors that condition our perceptions of threat, and consider ways that we can take these into account in our security planning.&#039;&#039; (Source: [https://holistic-security.tacticaltech.org/chapters/prepare/1-2-individual-responses-to-threat.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Resources:&lt;br /&gt;
&lt;br /&gt;
* [https://holistic-security.tacticaltech.org/chapters/prepare/1-2-individual-responses-to-threat.html &#039;&#039;&#039;Exploring individual responses to threat&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
* [https://holistic-security.tacticaltech.org/chapters/prepare/1-4-team-and-peer-responses-to-threat.html &#039;&#039;&#039;Exploring group responses to threat&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
* [https://holistic-security.tacticaltech.org/chapters/prepare/1-5-communicating-about-threats-in-teams-and-organisations.html &#039;&#039;&#039;Communicating about security in teams and organizations&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
&lt;br /&gt;
== Understanding our threats and context ==&lt;br /&gt;
&lt;br /&gt;
=== Situation monitoring and analysis ===&lt;br /&gt;
Situation monitoring and analysis is the broadest kind of analysis of our context: observing the political, economic, social, technological, legal and environmental developments in society which are relevant to our work, and may impact our security situation. (Source: [https://holistic-security.tacticaltech.org/chapters/explore/2-2-situation-monitoring-and-analysis.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Exercise: [https://holistic-security.tacticaltech.org/exercises/explore/situational-monitoring-a-quick-pestle-analysis.html &#039;&#039;&#039;Pestle analysis&#039;&#039;&#039;] (Holistic Security Manual) &lt;br /&gt;
&lt;br /&gt;
Tool: &#039;&#039;&#039;[https://tnr-research.uwazi.io/ Research Database on transnational repression]&#039;&#039;&#039; - This collection of research reports on transnational repression can help human rights defenders better understand: &lt;br /&gt;
&lt;br /&gt;
* Transnational Repression (TNR) threats that are possible, to determine appropriate mitigation techniques&lt;br /&gt;
* Which TNR threats are unlikely, in order to alleviate fear&lt;br /&gt;
* What exiled HRDs can expect from a host country in terms of protection measures&lt;br /&gt;
* Existing campaigns to strengthen protection for exiled HRDs&lt;br /&gt;
&lt;br /&gt;
=== Identifying, analyzing and prioritizing threats ===&lt;br /&gt;
&lt;br /&gt;
==== Map the actors ====&lt;br /&gt;
&#039;&#039;It is valuable to get a clear picture of all the actors in our environment (individuals, institutions, organizations, etc). Threats almost always come from someone or something. Knowing as much as we can about the actors in our context improves our perception of our environment and thereby, our ability to carry out activities to maintain or expand our space for work.&#039;&#039; (Source: [https://holistic-security.tacticaltech.org/chapters/explore/2-3-vision-strategy-and-actors.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Exercise:&lt;br /&gt;
&lt;br /&gt;
* [https://holistic-security.tacticaltech.org/exercises/explore/visual-actor-mapping-part-1.html &#039;&#039;&#039;Spectrum of allies&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
* [https://newtactics.org/resource/exercises-identifying-allies-opponents &#039;&#039;&#039;Spectrum of allies&#039;&#039;&#039;] (New Tactics in Human Rights project)&lt;br /&gt;
&lt;br /&gt;
==== Brainstorm threats ====&lt;br /&gt;
This exercise is a first attempt at identifying the threats to yourself, your group or organization and your work in defense of human rights. This initial list of threats can then be refined so as to focus in more depth on the threats which are most likely or potentially most harmful. (Source: [https://holistic-security.tacticaltech.org/exercises/explore/threat-brainstorm.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Exercise: [https://holistic-security.tacticaltech.org/exercises/explore/threat-brainstorm.html &#039;&#039;&#039;Threat brainstorm&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
&lt;br /&gt;
==== Analyzing risk, prioritizing threats ====&lt;br /&gt;
Threats can be viewed and categorized in light of the following: the likelihood that the threat will take place, and the impact if and when it does. Likelihood and impact are concepts which help us determine risk: the higher the likelihood or impact of a threat, the higher the risk. Categorizing threats can help to keep us from feeling overwhelmed and keep our perception of threats realistic. (Source: [https://holistic-security.tacticaltech.org/chapters/explore/2-8-identifying-and-analysing-threats.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Exercise: [https://holistic-security.tacticaltech.org/chapters/explore/2-8-identifying-and-analysing-threats.html &#039;&#039;&#039;Threat matrix&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
&lt;br /&gt;
Tools:&lt;br /&gt;
&lt;br /&gt;
* The Ford Foundation’s [https://www.fordfoundation.org/work/our-grants/building-institutions-and-networks/cybersecurity-assessment-tool/ &#039;&#039;&#039;Cybersecurity Assessment Tool (CAT)&#039;&#039;&#039;] is designed to measure the maturity, resiliency, and strength of an organization’s cybersecurity efforts. We have created this questionnaire with busy nontechnical grant makers, grantee partners, civil society organizations, and nonprofits in mind, and we hope it helps shine some light on a recommended path forward for any organization undertaking a cybersecurity journey&lt;br /&gt;
&lt;br /&gt;
==== Analyze threats ====&lt;br /&gt;
This exercise will help you prioritize threats and divine the causes, ramifications, sources as well as the required resources, existing actions and possible next steps.&lt;br /&gt;
&lt;br /&gt;
Exercise: [https://holistic-security.tacticaltech.org/exercises/explore/threat-inventory.html &#039;&#039;&#039;Threat inventory&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
&lt;br /&gt;
== Risk mitigation ==&lt;br /&gt;
In order to build a response to the threats we face, we can consider them in terms of the factors which make us more or less susceptible to them. Read more in [https://holistic-security.tacticaltech.org/chapters/strategise/3-1-responding-to-threats.html this chapter of the Holistic Security Manual]. &lt;br /&gt;
&lt;br /&gt;
=== Mitigation techniques for common threats to information ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
! Threat&lt;br /&gt;
!Mitigation techniques and links to guidance &lt;br /&gt;
|-&lt;br /&gt;
|Data loss&lt;br /&gt;
|&lt;br /&gt;
* [[Ways to securely store and share files|Have your information securely in the cloud or on a server]]&lt;br /&gt;
* Have a backup process&lt;br /&gt;
|-&lt;br /&gt;
|Compromised accounts&lt;br /&gt;
|&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa|Use two factor authentication for all accounts]]&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa|Use unique, complex passwords for all accounts]]&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa|Use a password manager to create, store and protect those passwords]]&lt;br /&gt;
|-&lt;br /&gt;
|Device inspection at checkpoints&lt;br /&gt;
|&lt;br /&gt;
* [[Use a secure messaging app#Tip: use automatic disappearing messages|Use automated disappearing messages on your messaging apps]]&lt;br /&gt;
* [[Ways to securely store and share files|Have your sensitive information stored safely in the cloud and off of your device]]&lt;br /&gt;
* Hide or delete any apps that would provide access to this information (you can restore that app later)&lt;br /&gt;
|-&lt;br /&gt;
|Device confiscation or theft&lt;br /&gt;
|&lt;br /&gt;
* [[Secure your devices#Full disk encryption|Encrypt your devices]]&lt;br /&gt;
* And, review and adapt the same advice above for “device inspection” threat&lt;br /&gt;
|-&lt;br /&gt;
|Information handover&lt;br /&gt;
|&lt;br /&gt;
* [[Trusted hosting companies in the human rights community|Host your information with a company you trust]], who will not turn over information to your opponents (via subpoena, request, etc)&lt;br /&gt;
|-&lt;br /&gt;
|Targeted malware or spyware&lt;br /&gt;
|&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa#Be aware of spear phishing attacks|Protect yourselves against (spear) phishing attacks]]&lt;br /&gt;
* Use a second device for sensitive activities&lt;br /&gt;
* [[How to mitigate your risk of being subject to Pegasus surveillance|Restart your device regularly to disrupt spyware]]&lt;br /&gt;
* [[Secure your devices|Use anti virus]]&lt;br /&gt;
* [[How to mitigate your risk of being subject to Pegasus surveillance]], and other spyware&lt;br /&gt;
|-&lt;br /&gt;
|Surveillance and monitoring&lt;br /&gt;
|&lt;br /&gt;
* [[Safe internet browsing using VPN and Tor browser|Use a VPN and/or Tor browser]]&lt;br /&gt;
* [[Use a secure messaging app]]&lt;br /&gt;
* [[How to collect and store information in a secure way]]&lt;br /&gt;
* [[Ways to securely store and share files|How to use Google Drive safely and alternatives to Google Drive]]&lt;br /&gt;
|-&lt;br /&gt;
|Website hacking and takeover&lt;br /&gt;
|&lt;br /&gt;
* [[Protect your website|Protect your website from DDOS attacks]]&lt;br /&gt;
* [[Trusted hosting companies in the human rights community|Use a host company that you trust]]&lt;br /&gt;
* And, review and adapt the same advice above for &amp;quot;compromised accounts&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
Other important considerations when collecting, storing, using sensitive information:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Consideration&lt;br /&gt;
!Resources&lt;br /&gt;
|-&lt;br /&gt;
|Make sure you have informed consent from the people you are collecting information&lt;br /&gt;
|[[Guidance on informed consent]]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
* [[Information Security for Human Rights Defenders]]&lt;br /&gt;
&lt;br /&gt;
===Mitigation techniques for online harassment===&lt;br /&gt;
[[How to deal with online harassment and threats]]&lt;br /&gt;
&lt;br /&gt;
==Security planning ==&lt;br /&gt;
Once we have clarity about the threats we face during our activities, we can begin to organize our security protocols into security plans or agreements. There are three main areas to consider when developing any security plans: &lt;br /&gt;
&lt;br /&gt;
# &#039;&#039;&#039;PREPARE: Prevention of threats&#039;&#039;&#039; - Most security plans will include tactics which aim to prevent identified threats from taking place (i.e. reducing their likelihood). This will include:&lt;br /&gt;
## Identify &amp;amp; assess the threats and your vulnerabilities&lt;br /&gt;
## Develop security policies and procedures&lt;br /&gt;
## Implement preventive measures&lt;br /&gt;
## Invest in Security Awareness Programs&lt;br /&gt;
## Conduct Security testing&lt;br /&gt;
# &#039;&#039;&#039;RESPOND: Emergency responses&#039;&#039;&#039; - Emergency plans, also called contingency plans, are the actions which we take in response to a threat becoming a reality. This will include:&lt;br /&gt;
## Build Incident Response Plan&lt;br /&gt;
## Communication Strategy&lt;br /&gt;
## Business continuity plan&lt;br /&gt;
## Disaster recovery plan (Data Backups and Recovery)&lt;br /&gt;
## Communication and Collaboration&lt;br /&gt;
# &#039;&#039;&#039;TREAT: Well-being considerations&#039;&#039;&#039; - Actions we take to maintain our physical energy and a mindful approach to our work and our security –it may include such considerations as where and when we will eat, sleep, relax and enjoy ourselves in the course of our work. This will include: &lt;br /&gt;
## Analyze lessons learned&lt;br /&gt;
## Recovery and Remediation&lt;br /&gt;
## Psychological safety considerations,&lt;br /&gt;
## Review and update your security plans and approach&lt;br /&gt;
For more information, read &#039;&#039;&#039;[[General guidance for creating security plans and agreements]]&#039;&#039;&#039; and review [https://holistic-security.tacticaltech.org/chapters/strategise/3-3-creating-security-plans-and-agreements.html this chapter of the Holistic Security Manual]. &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Additional resources:  &lt;br /&gt;
&lt;br /&gt;
* Consumer Reports [https://securityplanner.consumerreports.org/ &#039;&#039;&#039;Security Planner&#039;&#039;&#039;] is a free, easy-to-use guide to staying safer online. It provides personalized recommendations and expert advice on topics such as keeping social media accounts from being hacked, locking down devices ranging from smartphones to home security cameras, and reducing intrusive tracking by websites.&lt;br /&gt;
* [https://www.nist.gov/itl/smallbusinesscyber/nist-cybersecurity-framework-0 &#039;&#039;&#039;NIST Cybersecurity Framework 2.0&#039;&#039;&#039;]:  Small Business Quick Start Guide - provides small-to-medium sized businesses (SMB), specifically those who have modest or no cybersecurity plans in place, with considerations to kick-start their cybersecurity risk management strategy using the NIST Cybersecurity Framework (CSF) 2.0. (by the &#039;&#039;National Institute of Standards and Technology)&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Security planning on specific topics===&lt;br /&gt;
&lt;br /&gt;
* [[General tips for international travel]]&lt;br /&gt;
* [[General tips for home security]]&lt;br /&gt;
&lt;br /&gt;
== Building a culture of security within a team ==&lt;br /&gt;
[https://level-up.cc/ &#039;&#039;&#039;LevelUp&#039;&#039;&#039;] is a collection of resources for the global digital safety training community.&lt;br /&gt;
&lt;br /&gt;
[https://wiki.orgsec.community/ &#039;&#039;&#039;Organisational security community wiki&#039;&#039;&#039;] is a resource created by and for security practitioners from all backgrounds to share useful resources and document innovative approaches to long-term security work. &lt;br /&gt;
&lt;br /&gt;
==Resource collections related to security ==&lt;br /&gt;
[https://digitalfirstaid.org/ &#039;&#039;&#039;Digital First Aid Kit&#039;&#039;&#039;] - The Digital First Aid Kit is a free resource to help rapid responders, digital security trainers, and tech-savvy activists to better protect themselves and the communities they support against the most common types of digital emergencies. It can also be used by activists, human rights defenders, bloggers, journalists or media activists who want to learn more about how they can protect themselves and support others. If you or someone you are assisting is experiencing a digital emergency, the Digital First Aid Kit will guide you in diagnosing the issues you are facing, and refer you to support providers for further help if needed.&lt;br /&gt;
&lt;br /&gt;
[https://communitydocs.accessnow.org/ &#039;&#039;&#039;Access Now Help Desk documentation&#039;&#039;&#039;]&lt;br /&gt;
&lt;br /&gt;
[https://cyber-star.org/ &#039;&#039;&#039;CyberSTAR&#039;&#039;&#039;], by SecDev, makes it easier for small organizations and individuals to understand and manage digital safety by organizing it around six themes. This site presents learning resources to help you be safer online—plus teaching resources for digital safety trainers.&lt;br /&gt;
&lt;br /&gt;
[https://totem-project.org/ &#039;&#039;&#039;Totem project&#039;&#039;&#039;] - Developed in collaboration by Greenhost and Free Press Unlimited, Totem is a &#039;&#039;&#039;free&#039;&#039;&#039; &#039;&#039;&#039;online learning platform&#039;&#039;&#039; that offers educational courses about digital security and privacy, and related tools and tactics for journalists, activists and human rights defenders in a safe, online classroom environment.&lt;br /&gt;
&lt;br /&gt;
[https://advocacyassembly.org/en/courses?category=1 &#039;&#039;&#039;Advocacy Assembly&#039;&#039;&#039; online courses related to digital security] - Advocacy Assembly is a &#039;&#039;&#039;free e-learning platform&#039;&#039;&#039; featuring dozens of courses for human rights activists, campaigners and journalists.&lt;br /&gt;
&lt;br /&gt;
[https://www.saferedge.com/learning &#039;&#039;&#039;Safer Edge&#039;&#039;&#039; online courses] (not free) - Safer Edge works with security, safeguarding and risk advisory professionals with a wide range of expertise, skills and experience. Team and consultants have experience working internationally in the humanitarian and development contexts in a range of risk contexts. In-house team speaks English, French, Spanish, Portuguese, Arabic and Russian.&lt;br /&gt;
&lt;br /&gt;
[https://academy.amnesty.org/ &#039;&#039;&#039;Amnesty International&#039;s Human Rights Academy&#039;&#039;&#039;] is a free online learning platform that allows participants to embark on a self-paced learning journey to understand the principles of human rights and how to use them as a tool for positive change. We believe that knowledge of rights is essential for claiming them, defending them, and promoting them and hope that our courses will inspire you to take action.&lt;br /&gt;
&lt;br /&gt;
[https://www.protectioninternational.org/tools/protection-manuals/ &#039;&#039;&#039;Protection International&#039;s Protection Manuals&#039;&#039;&#039;] for Human Rights Defenders - These manuals were developed to provide human rights defenders with additional knowledge and tools to improve their understanding of security and protection.&lt;/div&gt;</summary>
		<author><name>Kristin1</name></author>
	</entry>
	<entry>
		<id>https://wiki.digitalrights.community/index.php?title=Security_resources_organized_by_topic&amp;diff=52247</id>
		<title>Security resources organized by topic</title>
		<link rel="alternate" type="text/html" href="https://wiki.digitalrights.community/index.php?title=Security_resources_organized_by_topic&amp;diff=52247"/>
		<updated>2024-11-07T17:20:50Z</updated>

		<summary type="html">&lt;p&gt;Kristin1: /* Resource collections related to security */ added Amnesty Academy&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Building awareness of how we respond to threat and stress ==&lt;br /&gt;
&#039;&#039;Developing a useful security strategy is heavily dependent on our perception – we need to be able to identify and analyse threats in order to implement ways of avoiding or reducing them. But we all perceive the world around us differently based on our circumstances, experiences and many other factors. As a result, our perception can sometimes be hindered: threats which may be evident to some people may go unrecognised by others; similarly, we also need to be able to tell the difference between threats which are genuinely possible and those which we falsely perceive, called &#039;unfounded fears&#039;. It&#039;s a good idea to become familiar with factors that condition our perceptions of threat, and consider ways that we can take these into account in our security planning.&#039;&#039; (Source: [https://holistic-security.tacticaltech.org/chapters/prepare/1-2-individual-responses-to-threat.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Resources:&lt;br /&gt;
&lt;br /&gt;
* [https://holistic-security.tacticaltech.org/chapters/prepare/1-2-individual-responses-to-threat.html &#039;&#039;&#039;Exploring individual responses to threat&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
* [https://holistic-security.tacticaltech.org/chapters/prepare/1-4-team-and-peer-responses-to-threat.html &#039;&#039;&#039;Exploring group responses to threat&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
* [https://holistic-security.tacticaltech.org/chapters/prepare/1-5-communicating-about-threats-in-teams-and-organisations.html &#039;&#039;&#039;Communicating about security in teams and organizations&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
&lt;br /&gt;
== Understanding our threats and context ==&lt;br /&gt;
&lt;br /&gt;
=== Situation monitoring and analysis ===&lt;br /&gt;
Situation monitoring and analysis is the broadest kind of analysis of our context: observing the political, economic, social, technological, legal and environmental developments in society which are relevant to our work, and may impact our security situation. (Source: [https://holistic-security.tacticaltech.org/chapters/explore/2-2-situation-monitoring-and-analysis.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Exercise: [https://holistic-security.tacticaltech.org/exercises/explore/situational-monitoring-a-quick-pestle-analysis.html &#039;&#039;&#039;Pestle analysis&#039;&#039;&#039;] (Holistic Security Manual) &lt;br /&gt;
&lt;br /&gt;
Tool: &#039;&#039;&#039;[https://tnr-research.uwazi.io/ Research Database on transnational repression]&#039;&#039;&#039; - This collection of research reports on transnational repression can help human rights defenders better understand: &lt;br /&gt;
&lt;br /&gt;
* Transnational Repression (TNR) threats that are possible, to determine appropriate mitigation techniques&lt;br /&gt;
* Which TNR threats are unlikely, in order to alleviate fear&lt;br /&gt;
* What exiled HRDs can expect from a host country in terms of protection measures&lt;br /&gt;
* Existing campaigns to strengthen protection for exiled HRDs&lt;br /&gt;
&lt;br /&gt;
=== Identifying, analyzing and prioritizing threats ===&lt;br /&gt;
&lt;br /&gt;
==== Map the actors ====&lt;br /&gt;
&#039;&#039;It is valuable to get a clear picture of all the actors in our environment (individuals, institutions, organizations, etc). Threats almost always come from someone or something. Knowing as much as we can about the actors in our context improves our perception of our environment and thereby, our ability to carry out activities to maintain or expand our space for work.&#039;&#039; (Source: [https://holistic-security.tacticaltech.org/chapters/explore/2-3-vision-strategy-and-actors.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Exercise:&lt;br /&gt;
&lt;br /&gt;
* [https://holistic-security.tacticaltech.org/exercises/explore/visual-actor-mapping-part-1.html &#039;&#039;&#039;Spectrum of allies&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
* [https://newtactics.org/resource/exercises-identifying-allies-opponents &#039;&#039;&#039;Spectrum of allies&#039;&#039;&#039;] (New Tactics in Human Rights project)&lt;br /&gt;
&lt;br /&gt;
==== Brainstorm threats ====&lt;br /&gt;
This exercise is a first attempt at identifying the threats to yourself, your group or organization and your work in defense of human rights. This initial list of threats can then be refined so as to focus in more depth on the threats which are most likely or potentially most harmful. (Source: [https://holistic-security.tacticaltech.org/exercises/explore/threat-brainstorm.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Exercise: [https://holistic-security.tacticaltech.org/exercises/explore/threat-brainstorm.html &#039;&#039;&#039;Threat brainstorm&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
&lt;br /&gt;
==== Analyzing risk, prioritizing threats ====&lt;br /&gt;
Threats can be viewed and categorized in light of the following: the likelihood that the threat will take place, and the impact if and when it does. Likelihood and impact are concepts which help us determine risk: the higher the likelihood or impact of a threat, the higher the risk. Categorizing threats can help to keep us from feeling overwhelmed and keep our perception of threats realistic. (Source: [https://holistic-security.tacticaltech.org/chapters/explore/2-8-identifying-and-analysing-threats.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Exercise: [https://holistic-security.tacticaltech.org/chapters/explore/2-8-identifying-and-analysing-threats.html &#039;&#039;&#039;Threat matrix&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
&lt;br /&gt;
Tools:&lt;br /&gt;
&lt;br /&gt;
* The Ford Foundation’s [https://www.fordfoundation.org/work/our-grants/building-institutions-and-networks/cybersecurity-assessment-tool/ &#039;&#039;&#039;Cybersecurity Assessment Tool (CAT)&#039;&#039;&#039;] is designed to measure the maturity, resiliency, and strength of an organization’s cybersecurity efforts. We have created this questionnaire with busy nontechnical grant makers, grantee partners, civil society organizations, and nonprofits in mind, and we hope it helps shine some light on a recommended path forward for any organization undertaking a cybersecurity journey&lt;br /&gt;
&lt;br /&gt;
==== Analyze threats ====&lt;br /&gt;
This exercise will help you prioritize threats and divine the causes, ramifications, sources as well as the required resources, existing actions and possible next steps.&lt;br /&gt;
&lt;br /&gt;
Exercise: [https://holistic-security.tacticaltech.org/exercises/explore/threat-inventory.html &#039;&#039;&#039;Threat inventory&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
&lt;br /&gt;
== Risk mitigation ==&lt;br /&gt;
In order to build a response to the threats we face, we can consider them in terms of the factors which make us more or less susceptible to them. Read more in [https://holistic-security.tacticaltech.org/chapters/strategise/3-1-responding-to-threats.html this chapter of the Holistic Security Manual]. &lt;br /&gt;
&lt;br /&gt;
=== Mitigation techniques for common threats to information ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
! Threat&lt;br /&gt;
!Mitigation techniques and links to guidance &lt;br /&gt;
|-&lt;br /&gt;
|Data loss&lt;br /&gt;
|&lt;br /&gt;
* [[Ways to securely store and share files|Have your information securely in the cloud or on a server]]&lt;br /&gt;
* Have a backup process&lt;br /&gt;
|-&lt;br /&gt;
|Compromised accounts&lt;br /&gt;
|&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa|Use two factor authentication for all accounts]]&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa|Use unique, complex passwords for all accounts]]&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa|Use a password manager to create, store and protect those passwords]]&lt;br /&gt;
|-&lt;br /&gt;
|Device inspection at checkpoints&lt;br /&gt;
|&lt;br /&gt;
* [[Use a secure messaging app#Tip: use automatic disappearing messages|Use automated disappearing messages on your messaging apps]]&lt;br /&gt;
* [[Ways to securely store and share files|Have your sensitive information stored safely in the cloud and off of your device]]&lt;br /&gt;
* Hide or delete any apps that would provide access to this information (you can restore that app later)&lt;br /&gt;
|-&lt;br /&gt;
|Device confiscation or theft&lt;br /&gt;
|&lt;br /&gt;
* [[Secure your devices#Full disk encryption|Encrypt your devices]]&lt;br /&gt;
* And, review and adapt the same advice above for “device inspection” threat&lt;br /&gt;
|-&lt;br /&gt;
|Information handover&lt;br /&gt;
|&lt;br /&gt;
* [[Trusted hosting companies in the human rights community|Host your information with a company you trust]], who will not turn over information to your opponents (via subpoena, request, etc)&lt;br /&gt;
|-&lt;br /&gt;
|Targeted malware or spyware&lt;br /&gt;
|&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa#Be aware of spear phishing attacks|Protect yourselves against (spear) phishing attacks]]&lt;br /&gt;
* Use a second device for sensitive activities&lt;br /&gt;
* [[How to mitigate your risk of being subject to Pegasus surveillance|Restart your device regularly to disrupt spyware]]&lt;br /&gt;
* [[Secure your devices|Use anti virus]]&lt;br /&gt;
* [[How to mitigate your risk of being subject to Pegasus surveillance]], and other spyware&lt;br /&gt;
|-&lt;br /&gt;
|Surveillance and monitoring&lt;br /&gt;
|&lt;br /&gt;
* [[Safe internet browsing using VPN and Tor browser|Use a VPN and/or Tor browser]]&lt;br /&gt;
* [[Use a secure messaging app]]&lt;br /&gt;
* [[How to collect and store information in a secure way]]&lt;br /&gt;
* [[Ways to securely store and share files|How to use Google Drive safely and alternatives to Google Drive]]&lt;br /&gt;
|-&lt;br /&gt;
|Website hacking and takeover&lt;br /&gt;
|&lt;br /&gt;
* [[Protect your website|Protect your website from DDOS attacks]]&lt;br /&gt;
* [[Trusted hosting companies in the human rights community|Use a host company that you trust]]&lt;br /&gt;
* And, review and adapt the same advice above for &amp;quot;compromised accounts&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
Other important considerations when collecting, storing, using sensitive information:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Consideration&lt;br /&gt;
!Resources&lt;br /&gt;
|-&lt;br /&gt;
|Make sure you have informed consent from the people you are collecting information&lt;br /&gt;
|[[Guidance on informed consent]]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
* [[Information Security for Human Rights Defenders]]&lt;br /&gt;
&lt;br /&gt;
===Mitigation techniques for online harassment===&lt;br /&gt;
[[How to deal with online harassment and threats]]&lt;br /&gt;
&lt;br /&gt;
==Security planning ==&lt;br /&gt;
Once we have clarity about the threats we face during our activities, we can begin to organize our security protocols into security plans or agreements. There are three main areas to consider when developing any security plans: &lt;br /&gt;
&lt;br /&gt;
# &#039;&#039;&#039;PREPARE: Prevention of threats&#039;&#039;&#039; - Most security plans will include tactics which aim to prevent identified threats from taking place (i.e. reducing their likelihood). This will include:&lt;br /&gt;
## Identify &amp;amp; assess the threats and your vulnerabilities&lt;br /&gt;
## Develop security policies and procedures&lt;br /&gt;
## Implement preventive measures&lt;br /&gt;
## Invest in Security Awareness Programs&lt;br /&gt;
## Conduct Security testing&lt;br /&gt;
# &#039;&#039;&#039;RESPOND: Emergency responses&#039;&#039;&#039; - Emergency plans, also called contingency plans, are the actions which we take in response to a threat becoming a reality. This will include:&lt;br /&gt;
## Build Incident Response Plan&lt;br /&gt;
## Communication Strategy&lt;br /&gt;
## Business continuity plan&lt;br /&gt;
## Disaster recovery plan (Data Backups and Recovery)&lt;br /&gt;
## Communication and Collaboration&lt;br /&gt;
# &#039;&#039;&#039;TREAT: Well-being considerations&#039;&#039;&#039; - Actions we take to maintain our physical energy and a mindful approach to our work and our security –it may include such considerations as where and when we will eat, sleep, relax and enjoy ourselves in the course of our work. This will include: &lt;br /&gt;
## Analyze lessons learned&lt;br /&gt;
## Recovery and Remediation&lt;br /&gt;
## Psychological safety considerations,&lt;br /&gt;
## Review and update your security plans and approach&lt;br /&gt;
For more information, read &#039;&#039;&#039;[[General guidance for creating security plans and agreements]]&#039;&#039;&#039; and review [https://holistic-security.tacticaltech.org/chapters/strategise/3-3-creating-security-plans-and-agreements.html this chapter of the Holistic Security Manual]. &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Additional resources:  &lt;br /&gt;
&lt;br /&gt;
* Consumer Reports [https://securityplanner.consumerreports.org/ &#039;&#039;&#039;Security Planner&#039;&#039;&#039;] is a free, easy-to-use guide to staying safer online. It provides personalized recommendations and expert advice on topics such as keeping social media accounts from being hacked, locking down devices ranging from smartphones to home security cameras, and reducing intrusive tracking by websites.&lt;br /&gt;
* [https://www.nist.gov/itl/smallbusinesscyber/nist-cybersecurity-framework-0 &#039;&#039;&#039;NIST Cybersecurity Framework 2.0&#039;&#039;&#039;]:  Small Business Quick Start Guide - provides small-to-medium sized businesses (SMB), specifically those who have modest or no cybersecurity plans in place, with considerations to kick-start their cybersecurity risk management strategy using the NIST Cybersecurity Framework (CSF) 2.0. (by the &#039;&#039;National Institute of Standards and Technology)&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Security planning on specific topics===&lt;br /&gt;
&lt;br /&gt;
* [[General tips for international travel]]&lt;br /&gt;
* [[General tips for home security]]&lt;br /&gt;
&lt;br /&gt;
== Building a culture of security within a team ==&lt;br /&gt;
[https://level-up.cc/ &#039;&#039;&#039;LevelUp&#039;&#039;&#039;] is a collection of resources for the global digital safety training community.&lt;br /&gt;
&lt;br /&gt;
[https://wiki.orgsec.community/ &#039;&#039;&#039;Organisational security community wiki&#039;&#039;&#039;] is a resource created by and for security practitioners from all backgrounds to share useful resources and document innovative approaches to long-term security work. &lt;br /&gt;
&lt;br /&gt;
==Resource collections related to security ==&lt;br /&gt;
[https://digitalfirstaid.org/ &#039;&#039;&#039;Digital First Aid Kit&#039;&#039;&#039;] - The Digital First Aid Kit is a free resource to help rapid responders, digital security trainers, and tech-savvy activists to better protect themselves and the communities they support against the most common types of digital emergencies. It can also be used by activists, human rights defenders, bloggers, journalists or media activists who want to learn more about how they can protect themselves and support others. If you or someone you are assisting is experiencing a digital emergency, the Digital First Aid Kit will guide you in diagnosing the issues you are facing, and refer you to support providers for further help if needed.&lt;br /&gt;
&lt;br /&gt;
[https://communitydocs.accessnow.org/ &#039;&#039;&#039;Access Now Help Desk documentation&#039;&#039;&#039;]&lt;br /&gt;
&lt;br /&gt;
[https://cyber-star.org/ &#039;&#039;&#039;CyberSTAR&#039;&#039;&#039;], by SecDev, makes it easier for small organizations and individuals to understand and manage digital safety by organizing it around six themes. This site presents learning resources to help you be safer online—plus teaching resources for digital safety trainers.&lt;br /&gt;
&lt;br /&gt;
[https://totem-project.org/ &#039;&#039;&#039;Totem project&#039;&#039;&#039;] - Developed in collaboration by Greenhost and Free Press Unlimited, Totem is a &#039;&#039;&#039;free&#039;&#039;&#039; &#039;&#039;&#039;online learning platform&#039;&#039;&#039; that offers educational courses about digital security and privacy, and related tools and tactics for journalists, activists and human rights defenders in a safe, online classroom environment.&lt;br /&gt;
&lt;br /&gt;
[https://advocacyassembly.org/en/courses?category=1 &#039;&#039;&#039;Advocacy Assembly&#039;&#039;&#039; online courses related to digital security] - Advocacy Assembly is a &#039;&#039;&#039;free e-learning platform&#039;&#039;&#039; featuring dozens of courses for human rights activists, campaigners and journalists.&lt;br /&gt;
&lt;br /&gt;
[https://www.saferedge.com/learning &#039;&#039;&#039;Safer Edge&#039;&#039;&#039; online courses] (not free) - Safer Edge works with security, safeguarding and risk advisory professionals with a wide range of expertise, skills and experience. Team and consultants have experience working internationally in the humanitarian and development contexts in a range of risk contexts. In-house team speaks English, French, Spanish, Portuguese, Arabic and Russian.&lt;br /&gt;
&lt;br /&gt;
[https://academy.amnesty.org/ &#039;&#039;&#039;Amnesty International&#039;s Human Rights Academy&#039;&#039;&#039;] is a free online learning platform that allows participants to embark on a self-paced learning journey to understand the principles of human rights and how to use them as a tool for positive change. We believe that knowledge of rights is essential for claiming them, defending them, and promoting them and hope that our courses will inspire you to take action.&lt;/div&gt;</summary>
		<author><name>Kristin1</name></author>
	</entry>
	<entry>
		<id>https://wiki.digitalrights.community/index.php?title=Security_resources_organized_by_topic&amp;diff=52246</id>
		<title>Security resources organized by topic</title>
		<link rel="alternate" type="text/html" href="https://wiki.digitalrights.community/index.php?title=Security_resources_organized_by_topic&amp;diff=52246"/>
		<updated>2024-11-07T17:11:31Z</updated>

		<summary type="html">&lt;p&gt;Kristin1: /* Resource collections */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Building awareness of how we respond to threat and stress ==&lt;br /&gt;
&#039;&#039;Developing a useful security strategy is heavily dependent on our perception – we need to be able to identify and analyse threats in order to implement ways of avoiding or reducing them. But we all perceive the world around us differently based on our circumstances, experiences and many other factors. As a result, our perception can sometimes be hindered: threats which may be evident to some people may go unrecognised by others; similarly, we also need to be able to tell the difference between threats which are genuinely possible and those which we falsely perceive, called &#039;unfounded fears&#039;. It&#039;s a good idea to become familiar with factors that condition our perceptions of threat, and consider ways that we can take these into account in our security planning.&#039;&#039; (Source: [https://holistic-security.tacticaltech.org/chapters/prepare/1-2-individual-responses-to-threat.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Resources:&lt;br /&gt;
&lt;br /&gt;
* [https://holistic-security.tacticaltech.org/chapters/prepare/1-2-individual-responses-to-threat.html &#039;&#039;&#039;Exploring individual responses to threat&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
* [https://holistic-security.tacticaltech.org/chapters/prepare/1-4-team-and-peer-responses-to-threat.html &#039;&#039;&#039;Exploring group responses to threat&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
* [https://holistic-security.tacticaltech.org/chapters/prepare/1-5-communicating-about-threats-in-teams-and-organisations.html &#039;&#039;&#039;Communicating about security in teams and organizations&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
&lt;br /&gt;
== Understanding our threats and context ==&lt;br /&gt;
&lt;br /&gt;
=== Situation monitoring and analysis ===&lt;br /&gt;
Situation monitoring and analysis is the broadest kind of analysis of our context: observing the political, economic, social, technological, legal and environmental developments in society which are relevant to our work, and may impact our security situation. (Source: [https://holistic-security.tacticaltech.org/chapters/explore/2-2-situation-monitoring-and-analysis.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Exercise: [https://holistic-security.tacticaltech.org/exercises/explore/situational-monitoring-a-quick-pestle-analysis.html &#039;&#039;&#039;Pestle analysis&#039;&#039;&#039;] (Holistic Security Manual) &lt;br /&gt;
&lt;br /&gt;
Tool: &#039;&#039;&#039;[https://tnr-research.uwazi.io/ Research Database on transnational repression]&#039;&#039;&#039; - This collection of research reports on transnational repression can help human rights defenders better understand: &lt;br /&gt;
&lt;br /&gt;
* Transnational Repression (TNR) threats that are possible, to determine appropriate mitigation techniques&lt;br /&gt;
* Which TNR threats are unlikely, in order to alleviate fear&lt;br /&gt;
* What exiled HRDs can expect from a host country in terms of protection measures&lt;br /&gt;
* Existing campaigns to strengthen protection for exiled HRDs&lt;br /&gt;
&lt;br /&gt;
=== Identifying, analyzing and prioritizing threats ===&lt;br /&gt;
&lt;br /&gt;
==== Map the actors ====&lt;br /&gt;
&#039;&#039;It is valuable to get a clear picture of all the actors in our environment (individuals, institutions, organizations, etc). Threats almost always come from someone or something. Knowing as much as we can about the actors in our context improves our perception of our environment and thereby, our ability to carry out activities to maintain or expand our space for work.&#039;&#039; (Source: [https://holistic-security.tacticaltech.org/chapters/explore/2-3-vision-strategy-and-actors.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Exercise:&lt;br /&gt;
&lt;br /&gt;
* [https://holistic-security.tacticaltech.org/exercises/explore/visual-actor-mapping-part-1.html &#039;&#039;&#039;Spectrum of allies&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
* [https://newtactics.org/resource/exercises-identifying-allies-opponents &#039;&#039;&#039;Spectrum of allies&#039;&#039;&#039;] (New Tactics in Human Rights project)&lt;br /&gt;
&lt;br /&gt;
==== Brainstorm threats ====&lt;br /&gt;
This exercise is a first attempt at identifying the threats to yourself, your group or organization and your work in defense of human rights. This initial list of threats can then be refined so as to focus in more depth on the threats which are most likely or potentially most harmful. (Source: [https://holistic-security.tacticaltech.org/exercises/explore/threat-brainstorm.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Exercise: [https://holistic-security.tacticaltech.org/exercises/explore/threat-brainstorm.html &#039;&#039;&#039;Threat brainstorm&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
&lt;br /&gt;
==== Analyzing risk, prioritizing threats ====&lt;br /&gt;
Threats can be viewed and categorized in light of the following: the likelihood that the threat will take place, and the impact if and when it does. Likelihood and impact are concepts which help us determine risk: the higher the likelihood or impact of a threat, the higher the risk. Categorizing threats can help to keep us from feeling overwhelmed and keep our perception of threats realistic. (Source: [https://holistic-security.tacticaltech.org/chapters/explore/2-8-identifying-and-analysing-threats.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Exercise: [https://holistic-security.tacticaltech.org/chapters/explore/2-8-identifying-and-analysing-threats.html &#039;&#039;&#039;Threat matrix&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
&lt;br /&gt;
Tools:&lt;br /&gt;
&lt;br /&gt;
* The Ford Foundation’s [https://www.fordfoundation.org/work/our-grants/building-institutions-and-networks/cybersecurity-assessment-tool/ &#039;&#039;&#039;Cybersecurity Assessment Tool (CAT)&#039;&#039;&#039;] is designed to measure the maturity, resiliency, and strength of an organization’s cybersecurity efforts. We have created this questionnaire with busy nontechnical grant makers, grantee partners, civil society organizations, and nonprofits in mind, and we hope it helps shine some light on a recommended path forward for any organization undertaking a cybersecurity journey&lt;br /&gt;
&lt;br /&gt;
==== Analyze threats ====&lt;br /&gt;
This exercise will help you prioritize threats and divine the causes, ramifications, sources as well as the required resources, existing actions and possible next steps.&lt;br /&gt;
&lt;br /&gt;
Exercise: [https://holistic-security.tacticaltech.org/exercises/explore/threat-inventory.html &#039;&#039;&#039;Threat inventory&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
&lt;br /&gt;
== Risk mitigation ==&lt;br /&gt;
In order to build a response to the threats we face, we can consider them in terms of the factors which make us more or less susceptible to them. Read more in [https://holistic-security.tacticaltech.org/chapters/strategise/3-1-responding-to-threats.html this chapter of the Holistic Security Manual]. &lt;br /&gt;
&lt;br /&gt;
=== Mitigation techniques for common threats to information ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
! Threat&lt;br /&gt;
!Mitigation techniques and links to guidance &lt;br /&gt;
|-&lt;br /&gt;
|Data loss&lt;br /&gt;
|&lt;br /&gt;
* [[Ways to securely store and share files|Have your information securely in the cloud or on a server]]&lt;br /&gt;
* Have a backup process&lt;br /&gt;
|-&lt;br /&gt;
|Compromised accounts&lt;br /&gt;
|&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa|Use two factor authentication for all accounts]]&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa|Use unique, complex passwords for all accounts]]&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa|Use a password manager to create, store and protect those passwords]]&lt;br /&gt;
|-&lt;br /&gt;
|Device inspection at checkpoints&lt;br /&gt;
|&lt;br /&gt;
* [[Use a secure messaging app#Tip: use automatic disappearing messages|Use automated disappearing messages on your messaging apps]]&lt;br /&gt;
* [[Ways to securely store and share files|Have your sensitive information stored safely in the cloud and off of your device]]&lt;br /&gt;
* Hide or delete any apps that would provide access to this information (you can restore that app later)&lt;br /&gt;
|-&lt;br /&gt;
|Device confiscation or theft&lt;br /&gt;
|&lt;br /&gt;
* [[Secure your devices#Full disk encryption|Encrypt your devices]]&lt;br /&gt;
* And, review and adapt the same advice above for “device inspection” threat&lt;br /&gt;
|-&lt;br /&gt;
|Information handover&lt;br /&gt;
|&lt;br /&gt;
* [[Trusted hosting companies in the human rights community|Host your information with a company you trust]], who will not turn over information to your opponents (via subpoena, request, etc)&lt;br /&gt;
|-&lt;br /&gt;
|Targeted malware or spyware&lt;br /&gt;
|&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa#Be aware of spear phishing attacks|Protect yourselves against (spear) phishing attacks]]&lt;br /&gt;
* Use a second device for sensitive activities&lt;br /&gt;
* [[How to mitigate your risk of being subject to Pegasus surveillance|Restart your device regularly to disrupt spyware]]&lt;br /&gt;
* [[Secure your devices|Use anti virus]]&lt;br /&gt;
* [[How to mitigate your risk of being subject to Pegasus surveillance]], and other spyware&lt;br /&gt;
|-&lt;br /&gt;
|Surveillance and monitoring&lt;br /&gt;
|&lt;br /&gt;
* [[Safe internet browsing using VPN and Tor browser|Use a VPN and/or Tor browser]]&lt;br /&gt;
* [[Use a secure messaging app]]&lt;br /&gt;
* [[How to collect and store information in a secure way]]&lt;br /&gt;
* [[Ways to securely store and share files|How to use Google Drive safely and alternatives to Google Drive]]&lt;br /&gt;
|-&lt;br /&gt;
|Website hacking and takeover&lt;br /&gt;
|&lt;br /&gt;
* [[Protect your website|Protect your website from DDOS attacks]]&lt;br /&gt;
* [[Trusted hosting companies in the human rights community|Use a host company that you trust]]&lt;br /&gt;
* And, review and adapt the same advice above for &amp;quot;compromised accounts&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
Other important considerations when collecting, storing, using sensitive information:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Consideration&lt;br /&gt;
!Resources&lt;br /&gt;
|-&lt;br /&gt;
|Make sure you have informed consent from the people you are collecting information&lt;br /&gt;
|[[Guidance on informed consent]]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
* [[Information Security for Human Rights Defenders]]&lt;br /&gt;
&lt;br /&gt;
===Mitigation techniques for online harassment===&lt;br /&gt;
[[How to deal with online harassment and threats]]&lt;br /&gt;
&lt;br /&gt;
==Security planning ==&lt;br /&gt;
Once we have clarity about the threats we face during our activities, we can begin to organize our security protocols into security plans or agreements. There are three main areas to consider when developing any security plans: &lt;br /&gt;
&lt;br /&gt;
# &#039;&#039;&#039;PREPARE: Prevention of threats&#039;&#039;&#039; - Most security plans will include tactics which aim to prevent identified threats from taking place (i.e. reducing their likelihood). This will include:&lt;br /&gt;
## Identify &amp;amp; assess the threats and your vulnerabilities&lt;br /&gt;
## Develop security policies and procedures&lt;br /&gt;
## Implement preventive measures&lt;br /&gt;
## Invest in Security Awareness Programs&lt;br /&gt;
## Conduct Security testing&lt;br /&gt;
# &#039;&#039;&#039;RESPOND: Emergency responses&#039;&#039;&#039; - Emergency plans, also called contingency plans, are the actions which we take in response to a threat becoming a reality. This will include:&lt;br /&gt;
## Build Incident Response Plan&lt;br /&gt;
## Communication Strategy&lt;br /&gt;
## Business continuity plan&lt;br /&gt;
## Disaster recovery plan (Data Backups and Recovery)&lt;br /&gt;
## Communication and Collaboration&lt;br /&gt;
# &#039;&#039;&#039;TREAT: Well-being considerations&#039;&#039;&#039; - Actions we take to maintain our physical energy and a mindful approach to our work and our security –it may include such considerations as where and when we will eat, sleep, relax and enjoy ourselves in the course of our work. This will include: &lt;br /&gt;
## Analyze lessons learned&lt;br /&gt;
## Recovery and Remediation&lt;br /&gt;
## Psychological safety considerations,&lt;br /&gt;
## Review and update your security plans and approach&lt;br /&gt;
For more information, read &#039;&#039;&#039;[[General guidance for creating security plans and agreements]]&#039;&#039;&#039; and review [https://holistic-security.tacticaltech.org/chapters/strategise/3-3-creating-security-plans-and-agreements.html this chapter of the Holistic Security Manual]. &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Additional resources:  &lt;br /&gt;
&lt;br /&gt;
* Consumer Reports [https://securityplanner.consumerreports.org/ &#039;&#039;&#039;Security Planner&#039;&#039;&#039;] is a free, easy-to-use guide to staying safer online. It provides personalized recommendations and expert advice on topics such as keeping social media accounts from being hacked, locking down devices ranging from smartphones to home security cameras, and reducing intrusive tracking by websites.&lt;br /&gt;
* [https://www.nist.gov/itl/smallbusinesscyber/nist-cybersecurity-framework-0 &#039;&#039;&#039;NIST Cybersecurity Framework 2.0&#039;&#039;&#039;]:  Small Business Quick Start Guide - provides small-to-medium sized businesses (SMB), specifically those who have modest or no cybersecurity plans in place, with considerations to kick-start their cybersecurity risk management strategy using the NIST Cybersecurity Framework (CSF) 2.0. (by the &#039;&#039;National Institute of Standards and Technology)&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Security planning on specific topics===&lt;br /&gt;
&lt;br /&gt;
* [[General tips for international travel]]&lt;br /&gt;
* [[General tips for home security]]&lt;br /&gt;
&lt;br /&gt;
== Building a culture of security within a team ==&lt;br /&gt;
[https://level-up.cc/ &#039;&#039;&#039;LevelUp&#039;&#039;&#039;] is a collection of resources for the global digital safety training community.&lt;br /&gt;
&lt;br /&gt;
[https://wiki.orgsec.community/ &#039;&#039;&#039;Organisational security community wiki&#039;&#039;&#039;] is a resource created by and for security practitioners from all backgrounds to share useful resources and document innovative approaches to long-term security work. &lt;br /&gt;
&lt;br /&gt;
==Resource collections related to security ==&lt;br /&gt;
[https://digitalfirstaid.org/ &#039;&#039;&#039;Digital First Aid Kit&#039;&#039;&#039;] - The Digital First Aid Kit is a free resource to help rapid responders, digital security trainers, and tech-savvy activists to better protect themselves and the communities they support against the most common types of digital emergencies. It can also be used by activists, human rights defenders, bloggers, journalists or media activists who want to learn more about how they can protect themselves and support others. If you or someone you are assisting is experiencing a digital emergency, the Digital First Aid Kit will guide you in diagnosing the issues you are facing, and refer you to support providers for further help if needed.&lt;br /&gt;
&lt;br /&gt;
[https://communitydocs.accessnow.org/ &#039;&#039;&#039;Access Now Help Desk documentation&#039;&#039;&#039;]&lt;br /&gt;
&lt;br /&gt;
[https://cyber-star.org/ &#039;&#039;&#039;CyberSTAR&#039;&#039;&#039;], by SecDev, makes it easier for small organizations and individuals to understand and manage digital safety by organizing it around six themes. This site presents learning resources to help you be safer online—plus teaching resources for digital safety trainers.&lt;br /&gt;
&lt;br /&gt;
[https://totem-project.org/ &#039;&#039;&#039;Totem project&#039;&#039;&#039;] - Developed in collaboration by Greenhost and Free Press Unlimited, Totem is a &#039;&#039;&#039;free&#039;&#039;&#039; &#039;&#039;&#039;online learning platform&#039;&#039;&#039; that offers educational courses about digital security and privacy, and related tools and tactics for journalists, activists and human rights defenders in a safe, online classroom environment.&lt;br /&gt;
&lt;br /&gt;
[https://advocacyassembly.org/en/courses?category=1 &#039;&#039;&#039;Advocacy Assembly&#039;&#039;&#039; online courses related to digital security] - Advocacy Assembly is a &#039;&#039;&#039;free e-learning platform&#039;&#039;&#039; featuring dozens of courses for human rights activists, campaigners and journalists.&lt;br /&gt;
&lt;br /&gt;
[https://www.saferedge.com/learning &#039;&#039;&#039;Safer Edge&#039;&#039;&#039; online courses] (not free) - Safer Edge works with security, safeguarding and risk advisory professionals with a wide range of expertise, skills and experience. Team and consultants have experience working internationally in the humanitarian and development contexts in a range of risk contexts. In-house team speaks English, French, Spanish, Portuguese, Arabic and Russian.&lt;/div&gt;</summary>
		<author><name>Kristin1</name></author>
	</entry>
	<entry>
		<id>https://wiki.digitalrights.community/index.php?title=Security_resources_organized_by_topic&amp;diff=52245</id>
		<title>Security resources organized by topic</title>
		<link rel="alternate" type="text/html" href="https://wiki.digitalrights.community/index.php?title=Security_resources_organized_by_topic&amp;diff=52245"/>
		<updated>2024-11-07T17:11:11Z</updated>

		<summary type="html">&lt;p&gt;Kristin1: /* Resource collections */ added online resource collections&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Building awareness of how we respond to threat and stress ==&lt;br /&gt;
&#039;&#039;Developing a useful security strategy is heavily dependent on our perception – we need to be able to identify and analyse threats in order to implement ways of avoiding or reducing them. But we all perceive the world around us differently based on our circumstances, experiences and many other factors. As a result, our perception can sometimes be hindered: threats which may be evident to some people may go unrecognised by others; similarly, we also need to be able to tell the difference between threats which are genuinely possible and those which we falsely perceive, called &#039;unfounded fears&#039;. It&#039;s a good idea to become familiar with factors that condition our perceptions of threat, and consider ways that we can take these into account in our security planning.&#039;&#039; (Source: [https://holistic-security.tacticaltech.org/chapters/prepare/1-2-individual-responses-to-threat.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Resources:&lt;br /&gt;
&lt;br /&gt;
* [https://holistic-security.tacticaltech.org/chapters/prepare/1-2-individual-responses-to-threat.html &#039;&#039;&#039;Exploring individual responses to threat&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
* [https://holistic-security.tacticaltech.org/chapters/prepare/1-4-team-and-peer-responses-to-threat.html &#039;&#039;&#039;Exploring group responses to threat&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
* [https://holistic-security.tacticaltech.org/chapters/prepare/1-5-communicating-about-threats-in-teams-and-organisations.html &#039;&#039;&#039;Communicating about security in teams and organizations&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
&lt;br /&gt;
== Understanding our threats and context ==&lt;br /&gt;
&lt;br /&gt;
=== Situation monitoring and analysis ===&lt;br /&gt;
Situation monitoring and analysis is the broadest kind of analysis of our context: observing the political, economic, social, technological, legal and environmental developments in society which are relevant to our work, and may impact our security situation. (Source: [https://holistic-security.tacticaltech.org/chapters/explore/2-2-situation-monitoring-and-analysis.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Exercise: [https://holistic-security.tacticaltech.org/exercises/explore/situational-monitoring-a-quick-pestle-analysis.html &#039;&#039;&#039;Pestle analysis&#039;&#039;&#039;] (Holistic Security Manual) &lt;br /&gt;
&lt;br /&gt;
Tool: &#039;&#039;&#039;[https://tnr-research.uwazi.io/ Research Database on transnational repression]&#039;&#039;&#039; - This collection of research reports on transnational repression can help human rights defenders better understand: &lt;br /&gt;
&lt;br /&gt;
* Transnational Repression (TNR) threats that are possible, to determine appropriate mitigation techniques&lt;br /&gt;
* Which TNR threats are unlikely, in order to alleviate fear&lt;br /&gt;
* What exiled HRDs can expect from a host country in terms of protection measures&lt;br /&gt;
* Existing campaigns to strengthen protection for exiled HRDs&lt;br /&gt;
&lt;br /&gt;
=== Identifying, analyzing and prioritizing threats ===&lt;br /&gt;
&lt;br /&gt;
==== Map the actors ====&lt;br /&gt;
&#039;&#039;It is valuable to get a clear picture of all the actors in our environment (individuals, institutions, organizations, etc). Threats almost always come from someone or something. Knowing as much as we can about the actors in our context improves our perception of our environment and thereby, our ability to carry out activities to maintain or expand our space for work.&#039;&#039; (Source: [https://holistic-security.tacticaltech.org/chapters/explore/2-3-vision-strategy-and-actors.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Exercise:&lt;br /&gt;
&lt;br /&gt;
* [https://holistic-security.tacticaltech.org/exercises/explore/visual-actor-mapping-part-1.html &#039;&#039;&#039;Spectrum of allies&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
* [https://newtactics.org/resource/exercises-identifying-allies-opponents &#039;&#039;&#039;Spectrum of allies&#039;&#039;&#039;] (New Tactics in Human Rights project)&lt;br /&gt;
&lt;br /&gt;
==== Brainstorm threats ====&lt;br /&gt;
This exercise is a first attempt at identifying the threats to yourself, your group or organization and your work in defense of human rights. This initial list of threats can then be refined so as to focus in more depth on the threats which are most likely or potentially most harmful. (Source: [https://holistic-security.tacticaltech.org/exercises/explore/threat-brainstorm.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Exercise: [https://holistic-security.tacticaltech.org/exercises/explore/threat-brainstorm.html &#039;&#039;&#039;Threat brainstorm&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
&lt;br /&gt;
==== Analyzing risk, prioritizing threats ====&lt;br /&gt;
Threats can be viewed and categorized in light of the following: the likelihood that the threat will take place, and the impact if and when it does. Likelihood and impact are concepts which help us determine risk: the higher the likelihood or impact of a threat, the higher the risk. Categorizing threats can help to keep us from feeling overwhelmed and keep our perception of threats realistic. (Source: [https://holistic-security.tacticaltech.org/chapters/explore/2-8-identifying-and-analysing-threats.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Exercise: [https://holistic-security.tacticaltech.org/chapters/explore/2-8-identifying-and-analysing-threats.html &#039;&#039;&#039;Threat matrix&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
&lt;br /&gt;
Tools:&lt;br /&gt;
&lt;br /&gt;
* The Ford Foundation’s [https://www.fordfoundation.org/work/our-grants/building-institutions-and-networks/cybersecurity-assessment-tool/ &#039;&#039;&#039;Cybersecurity Assessment Tool (CAT)&#039;&#039;&#039;] is designed to measure the maturity, resiliency, and strength of an organization’s cybersecurity efforts. We have created this questionnaire with busy nontechnical grant makers, grantee partners, civil society organizations, and nonprofits in mind, and we hope it helps shine some light on a recommended path forward for any organization undertaking a cybersecurity journey&lt;br /&gt;
&lt;br /&gt;
==== Analyze threats ====&lt;br /&gt;
This exercise will help you prioritize threats and divine the causes, ramifications, sources as well as the required resources, existing actions and possible next steps.&lt;br /&gt;
&lt;br /&gt;
Exercise: [https://holistic-security.tacticaltech.org/exercises/explore/threat-inventory.html &#039;&#039;&#039;Threat inventory&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
&lt;br /&gt;
== Risk mitigation ==&lt;br /&gt;
In order to build a response to the threats we face, we can consider them in terms of the factors which make us more or less susceptible to them. Read more in [https://holistic-security.tacticaltech.org/chapters/strategise/3-1-responding-to-threats.html this chapter of the Holistic Security Manual]. &lt;br /&gt;
&lt;br /&gt;
=== Mitigation techniques for common threats to information ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
! Threat&lt;br /&gt;
!Mitigation techniques and links to guidance &lt;br /&gt;
|-&lt;br /&gt;
|Data loss&lt;br /&gt;
|&lt;br /&gt;
* [[Ways to securely store and share files|Have your information securely in the cloud or on a server]]&lt;br /&gt;
* Have a backup process&lt;br /&gt;
|-&lt;br /&gt;
|Compromised accounts&lt;br /&gt;
|&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa|Use two factor authentication for all accounts]]&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa|Use unique, complex passwords for all accounts]]&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa|Use a password manager to create, store and protect those passwords]]&lt;br /&gt;
|-&lt;br /&gt;
|Device inspection at checkpoints&lt;br /&gt;
|&lt;br /&gt;
* [[Use a secure messaging app#Tip: use automatic disappearing messages|Use automated disappearing messages on your messaging apps]]&lt;br /&gt;
* [[Ways to securely store and share files|Have your sensitive information stored safely in the cloud and off of your device]]&lt;br /&gt;
* Hide or delete any apps that would provide access to this information (you can restore that app later)&lt;br /&gt;
|-&lt;br /&gt;
|Device confiscation or theft&lt;br /&gt;
|&lt;br /&gt;
* [[Secure your devices#Full disk encryption|Encrypt your devices]]&lt;br /&gt;
* And, review and adapt the same advice above for “device inspection” threat&lt;br /&gt;
|-&lt;br /&gt;
|Information handover&lt;br /&gt;
|&lt;br /&gt;
* [[Trusted hosting companies in the human rights community|Host your information with a company you trust]], who will not turn over information to your opponents (via subpoena, request, etc)&lt;br /&gt;
|-&lt;br /&gt;
|Targeted malware or spyware&lt;br /&gt;
|&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa#Be aware of spear phishing attacks|Protect yourselves against (spear) phishing attacks]]&lt;br /&gt;
* Use a second device for sensitive activities&lt;br /&gt;
* [[How to mitigate your risk of being subject to Pegasus surveillance|Restart your device regularly to disrupt spyware]]&lt;br /&gt;
* [[Secure your devices|Use anti virus]]&lt;br /&gt;
* [[How to mitigate your risk of being subject to Pegasus surveillance]], and other spyware&lt;br /&gt;
|-&lt;br /&gt;
|Surveillance and monitoring&lt;br /&gt;
|&lt;br /&gt;
* [[Safe internet browsing using VPN and Tor browser|Use a VPN and/or Tor browser]]&lt;br /&gt;
* [[Use a secure messaging app]]&lt;br /&gt;
* [[How to collect and store information in a secure way]]&lt;br /&gt;
* [[Ways to securely store and share files|How to use Google Drive safely and alternatives to Google Drive]]&lt;br /&gt;
|-&lt;br /&gt;
|Website hacking and takeover&lt;br /&gt;
|&lt;br /&gt;
* [[Protect your website|Protect your website from DDOS attacks]]&lt;br /&gt;
* [[Trusted hosting companies in the human rights community|Use a host company that you trust]]&lt;br /&gt;
* And, review and adapt the same advice above for &amp;quot;compromised accounts&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
Other important considerations when collecting, storing, using sensitive information:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Consideration&lt;br /&gt;
!Resources&lt;br /&gt;
|-&lt;br /&gt;
|Make sure you have informed consent from the people you are collecting information&lt;br /&gt;
|[[Guidance on informed consent]]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
* [[Information Security for Human Rights Defenders]]&lt;br /&gt;
&lt;br /&gt;
===Mitigation techniques for online harassment===&lt;br /&gt;
[[How to deal with online harassment and threats]]&lt;br /&gt;
&lt;br /&gt;
==Security planning ==&lt;br /&gt;
Once we have clarity about the threats we face during our activities, we can begin to organize our security protocols into security plans or agreements. There are three main areas to consider when developing any security plans: &lt;br /&gt;
&lt;br /&gt;
# &#039;&#039;&#039;PREPARE: Prevention of threats&#039;&#039;&#039; - Most security plans will include tactics which aim to prevent identified threats from taking place (i.e. reducing their likelihood). This will include:&lt;br /&gt;
## Identify &amp;amp; assess the threats and your vulnerabilities&lt;br /&gt;
## Develop security policies and procedures&lt;br /&gt;
## Implement preventive measures&lt;br /&gt;
## Invest in Security Awareness Programs&lt;br /&gt;
## Conduct Security testing&lt;br /&gt;
# &#039;&#039;&#039;RESPOND: Emergency responses&#039;&#039;&#039; - Emergency plans, also called contingency plans, are the actions which we take in response to a threat becoming a reality. This will include:&lt;br /&gt;
## Build Incident Response Plan&lt;br /&gt;
## Communication Strategy&lt;br /&gt;
## Business continuity plan&lt;br /&gt;
## Disaster recovery plan (Data Backups and Recovery)&lt;br /&gt;
## Communication and Collaboration&lt;br /&gt;
# &#039;&#039;&#039;TREAT: Well-being considerations&#039;&#039;&#039; - Actions we take to maintain our physical energy and a mindful approach to our work and our security –it may include such considerations as where and when we will eat, sleep, relax and enjoy ourselves in the course of our work. This will include: &lt;br /&gt;
## Analyze lessons learned&lt;br /&gt;
## Recovery and Remediation&lt;br /&gt;
## Psychological safety considerations,&lt;br /&gt;
## Review and update your security plans and approach&lt;br /&gt;
For more information, read &#039;&#039;&#039;[[General guidance for creating security plans and agreements]]&#039;&#039;&#039; and review [https://holistic-security.tacticaltech.org/chapters/strategise/3-3-creating-security-plans-and-agreements.html this chapter of the Holistic Security Manual]. &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Additional resources:  &lt;br /&gt;
&lt;br /&gt;
* Consumer Reports [https://securityplanner.consumerreports.org/ &#039;&#039;&#039;Security Planner&#039;&#039;&#039;] is a free, easy-to-use guide to staying safer online. It provides personalized recommendations and expert advice on topics such as keeping social media accounts from being hacked, locking down devices ranging from smartphones to home security cameras, and reducing intrusive tracking by websites.&lt;br /&gt;
* [https://www.nist.gov/itl/smallbusinesscyber/nist-cybersecurity-framework-0 &#039;&#039;&#039;NIST Cybersecurity Framework 2.0&#039;&#039;&#039;]:  Small Business Quick Start Guide - provides small-to-medium sized businesses (SMB), specifically those who have modest or no cybersecurity plans in place, with considerations to kick-start their cybersecurity risk management strategy using the NIST Cybersecurity Framework (CSF) 2.0. (by the &#039;&#039;National Institute of Standards and Technology)&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Security planning on specific topics===&lt;br /&gt;
&lt;br /&gt;
* [[General tips for international travel]]&lt;br /&gt;
* [[General tips for home security]]&lt;br /&gt;
&lt;br /&gt;
== Building a culture of security within a team ==&lt;br /&gt;
[https://level-up.cc/ &#039;&#039;&#039;LevelUp&#039;&#039;&#039;] is a collection of resources for the global digital safety training community.&lt;br /&gt;
&lt;br /&gt;
[https://wiki.orgsec.community/ &#039;&#039;&#039;Organisational security community wiki&#039;&#039;&#039;] is a resource created by and for security practitioners from all backgrounds to share useful resources and document innovative approaches to long-term security work. &lt;br /&gt;
&lt;br /&gt;
==Resource collections ==&lt;br /&gt;
[https://digitalfirstaid.org/ &#039;&#039;&#039;Digital First Aid Kit&#039;&#039;&#039;] - The Digital First Aid Kit is a free resource to help rapid responders, digital security trainers, and tech-savvy activists to better protect themselves and the communities they support against the most common types of digital emergencies. It can also be used by activists, human rights defenders, bloggers, journalists or media activists who want to learn more about how they can protect themselves and support others. If you or someone you are assisting is experiencing a digital emergency, the Digital First Aid Kit will guide you in diagnosing the issues you are facing, and refer you to support providers for further help if needed.&lt;br /&gt;
&lt;br /&gt;
[https://communitydocs.accessnow.org/ &#039;&#039;&#039;Access Now Help Desk documentation&#039;&#039;&#039;]&lt;br /&gt;
&lt;br /&gt;
[https://cyber-star.org/ &#039;&#039;&#039;CyberSTAR&#039;&#039;&#039;], by SecDev, makes it easier for small organizations and individuals to understand and manage digital safety by organizing it around six themes. This site presents learning resources to help you be safer online—plus teaching resources for digital safety trainers.&lt;br /&gt;
&lt;br /&gt;
[https://totem-project.org/ &#039;&#039;&#039;Totem project&#039;&#039;&#039;] - Developed in collaboration by Greenhost and Free Press Unlimited, Totem is a &#039;&#039;&#039;free&#039;&#039;&#039; &#039;&#039;&#039;online learning platform&#039;&#039;&#039; that offers educational courses about digital security and privacy, and related tools and tactics for journalists, activists and human rights defenders in a safe, online classroom environment.&lt;br /&gt;
&lt;br /&gt;
[https://advocacyassembly.org/en/courses?category=1 &#039;&#039;&#039;Advocacy Assembly&#039;&#039;&#039; online courses related to digital security] - Advocacy Assembly is a &#039;&#039;&#039;free e-learning platform&#039;&#039;&#039; featuring dozens of courses for human rights activists, campaigners and journalists.&lt;br /&gt;
&lt;br /&gt;
[https://www.saferedge.com/learning &#039;&#039;&#039;Safer Edge&#039;&#039;&#039; online courses] (not free) - Safer Edge works with security, safeguarding and risk advisory professionals with a wide range of expertise, skills and experience. Team and consultants have experience working internationally in the humanitarian and development contexts in a range of risk contexts. In-house team speaks English, French, Spanish, Portuguese, Arabic and Russian.&lt;/div&gt;</summary>
		<author><name>Kristin1</name></author>
	</entry>
	<entry>
		<id>https://wiki.digitalrights.community/index.php?title=How_to_deal_with_online_harassment_and_threats&amp;diff=52206</id>
		<title>How to deal with online harassment and threats</title>
		<link rel="alternate" type="text/html" href="https://wiki.digitalrights.community/index.php?title=How_to_deal_with_online_harassment_and_threats&amp;diff=52206"/>
		<updated>2024-10-28T13:23:21Z</updated>

		<summary type="html">&lt;p&gt;Kristin1: /* Abusers and their tactics */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;The information below is used with permission from the Totem Project&#039;s online course on [https://learn.totem-project.org/courses/course-v1:IWMF+IWMF_OH_EN+001/about Know Your Trolls], in 2023.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Abusers and their tactics==&lt;br /&gt;
&amp;lt;p&amp;gt;Watch [https://www.youtube.com/watch?v=RJR466zSUhs this video] to get an understanding of the strategies used and the reason abusers use them.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Identifying common tactics ===&lt;br /&gt;
&amp;lt;p&amp;gt;Targets need a common language to describe what&amp;amp;rsquo;s happening to them, to friends, colleagues, editors, and law enforcement. You will learn more about how to define these tactics in the next exercise. You may find that abusers often use a combination of tactics to silence you online. Below are some common tactics and their definitions. &amp;lt;/p&amp;gt;&lt;br /&gt;
[[File:Image-common-tactics.png|border]]&lt;br /&gt;
&amp;lt;h3&amp;gt;More on doxxing&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Doxxing is a tactic used by online abusers as a way to intimidate and threaten journalists. Personal details, including a home address, are posted online with a call to others to use that information to harass and cause harm.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;This is a common tactic used by the far right as well as by members of certain interest groups, such as pro-life supporters. Having your home address circulated online by trolls means that an online attack has the possibility to turn into a physical threat as people now know where you live.&amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;There are steps you can take to remove and limit access to your personal information on the Internet. This will help to better protect you against doxxing. Learn more about this in the Totem course on [https://learn.totem-project.org/courses/course-v1:Totem+TP_IO_EN+001/about How to protect your identity online].&amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;You can also review these resources by [https://www.brightlin.es/ Brightlines] (shared via Creative Commons):&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Tips for Managing Your Online Presence&lt;br /&gt;
* Doxxing Scenario Planning&lt;br /&gt;
&lt;br /&gt;
== Mental health==&lt;br /&gt;
&amp;lt;p&amp;gt;Online harassment and abuse can take its toll on your mental health. There are steps you can take to protect yourself and reduce the impact of the abuse.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
    &amp;lt;li&amp;gt;Ask a colleague or friend to monitor your accounts so you do not have to be exposed to the abuse &amp;lt;/li&amp;gt;&lt;br /&gt;
    &amp;lt;li&amp;gt;Do not engage with trolls as this can make the situation worse. &amp;lt;/li&amp;gt;&lt;br /&gt;
    &amp;lt;li&amp;gt;Speak with your editor or colleagues about the abuse and make them aware of the situation.&amp;lt;/li&amp;gt;&lt;br /&gt;
    &amp;lt;li&amp;gt;Take care of yourself by looking after your body and mind.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Ways to fight back==&lt;br /&gt;
&amp;lt;h3&amp;gt;Documenting attacks&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;It can be important to document the abuse you are receiving online, especially if you feel there is a threat to your life. &amp;lt;strong&amp;gt;You should keep an evidence trail&amp;lt;/strong&amp;gt; to show your colleagues, editors or the authorities. This information can also be presented to international organizations who assist journalists, and they may be able to help you with your case.&amp;lt;/p&amp;gt;&lt;br /&gt;
*&amp;lt;strong&amp;gt;Keep a spreadsheet with details of the harassment&amp;lt;/strong&amp;gt;, including date, time and type of harassment. Include the medium through which the abuse happened, for example, direct message, and also note down the platform.&lt;br /&gt;
*&amp;lt;strong&amp;gt;Take screenshots of the abuse&amp;lt;/strong&amp;gt;. Ensure that you include, where possible, the name or handle of the abuser, the date and time, and the full content of the abuse. &amp;lt;strong&amp;gt;It&amp;amp;rsquo;s important to capture the whole message, the date, the name, and the handle/account name when collecting evidence about your abusers.&amp;lt;/strong&amp;gt; This will become important if you decide to contact the authorities or an organization that defends freedom of expression about your case.&lt;br /&gt;
* You may wish to &amp;lt;strong&amp;gt;ask someone to help you&amp;lt;/strong&amp;gt; do this if the abuse is taking its toll on your mental health. For example, ask a colleague to monitor your social media accounts and enlist their help in taking screenshots of the abuse.&lt;br /&gt;
* Before you start working on a story, &amp;lt;strong&amp;gt;think about the groups of people who could attack you&amp;lt;/strong&amp;gt; online as a result of publishing a story. Take steps to secure your data and your accounts: use strong and unique passwords, and protect yourself against phishing attacks.&amp;lt;h3 class=&amp;quot;mb-0 h3&amp;quot;&amp;gt;Blocking, muting, and reporting abuse&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;We have looked at how to document abuse. Now let&amp;amp;rsquo;s look at how to block, mute, and report your abuse.&amp;lt;/p&amp;gt;[[File:Image-blocking-muting.png]]&amp;lt;p&amp;gt;&amp;lt;strong&amp;gt;Tip:&amp;lt;/strong&amp;gt; When you block someone on a social media site it could mean that the content they posted will be deleted. Make sure you have documented the abuse before blocking anyone.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Blocking and muting on specific platforms====&lt;br /&gt;
&amp;lt;p&amp;gt;Learn more about blocking and muting different social media sites by visiting their guides. Below is a list of the most common social media sites.&amp;lt;/p&amp;gt;&lt;br /&gt;
    &amp;lt;blockquote&amp;gt;&lt;br /&gt;
        &amp;lt;ul&amp;gt;&lt;br /&gt;
            &amp;lt;li&amp;gt;[https://help.twitter.com/en/using-x#blocking-and-muting Twitter&amp;amp;rsquo;s guide to blocking and muting]&amp;lt;/li&amp;gt;&lt;br /&gt;
            &amp;lt;li&amp;gt;[https://www.facebook.com/help/1000976436606344 Facebook&amp;amp;rsquo;s guide to blocking]&amp;lt;/li&amp;gt;&lt;br /&gt;
            &amp;lt;li&amp;gt;[https://help.instagram.com/426700567389543 Instagram&amp;amp;rsquo;s guide to blocking] &amp;lt;/li&amp;gt;&lt;br /&gt;
            &amp;lt;li&amp;gt;[https://help.snapchat.com/hc/en-us/articles/7012410297364-How-to-Remove-a-Friend-on-Snapchat Snapchat&amp;amp;rsquo;s guide to blocking] &amp;lt;/li&amp;gt;&lt;br /&gt;
        &amp;lt;/ul&amp;gt;&lt;br /&gt;
    &amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Platforms and reporting harassment====&lt;br /&gt;
&amp;lt;p&amp;gt;Each platform has different policies around reporting online harassment that makes it challenging and frustrating for those trying to get something done about their online harassment. Know that you are not alone with this. It can help to keep a record of when you reported the harassment to the platform and what, if any, were the outcomes. You can add this to other evidence that you have collected about your harassers.&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;strong&amp;gt;Tip:&amp;lt;/strong&amp;gt; Platforms administrators are only likely to take down content if it violates their community guidelines or standards. Before reporting harassment to the platform, make sure you are familiar with their guidelines and what they will and will not remove. Use the guidelines to support your case for removing the content. Below is a list of the most common social media sites:&lt;br /&gt;
    &amp;lt;ul&amp;gt;&lt;br /&gt;
        &amp;lt;li&amp;gt;[https://transparency.fb.com/policies/community-standards/bullying-harassment/ Facebook&amp;amp;rsquo;s Community Standards on bullying and harassment]&amp;lt;/li&amp;gt;&lt;br /&gt;
        &amp;lt;li&amp;gt;[https://help.twitter.com/en/rules-and-policies/x-rules Twitter Rules] &amp;lt;/li&amp;gt;&lt;br /&gt;
    &amp;lt;/ul&amp;gt;&amp;lt;strong&amp;gt;If you are a freelance journalist or HRD&amp;lt;/strong&amp;gt; working without the support of a media outlet or if you are not supported by your workplace, then you should consider reaching out to other women journalists to create a support network. You should ask them to: &amp;lt;blockquote&amp;gt;&lt;br /&gt;
    &amp;lt;ul&amp;gt;&lt;br /&gt;
        &amp;lt;li&amp;gt; Help report abuse on the platforms&amp;lt;/li&amp;gt;&lt;br /&gt;
        &amp;lt;li&amp;gt; Help document the abuse&amp;lt;/li&amp;gt;&lt;br /&gt;
        &amp;lt;li&amp;gt; Monitor your social media and/or email accounts&amp;lt;/li&amp;gt;&lt;br /&gt;
        &amp;lt;li&amp;gt;Make a public statement of solidarity [TIP: Focus on condemning the behavior, not the abusers]&amp;lt;/li&amp;gt;&lt;br /&gt;
        &amp;lt;li&amp;gt;Rally a supportive community&amp;lt;/li&amp;gt;&lt;br /&gt;
        &amp;lt;li&amp;gt;Provide emotional support&amp;lt;/li&amp;gt;&lt;br /&gt;
    &amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&amp;lt;h2&amp;gt;More information and resources&amp;lt;/h2&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt; Resources for putting this into practice&amp;lt;/h3&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [https://open.nytimes.com/how-to-dox-yourself-on-the-internet-d2892b4c5954 How to Dox yourself on the Internet] by the New York Times&lt;br /&gt;
* [https://cpj.org/2019/09/digital-safety-remove-personal-data-internet/ Remove Personal Data from the Internet] by the Committee to Protect Journalists (CPJ)&lt;br /&gt;
* [https://onlineharassmentfieldmanual.pen.org/best-practices-for-employers/ Online Harassment Field Manual: Steps for Safeguarding Employees] by PEN America&lt;br /&gt;
* Blocking and Muting on Different Social Media Sites:&lt;br /&gt;
** [https://help.twitter.com/en/using-x#blocking-and-muting Twitter&amp;amp;rsquo;s guide to blocking and muting]&lt;br /&gt;
** [https://www.facebook.com/help/1000976436606344 Facebook&amp;amp;rsquo;s guide to blocking]&lt;br /&gt;
** [https://help.instagram.com/426700567389543 Instagram&amp;amp;rsquo;s guide to blocking]&lt;br /&gt;
** [https://help.snapchat.com/hc/en-us/articles/7012410297364-How-to-Remove-a-Friend-on-Snapchat Snapchat&amp;amp;rsquo;s guide to blocking]&lt;br /&gt;
&amp;lt;h3&amp;gt;Free online learning courses&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[https://advocacyassembly.org/en/courses/34/#/chapter/1/lesson/1 Recognising and Responding to Online Gender-Based Violence], a free online course by Advocacy Assembly and Association for Progressive Communications (APC)&lt;br /&gt;
&amp;lt;li&amp;gt;You will learn about different types of online gender-based violence, how it harms people, and how people are responding. You&#039;ll also learn effective strategies and digital safety steps.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[https://advocacyassembly.org/en/courses/43 Cyber harassment: Concepts and prevention] by Advocacy Assembly and Institute for War and Peace Reporting&lt;br /&gt;
&amp;lt;li&amp;gt;You will also learn some general digital security concepts, about metadata, and how to do safe online campaigning.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[https://advocacyassembly.org/en/courses/32 Staying Safe Online And Using Social Media] by Advocacy Assembly and Security First&lt;br /&gt;
&amp;lt;li&amp;gt;By the end of the course, you will be able to identify common causes of digital security breaches such as phishing and social engineering. Also how to implement basic precautions to protect from viruses and an stay safe online in repressive countries.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[https://learn.totem-project.org/courses/course-v1:Totem+TP_IO_EN+001/about How to protect your identity online] on the Totem Project&lt;br /&gt;
&amp;lt;li&amp;gt;By the end of this course, you will: Understand what anonymity is; Know what identifies you online; Understand why protecting your identity and that of others matters; Know what to do to protect your identity; Understand that achieving anonymity online is often very difficult. &lt;br /&gt;
&amp;lt;li&amp;gt;[https://learn.totem-project.org/courses/course-v1:IWMF+IWMF_OH_EN+001/about Know your trolls] on the Totem Project created by IWMF&lt;br /&gt;
&amp;lt;li&amp;gt;After completing this interactive course you will: Recognize types of online abusers and how they work together, Become more familiar with some of the tactics online abusers use, Be equipped with some key strategies for dealing with abuse&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;h3&amp;gt;Video resources&amp;lt;/h3&amp;gt;&lt;br /&gt;
&lt;br /&gt;
                    &amp;lt;ul&amp;gt;&lt;br /&gt;
                        &amp;lt;li&amp;gt;[https://www.youtube.com/watch?v=_KHEkR5yb9A The Problem with &amp;amp;ldquo;Don&amp;amp;rsquo;t Feed the Trolls&amp;amp;rdquo;] by Steph Guthrie, TEDxToronto &amp;lt;/li&amp;gt;&lt;br /&gt;
                        &amp;lt;li&amp;gt;[https://feministfrequency.com/2015/04/28/women-in-the-world-online-harassment-panel/ Stop the Trolls: Women Fight Online Harassment Panel] by Feminist Frequency&amp;lt;/li&amp;gt;&lt;br /&gt;
                        &amp;lt;li&amp;gt;[https://feministfrequency.com/video/anita-sarkeesian-speaking-at-xoxo-conference/ Anita Sarkeesian, Feminist Frequency] at XOXO Festival&amp;lt;/li&amp;gt;&lt;br /&gt;
                        &amp;lt;li&amp;gt;[https://newsrooms-ontheline.ipi.media/tutorials/block-3-basic-countermeasures-for-journalist-to-cope-with-online-harassment/ Basic Countermeasures for Journalists to Cope with Online Harassment] by IPI and the Dart Centre&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;[https://newsrooms-ontheline.ipi.media/tutorials_category/legal-remedies-on-addressing-online-harassment/ Legal Remedies to Address Online harassment] by International Press Institute (IPI)&amp;lt;/li&amp;gt;&lt;br /&gt;
                    &amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;Read&amp;lt;/h3&amp;gt;&lt;br /&gt;
&lt;br /&gt;
                    &amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;[https://www.iwmf.org/wp-content/uploads/2018/09/Attacks-and-Harassment.pdf Attacks and Harassment: The impact on female journalists and their reporting] [PDF] by the International Women&amp;amp;rsquo;s Media Foundation (IWMF)&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;[https://onlineharassmentfieldmanual.pen.org Online Harassment Field Manual] by Pen America&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;[https://www.takebackthetech.net Take Back the Tech] website&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;[https://rorypecktrust.org/how-we-help/freelance-resources/digital-security/social-media-trolling-and-doxxing/ Social Media: Trolling and Doxxing] by the Rory Peck Trust&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;[https://dartcenter.org/resources/dealing-hate-campaigns-toolkit-journalists Dealing with Hate Campaigns: Toolkit for Journalists] by the Dart Center&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;[https://gameshotline.org/online-free-safety-guide/ A Guide to Protecting Yourself During Online Harassment Attacks] by Feminist Frequency&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;[https://www.onlinesos.org/ OnlineSOS] is a non-profit organization connecting people with information and tools to take action in the face of online harassment&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;[https://gijn.org/resource/digital-security/ Digital Security Tips and Links to Organisations who can Assist] by the Global Investigative Journalism Network&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;[https://dartcenter.org/blog/2017/12/online-harassment-don%E2%80%99t-starve-trolls-control-them How to Manage Trolls and your Mental Health] by the Dart Centre&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;[https://onlineharassmentfieldmanual.pen.org/best-practices-for-allies-and-witnesses/ Tips for Allies and Witnesses] by PEN America&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;Totem course handouts:&amp;lt;ul&amp;gt;&lt;br /&gt;
                                        &amp;lt;li&amp;gt;[https://learn.totem-project.org/asset-v1:IWMF+IWMF_OH_EN+001+type@asset+block@IWMF-Totem_Infographic_AbuserStrategies.pdf Infographic on abuser Strategies] [PDF]&amp;lt;/li&amp;gt;&lt;br /&gt;
                                        &amp;lt;li&amp;gt;[https://learn.totem-project.org/asset-v1:IWMF+IWMF_OH_EN+001+type@asset+block@IWMF-Totem_Infographic_BlockingMuting.pdf Infographic on Muting and Blocking] [PDF]&amp;lt;/li&amp;gt;&lt;br /&gt;
                                        &amp;lt;li&amp;gt;[https://learn.totem-project.org/asset-v1:IWMF+IWMF_OH_EN+001+type@asset+block@IWMF-Totem_Infographic_StudyAbusers.pdf Infographic on Studying abusers] [PDF]&amp;lt;/li&amp;gt;&lt;br /&gt;
                                    &amp;lt;/ul&amp;gt;&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&lt;/div&gt;</summary>
		<author><name>Kristin1</name></author>
	</entry>
	<entry>
		<id>https://wiki.digitalrights.community/index.php?title=Building_a_trauma-informed_organization&amp;diff=52112</id>
		<title>Building a trauma-informed organization</title>
		<link rel="alternate" type="text/html" href="https://wiki.digitalrights.community/index.php?title=Building_a_trauma-informed_organization&amp;diff=52112"/>
		<updated>2024-10-07T12:26:12Z</updated>

		<summary type="html">&lt;p&gt;Kristin1: /* Articles */ added new articles&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Key principles of a trauma-informed approach ==&lt;br /&gt;
There are six key principles of a trauma-informed approach:&lt;br /&gt;
&lt;br /&gt;
# Safety&lt;br /&gt;
# Trustworthiness and transparency&lt;br /&gt;
# Peer support&lt;br /&gt;
# Collaboration and mutuality&lt;br /&gt;
# Empowerment, voice, and choice&lt;br /&gt;
# Cultural, historical, and gender issues&lt;br /&gt;
&lt;br /&gt;
=== Safety ===&lt;br /&gt;
Safety considers both the physical and emotional safety of staff and individuals with which we work. Physical safety can include:&lt;br /&gt;
&lt;br /&gt;
* Physical space for trainings&lt;br /&gt;
* Accessibility of work spaces&lt;br /&gt;
* Timing of workshops/training&lt;br /&gt;
&lt;br /&gt;
Emotional safety requires constant feedback from staff and individuals to ensure their physical safety needs are met. For instance, supervisors conduct regular check-ins to ask about workload, mental health, needs, etc.&lt;br /&gt;
&lt;br /&gt;
=== Trustworthiness and transparency ===&lt;br /&gt;
Trustworthiness and transparency involves providing clear information about what is being done, by whom, when, and why. This can include job descriptions, roles clarity, expectations. It also means maintaining respectful boundaries, prioritizing privacy and confidentiality. It can include:&lt;br /&gt;
&lt;br /&gt;
* Providing the people we work with the reports we write that involve them&lt;br /&gt;
* Involving the people we work with in decision-making about the project&lt;br /&gt;
* Providing a clear job description and expectations to staff&lt;br /&gt;
&lt;br /&gt;
=== Peer Support ===&lt;br /&gt;
Peer Support and mutual self-help establish safety, hope, trust. “Peers” refers to people who have shared experiences of trauma or stress. It also acknowledges that the trauma itself may be used as a galvanizing tool for action, solidarity, etc.&lt;br /&gt;
&lt;br /&gt;
=== Collaboration and mutuality ===&lt;br /&gt;
Collaboration and mutuality levels power differences between staff and those who we work with. It demonstrates that healing can happen in relationships and in meaningful sharing of power. The organization recognizes that everyone has an important role to play. It is the attitude of doing something “with” someone, not “to” or “for”. It emphasizes autonomy and agency.&lt;br /&gt;
&lt;br /&gt;
=== Empowerment, voice and choice ===&lt;br /&gt;
Empowerment, voice and choice requires the organization to place people above projects. The organization seeks to empower both staff and stakeholders. It allows those we work with decision-making power, a voice in our projects, the ability to say no without fear of punishment or ostracization. It also focuses on individual’s strengths over weaknesses.&lt;br /&gt;
&lt;br /&gt;
=== Cultural, historical and gender issues ===&lt;br /&gt;
Cultural, historical and gender issues involves the organization conscientiously acknowledging the role it has played in perpetuating harm (e.g. the aid sector or “international development” and the consequences of that) as well as structural forms of racism, ableism, sexism, etc. It moves past acknowledgement into action: how can we transform the organization and those within it to ensure that we are not upholding harmful stereotypes, world systems, or oppression?&lt;br /&gt;
&lt;br /&gt;
All six principles are intertwined and do not exist in a vacuum. They are interdependent. &lt;br /&gt;
&lt;br /&gt;
== What is a trauma-informed organization? ==&lt;br /&gt;
&amp;quot;A trauma-informed organization is one that operates with an understanding of trauma and its negative effects on the organization’s employees and the communities it serves and works to mitigate those effects.&amp;quot; (Source: [https://hbr.org/2022/03/we-need-trauma-informed-workplaces Harvard Business Review])&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Trauma-informed organizations are able to:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Realize the impact of trauma&lt;br /&gt;
* Recognize the signs and symptoms&lt;br /&gt;
* Respond by integrating this knowledge into policies, procedures, practices&lt;br /&gt;
* Resist re-traumatization&lt;br /&gt;
&lt;br /&gt;
== Recognize the signs and symptoms ==&lt;br /&gt;
&lt;br /&gt;
=== Physiological responses to threat ===&lt;br /&gt;
Humans, like all animals, have built-in responses to threats that have helped us survive as we’ve evolved as a species. When we perceive acute danger, many of these responses kick in without our being able to control them: they are hard-wired to our bodies and minds. &lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;The &#039;freeze response&#039;&#039;&#039;&#039; is when a person becomes utterly still while remaining highly alert and poised for action. This response relies on escaping notice until the danger has passed. For example, we might cease the work that we are doing, stop communicating through our usual channels, or reduce communication with someone with whom we are in conflict. In each case, we are hoping that the unwelcome attention will pass if we become inactive. &lt;br /&gt;
* &#039;&#039;&#039;The &#039;flight response&#039;&#039;&#039;&#039; is when a person quickly tries to get as far away from the danger as possible. We might move our operations to a safer location, abandon certain activities or modes of communication, or separate ourselves from people who might cause us harm. &lt;br /&gt;
* &#039;&#039;&#039;The &#039;comply response&#039;&#039;&#039;&#039; involves doing what an aggressor instructs in the hope that our cooperation will result in the attack ending quickly and without injury. We might agree to suspend or abandon certain objectives or activities, or give up passwords to secure information. &lt;br /&gt;
* &#039;&#039;&#039;The &#039;tend response&#039;&#039;&#039;&#039; happens when people try to protect other, more vulnerable people who are being victimized. Many human rights defenders are motivated to help others because of our own experiences of oppression and exploitation. &lt;br /&gt;
* &#039;&#039;&#039;The &#039;befriend response&#039;&#039;&#039;&#039; involves trying to build some kind of relationship with the aggressor in the hope that this will limit the harm perpetrated against oneself or others. For example, by telling aggressors about our families we might try to humanize ourselves in their eyes, a strategy that is sometimes useful in reducing violence. &lt;br /&gt;
* &#039;&#039;&#039;The &#039;posture response&#039;&#039;&#039;&#039; is an attempt to drive off the danger by pretending to have greater power than one actually does. As human rights defenders, we often threaten to expose threats of violence in order to publicly embarrass our adversaries. &lt;br /&gt;
* &#039;&#039;&#039;The &#039;fight response&#039;&#039;&#039;&#039; is when a person attacks with the intent of driving off or destroying an aggressor. (There are many ways to fight, and we all make our own ethical choices about this.) &lt;br /&gt;
&lt;br /&gt;
If we have been through dangerous, stressful or traumatic experiences, sometimes these reactions can kick in when we are stressed or frightened, even if there is no &#039;real&#039; danger present. Therefore, it is a good idea to look for indicators in our behavior when we are under stress, and to work with them in order to reduce our stress.&lt;br /&gt;
&lt;br /&gt;
(Source: [https://holistic-security.tacticaltech.org/ckeditor_assets/attachments/60/holisticsecurity_trainersmanual.pdf Holistic Security Training Manual], page 53)&lt;br /&gt;
&lt;br /&gt;
=== Group responses to threat ===&lt;br /&gt;
Threats and stress affect group dynamics in a number of ways, and this varies greatly due to organizational culture and many other factors. There are some common reactions, however. Consider these potential changes to group dynamics under stress and see if they resonate. &lt;br /&gt;
&lt;br /&gt;
# &amp;lt;u&amp;gt;&#039;&#039;&#039;Harder group boundaries&#039;&#039;&#039;&amp;lt;/u&amp;gt; - One predictable change experienced by groups under threat is the boundaries that define the group becoming less permeable. Those within the group become more closely connected to each other, and those outside the group become more distant. It also becomes more difficult for people to join or leave the group. While such changes can be protective, there are also some potential difficulties with this. The impermeable boundaries of the group may distance the group from existing and potential allies, leaving it more isolated than it might otherwise be. These boundaries also reduce the flow of information into and out of the group. This may result in members of the group being less informed than they might otherwise have been, and having fewer opportunities to check their perception of the world with those ‘outside’ of their group. Less permeable boundaries also make it difficult to leave groups. Members who wish to leave might be branded as traitors or sell-outs in a way that is harmful to the individual and those perceived to be his or her allies. It is very helpful for groups to regularly discuss the ways in which people and information enter and leave the group, and how to manage this in a holistic way that truly promotes security. &lt;br /&gt;
# &amp;lt;u&amp;gt;&#039;&#039;&#039;Fixed patterns&#039;&#039;&#039;&amp;lt;/u&amp;gt; - Secondly, patterns of behaviour become more fixed and harder to change. This makes it more difficult for members of the group to question (supposedly) shared beliefs, or challenge the behaviour of other members. When we lose the ability to question each others’ assumptions or point out potentially unhealthy behaviours, our ability to constructively and compassionately build group security is greatly compromised. For this reason, it is important for groups to regularly revisit and discuss their shared values in an honest way. &lt;br /&gt;
# &amp;lt;u&amp;gt;&#039;&#039;&#039;Authoritarianism&#039;&#039;&#039;&amp;lt;/u&amp;gt; - A third predictable change relates to leadership and power dynamics within groups. When groups feel unsafe, group members tolerate greater authoritarianism from leaders or more powerful members of the group. This results in reduced levels of information exchange within the group, and fewer opportunities for group members to check their perceptions of the world with other members of their team. In extreme cases, powerful members of the group may become abusive, and the increased rigidity of the group boundaries may prevent victims of such abuse from escaping. Again, it is important for groups to talk about power dynamics and leadership styles on a regular basis, and to make sure that every person has an opportunity to contribute.&lt;br /&gt;
&lt;br /&gt;
Looking into the links between decision-making processes and security, we should not underestimate the positive effects of having fair and transparent decision-making processes. If a group has shared knowledge and responsibilities, it reduces the impact when perpetrators target the leaders of a group. &lt;br /&gt;
&lt;br /&gt;
(Source: [https://holistic-security.tacticaltech.org/ckeditor_assets/attachments/60/holisticsecurity_trainersmanual.pdf Holistic Security Training Manual], page 57)&lt;br /&gt;
&lt;br /&gt;
== Respond by integrating knowledge into policies, procedures, practices ==&lt;br /&gt;
&lt;br /&gt;
=== Crisis management ===&lt;br /&gt;
Being prepared to handle crisis situations is a crucial part of the organization’s commitment to protecting the physical and emotional well-being of its staff.&lt;br /&gt;
&lt;br /&gt;
Conveys a strong message that staff safety is a top priority. &lt;br /&gt;
&lt;br /&gt;
==== Before the crisis (preparedness) ====&lt;br /&gt;
&lt;br /&gt;
# Determine what types of crisis events might be faced by an organization, and develop a list of potential risks.&lt;br /&gt;
# Gain an understanding of how staff respond to crisis events and what stress reactions they might have before, during, and after such events.  This will help determine what strategies might be useful to individuals or groups (see the section above on [[Building a trauma-informed organization#Physiological%20responses%20to%20threat|Physiological responses to threat]])&lt;br /&gt;
# Create a staff support plan that can be used in the event of a crisis.&lt;br /&gt;
# Create a crisis response team with clearly defined roles and responsibilities. It is crucial that the crisis team understands the psychosocial and mental health effects of trauma, how to provide support, and the options available to staff requiring specialized assessment and care.&lt;br /&gt;
# Prepare a list of internal and external resources available to staff in the organization. Ensure that these lists are reviewed regularly and kept up to date.&lt;br /&gt;
# Develop communication plans that include how to inform staff members immediately about the nature of the event, how to protect themselves in case of danger, and how to keep them informed about the crisis.&lt;br /&gt;
# Practice responding to different crisis scenarios with all staff members. &lt;br /&gt;
&lt;br /&gt;
==== During the crisis ====&lt;br /&gt;
&#039;&#039;&#039;Look&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
# Identify people who need immediate attention or support.&lt;br /&gt;
# Focus on safety.&lt;br /&gt;
# Pay attention to physical and emotional reactions.&lt;br /&gt;
# Be attentive to staff members who want to share their reactions.&lt;br /&gt;
# Assess how the crisis is impacting staff members’ decision making and abilities to fulfill their given roles and responsibilities. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Listen&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
# Listen with your eyes, ears and heart&lt;br /&gt;
# Pay attention to body language and words&lt;br /&gt;
# Validate staff reactions to the crisis&lt;br /&gt;
# Provide comfort and reassurance where possible&lt;br /&gt;
# Obtain multiple perspectives on the situation if possible&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
# Remind staff members about the internal and external resources available to them if they need support&lt;br /&gt;
# When you suspect any staff member is having a difficult time dealing with his or her situation or having severe symptoms, recommend that they seek professional support&lt;br /&gt;
# Give permission for anyone who is severely impacted to step away from their responsibilities if possible and get the support/rest that they need.&lt;br /&gt;
&lt;br /&gt;
==== After the crisis ====&lt;br /&gt;
&lt;br /&gt;
# Debrief the event as an organization. Analyze how the incident occurred, how to prevent it from happening again, and what measures must be taken in the meantime to control the risk.&lt;br /&gt;
# Consult with staff members about the effectiveness of the existing plan. Update the procedures and protocols as necessary.&lt;br /&gt;
# Follow-up with staff about how they were impacted by the incident, and what ongoing needs them might have.&lt;br /&gt;
# Make adjustments to work schedules according to staff capacity and needs.&lt;br /&gt;
&lt;br /&gt;
== Resources for building a trauma-informed organization ==&lt;br /&gt;
&lt;br /&gt;
=== Articles ===&lt;br /&gt;
[https://hbr.org/2022/03/we-need-trauma-informed-workplaces We need trauma-informed workplaces] (Harvard Business Review, 2022)&lt;br /&gt;
&lt;br /&gt;
For the past few years, we’ve been experiencing collective trauma. But trauma is not new in our organizations, and it’s not going away, either. Estimates are that six in 10 men and five in 10 women experience at least one trauma, and approximately 6% of the population will experience PTSD at some point in their lives. As we’ve seen the lines between work and home blur and a fundamental shift in our expectations of the places we work, organizations have struggled to provide the support and leadership that their employees and customers need. That’s why it’s so important that they take steps now to build the cultures that can see them through this crisis and the ones we’ll all inevitably face in the future. To do that, we need to build trauma-informed organizations. A trauma-informed organization is one that operates with an understanding of trauma and its negative effects on the organization’s employees and the communities it serves and works to mitigate those effects. It may not be possible to predict or avoid the next crisis our organizations will face. However, with forethought, planning, and commitment, we can be prepared to meet the next challenge — whatever it may be — and come through it stronger.&lt;br /&gt;
&lt;br /&gt;
[https://pubmed.ncbi.nlm.nih.gov/18181708/ Five essential elements of immediate and mid-term mass trauma intervention: empirical evidence] (Stevan E Hobfoll, 2007)&lt;br /&gt;
&lt;br /&gt;
Given the devastation caused by disasters and mass violence, it is critical that intervention policy be based on the most updated research findings. However, to date, no evidence-based consensus has been reached supporting a clear set of recommendations for intervention during the immediate and the mid-term post mass trauma phases. Because it is unlikely that there will be evidence in the near or mid-term future from clinical trials that cover the diversity of disaster and mass violence circumstances, we assembled a worldwide panel of experts on the study and treatment of those exposed to disaster and mass violence to extrapolate from related fields of research, and to gain consensus on intervention principles. We identified five empirically supported intervention principles that should be used to guide and inform intervention and prevention efforts at the early to mid-term stages. These are promoting: 1) a sense of safety, 2) calming, 3) a sense of self- and community efficacy, 4) connectedness, and 5) hope.&lt;br /&gt;
&lt;br /&gt;
[https://www.ictj.org/resource-library/%E2%80%98-search-people%E2%80%99s-well-being%E2%80%99-mainstreaming-psychosocial-approach-transitional ‘The Search for People’s Well-Being’: Mainstreaming a Psychosocial Approach to Transitional Justice] (ICTJ, 2024)&lt;br /&gt;
&lt;br /&gt;
The field of transitional justice is increasingly recognizing the relevance of mental health and psychosocial support (MHPSS) in contexts of massive human rights violations. Despite growing advocacy and awareness at the global policy level, however, the field lacks a systematic approach to the issue. This study contributes to the development of such an  approach, one that applies a psychosocial lens to analyze contexts, assess needs, and design and implement programming that has a positive impact on the well-being of victims and communities and broader social systems.&lt;br /&gt;
&lt;br /&gt;
=== Assessment resources ===&lt;br /&gt;
&lt;br /&gt;
* [https://ctrinstitute.com/trauma-informed-workplace-assessment/ Trauma-Informed Workplace Assessment] by the Crisis and Trauma Resource Institute&lt;br /&gt;
* [https://www.hca.wa.gov/assets/program/trauma-informed-self-assessment-national-council-for-behavioral-health.pdf Organizational Self-Assessment: Adoption of trauma-informed care practice] by the National Council for Behavioral Health&lt;br /&gt;
* [https://nhchc.org/wp-content/uploads/2020/12/NHCHC-TIO-Assessment-Manual.pdf Trauma-Informed Organization Assessment Manual](PDF) by National Healthcare for the Homeless Council (NHCHC), 2020&lt;br /&gt;
* [https://traumainformedoregon.org/tic-resources/creating-cultures-trauma-informed-care-cctic-self-assessment-planning-protocol/ Creating Cultures of Trauma-Informed Care (CCTIC): A Self-Assessment and Planning Protocol] - This assessment tool provides guidelines for agencies or programs interested in facilitating trauma-informed modifications in their service systems. For use by administrators, providers, and survivor-consumers in the development, implementation, evaluation, and ongoing monitoring of trauma-informed programs. (Source: Community Connections; Washington, D.C. Roger D. Fallot, Ph.D. and Maxine Harris, Ph.D., 2009)&lt;br /&gt;
&lt;br /&gt;
=== Resource hub ===&lt;br /&gt;
[https://safeguardingsupporthub.org/what-rsh The Safeguarding Resource and Support Hub (RSH)] is a programme that aims to support organisations in the aid sector to strengthen their safeguarding policy and practice against Sexual Exploitation, Abuse and Sexual Harassment (SEAH). RSH supports organisations working in both the humanitarian and development sectors but is driven by the needs of smaller national or local organisations in developing countries. RSH has an Online Hub website available in English, Arabic, French and Swahili and is free for anyone working in the aid sector to use.&lt;/div&gt;</summary>
		<author><name>Kristin1</name></author>
	</entry>
	<entry>
		<id>https://wiki.digitalrights.community/index.php?title=Security_resources_organized_by_topic&amp;diff=50960</id>
		<title>Security resources organized by topic</title>
		<link rel="alternate" type="text/html" href="https://wiki.digitalrights.community/index.php?title=Security_resources_organized_by_topic&amp;diff=50960"/>
		<updated>2024-08-09T17:35:59Z</updated>

		<summary type="html">&lt;p&gt;Kristin1: /* Mitigation techniques for common threats to information */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Building awareness of how we respond to threat and stress ==&lt;br /&gt;
&#039;&#039;Developing a useful security strategy is heavily dependent on our perception – we need to be able to identify and analyse threats in order to implement ways of avoiding or reducing them. But we all perceive the world around us differently based on our circumstances, experiences and many other factors. As a result, our perception can sometimes be hindered: threats which may be evident to some people may go unrecognised by others; similarly, we also need to be able to tell the difference between threats which are genuinely possible and those which we falsely perceive, called &#039;unfounded fears&#039;. It&#039;s a good idea to become familiar with factors that condition our perceptions of threat, and consider ways that we can take these into account in our security planning.&#039;&#039; (Source: [https://holistic-security.tacticaltech.org/chapters/prepare/1-2-individual-responses-to-threat.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Resources:&lt;br /&gt;
&lt;br /&gt;
* [https://holistic-security.tacticaltech.org/chapters/prepare/1-2-individual-responses-to-threat.html &#039;&#039;&#039;Exploring individual responses to threat&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
* [https://holistic-security.tacticaltech.org/chapters/prepare/1-4-team-and-peer-responses-to-threat.html &#039;&#039;&#039;Exploring group responses to threat&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
* [https://holistic-security.tacticaltech.org/chapters/prepare/1-5-communicating-about-threats-in-teams-and-organisations.html &#039;&#039;&#039;Communicating about security in teams and organizations&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
&lt;br /&gt;
== Understanding our threats and context ==&lt;br /&gt;
&lt;br /&gt;
=== Situation monitoring and analysis ===&lt;br /&gt;
Situation monitoring and analysis is the broadest kind of analysis of our context: observing the political, economic, social, technological, legal and environmental developments in society which are relevant to our work, and may impact our security situation. (Source: [https://holistic-security.tacticaltech.org/chapters/explore/2-2-situation-monitoring-and-analysis.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Exercise: [https://holistic-security.tacticaltech.org/exercises/explore/situational-monitoring-a-quick-pestle-analysis.html &#039;&#039;&#039;Pestle analysis&#039;&#039;&#039;] (Holistic Security Manual) &lt;br /&gt;
&lt;br /&gt;
Tool: &#039;&#039;&#039;[https://tnr-research.uwazi.io/ Research Database on transnational repression]&#039;&#039;&#039; - This collection of research reports on transnational repression can help human rights defenders better understand: &lt;br /&gt;
&lt;br /&gt;
* Transnational Repression (TNR) threats that are possible, to determine appropriate mitigation techniques&lt;br /&gt;
* Which TNR threats are unlikely, in order to alleviate fear&lt;br /&gt;
* What exiled HRDs can expect from a host country in terms of protection measures&lt;br /&gt;
* Existing campaigns to strengthen protection for exiled HRDs&lt;br /&gt;
&lt;br /&gt;
=== Identifying, analyzing and prioritizing threats ===&lt;br /&gt;
&lt;br /&gt;
==== Map the actors ====&lt;br /&gt;
&#039;&#039;It is valuable to get a clear picture of all the actors in our environment (individuals, institutions, organizations, etc). Threats almost always come from someone or something. Knowing as much as we can about the actors in our context improves our perception of our environment and thereby, our ability to carry out activities to maintain or expand our space for work.&#039;&#039; (Source: [https://holistic-security.tacticaltech.org/chapters/explore/2-3-vision-strategy-and-actors.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Exercise:&lt;br /&gt;
&lt;br /&gt;
* [https://holistic-security.tacticaltech.org/exercises/explore/visual-actor-mapping-part-1.html &#039;&#039;&#039;Spectrum of allies&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
* [https://newtactics.org/resource/exercises-identifying-allies-opponents &#039;&#039;&#039;Spectrum of allies&#039;&#039;&#039;] (New Tactics in Human Rights project)&lt;br /&gt;
&lt;br /&gt;
==== Brainstorm threats ====&lt;br /&gt;
This exercise is a first attempt at identifying the threats to yourself, your group or organization and your work in defense of human rights. This initial list of threats can then be refined so as to focus in more depth on the threats which are most likely or potentially most harmful. (Source: [https://holistic-security.tacticaltech.org/exercises/explore/threat-brainstorm.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Exercise: [https://holistic-security.tacticaltech.org/exercises/explore/threat-brainstorm.html &#039;&#039;&#039;Threat brainstorm&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
&lt;br /&gt;
==== Analyzing risk, prioritizing threats ====&lt;br /&gt;
Threats can be viewed and categorized in light of the following: the likelihood that the threat will take place, and the impact if and when it does. Likelihood and impact are concepts which help us determine risk: the higher the likelihood or impact of a threat, the higher the risk. Categorizing threats can help to keep us from feeling overwhelmed and keep our perception of threats realistic. (Source: [https://holistic-security.tacticaltech.org/chapters/explore/2-8-identifying-and-analysing-threats.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Exercise: [https://holistic-security.tacticaltech.org/chapters/explore/2-8-identifying-and-analysing-threats.html &#039;&#039;&#039;Threat matrix&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
&lt;br /&gt;
Tools:&lt;br /&gt;
&lt;br /&gt;
* The Ford Foundation’s [https://www.fordfoundation.org/work/our-grants/building-institutions-and-networks/cybersecurity-assessment-tool/ &#039;&#039;&#039;Cybersecurity Assessment Tool (CAT)&#039;&#039;&#039;] is designed to measure the maturity, resiliency, and strength of an organization’s cybersecurity efforts. We have created this questionnaire with busy nontechnical grant makers, grantee partners, civil society organizations, and nonprofits in mind, and we hope it helps shine some light on a recommended path forward for any organization undertaking a cybersecurity journey&lt;br /&gt;
&lt;br /&gt;
==== Analyze threats ====&lt;br /&gt;
This exercise will help you prioritize threats and divine the causes, ramifications, sources as well as the required resources, existing actions and possible next steps.&lt;br /&gt;
&lt;br /&gt;
Exercise: [https://holistic-security.tacticaltech.org/exercises/explore/threat-inventory.html &#039;&#039;&#039;Threat inventory&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
&lt;br /&gt;
== Risk mitigation ==&lt;br /&gt;
In order to build a response to the threats we face, we can consider them in terms of the factors which make us more or less susceptible to them. Read more in [https://holistic-security.tacticaltech.org/chapters/strategise/3-1-responding-to-threats.html this chapter of the Holistic Security Manual]. &lt;br /&gt;
&lt;br /&gt;
=== Mitigation techniques for common threats to information ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
! Threat&lt;br /&gt;
!Mitigation techniques and links to guidance &lt;br /&gt;
|-&lt;br /&gt;
|Data loss&lt;br /&gt;
|&lt;br /&gt;
* [[Ways to securely store and share files|Have your information securely in the cloud or on a server]]&lt;br /&gt;
* Have a backup process&lt;br /&gt;
|-&lt;br /&gt;
|Compromised accounts&lt;br /&gt;
|&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa|Use two factor authentication for all accounts]]&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa|Use unique, complex passwords for all accounts]]&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa|Use a password manager to create, store and protect those passwords]]&lt;br /&gt;
|-&lt;br /&gt;
|Device inspection at checkpoints&lt;br /&gt;
|&lt;br /&gt;
* [[Use a secure messaging app#Tip: use automatic disappearing messages|Use automated disappearing messages on your messaging apps]]&lt;br /&gt;
* [[Ways to securely store and share files|Have your sensitive information stored safely in the cloud and off of your device]]&lt;br /&gt;
* Hide or delete any apps that would provide access to this information (you can restore that app later)&lt;br /&gt;
|-&lt;br /&gt;
|Device confiscation or theft&lt;br /&gt;
|&lt;br /&gt;
* [[Secure your devices#Full disk encryption|Encrypt your devices]]&lt;br /&gt;
* And, review and adapt the same advice above for “device inspection” threat&lt;br /&gt;
|-&lt;br /&gt;
|Information handover&lt;br /&gt;
|&lt;br /&gt;
* [[Trusted hosting companies in the human rights community|Host your information with a company you trust]], who will not turn over information to your opponents (via subpoena, request, etc)&lt;br /&gt;
|-&lt;br /&gt;
|Targeted malware or spyware&lt;br /&gt;
|&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa#Be aware of spear phishing attacks|Protect yourselves against (spear) phishing attacks]]&lt;br /&gt;
* Use a second device for sensitive activities&lt;br /&gt;
* [[How to mitigate your risk of being subject to Pegasus surveillance|Restart your device regularly to disrupt spyware]]&lt;br /&gt;
* [[Secure your devices|Use anti virus]]&lt;br /&gt;
* [[How to mitigate your risk of being subject to Pegasus surveillance]], and other spyware&lt;br /&gt;
|-&lt;br /&gt;
|Surveillance and monitoring&lt;br /&gt;
|&lt;br /&gt;
* [[Safe internet browsing using VPN and Tor browser|Use a VPN and/or Tor browser]]&lt;br /&gt;
* [[Use a secure messaging app]]&lt;br /&gt;
* [[How to collect and store information in a secure way]]&lt;br /&gt;
* [[Ways to securely store and share files|How to use Google Drive safely and alternatives to Google Drive]]&lt;br /&gt;
|-&lt;br /&gt;
|Website hacking and takeover&lt;br /&gt;
|&lt;br /&gt;
* [[Protect your website|Protect your website from DDOS attacks]]&lt;br /&gt;
* [[Trusted hosting companies in the human rights community|Use a host company that you trust]]&lt;br /&gt;
* And, review and adapt the same advice above for &amp;quot;compromised accounts&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
Other important considerations when collecting, storing, using sensitive information:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Consideration&lt;br /&gt;
!Resources&lt;br /&gt;
|-&lt;br /&gt;
|Make sure you have informed consent from the people you are collecting information&lt;br /&gt;
|[[Guidance on informed consent]]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
* [[Information Security for Human Rights Defenders]]&lt;br /&gt;
&lt;br /&gt;
===Mitigation techniques for online harassment===&lt;br /&gt;
[[How to deal with online harassment and threats]]&lt;br /&gt;
&lt;br /&gt;
==Security planning ==&lt;br /&gt;
Once we have clarity about the threats we face during our activities, we can begin to organize our security protocols into security plans or agreements. There are three main areas to consider when developing any security plans: &lt;br /&gt;
&lt;br /&gt;
# &#039;&#039;&#039;PREPARE: Prevention of threats&#039;&#039;&#039; - Most security plans will include tactics which aim to prevent identified threats from taking place (i.e. reducing their likelihood). This will include:&lt;br /&gt;
## Identify &amp;amp; assess the threats and your vulnerabilities&lt;br /&gt;
## Develop security policies and procedures&lt;br /&gt;
## Implement preventive measures&lt;br /&gt;
## Invest in Security Awareness Programs&lt;br /&gt;
## Conduct Security testing&lt;br /&gt;
# &#039;&#039;&#039;RESPOND: Emergency responses&#039;&#039;&#039; - Emergency plans, also called contingency plans, are the actions which we take in response to a threat becoming a reality. This will include:&lt;br /&gt;
## Build Incident Response Plan&lt;br /&gt;
## Communication Strategy&lt;br /&gt;
## Business continuity plan&lt;br /&gt;
## Disaster recovery plan (Data Backups and Recovery)&lt;br /&gt;
## Communication and Collaboration&lt;br /&gt;
# &#039;&#039;&#039;TREAT: Well-being considerations&#039;&#039;&#039; - Actions we take to maintain our physical energy and a mindful approach to our work and our security –it may include such considerations as where and when we will eat, sleep, relax and enjoy ourselves in the course of our work. This will include: &lt;br /&gt;
## Analyze lessons learned&lt;br /&gt;
## Recovery and Remediation&lt;br /&gt;
## Psychological safety considerations,&lt;br /&gt;
## Review and update your security plans and approach&lt;br /&gt;
For more information, read &#039;&#039;&#039;[[General guidance for creating security plans and agreements]]&#039;&#039;&#039; and review [https://holistic-security.tacticaltech.org/chapters/strategise/3-3-creating-security-plans-and-agreements.html this chapter of the Holistic Security Manual]. &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Additional resources:  &lt;br /&gt;
&lt;br /&gt;
* Consumer Reports [https://securityplanner.consumerreports.org/ &#039;&#039;&#039;Security Planner&#039;&#039;&#039;] is a free, easy-to-use guide to staying safer online. It provides personalized recommendations and expert advice on topics such as keeping social media accounts from being hacked, locking down devices ranging from smartphones to home security cameras, and reducing intrusive tracking by websites.&lt;br /&gt;
* [https://www.nist.gov/itl/smallbusinesscyber/nist-cybersecurity-framework-0 &#039;&#039;&#039;NIST Cybersecurity Framework 2.0&#039;&#039;&#039;]:  Small Business Quick Start Guide - provides small-to-medium sized businesses (SMB), specifically those who have modest or no cybersecurity plans in place, with considerations to kick-start their cybersecurity risk management strategy using the NIST Cybersecurity Framework (CSF) 2.0. (by the &#039;&#039;National Institute of Standards and Technology)&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Security planning on specific topics===&lt;br /&gt;
&lt;br /&gt;
* [[General tips for international travel]]&lt;br /&gt;
* [[General tips for home security]]&lt;br /&gt;
&lt;br /&gt;
== Building a culture of security within a team ==&lt;br /&gt;
[https://level-up.cc/ &#039;&#039;&#039;LevelUp&#039;&#039;&#039;] is a collection of resources for the global digital safety training community.&lt;br /&gt;
&lt;br /&gt;
[https://wiki.orgsec.community/ &#039;&#039;&#039;Organisational security community wiki&#039;&#039;&#039;] is a resource created by and for security practitioners from all backgrounds to share useful resources and document innovative approaches to long-term security work. &lt;br /&gt;
&lt;br /&gt;
==Resource collections ==&lt;br /&gt;
[https://digitalfirstaid.org/ &#039;&#039;&#039;Digital First Aid Kit&#039;&#039;&#039;] - The Digital First Aid Kit is a free resource to help rapid responders, digital security trainers, and tech-savvy activists to better protect themselves and the communities they support against the most common types of digital emergencies. It can also be used by activists, human rights defenders, bloggers, journalists or media activists who want to learn more about how they can protect themselves and support others. If you or someone you are assisting is experiencing a digital emergency, the Digital First Aid Kit will guide you in diagnosing the issues you are facing, and refer you to support providers for further help if needed.&lt;br /&gt;
&lt;br /&gt;
[https://communitydocs.accessnow.org/ &#039;&#039;&#039;Access Now Help Desk documentation&#039;&#039;&#039;]&lt;br /&gt;
&lt;br /&gt;
[https://cyber-star.org/ &#039;&#039;&#039;CyberSTAR&#039;&#039;&#039;], by SecDev, makes it easier for small organizations and individuals to understand and manage digital safety by organizing it around six themes. This site presents learning resources to help you be safer online—plus teaching resources for digital safety trainers.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
More info:&lt;br /&gt;
&lt;br /&gt;
[[Ways to securely store and share files|Secure storage for sensitive information]] &lt;br /&gt;
&lt;br /&gt;
[[Protect your accounts using strong passwords, pw managers, 2fa|Secure access to sensitive information]] &lt;br /&gt;
&lt;br /&gt;
[[Secure your devices]]&lt;/div&gt;</summary>
		<author><name>Kristin1</name></author>
	</entry>
	<entry>
		<id>https://wiki.digitalrights.community/index.php?title=How_to_collect_and_store_information_in_a_secure_way&amp;diff=50875</id>
		<title>How to collect and store information in a secure way</title>
		<link rel="alternate" type="text/html" href="https://wiki.digitalrights.community/index.php?title=How_to_collect_and_store_information_in_a_secure_way&amp;diff=50875"/>
		<updated>2024-08-05T19:09:50Z</updated>

		<summary type="html">&lt;p&gt;Kristin1: /* Tools to collect information */  added tresorit&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Principles for protecting information ==&lt;br /&gt;
&lt;br /&gt;
=== Enable (and use) multi-factor authentication on any accounts ===&lt;br /&gt;
If you are requiring someone to create an account in order to send you information, make sure that it&#039;s possible to protect that account by using multi-factor authentication. Multi-factor authentication is an electronic authentication method in which a user is granted access to a website or application only after successfully presenting two or more pieces of evidence to an authentication mechanism: knowledge, possession, and inherent. Without multi-factor authentication, the information is only as protected as the strength of the user&#039;s password. &lt;br /&gt;
&lt;br /&gt;
Learn more about two factor authentication here: [[Protect your accounts using strong passwords, pw managers, 2fa]]&lt;br /&gt;
&lt;br /&gt;
=== Use end-to-end encryption for information in motion ===&lt;br /&gt;
When protecting information that is &amp;quot;in motion&amp;quot; (being transferred from one person/device to another), It&#039;s a good practice to use a tool that provides end-to-end encryption. End-to-end encryption (E2EE) is a type of information transfer or messaging that keeps the information private from everyone, including the messaging service. When E2EE is used, the information being transferred only appears in decrypted form for the person sending the message and the person receiving the message. [https://holistic-security.tacticaltech.org/chapters/explore/2-6-information-in-motion.html Learn more about protecting information in motion].&lt;br /&gt;
&lt;br /&gt;
=== Host sensitive information with a company you trust ===&lt;br /&gt;
For things that are extremely sensitive and you don&#039;t need to actually need to use it (analyze it) or share it, you can always lock it away in an encrypted folder (using [https://www.veracrypt.fr/code/VeraCrypt/ VeraCrypt]) on any server. But for information that you want to organize, understand, analyze, use and share, you will want it more accessible than having it in an encrypted folder. For these cases, you will want to [[Trusted hosting companies in the human rights community|host your information with a company that you trust]].  &lt;br /&gt;
&lt;br /&gt;
== Tools to collect information ==&lt;br /&gt;
&lt;br /&gt;
=== Tella app ===&lt;br /&gt;
[https://tella-app.org/ Tella] is a free app that is available for Android devices and will be available for iOS soon. It can be used by anyone who engages in collecting information on injustices. Tella allows users to produce high-quality documentation that can be used for research, advocacy or transitional justice. Tella can be connected to KoboToolbox, Uwazi, or another database platform to store, organize and analyze the information.&lt;br /&gt;
&lt;br /&gt;
=== LimeSurvey ===&lt;br /&gt;
[https://www.limesurvey.org/ LimeSurvey] is a simple, quick and anonymous online survey tool. It is open source, allowing people to host LimeSurvey themselves. This self-hosted version is called LimeSurvey Community Edition, and all your data is stored on your or your provider’s server (usually the one where you installed LimeSurvey). You can also work with a [[Trusted hosting companies in the human rights community|web hosting company that you trust]] to host and manage this software for you, such as Greenhost. &lt;br /&gt;
&lt;br /&gt;
=== SecureDrop ===&lt;br /&gt;
[https://securedrop.org/ SecureDrop] is an open source whistleblower submission system that media organizations and NGOs can install to securely accept documents from anonymous sources. SecureDrop is available in 22 languages.&lt;br /&gt;
&lt;br /&gt;
=== Globaleaks ===&lt;br /&gt;
[https://www.globaleaks.org/ GlobaLeaks] is free, open-source software enabling anyone to easily set up and maintain a secure whistleblowing platform. It is possible to host this software with [https://greenhost.net/products/managed/ Greenhost]. &lt;br /&gt;
&lt;br /&gt;
=== OnionShare ===&lt;br /&gt;
🧅 [https://onionshare.org OnionShare] is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network.  &lt;br /&gt;
&lt;br /&gt;
=== Tresorit ===&lt;br /&gt;
[https://tresorit.com/ Tresorit] offers ultra-secure encryption for cloud storage, encrypted file sharing &amp;amp; storage, and e‑signature within your organization and with external partners. They offer a [https://tresorit.com/nonprofit 50% discount for nonprofits].  &lt;br /&gt;
&lt;br /&gt;
== Tools to store information ==&lt;br /&gt;
&lt;br /&gt;
=== Uwazi database to store information ===&lt;br /&gt;
[https://uwazi.io/ Uwazi] is a web-based tool designed for managing your data in one easy-to-search place. This open-source database application allows you to capture, organise and make sense of a set of facts, observations, testimonies, research, documents and more. You can work with a [[Trusted hosting companies in the human rights community|web hosting company that you trust]] to host and manage this software for you, such as Greenhost.&lt;br /&gt;
&lt;br /&gt;
=== NextCloud ===&lt;br /&gt;
[https://nextcloud.com/about/ Nextcloud] Hub is the industry-leading, fully open-source, on-premises content collaboration platform. Teams access, share and edit their documents, chat and participate in video calls and manage their mail and calendar and projects across mobile, desktop and web interfaces. It is hosted and managed by [[Trusted hosting companies in the human rights community|Greenhost and other web hosting companies]]. &lt;br /&gt;
&lt;br /&gt;
== Ways to collect and store information ==&lt;br /&gt;
&lt;br /&gt;
=== Tella to collect and Uwazi to store information ===&lt;br /&gt;
Organisations who already use Uwazi to store their information, can connect Tella to one or more of their databases to upload data. Using Tella for the information collection enables users who work offline to collect data, add it to the submission forms, save it and upload the information when it is convenient. In addition to the protection and encryption features, working in offline mode is a huge benefit for those who collect information in risky environments and areas with limited or no connectivity. [https://huridocs.org/2022/07/the-new-tella-app-lets-uwazi-users-document-violations-safely-and-while-offline/ More information]on the HURIDOCS website.&lt;br /&gt;
&lt;br /&gt;
== Other tools ==&lt;br /&gt;
For more tools used for documenting human rights violations, see [[Tools for securely documenting human rights violations]]&lt;br /&gt;
&lt;br /&gt;
To learn more about &#039;&#039;&#039;how to use Google Drive safely and alternatives to Google Drive&#039;&#039;&#039;, see [[Ways to securely store and share files]]&lt;/div&gt;</summary>
		<author><name>Kristin1</name></author>
	</entry>
	<entry>
		<id>https://wiki.digitalrights.community/index.php?title=Fran%C3%A7ais_(French)&amp;diff=50809</id>
		<title>Français (French)</title>
		<link rel="alternate" type="text/html" href="https://wiki.digitalrights.community/index.php?title=Fran%C3%A7ais_(French)&amp;diff=50809"/>
		<updated>2024-07-19T14:47:51Z</updated>

		<summary type="html">&lt;p&gt;Kristin1: /* Cours en ligne (gratuit) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Assistance urgente ==&lt;br /&gt;
&#039;&#039;&#039;Service de sécurité numérique de la Helpline&#039;&#039;&#039; - La liste ci-dessous répertorie les domaines les plus courants pour lesquels l’équipe de la Helpline, assistera les utilisateurs exposés aux risques. Si le besoin/l’incident ne figure pas dans la liste, nous encourageons nos bénéficiaires à vérifier auprès de nous, car nous pourrons peut-être encore vous aider. https://www.accessnow.org/helpline-services-fr/?ignorelocale &lt;br /&gt;
&lt;br /&gt;
== Guides pratiques ==&lt;br /&gt;
* &#039;&#039;&#039;Autodéfense Contre La Surveillance: Astuces, outils, et Guides pratiques pour des communications en ligne plus sécurisées&#039;&#039;&#039; https://ssd.eff.org/fr#index - Surveillance Self-Defense (Electronic Frontier Foundation)&lt;br /&gt;
** Créer des mots de passe robustes https://ssd.eff.org/fr/module/cr%C3%A9er-des-mots-de-passe-robustes&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Manuel de Sécurité (Front Line Defenders)&#039;&#039;&#039; https://www.frontlinedefenders.org/fr/manuel-de-s%C3%A9curit%C3%A9 - Le Manuel de Sécurité de Front Line Defenders vous explique comment élaborer un plan de sécurité – pour vous-même et pour votre organisation (pour les DDH qui travaillent dans des organisations). Il suit une approche systématique pour évaluer votre situation de sécurité et élaborer des stratégies et des tactiques pour réduire les risques et la vulnérabilité.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Le Protocole de sécurité holistique pour les défenseurs des droits de l&#039;homme (le Protocole du Défenseur)&#039;&#039;&#039; nous aide à améliorer notre sécurité physique, notre sécurité numérique, ainsi que notre bien-être et notre capacité de résilience. En suivant le ptorocole, nous renforçons notre sécurité individuelle et collective et pouvons réduire le fardeau des attaques, du harcèlement et de la censure qui pèse sur nous et nos communautés. https://openbriefing.gitbook.io/defenders-protocol/v/fr/&lt;br /&gt;
&lt;br /&gt;
== Cours en ligne (gratuit) ==&lt;br /&gt;
* &#039;&#039;&#039;Cours de Totem sur les mots de passe sécurisés&#039;&#039;&#039; - Les mots de passe sont votre première ligne de défense en ligne, il est donc très important qu&#039;ils soient longs et uniques. Mais comment pouvez-vous gérer cela pour tous vos comptes? Le cours vous guidera dans la configuration de KeePassXC, un gestionnaire de mots de passe qui facilite et sécurise la création et le stockage des mots de passe. Vous examinerez également l&#039;authentification à deux facteurs (2FA), pour plus de sécurité. Vous devriez terminer le cours avec une solide stratégie de gestion des mots de passe qui protège vos comptes, sans prendre trop de temps (ou de ressources intellectuelles!). https://learn.totem-project.org/courses/course-v1:Totem+TP_SP_FR_001+cours/about&lt;br /&gt;
* &#039;&#039;&#039;Protégez vos périphériques&#039;&#039;&#039; - Il ne fait aucun doute que nos périphériques, smartphones, ordinateurs, montres connectées, etc. sont devenus notre interface avec le monde et nos principaux souvenirs. Nous dépendons d&#039;eux au quotidien pour toutes sortes de choses, leur confiant souvent nos secrets les plus intimes. C&#039;est pourquoi il est important de les sécuriser et de les protéger, ainsi que les données qu&#039;ils contiennent. https://learn.totem-project.org/courses/course-v1:Totem+TP_SD_FR+01/about &lt;br /&gt;
* &#039;&#039;&#039;Le Hameçonnage&#039;&#039;&#039; -  Les attaques par hameçonnage, cela concerne tout le monde. Malheureusement la plupart des gens ne s&#039;y intéressent seulement une fois qu&#039;ils en ont été victimes. Pour se protéger de ce type d&#039;attaque, il faut commencer par identifier le message électronique (email, message Facebook, ou autre), vecteur de l&#039;attaque avant de cliquer sur le lien ou de télécharger la ou les pièces jointes du message. Même si vous faites attention, une attaque par hameçonnage peut quand même réussir. Ne paniquez pas. Si vous avez cliqué sur un lien de hameçonnage et si un tiers a réussi à accéder à vos données, vous pouvez quand même minimiser les conséquences pour vous, vos collègues, vos amis ou votre famille. Dans ce cours, vous allez en apprendre plus sur les attaques par hameçonnage, en quoi elles consistent, comment vous pouvez les identifier et ce que vous pouvez faire si vous vous êtes fait hameçonner. https://learn.totem-project.org/courses/course-v1:Totem+TP_PM_FR001+cours/about&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Qui sont vos trolls?&#039;&#039;&#039; Bienvenue dans ce cours en ligne sur le harcèlement en ligne développé par l&#039;IWMF, des experts en cybersécurité, des journalistes et des spécialistes des formations en ligne au cours de workshops et de sessions de travail communes. Le but: aider les journalistes à mieux appréhender le harcèlement en ligne, qui peut se cacher derrière les «trolls», et quelles sont les stratégies pour mieux s’en prémunir. https://learn.totem-project.org/courses/course-v1:IWMF+IWMF_OH_FR+001/about&lt;br /&gt;
* &#039;&#039;&#039;Protège ta vie privée!&#039;&#039;&#039; Bienvenue dans ce cours sur la vie privée en ligne développé par l’IWMF, des expert.e.s en cybersécurité, des journalistes et des spécialistes des formations en ligne. L’objectif de ce cours est d’aider les journalistes à évaluer quelles informations il est raisonnable de partager en ligne et la manière dont celles-ci pourront être ensuite utilisées contre eux pour les menacer. Les journalistes ont la difficile tâche de devoir être présent.e.s en ligne tout en devant se protéger face au cyberharcèlement et aux attaques en ligne. Ce cours leur fournit des conseils pratiques sur la manière de mieux se protéger, ainsi que leur famille. https://learn.totem-project.org/courses/course-v1:IWMF+IWMF_KP_FR+001/about&lt;br /&gt;
* &#039;&#039;&#039;Applications de messagerie Sécurisées&#039;&#039;&#039; -  Les applications de messagerie dites instantanées sont devenues un outil de communication essentiel. Nous partageons une grande quantité de messages personnels et professionnels, de photos, de vidéos et de pièces jointes par le biais des applications de messagerie, mais nous nous demandons rarement qui pourrait avoir accès à ce contenu. Dans le cadre de votre travail, vous pourriez vouloir protéger vos communications avec vos collègues, vos sources ou vos clients. Dans votre vie personnelle, vous pourriez vouloir protéger les photos et les documents que vous partagez avec votre famille et vos amis. Il existe de nombreuses applications de messagerie différentes. Comment choisir celles qui vous conviennent? En matière de protection de la vie privée et de sécurité numérique, il n&#039;existe pas de solution unique; tout est question de contexte. https://learn.totem-project.org/courses/course-v1:Totem+TP_SM_FR+cours/about&lt;br /&gt;
* &#039;&#039;&#039;Comment fonctionne Internet&#039;&#039;&#039; -  Est-il encore possible d&#039;imaginer votre vie sans Internet? Depuis une dizaine d&#039;années, Internet s&#039;est installé au centre de nombreux aspects de nos vies: communication, travail, recherche, opérations bancaires, shopping, stockage de photos et de vidéos. L&#039;utilisation d&#039;Internet est devenue presque incontournable. Dans ce cours, vous découvrirez l&#039;infrastructure d&#039;Internet - son fonctionnement, qui en est le propriétaire et comment faire des choix éclairés en fonction de vos besoins en matière de protection de la vie privée et de sécurité. https://learn.totem-project.org/courses/course-v1:Totem+TP_IP_FR+cours/about &lt;br /&gt;
&lt;br /&gt;
Tous le cours https://learn.totem-project.org/courses&lt;/div&gt;</summary>
		<author><name>Kristin1</name></author>
	</entry>
	<entry>
		<id>https://wiki.digitalrights.community/index.php?title=Security_resources_organized_by_topic&amp;diff=50767</id>
		<title>Security resources organized by topic</title>
		<link rel="alternate" type="text/html" href="https://wiki.digitalrights.community/index.php?title=Security_resources_organized_by_topic&amp;diff=50767"/>
		<updated>2024-07-05T14:45:01Z</updated>

		<summary type="html">&lt;p&gt;Kristin1: /* Security planning */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Building awareness of how we respond to threat and stress ==&lt;br /&gt;
&#039;&#039;Developing a useful security strategy is heavily dependent on our perception – we need to be able to identify and analyse threats in order to implement ways of avoiding or reducing them. But we all perceive the world around us differently based on our circumstances, experiences and many other factors. As a result, our perception can sometimes be hindered: threats which may be evident to some people may go unrecognised by others; similarly, we also need to be able to tell the difference between threats which are genuinely possible and those which we falsely perceive, called &#039;unfounded fears&#039;. It&#039;s a good idea to become familiar with factors that condition our perceptions of threat, and consider ways that we can take these into account in our security planning.&#039;&#039; (Source: [https://holistic-security.tacticaltech.org/chapters/prepare/1-2-individual-responses-to-threat.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Resources:&lt;br /&gt;
&lt;br /&gt;
* [https://holistic-security.tacticaltech.org/chapters/prepare/1-2-individual-responses-to-threat.html &#039;&#039;&#039;Exploring individual responses to threat&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
* [https://holistic-security.tacticaltech.org/chapters/prepare/1-4-team-and-peer-responses-to-threat.html &#039;&#039;&#039;Exploring group responses to threat&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
* [https://holistic-security.tacticaltech.org/chapters/prepare/1-5-communicating-about-threats-in-teams-and-organisations.html &#039;&#039;&#039;Communicating about security in teams and organizations&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
&lt;br /&gt;
== Understanding our threats and context ==&lt;br /&gt;
&lt;br /&gt;
=== Situation monitoring and analysis ===&lt;br /&gt;
Situation monitoring and analysis is the broadest kind of analysis of our context: observing the political, economic, social, technological, legal and environmental developments in society which are relevant to our work, and may impact our security situation. (Source: [https://holistic-security.tacticaltech.org/chapters/explore/2-2-situation-monitoring-and-analysis.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Exercise: [https://holistic-security.tacticaltech.org/exercises/explore/situational-monitoring-a-quick-pestle-analysis.html &#039;&#039;&#039;Pestle analysis&#039;&#039;&#039;] (Holistic Security Manual) &lt;br /&gt;
&lt;br /&gt;
Tool: &#039;&#039;&#039;[https://tnr-research.uwazi.io/ Research Database on transnational repression]&#039;&#039;&#039; - This collection of research reports on transnational repression can help human rights defenders better understand: &lt;br /&gt;
&lt;br /&gt;
* Transnational Repression (TNR) threats that are possible, to determine appropriate mitigation techniques&lt;br /&gt;
* Which TNR threats are unlikely, in order to alleviate fear&lt;br /&gt;
* What exiled HRDs can expect from a host country in terms of protection measures&lt;br /&gt;
* Existing campaigns to strengthen protection for exiled HRDs&lt;br /&gt;
&lt;br /&gt;
=== Identifying, analyzing and prioritizing threats ===&lt;br /&gt;
&lt;br /&gt;
==== Map the actors ====&lt;br /&gt;
&#039;&#039;It is valuable to get a clear picture of all the actors in our environment (individuals, institutions, organizations, etc). Threats almost always come from someone or something. Knowing as much as we can about the actors in our context improves our perception of our environment and thereby, our ability to carry out activities to maintain or expand our space for work.&#039;&#039; (Source: [https://holistic-security.tacticaltech.org/chapters/explore/2-3-vision-strategy-and-actors.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Exercise:&lt;br /&gt;
&lt;br /&gt;
* [https://holistic-security.tacticaltech.org/exercises/explore/visual-actor-mapping-part-1.html &#039;&#039;&#039;Spectrum of allies&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
* [https://newtactics.org/resource/exercises-identifying-allies-opponents &#039;&#039;&#039;Spectrum of allies&#039;&#039;&#039;] (New Tactics in Human Rights project)&lt;br /&gt;
&lt;br /&gt;
==== Brainstorm threats ====&lt;br /&gt;
This exercise is a first attempt at identifying the threats to yourself, your group or organization and your work in defense of human rights. This initial list of threats can then be refined so as to focus in more depth on the threats which are most likely or potentially most harmful. (Source: [https://holistic-security.tacticaltech.org/exercises/explore/threat-brainstorm.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Exercise: [https://holistic-security.tacticaltech.org/exercises/explore/threat-brainstorm.html &#039;&#039;&#039;Threat brainstorm&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
&lt;br /&gt;
==== Analyzing risk, prioritizing threats ====&lt;br /&gt;
Threats can be viewed and categorized in light of the following: the likelihood that the threat will take place, and the impact if and when it does. Likelihood and impact are concepts which help us determine risk: the higher the likelihood or impact of a threat, the higher the risk. Categorizing threats can help to keep us from feeling overwhelmed and keep our perception of threats realistic. (Source: [https://holistic-security.tacticaltech.org/chapters/explore/2-8-identifying-and-analysing-threats.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Exercise: [https://holistic-security.tacticaltech.org/chapters/explore/2-8-identifying-and-analysing-threats.html &#039;&#039;&#039;Threat matrix&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
&lt;br /&gt;
Tools:&lt;br /&gt;
&lt;br /&gt;
* The Ford Foundation’s [https://www.fordfoundation.org/work/our-grants/building-institutions-and-networks/cybersecurity-assessment-tool/ &#039;&#039;&#039;Cybersecurity Assessment Tool (CAT)&#039;&#039;&#039;] is designed to measure the maturity, resiliency, and strength of an organization’s cybersecurity efforts. We have created this questionnaire with busy nontechnical grant makers, grantee partners, civil society organizations, and nonprofits in mind, and we hope it helps shine some light on a recommended path forward for any organization undertaking a cybersecurity journey&lt;br /&gt;
&lt;br /&gt;
==== Analyze threats ====&lt;br /&gt;
This exercise will help you prioritize threats and divine the causes, ramifications, sources as well as the required resources, existing actions and possible next steps.&lt;br /&gt;
&lt;br /&gt;
Exercise: [https://holistic-security.tacticaltech.org/exercises/explore/threat-inventory.html &#039;&#039;&#039;Threat inventory&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
&lt;br /&gt;
== Risk mitigation ==&lt;br /&gt;
In order to build a response to the threats we face, we can consider them in terms of the factors which make us more or less susceptible to them. Read more in [https://holistic-security.tacticaltech.org/chapters/strategise/3-1-responding-to-threats.html this chapter of the Holistic Security Manual]. &lt;br /&gt;
&lt;br /&gt;
=== Mitigation techniques for common threats to information ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
! Threat&lt;br /&gt;
!Mitigation techniques and links to guidance &lt;br /&gt;
|-&lt;br /&gt;
|Data loss&lt;br /&gt;
|&lt;br /&gt;
* [[Ways to securely store and share files|Have your information securely in the cloud or on a server]]&lt;br /&gt;
* Have a backup process&lt;br /&gt;
|-&lt;br /&gt;
|Compromised accounts&lt;br /&gt;
|&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa|Use two factor authentication for all accounts]]&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa|Use unique, complex passwords for all accounts]]&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa|Use a password manager to create, store and protect those passwords]]&lt;br /&gt;
|-&lt;br /&gt;
|Device inspection at checkpoints&lt;br /&gt;
|&lt;br /&gt;
* [[Use a secure messaging app#Tip: use automatic disappearing messages|Use automated disappearing messages on your messaging apps]]&lt;br /&gt;
* [[Ways to securely store and share files|Have your sensitive information stored safely in the cloud and off of your device]]&lt;br /&gt;
* Hide or delete any apps that would provide access to this information (you can restore that app later)&lt;br /&gt;
|-&lt;br /&gt;
|Device confiscation or theft&lt;br /&gt;
|&lt;br /&gt;
* [[Secure your devices#Full disk encryption|Encrypt your devices]]&lt;br /&gt;
* And, review and adapt the same advice above for “device inspection” threat&lt;br /&gt;
|-&lt;br /&gt;
|Information handover&lt;br /&gt;
|&lt;br /&gt;
* [[Trusted hosting companies in the human rights community|Host your information with a company you trust]], who will not turn over information to your opponents (via subpoena, request, etc)&lt;br /&gt;
|-&lt;br /&gt;
|Targeted malware or spyware&lt;br /&gt;
|&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa|Protect yourselves against (spear) phishing attacks]]&lt;br /&gt;
* Use a second device for sensitive activities&lt;br /&gt;
* [[How to mitigate your risk of being subject to Pegasus surveillance|Restart your device regularly to disrupt spyware]]&lt;br /&gt;
* [[Secure your devices|Use anti virus]]&lt;br /&gt;
* [[How to mitigate your risk of being subject to Pegasus surveillance]], and other spyware&lt;br /&gt;
|-&lt;br /&gt;
|Surveillance and monitoring&lt;br /&gt;
|&lt;br /&gt;
* [[Safe internet browsing using VPN and Tor browser|Use a VPN and/or Tor browser]]&lt;br /&gt;
* [[Use a secure messaging app]]&lt;br /&gt;
* [[How to collect and store information in a secure way]]&lt;br /&gt;
* [[Ways to securely store and share files|How to use Google Drive safely and alternatives to Google Drive]]&lt;br /&gt;
|-&lt;br /&gt;
|Website hacking and takeover&lt;br /&gt;
|&lt;br /&gt;
* [[Protect your website|Protect your website from DDOS attacks]]&lt;br /&gt;
* [[Trusted hosting companies in the human rights community|Use a host company that you trust]]&lt;br /&gt;
* And, review and adapt the same advice above for &amp;quot;compromised accounts&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
Other important considerations when collecting, storing, using sensitive information:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Consideration&lt;br /&gt;
!Resources&lt;br /&gt;
|-&lt;br /&gt;
|Make sure you have informed consent from the people you are collecting information&lt;br /&gt;
|[[Guidance on informed consent]]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
* [[Information Security for Human Rights Defenders]]&lt;br /&gt;
&lt;br /&gt;
===Mitigation techniques for online harassment===&lt;br /&gt;
[[How to deal with online harassment and threats]]&lt;br /&gt;
&lt;br /&gt;
==Security planning ==&lt;br /&gt;
Once we have clarity about the threats we face during our activities, we can begin to organize our security protocols into security plans or agreements. There are three main areas to consider when developing any security plans: &lt;br /&gt;
&lt;br /&gt;
# &#039;&#039;&#039;PREPARE: Prevention of threats&#039;&#039;&#039; - Most security plans will include tactics which aim to prevent identified threats from taking place (i.e. reducing their likelihood). This will include:&lt;br /&gt;
## Identify &amp;amp; assess the threats and your vulnerabilities&lt;br /&gt;
## Develop security policies and procedures&lt;br /&gt;
## Implement preventive measures&lt;br /&gt;
## Invest in Security Awareness Programs&lt;br /&gt;
## Conduct Security testing&lt;br /&gt;
# &#039;&#039;&#039;RESPOND: Emergency responses&#039;&#039;&#039; - Emergency plans, also called contingency plans, are the actions which we take in response to a threat becoming a reality. This will include:&lt;br /&gt;
## Build Incident Response Plan&lt;br /&gt;
## Communication Strategy&lt;br /&gt;
## Business continuity plan&lt;br /&gt;
## Disaster recovery plan (Data Backups and Recovery)&lt;br /&gt;
## Communication and Collaboration&lt;br /&gt;
# &#039;&#039;&#039;TREAT: Well-being considerations&#039;&#039;&#039; - Actions we take to maintain our physical energy and a mindful approach to our work and our security –it may include such considerations as where and when we will eat, sleep, relax and enjoy ourselves in the course of our work. This will include: &lt;br /&gt;
## Analyze lessons learned&lt;br /&gt;
## Recovery and Remediation&lt;br /&gt;
## Psychological safety considerations,&lt;br /&gt;
## Review and update your security plans and approach&lt;br /&gt;
For more information, read &#039;&#039;&#039;[[General guidance for creating security plans and agreements]]&#039;&#039;&#039; and review [https://holistic-security.tacticaltech.org/chapters/strategise/3-3-creating-security-plans-and-agreements.html this chapter of the Holistic Security Manual]. &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Additional resources:  &lt;br /&gt;
&lt;br /&gt;
* Consumer Reports [https://securityplanner.consumerreports.org/ &#039;&#039;&#039;Security Planner&#039;&#039;&#039;] is a free, easy-to-use guide to staying safer online. It provides personalized recommendations and expert advice on topics such as keeping social media accounts from being hacked, locking down devices ranging from smartphones to home security cameras, and reducing intrusive tracking by websites.&lt;br /&gt;
* [https://www.nist.gov/itl/smallbusinesscyber/nist-cybersecurity-framework-0 &#039;&#039;&#039;NIST Cybersecurity Framework 2.0&#039;&#039;&#039;]:  Small Business Quick Start Guide - provides small-to-medium sized businesses (SMB), specifically those who have modest or no cybersecurity plans in place, with considerations to kick-start their cybersecurity risk management strategy using the NIST Cybersecurity Framework (CSF) 2.0. (by the &#039;&#039;National Institute of Standards and Technology)&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Security planning on specific topics===&lt;br /&gt;
&lt;br /&gt;
* [[General tips for international travel]]&lt;br /&gt;
* [[General tips for home security]]&lt;br /&gt;
&lt;br /&gt;
== Building a culture of security within a team ==&lt;br /&gt;
[https://level-up.cc/ &#039;&#039;&#039;LevelUp&#039;&#039;&#039;] is a collection of resources for the global digital safety training community.&lt;br /&gt;
&lt;br /&gt;
[https://wiki.orgsec.community/ &#039;&#039;&#039;Organisational security community wiki&#039;&#039;&#039;] is a resource created by and for security practitioners from all backgrounds to share useful resources and document innovative approaches to long-term security work. &lt;br /&gt;
&lt;br /&gt;
==Resource collections ==&lt;br /&gt;
[https://digitalfirstaid.org/ &#039;&#039;&#039;Digital First Aid Kit&#039;&#039;&#039;] - The Digital First Aid Kit is a free resource to help rapid responders, digital security trainers, and tech-savvy activists to better protect themselves and the communities they support against the most common types of digital emergencies. It can also be used by activists, human rights defenders, bloggers, journalists or media activists who want to learn more about how they can protect themselves and support others. If you or someone you are assisting is experiencing a digital emergency, the Digital First Aid Kit will guide you in diagnosing the issues you are facing, and refer you to support providers for further help if needed.&lt;br /&gt;
&lt;br /&gt;
[https://communitydocs.accessnow.org/ &#039;&#039;&#039;Access Now Help Desk documentation&#039;&#039;&#039;]&lt;br /&gt;
&lt;br /&gt;
[https://cyber-star.org/ &#039;&#039;&#039;CyberSTAR&#039;&#039;&#039;], by SecDev, makes it easier for small organizations and individuals to understand and manage digital safety by organizing it around six themes. This site presents learning resources to help you be safer online—plus teaching resources for digital safety trainers.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
More info:&lt;br /&gt;
&lt;br /&gt;
[[Ways to securely store and share files|Secure storage for sensitive information]] &lt;br /&gt;
&lt;br /&gt;
[[Protect your accounts using strong passwords, pw managers, 2fa|Secure access to sensitive information]] &lt;br /&gt;
&lt;br /&gt;
[[Secure your devices]]&lt;/div&gt;</summary>
		<author><name>Kristin1</name></author>
	</entry>
	<entry>
		<id>https://wiki.digitalrights.community/index.php?title=Security_resources_organized_by_topic&amp;diff=50691</id>
		<title>Security resources organized by topic</title>
		<link rel="alternate" type="text/html" href="https://wiki.digitalrights.community/index.php?title=Security_resources_organized_by_topic&amp;diff=50691"/>
		<updated>2024-06-18T18:50:02Z</updated>

		<summary type="html">&lt;p&gt;Kristin1: /* Security planning */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Building awareness of how we respond to threat and stress ==&lt;br /&gt;
&#039;&#039;Developing a useful security strategy is heavily dependent on our perception – we need to be able to identify and analyse threats in order to implement ways of avoiding or reducing them. But we all perceive the world around us differently based on our circumstances, experiences and many other factors. As a result, our perception can sometimes be hindered: threats which may be evident to some people may go unrecognised by others; similarly, we also need to be able to tell the difference between threats which are genuinely possible and those which we falsely perceive, called &#039;unfounded fears&#039;. It&#039;s a good idea to become familiar with factors that condition our perceptions of threat, and consider ways that we can take these into account in our security planning.&#039;&#039; (Source: [https://holistic-security.tacticaltech.org/chapters/prepare/1-2-individual-responses-to-threat.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Resources:&lt;br /&gt;
&lt;br /&gt;
* [https://holistic-security.tacticaltech.org/chapters/prepare/1-2-individual-responses-to-threat.html &#039;&#039;&#039;Exploring individual responses to threat&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
* [https://holistic-security.tacticaltech.org/chapters/prepare/1-4-team-and-peer-responses-to-threat.html &#039;&#039;&#039;Exploring group responses to threat&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
* [https://holistic-security.tacticaltech.org/chapters/prepare/1-5-communicating-about-threats-in-teams-and-organisations.html &#039;&#039;&#039;Communicating about security in teams and organizations&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
&lt;br /&gt;
== Understanding our threats and context ==&lt;br /&gt;
&lt;br /&gt;
=== Situation monitoring and analysis ===&lt;br /&gt;
Situation monitoring and analysis is the broadest kind of analysis of our context: observing the political, economic, social, technological, legal and environmental developments in society which are relevant to our work, and may impact our security situation. (Source: [https://holistic-security.tacticaltech.org/chapters/explore/2-2-situation-monitoring-and-analysis.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Exercise: [https://holistic-security.tacticaltech.org/exercises/explore/situational-monitoring-a-quick-pestle-analysis.html &#039;&#039;&#039;Pestle analysis&#039;&#039;&#039;] (Holistic Security Manual) &lt;br /&gt;
&lt;br /&gt;
Tool: &#039;&#039;&#039;[https://tnr-research.uwazi.io/ Research Database on transnational repression]&#039;&#039;&#039; - This collection of research reports on transnational repression can help human rights defenders better understand: &lt;br /&gt;
&lt;br /&gt;
* Transnational Repression (TNR) threats that are possible, to determine appropriate mitigation techniques&lt;br /&gt;
* Which TNR threats are unlikely, in order to alleviate fear&lt;br /&gt;
* What exiled HRDs can expect from a host country in terms of protection measures&lt;br /&gt;
* Existing campaigns to strengthen protection for exiled HRDs&lt;br /&gt;
&lt;br /&gt;
=== Identifying, analyzing and prioritizing threats ===&lt;br /&gt;
&lt;br /&gt;
==== Map the actors ====&lt;br /&gt;
&#039;&#039;It is valuable to get a clear picture of all the actors in our environment (individuals, institutions, organizations, etc). Threats almost always come from someone or something. Knowing as much as we can about the actors in our context improves our perception of our environment and thereby, our ability to carry out activities to maintain or expand our space for work.&#039;&#039; (Source: [https://holistic-security.tacticaltech.org/chapters/explore/2-3-vision-strategy-and-actors.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Exercise:&lt;br /&gt;
&lt;br /&gt;
* [https://holistic-security.tacticaltech.org/exercises/explore/visual-actor-mapping-part-1.html &#039;&#039;&#039;Spectrum of allies&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
* [https://newtactics.org/resource/exercises-identifying-allies-opponents &#039;&#039;&#039;Spectrum of allies&#039;&#039;&#039;] (New Tactics in Human Rights project)&lt;br /&gt;
&lt;br /&gt;
==== Brainstorm threats ====&lt;br /&gt;
This exercise is a first attempt at identifying the threats to yourself, your group or organization and your work in defense of human rights. This initial list of threats can then be refined so as to focus in more depth on the threats which are most likely or potentially most harmful. (Source: [https://holistic-security.tacticaltech.org/exercises/explore/threat-brainstorm.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Exercise: [https://holistic-security.tacticaltech.org/exercises/explore/threat-brainstorm.html &#039;&#039;&#039;Threat brainstorm&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
&lt;br /&gt;
==== Analyzing risk, prioritizing threats ====&lt;br /&gt;
Threats can be viewed and categorized in light of the following: the likelihood that the threat will take place, and the impact if and when it does. Likelihood and impact are concepts which help us determine risk: the higher the likelihood or impact of a threat, the higher the risk. Categorizing threats can help to keep us from feeling overwhelmed and keep our perception of threats realistic. (Source: [https://holistic-security.tacticaltech.org/chapters/explore/2-8-identifying-and-analysing-threats.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Exercise: [https://holistic-security.tacticaltech.org/chapters/explore/2-8-identifying-and-analysing-threats.html &#039;&#039;&#039;Threat matrix&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
&lt;br /&gt;
Tools:&lt;br /&gt;
&lt;br /&gt;
* The Ford Foundation’s [https://www.fordfoundation.org/work/our-grants/building-institutions-and-networks/cybersecurity-assessment-tool/ &#039;&#039;&#039;Cybersecurity Assessment Tool (CAT)&#039;&#039;&#039;] is designed to measure the maturity, resiliency, and strength of an organization’s cybersecurity efforts. We have created this questionnaire with busy nontechnical grant makers, grantee partners, civil society organizations, and nonprofits in mind, and we hope it helps shine some light on a recommended path forward for any organization undertaking a cybersecurity journey&lt;br /&gt;
&lt;br /&gt;
==== Analyze threats ====&lt;br /&gt;
This exercise will help you prioritize threats and divine the causes, ramifications, sources as well as the required resources, existing actions and possible next steps.&lt;br /&gt;
&lt;br /&gt;
Exercise: [https://holistic-security.tacticaltech.org/exercises/explore/threat-inventory.html &#039;&#039;&#039;Threat inventory&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
&lt;br /&gt;
== Risk mitigation ==&lt;br /&gt;
In order to build a response to the threats we face, we can consider them in terms of the factors which make us more or less susceptible to them. Read more in [https://holistic-security.tacticaltech.org/chapters/strategise/3-1-responding-to-threats.html this chapter of the Holistic Security Manual]. &lt;br /&gt;
&lt;br /&gt;
=== Mitigation techniques for common threats to information ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
! Threat&lt;br /&gt;
!Mitigation techniques and links to guidance &lt;br /&gt;
|-&lt;br /&gt;
|Data loss&lt;br /&gt;
|&lt;br /&gt;
* [[Ways to securely store and share files|Have your information securely in the cloud or on a server]]&lt;br /&gt;
* Have a backup process&lt;br /&gt;
|-&lt;br /&gt;
|Compromised accounts&lt;br /&gt;
|&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa|Use two factor authentication for all accounts]]&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa|Use unique, complex passwords for all accounts]]&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa|Use a password manager to create, store and protect those passwords]]&lt;br /&gt;
|-&lt;br /&gt;
|Device inspection at checkpoints&lt;br /&gt;
|&lt;br /&gt;
* [[Use a secure messaging app#Tip: use automatic disappearing messages|Use automated disappearing messages on your messaging apps]]&lt;br /&gt;
* [[Ways to securely store and share files|Have your sensitive information stored safely in the cloud and off of your device]]&lt;br /&gt;
* Hide or delete any apps that would provide access to this information (you can restore that app later)&lt;br /&gt;
|-&lt;br /&gt;
|Device confiscation or theft&lt;br /&gt;
|&lt;br /&gt;
* [[Secure your devices#Full disk encryption|Encrypt your devices]]&lt;br /&gt;
* And, review and adapt the same advice above for “device inspection” threat&lt;br /&gt;
|-&lt;br /&gt;
|Information handover&lt;br /&gt;
|&lt;br /&gt;
* [[Trusted hosting companies in the human rights community|Host your information with a company you trust]], who will not turn over information to your opponents (via subpoena, request, etc)&lt;br /&gt;
|-&lt;br /&gt;
|Targeted malware or spyware&lt;br /&gt;
|&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa|Protect yourselves against (spear) phishing attacks]]&lt;br /&gt;
* Use a second device for sensitive activities&lt;br /&gt;
* [[How to mitigate your risk of being subject to Pegasus surveillance|Restart your device regularly to disrupt spyware]]&lt;br /&gt;
* [[Secure your devices|Use anti virus]]&lt;br /&gt;
* [[How to mitigate your risk of being subject to Pegasus surveillance]], and other spyware&lt;br /&gt;
|-&lt;br /&gt;
|Surveillance and monitoring&lt;br /&gt;
|&lt;br /&gt;
* [[Safe internet browsing using VPN and Tor browser|Use a VPN and/or Tor browser]]&lt;br /&gt;
* [[Use a secure messaging app]]&lt;br /&gt;
* [[How to collect and store information in a secure way]]&lt;br /&gt;
* [[Ways to securely store and share files|How to use Google Drive safely and alternatives to Google Drive]]&lt;br /&gt;
|-&lt;br /&gt;
|Website hacking and takeover&lt;br /&gt;
|&lt;br /&gt;
* [[Protect your website|Protect your website from DDOS attacks]]&lt;br /&gt;
* [[Trusted hosting companies in the human rights community|Use a host company that you trust]]&lt;br /&gt;
* And, review and adapt the same advice above for &amp;quot;compromised accounts&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
Other important considerations when collecting, storing, using sensitive information:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Consideration&lt;br /&gt;
!Resources&lt;br /&gt;
|-&lt;br /&gt;
|Make sure you have informed consent from the people you are collecting information&lt;br /&gt;
|[[Guidance on informed consent]]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
* [[Information Security for Human Rights Defenders]]&lt;br /&gt;
&lt;br /&gt;
===Mitigation techniques for online harassment===&lt;br /&gt;
[[How to deal with online harassment and threats]]&lt;br /&gt;
&lt;br /&gt;
==Security planning ==&lt;br /&gt;
Once we have clarity about the threats we face during our activities, we can begin to organize our security protocols into security plans or agreements. There are three main areas to consider when developing any security plans: &lt;br /&gt;
&lt;br /&gt;
# &#039;&#039;&#039;PREPARE: Prevention of threats&#039;&#039;&#039; - Most security plans will include tactics which aim to prevent identified threats from taking place (i.e. reducing their likelihood). This will include:&lt;br /&gt;
## Identify &amp;amp; assess the threats and your vulnerabilities&lt;br /&gt;
## Develop security policies and procedures&lt;br /&gt;
## Implement preventive measures&lt;br /&gt;
## Invest in Security Awareness Programs&lt;br /&gt;
## Conduct Security testing&lt;br /&gt;
# &#039;&#039;&#039;RESPOND: Emergency responses&#039;&#039;&#039; - Emergency plans, also called contingency plans, are the actions which we take in response to a threat becoming a reality. This will include:&lt;br /&gt;
## Build Incident Response Plan&lt;br /&gt;
## Communication Strategy&lt;br /&gt;
## Business continuity plan&lt;br /&gt;
## Disaster recovery plan (Data Backups and Recovery)&lt;br /&gt;
## Communication and Collaboration&lt;br /&gt;
# &#039;&#039;&#039;TREAT: Well-being considerations&#039;&#039;&#039; - Actions we take to maintain our physical energy and a mindful approach to our work and our security –it may include such considerations as where and when we will eat, sleep, relax and enjoy ourselves in the course of our work. This will include: &lt;br /&gt;
## Analyze lessons learned&lt;br /&gt;
## Recovery and Remediation&lt;br /&gt;
## Psychological safety considerations,&lt;br /&gt;
## Review and update your security plans and approach&lt;br /&gt;
For more information, read [[Index.php?title=general guidance for creating security plans and agreements|&#039;&#039;&#039;General guidance for creating security plans and agreements&#039;&#039;&#039;]] and review [https://holistic-security.tacticaltech.org/chapters/strategise/3-3-creating-security-plans-and-agreements.html this chapter of the Holistic Security Manual]. &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Additional resources:  &lt;br /&gt;
&lt;br /&gt;
* Consumer Reports [https://securityplanner.consumerreports.org/ &#039;&#039;&#039;Security Planner&#039;&#039;&#039;] is a free, easy-to-use guide to staying safer online. It provides personalized recommendations and expert advice on topics such as keeping social media accounts from being hacked, locking down devices ranging from smartphones to home security cameras, and reducing intrusive tracking by websites.&lt;br /&gt;
* [https://www.nist.gov/itl/smallbusinesscyber/nist-cybersecurity-framework-0 &#039;&#039;&#039;NIST Cybersecurity Framework 2.0&#039;&#039;&#039;]:  Small Business Quick Start Guide - provides small-to-medium sized businesses (SMB), specifically those who have modest or no cybersecurity plans in place, with considerations to kick-start their cybersecurity risk management strategy using the NIST Cybersecurity Framework (CSF) 2.0. (by the &#039;&#039;National Institute of Standards and Technology)&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Security planning on specific topics===&lt;br /&gt;
&lt;br /&gt;
* [[General tips for international travel]]&lt;br /&gt;
* [[General tips for home security]]&lt;br /&gt;
&lt;br /&gt;
== Building a culture of security within a team ==&lt;br /&gt;
[https://level-up.cc/ &#039;&#039;&#039;LevelUp&#039;&#039;&#039;] is a collection of resources for the global digital safety training community.&lt;br /&gt;
&lt;br /&gt;
[https://wiki.orgsec.community/ &#039;&#039;&#039;Organisational security community wiki&#039;&#039;&#039;] is a resource created by and for security practitioners from all backgrounds to share useful resources and document innovative approaches to long-term security work. &lt;br /&gt;
&lt;br /&gt;
==Resource collections ==&lt;br /&gt;
[https://digitalfirstaid.org/ &#039;&#039;&#039;Digital First Aid Kit&#039;&#039;&#039;] - The Digital First Aid Kit is a free resource to help rapid responders, digital security trainers, and tech-savvy activists to better protect themselves and the communities they support against the most common types of digital emergencies. It can also be used by activists, human rights defenders, bloggers, journalists or media activists who want to learn more about how they can protect themselves and support others. If you or someone you are assisting is experiencing a digital emergency, the Digital First Aid Kit will guide you in diagnosing the issues you are facing, and refer you to support providers for further help if needed.&lt;br /&gt;
&lt;br /&gt;
[https://communitydocs.accessnow.org/ &#039;&#039;&#039;Access Now Help Desk documentation&#039;&#039;&#039;]&lt;br /&gt;
&lt;br /&gt;
[https://cyber-star.org/ &#039;&#039;&#039;CyberSTAR&#039;&#039;&#039;], by SecDev, makes it easier for small organizations and individuals to understand and manage digital safety by organizing it around six themes. This site presents learning resources to help you be safer online—plus teaching resources for digital safety trainers.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
More info:&lt;br /&gt;
&lt;br /&gt;
[[Ways to securely store and share files|Secure storage for sensitive information]] &lt;br /&gt;
&lt;br /&gt;
[[Protect your accounts using strong passwords, pw managers, 2fa|Secure access to sensitive information]] &lt;br /&gt;
&lt;br /&gt;
[[Secure your devices]]&lt;/div&gt;</summary>
		<author><name>Kristin1</name></author>
	</entry>
	<entry>
		<id>https://wiki.digitalrights.community/index.php?title=General_guidance_for_creating_security_plans_and_agreements&amp;diff=50690</id>
		<title>General guidance for creating security plans and agreements</title>
		<link rel="alternate" type="text/html" href="https://wiki.digitalrights.community/index.php?title=General_guidance_for_creating_security_plans_and_agreements&amp;diff=50690"/>
		<updated>2024-06-18T18:47:31Z</updated>

		<summary type="html">&lt;p&gt;Kristin1: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=== Components of a security plan ===&lt;br /&gt;
As far as individual HRDs are concerned, a simple security plan may include the following sections:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Objective (or activity, region, area of work, etc)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Threats&#039;&#039;&#039; - ideally you will create a security plan for each threat&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;PREPARE: Prevention of threats&#039;&#039;&#039;&lt;br /&gt;
** Most security plans will include tactics which aim to prevent identified threats from taking place (i.e. reducing their likelihood). Examples of prevention tactics might include encrypting a database of contacts so as to reduce the likelihood that it can be accessed by adversaries, or employing a security guard at the office so as to reduce the likelihood that it is broken into. &lt;br /&gt;
** Many of these tactics will reflect strategies of acceptance, deterrence and protection or self-defence. As such, they may include advocacy campaigns or other forms of engagement with the public or civilian and military authorities in order to raise consciousness and acceptance of the legitimacy of our work; strengthening of ties with our allies in order to raise the potential cost of aggressions against us, and any number of tactics which build our own capacities and agility in the face of the threats to our work which we have identified. &lt;br /&gt;
** In this section, consider the following activities:&lt;br /&gt;
*** Identify &amp;amp; assess the threats and your vulnerabilities: This involves systematically analyzing your assets (physically, digitally) to understand potential threats and knowing your vulnerabilities that could be exploited.&lt;br /&gt;
*** Develop security policies and procedures: Create clear policies outlining acceptable behavior regarding physical and digital security, and incident reporting.&lt;br /&gt;
*** Implement preventive measures: based on identified threats, implement safeguards procedures and tools, with considering staff training programs to minimize the potential threats impact.&lt;br /&gt;
*** Invest in Security Awareness Programs: regularly educate your staff/colleagues on the founded security plans and measures, this empowers them to identify, respond and report effectively.&lt;br /&gt;
*** Conduct Security testing: regularly assess the effectiveness of security measures through penetration testing (simulated attacks) and security drills. This helps identify weaknesses and refine procedures.&lt;br /&gt;
&lt;br /&gt;
** &#039;&#039;&#039;TOOLS&#039;&#039;&#039;: Devices and information - Devices and information refer to which devices we will depend on in order to carry out our work, and the tactics we will employ in order to ensure that our information and communication can not be accessed by others.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;RESPOND: Emergency responses&#039;&#039;&#039; &lt;br /&gt;
** Emergency plans, also called contingency plans, are the actions which we take in response to a threat becoming a reality. They generally have the aim of lessening the impact of the event and reducing the likelihood of further harm in its aftermath. Examples of emergency response tactics might include bringing a First Aid kit with you when travelling, in case of minor injuries, or a mask and goggles to a protest in case tear gas is used.&lt;br /&gt;
** Coordinating a response to an emergency always involves coordinating actions so digital communication is increasingly important. Decide what the most secure and effective means of communicating with each actor is in different scenarios and identify a back-up means too. Be aware that for emergencies, it might be useful to have clear guidelines on: what to communicate, which channels to use, and to whom.&lt;br /&gt;
** In this section, consider the following activities:&lt;br /&gt;
*** Build Incident Response Plan: develop a clear plan outlining actions to be taken in case of a security threat. This includes identifying the designated responders, notification procedures (internal teams, authorities), and containment strategies to mitigate impact.&lt;br /&gt;
*** Communication Strategy: Establish a communication plan for internal and external stakeholders during a security incident. This ensures timely and accurate information is disseminated, minimizing confusion and panic.&lt;br /&gt;
*** Business continuity plan: A strategy to ensure critical operations continue with minimal disruption during an incident.&lt;br /&gt;
*** Disaster recovery plan (Data Backups and Recovery): establish a specific plan for recovering IT systems and data, maintain robust data backup and recovery procedures to ensure business continuity in case of after a disaster like a fire, flood, or cyberattack.&lt;br /&gt;
*** Communication and Collaboration: effective communication and collaboration across teams are crucial for successful incident response and recovery.&lt;br /&gt;
*** Train your people: Regularly train staff on security policies, incident reporting procedures, and their roles during a contingency.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;TREAT: Well-being considerations&#039;&#039;&#039;&lt;br /&gt;
** Actions we take to maintain our physical energy and a mindful approach to our work and our security –it may include such considerations as where and when we will eat, sleep, relax and enjoy ourselves in the course of our work&lt;br /&gt;
** In this section, consider the following activities:&lt;br /&gt;
*** Analyze lessons learned: conduct a thorough assessment to understand the cause and scope of the security incidents. This helps identify your vulnerabilities, prevent future occurrences, and establish better prevention plans.&lt;br /&gt;
*** Recovery and Remediation: Implement measures to restore affected systems and data. This might involve patching vulnerabilities in software, restoring lost data from backups, and implementing additional security measures to prevent similar incidents.&lt;br /&gt;
*** Psychological safety considerations, give priority to those affected by incident, and ensure that appropriate care is provided to them if physically or psychologically injured, and treat with causes of the incident accordingly later.&lt;br /&gt;
*** Review and update your security plans and approach: Following an incident, review your security posture and update policies, procedures, and preventative measures based on the lessons learned.&lt;br /&gt;
&lt;br /&gt;
=== Example of a basic security plan ===&lt;br /&gt;
Below is an example from [https://holistic-security.tacticaltech.org/media/chapters/pdfs/original/HS_3_Strategise_Chapter_3.pdf Holistic Security Manual] (see )&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Objective&#039;&#039;&#039;: Mission to collect testimonies of victims of human rights abuses in a rural area.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Threats&#039;&#039;&#039;&lt;br /&gt;
** Harassment or arrest by police.&lt;br /&gt;
** Confiscation of computer, mobile phone. &lt;br /&gt;
** Loss of data as a result. &lt;br /&gt;
** Compromising victims’ anonymity as a result.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;PREPARE: Prevention of threats&#039;&#039;&#039;&lt;br /&gt;
** Alert colleagues and friendly embassies and international organisations of the mission, its duration and location. &lt;br /&gt;
** Share contact details of local authorities/aggressors with embassies and international organisations. &lt;br /&gt;
** Check-in with colleagues every 12 hours. &lt;br /&gt;
** Testimonies will be saved to encrypted volume immediately after writing. &lt;br /&gt;
** Testimonies will be sent encrypted with GPG to colleagues every evening. &lt;br /&gt;
** Email inbox and sent folder will be cleaned from the device after use. &lt;br /&gt;
** Security indicators and check-ins will be shared over an encrypted messenger.&lt;br /&gt;
** &#039;&#039;&#039;Devices and information&#039;&#039;&#039;&lt;br /&gt;
*** Mobile phone with encrypted messenger and call apps. &lt;br /&gt;
*** Computer with encrypted volume and encrypting emails with GPG.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;RESPOND: Emergency responses&#039;&#039;&#039; &lt;br /&gt;
** Prepare an alert message (code) to send in case of surveillance/ being followed. &lt;br /&gt;
** Prepare an alert message (code) to send in case of arrest. &lt;br /&gt;
** Have lawyer’s number on speed-dial&lt;br /&gt;
** &#039;&#039;&#039;Emergency plan&#039;&#039;&#039;&lt;br /&gt;
*** In case of arrest, send alert message and call lawyer. &lt;br /&gt;
*** On receiving alert message, colleagues will alert friendly embassies and international organisations. &lt;br /&gt;
*** Ask for urgent appeals to be sent by international organisations to authorities.&lt;br /&gt;
*** Hand over password for encrypted volume if under threat of abuse.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;TREAT: Well-being considerations&#039;&#039;&#039;&lt;br /&gt;
** Eating in a decent local restaurant, at least twice a day. &lt;br /&gt;
** Switching off mobile phone and all other devices during mealtimes. &lt;br /&gt;
** Calling family over a secure channel to connect every evening&lt;br /&gt;
&lt;br /&gt;
=== Templates and examples ===&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;[https://drive.google.com/file/d/1rbzwGlZg6Fg6JHIVfx8StJlAc1MRPtDq/view?usp=sharing Unified Safety &amp;amp; Security Operating Procedure-Plan /or Agreement (PDF)]&#039;&#039;&#039; (or [https://docs.google.com/document/d/14gOQWbQdJ2nd3o9XW0gzZpw7neB2qBnO/edit?usp=sharing&amp;amp;ouid=116599388433607757970&amp;amp;rtpof=true&amp;amp;sd=true download the .docx version] of this document) -- This document is a collection of example security plans. It includes a number of risks, adding examples of mitigation strategies, prevention advice, and emergency procedures for the reader to benefit from as reference. It’s highly important to take into account the importance of modifying these risks in relation to the context area, while assessing the risks and developing strategies and procedures in a way that suits our capabilities and the ease of implementing on the ground.&lt;br /&gt;
&lt;br /&gt;
=== Further reading ===&lt;br /&gt;
&lt;br /&gt;
* [https://holistic-security.tacticaltech.org/chapters/strategise/3-3-creating-security-plans-and-agreements.html Holistic Security Manual: Creating security plans and agreements] &lt;br /&gt;
&lt;br /&gt;
* [https://holistic-security.tacticaltech.org/chapters/strategise/3-4-security-in-groups-and-organisations.html Holistic Security Manual: Security in groups and organisations] &lt;br /&gt;
&lt;br /&gt;
* [https://holistic-security.tacticaltech.org/chapters/strategise/3-5-assessing-organisational-security.html Tips for overcoming resistance to security planning]&lt;/div&gt;</summary>
		<author><name>Kristin1</name></author>
	</entry>
	<entry>
		<id>https://wiki.digitalrights.community/index.php?title=Security_resources_organized_by_topic&amp;diff=50689</id>
		<title>Security resources organized by topic</title>
		<link rel="alternate" type="text/html" href="https://wiki.digitalrights.community/index.php?title=Security_resources_organized_by_topic&amp;diff=50689"/>
		<updated>2024-06-18T17:54:28Z</updated>

		<summary type="html">&lt;p&gt;Kristin1: /* Security planning */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Building awareness of how we respond to threat and stress ==&lt;br /&gt;
&#039;&#039;Developing a useful security strategy is heavily dependent on our perception – we need to be able to identify and analyse threats in order to implement ways of avoiding or reducing them. But we all perceive the world around us differently based on our circumstances, experiences and many other factors. As a result, our perception can sometimes be hindered: threats which may be evident to some people may go unrecognised by others; similarly, we also need to be able to tell the difference between threats which are genuinely possible and those which we falsely perceive, called &#039;unfounded fears&#039;. It&#039;s a good idea to become familiar with factors that condition our perceptions of threat, and consider ways that we can take these into account in our security planning.&#039;&#039; (Source: [https://holistic-security.tacticaltech.org/chapters/prepare/1-2-individual-responses-to-threat.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Resources:&lt;br /&gt;
&lt;br /&gt;
* [https://holistic-security.tacticaltech.org/chapters/prepare/1-2-individual-responses-to-threat.html &#039;&#039;&#039;Exploring individual responses to threat&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
* [https://holistic-security.tacticaltech.org/chapters/prepare/1-4-team-and-peer-responses-to-threat.html &#039;&#039;&#039;Exploring group responses to threat&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
* [https://holistic-security.tacticaltech.org/chapters/prepare/1-5-communicating-about-threats-in-teams-and-organisations.html &#039;&#039;&#039;Communicating about security in teams and organizations&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
&lt;br /&gt;
== Understanding our threats and context ==&lt;br /&gt;
&lt;br /&gt;
=== Situation monitoring and analysis ===&lt;br /&gt;
Situation monitoring and analysis is the broadest kind of analysis of our context: observing the political, economic, social, technological, legal and environmental developments in society which are relevant to our work, and may impact our security situation. (Source: [https://holistic-security.tacticaltech.org/chapters/explore/2-2-situation-monitoring-and-analysis.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Exercise: [https://holistic-security.tacticaltech.org/exercises/explore/situational-monitoring-a-quick-pestle-analysis.html &#039;&#039;&#039;Pestle analysis&#039;&#039;&#039;] (Holistic Security Manual) &lt;br /&gt;
&lt;br /&gt;
Tool: &#039;&#039;&#039;[https://tnr-research.uwazi.io/ Research Database on transnational repression]&#039;&#039;&#039; - This collection of research reports on transnational repression can help human rights defenders better understand: &lt;br /&gt;
&lt;br /&gt;
* Transnational Repression (TNR) threats that are possible, to determine appropriate mitigation techniques&lt;br /&gt;
* Which TNR threats are unlikely, in order to alleviate fear&lt;br /&gt;
* What exiled HRDs can expect from a host country in terms of protection measures&lt;br /&gt;
* Existing campaigns to strengthen protection for exiled HRDs&lt;br /&gt;
&lt;br /&gt;
=== Identifying, analyzing and prioritizing threats ===&lt;br /&gt;
&lt;br /&gt;
==== Map the actors ====&lt;br /&gt;
&#039;&#039;It is valuable to get a clear picture of all the actors in our environment (individuals, institutions, organizations, etc). Threats almost always come from someone or something. Knowing as much as we can about the actors in our context improves our perception of our environment and thereby, our ability to carry out activities to maintain or expand our space for work.&#039;&#039; (Source: [https://holistic-security.tacticaltech.org/chapters/explore/2-3-vision-strategy-and-actors.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Exercise:&lt;br /&gt;
&lt;br /&gt;
* [https://holistic-security.tacticaltech.org/exercises/explore/visual-actor-mapping-part-1.html &#039;&#039;&#039;Spectrum of allies&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
* [https://newtactics.org/resource/exercises-identifying-allies-opponents &#039;&#039;&#039;Spectrum of allies&#039;&#039;&#039;] (New Tactics in Human Rights project)&lt;br /&gt;
&lt;br /&gt;
==== Brainstorm threats ====&lt;br /&gt;
This exercise is a first attempt at identifying the threats to yourself, your group or organization and your work in defense of human rights. This initial list of threats can then be refined so as to focus in more depth on the threats which are most likely or potentially most harmful. (Source: [https://holistic-security.tacticaltech.org/exercises/explore/threat-brainstorm.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Exercise: [https://holistic-security.tacticaltech.org/exercises/explore/threat-brainstorm.html &#039;&#039;&#039;Threat brainstorm&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
&lt;br /&gt;
==== Analyzing risk, prioritizing threats ====&lt;br /&gt;
Threats can be viewed and categorized in light of the following: the likelihood that the threat will take place, and the impact if and when it does. Likelihood and impact are concepts which help us determine risk: the higher the likelihood or impact of a threat, the higher the risk. Categorizing threats can help to keep us from feeling overwhelmed and keep our perception of threats realistic. (Source: [https://holistic-security.tacticaltech.org/chapters/explore/2-8-identifying-and-analysing-threats.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Exercise: [https://holistic-security.tacticaltech.org/chapters/explore/2-8-identifying-and-analysing-threats.html &#039;&#039;&#039;Threat matrix&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
&lt;br /&gt;
Tools:&lt;br /&gt;
&lt;br /&gt;
* The Ford Foundation’s [https://www.fordfoundation.org/work/our-grants/building-institutions-and-networks/cybersecurity-assessment-tool/ &#039;&#039;&#039;Cybersecurity Assessment Tool (CAT)&#039;&#039;&#039;] is designed to measure the maturity, resiliency, and strength of an organization’s cybersecurity efforts. We have created this questionnaire with busy nontechnical grant makers, grantee partners, civil society organizations, and nonprofits in mind, and we hope it helps shine some light on a recommended path forward for any organization undertaking a cybersecurity journey&lt;br /&gt;
&lt;br /&gt;
==== Analyze threats ====&lt;br /&gt;
This exercise will help you prioritize threats and divine the causes, ramifications, sources as well as the required resources, existing actions and possible next steps.&lt;br /&gt;
&lt;br /&gt;
Exercise: [https://holistic-security.tacticaltech.org/exercises/explore/threat-inventory.html &#039;&#039;&#039;Threat inventory&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
&lt;br /&gt;
== Risk mitigation ==&lt;br /&gt;
In order to build a response to the threats we face, we can consider them in terms of the factors which make us more or less susceptible to them. Read more in [https://holistic-security.tacticaltech.org/chapters/strategise/3-1-responding-to-threats.html this chapter of the Holistic Security Manual]. &lt;br /&gt;
&lt;br /&gt;
=== Mitigation techniques for common threats to information ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
! Threat&lt;br /&gt;
!Mitigation techniques and links to guidance &lt;br /&gt;
|-&lt;br /&gt;
|Data loss&lt;br /&gt;
|&lt;br /&gt;
* [[Ways to securely store and share files|Have your information securely in the cloud or on a server]]&lt;br /&gt;
* Have a backup process&lt;br /&gt;
|-&lt;br /&gt;
|Compromised accounts&lt;br /&gt;
|&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa|Use two factor authentication for all accounts]]&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa|Use unique, complex passwords for all accounts]]&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa|Use a password manager to create, store and protect those passwords]]&lt;br /&gt;
|-&lt;br /&gt;
|Device inspection at checkpoints&lt;br /&gt;
|&lt;br /&gt;
* [[Use a secure messaging app#Tip: use automatic disappearing messages|Use automated disappearing messages on your messaging apps]]&lt;br /&gt;
* [[Ways to securely store and share files|Have your sensitive information stored safely in the cloud and off of your device]]&lt;br /&gt;
* Hide or delete any apps that would provide access to this information (you can restore that app later)&lt;br /&gt;
|-&lt;br /&gt;
|Device confiscation or theft&lt;br /&gt;
|&lt;br /&gt;
* [[Secure your devices#Full disk encryption|Encrypt your devices]]&lt;br /&gt;
* And, review and adapt the same advice above for “device inspection” threat&lt;br /&gt;
|-&lt;br /&gt;
|Information handover&lt;br /&gt;
|&lt;br /&gt;
* [[Trusted hosting companies in the human rights community|Host your information with a company you trust]], who will not turn over information to your opponents (via subpoena, request, etc)&lt;br /&gt;
|-&lt;br /&gt;
|Targeted malware or spyware&lt;br /&gt;
|&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa|Protect yourselves against (spear) phishing attacks]]&lt;br /&gt;
* Use a second device for sensitive activities&lt;br /&gt;
* [[How to mitigate your risk of being subject to Pegasus surveillance|Restart your device regularly to disrupt spyware]]&lt;br /&gt;
* [[Secure your devices|Use anti virus]]&lt;br /&gt;
* [[How to mitigate your risk of being subject to Pegasus surveillance]], and other spyware&lt;br /&gt;
|-&lt;br /&gt;
|Surveillance and monitoring&lt;br /&gt;
|&lt;br /&gt;
* [[Safe internet browsing using VPN and Tor browser|Use a VPN and/or Tor browser]]&lt;br /&gt;
* [[Use a secure messaging app]]&lt;br /&gt;
* [[How to collect and store information in a secure way]]&lt;br /&gt;
* [[Ways to securely store and share files|How to use Google Drive safely and alternatives to Google Drive]]&lt;br /&gt;
|-&lt;br /&gt;
|Website hacking and takeover&lt;br /&gt;
|&lt;br /&gt;
* [[Protect your website|Protect your website from DDOS attacks]]&lt;br /&gt;
* [[Trusted hosting companies in the human rights community|Use a host company that you trust]]&lt;br /&gt;
* And, review and adapt the same advice above for &amp;quot;compromised accounts&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
Other important considerations when collecting, storing, using sensitive information:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Consideration&lt;br /&gt;
!Resources&lt;br /&gt;
|-&lt;br /&gt;
|Make sure you have informed consent from the people you are collecting information&lt;br /&gt;
|[[Guidance on informed consent]]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
* [[Information Security for Human Rights Defenders]]&lt;br /&gt;
&lt;br /&gt;
===Mitigation techniques for online harassment===&lt;br /&gt;
[[How to deal with online harassment and threats]]&lt;br /&gt;
&lt;br /&gt;
==Security planning ==&lt;br /&gt;
Once we have clarity about the threats we face during our activities, we can begin to organize our security protocols into security plans or agreements. There are three main areas to consider when developing any security plans: &lt;br /&gt;
&lt;br /&gt;
# Prepare -- What can you do now to prepare for when this threat happens? &lt;br /&gt;
# Respond -- How will you and your team respond when the threat occurs?&lt;br /&gt;
# Treat -- How will you take care of your team after the threat has happened?&lt;br /&gt;
Prepare:&lt;br /&gt;
* Identify &amp;amp; assess the threats and your vulnerabilities: This involves systematically analyzing your     assets (physically, digitally) to understand potential threats and knowing     your vulnerabilities that could be exploited.&lt;br /&gt;
* Develop security policies and procedures: Create clear policies outlining acceptable behavior regarding     physical and digital security, and incident reporting.&lt;br /&gt;
* Implement preventive measures: based on identified threats, implement safeguards procedures and     tools, with considering staff training programs to minimize the potential     threats impact.&lt;br /&gt;
* Invest in Security Awareness Programs: regularly educate your staff/colleagues on the founded security     plans and measures, this empowers them to identify, respond and report     effectively.&lt;br /&gt;
* Conduct Security testing: regularly assess the effectiveness of security measures through     penetration testing (simulated attacks) and security drills. This helps     identify weaknesses and refine procedures.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Respond:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Build Incident Response Plan:&#039;&#039;&#039; develop a clear plan outlining actions to be taken in case of a     security threat. This includes identifying the designated responders,     notification procedures (internal teams, authorities), and containment     strategies to mitigate impact.&lt;br /&gt;
* &#039;&#039;&#039;Communication Strategy:&#039;&#039;&#039; Establish a communication plan for internal and external     stakeholders during a security incident. This ensures timely and accurate     information is disseminated, minimizing confusion and panic.&lt;br /&gt;
* &#039;&#039;&#039;Business continuity plan:&#039;&#039;&#039; A strategy to ensure critical operations continue with minimal     disruption during an incident. &lt;br /&gt;
* &#039;&#039;&#039;Disaster recovery plan (Data     Backups and Recovery):&#039;&#039;&#039; establish a specific plan for     recovering IT systems and data, maintain robust data backup and recovery     procedures to ensure business continuity in case of after a disaster like     a fire, flood, or cyberattack.&lt;br /&gt;
* &#039;&#039;&#039;Communication and Collaboration:&#039;&#039;&#039; effective communication and     collaboration across teams are crucial for successful incident response     and recovery.&lt;br /&gt;
* &#039;&#039;&#039;Train your people:&#039;&#039;&#039; Regularly train staff on security policies, incident reporting     procedures, and their roles during a contingency. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Treat:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Analyze lessons learned:&#039;&#039;&#039; conduct a thorough assessment to     understand the cause and scope of the security incidents. This helps     identify your vulnerabilities, prevent future occurrences, and establish     better prevention plans.&lt;br /&gt;
* &#039;&#039;&#039;Recovery and Remediation&#039;&#039;&#039;: Implement measures to restore     affected systems and data. This might involve patching vulnerabilities in     software, restoring lost data from backups, and implementing additional     security measures to prevent similar incidents.&lt;br /&gt;
* &#039;&#039;&#039;psychological safety considerations,&#039;&#039;&#039; give priority to those affected by incident, and ensure that     appropriate care is provided to them if physically or psychologically     injured, and treat with causes of the incident accordingly later.&lt;br /&gt;
* &#039;&#039;&#039;Review and update your security plans and approach:&#039;&#039;&#039; Following an incident, review your security posture and update     policies, procedures, and preventative measures based on the lessons     learned. &lt;br /&gt;
&lt;br /&gt;
Review [https://holistic-security.tacticaltech.org/chapters/strategise/3-3-creating-security-plans-and-agreements.html this chapter of the Holistic Security Manual]. &lt;br /&gt;
&lt;br /&gt;
[[General guidance for creating security plans and agreements]] &lt;br /&gt;
&lt;br /&gt;
Resources:  &lt;br /&gt;
&lt;br /&gt;
* Consumer Reports [https://securityplanner.consumerreports.org/ &#039;&#039;&#039;Security Planner&#039;&#039;&#039;] is a free, easy-to-use guide to staying safer online. It provides personalized recommendations and expert advice on topics such as keeping social media accounts from being hacked, locking down devices ranging from smartphones to home security cameras, and reducing intrusive tracking by websites.&lt;br /&gt;
* [https://www.nist.gov/itl/smallbusinesscyber/nist-cybersecurity-framework-0 &#039;&#039;&#039;NIST Cybersecurity Framework 2.0&#039;&#039;&#039;]:  Small Business Quick Start Guide - provides small-to-medium sized businesses (SMB), specifically those who have modest or no cybersecurity plans in place, with considerations to kick-start their cybersecurity risk management strategy using the NIST Cybersecurity Framework (CSF) 2.0. (by the &#039;&#039;National Institute of Standards and Technology)&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Security planning on specific topics===&lt;br /&gt;
&lt;br /&gt;
* [[General tips for international travel]]&lt;br /&gt;
* [[General tips for home security]]&lt;br /&gt;
&lt;br /&gt;
== Building a culture of security within a team ==&lt;br /&gt;
[https://level-up.cc/ &#039;&#039;&#039;LevelUp&#039;&#039;&#039;] is a collection of resources for the global digital safety training community.&lt;br /&gt;
&lt;br /&gt;
[https://wiki.orgsec.community/ &#039;&#039;&#039;Organisational security community wiki&#039;&#039;&#039;] is a resource created by and for security practitioners from all backgrounds to share useful resources and document innovative approaches to long-term security work. &lt;br /&gt;
&lt;br /&gt;
==Resource collections ==&lt;br /&gt;
[https://digitalfirstaid.org/ &#039;&#039;&#039;Digital First Aid Kit&#039;&#039;&#039;] - The Digital First Aid Kit is a free resource to help rapid responders, digital security trainers, and tech-savvy activists to better protect themselves and the communities they support against the most common types of digital emergencies. It can also be used by activists, human rights defenders, bloggers, journalists or media activists who want to learn more about how they can protect themselves and support others. If you or someone you are assisting is experiencing a digital emergency, the Digital First Aid Kit will guide you in diagnosing the issues you are facing, and refer you to support providers for further help if needed.&lt;br /&gt;
&lt;br /&gt;
[https://communitydocs.accessnow.org/ &#039;&#039;&#039;Access Now Help Desk documentation&#039;&#039;&#039;]&lt;br /&gt;
&lt;br /&gt;
[https://cyber-star.org/ &#039;&#039;&#039;CyberSTAR&#039;&#039;&#039;], by SecDev, makes it easier for small organizations and individuals to understand and manage digital safety by organizing it around six themes. This site presents learning resources to help you be safer online—plus teaching resources for digital safety trainers.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
More info:&lt;br /&gt;
&lt;br /&gt;
[[Ways to securely store and share files|Secure storage for sensitive information]] &lt;br /&gt;
&lt;br /&gt;
[[Protect your accounts using strong passwords, pw managers, 2fa|Secure access to sensitive information]] &lt;br /&gt;
&lt;br /&gt;
[[Secure your devices]]&lt;/div&gt;</summary>
		<author><name>Kristin1</name></author>
	</entry>
	<entry>
		<id>https://wiki.digitalrights.community/index.php?title=Secure_your_devices&amp;diff=50688</id>
		<title>Secure your devices</title>
		<link rel="alternate" type="text/html" href="https://wiki.digitalrights.community/index.php?title=Secure_your_devices&amp;diff=50688"/>
		<updated>2024-06-18T17:09:06Z</updated>

		<summary type="html">&lt;p&gt;Kristin1: /* Keep your device or operating system up-to-date with software updates */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Keep your device or operating system up-to-date with software updates ==&lt;br /&gt;
When you buy a device or an operating system, keep it up-to-date with software updates. Updates will often fix security problems in older code that attacks can exploit. Note that some older phones and operating systems may no longer be supported, even for security updates. In particular, Microsoft has made it clear that versions of Windows Vista, XP, and below will not receive fixes for even severe security problems. This means that if you use these, you cannot expect them to be secure from attackers. The same is true for OS X before 10.11 or El Capitan. (Source: [https://ssd.eff.org/module/choosing-your-tools Electronic Frontier SSD]) &lt;br /&gt;
&lt;br /&gt;
=== Free, open source operating systems ===&lt;br /&gt;
If you cannot afford to purchase a licensed Windows or Mac operating system, you can use a free and open source operating system, such as: &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[https://www.linuxmint.com/ Linux Mint]&#039;&#039;&#039; is an operating system for desktop and laptop computers. It is designed to work &#039;out of the box&#039; and comes fully equipped with the apps most people need. Linux Mint works on most computers. It can also be run from a live USB stick to make sure everything works fine without having to install anything. &lt;br /&gt;
&lt;br /&gt;
[https://tails.net/ &#039;&#039;&#039;Tails&#039;&#039;&#039;] is a portable operating system that protects against surveillance and censorship. To use Tails, shut down the computer and start on your Tails USB stick instead of starting on Windows, macOS, or Linux. You can temporarily turn your own computer into a secure machine. You can also &#039;&#039;&#039;.&#039;&#039;&#039; You can also stay safe while using the computer of somebody else&#039;&#039;&#039;.&#039;&#039;&#039; Tails is a 1.4 GB download and takes ½ hour to install. Tails can be installed on any USB stick of 8 GB minimum. Tails works on most computers less than 10 years old. You can start again on the other operating system after you s t down Tails. You don&#039;t have to worry about the computer having viruses because Tails runs independently from the other operating system and never uses the hard disk. But, Tails cannot always protect you if you install it from a computer with viruses or if you use it on a computer with malicious hardware, like keyloggers. &lt;br /&gt;
&lt;br /&gt;
== Use antivirus or anti-malware ==&lt;br /&gt;
&lt;br /&gt;
=== Advice ===&lt;br /&gt;
1. Know how to check if your antivirus or anti-malware app is working and updating itself.&lt;br /&gt;
&lt;br /&gt;
2. Perform periodic manual scans.&lt;br /&gt;
&lt;br /&gt;
3. Choose and run only one anti-malware app; if you run more than one on a device, they may interfere with each other.&lt;br /&gt;
&lt;br /&gt;
[https://freedom.press/training/blog/what-about-antivirus/ What about antivirus?] Article by David Huerta (2020) of the Freedom of the Press Foundation Here&#039;s a good article &lt;br /&gt;
Excerpt: &amp;quot;Antivirus software is one of the oldest offerings available from the now billion-dollar cybersecurity industry. But what does antivirus software do to help protect our devices, what does it not do, and do we really need it?&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== Antivirus software options ===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Windows&#039;&#039;&#039;&lt;br /&gt;
On Windows 10, Security in a Box recommends to turn on Windows&#039;s own anti-malware protection [https://securityplanner.consumerreports.org/tool/turn-on-windows-defender-antivirus Windows Defender]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Linux&#039;&#039;&#039;&lt;br /&gt;
On Linux you can manually scan your device for malware with [https://www.clamav.net/ ClamAV]. But be aware it is only a scanner, and will not monitor your system to protect you from infection. You can use it to determine whether or not a file or directory contains known malware — and it can be run from a USB memory stick in case you do not have permission to install software on the suspect computer. You may also consider using paid antivirus (e.g. ESET NOD32)&lt;br /&gt;
&lt;br /&gt;
Software available on multiple operating systems that offer free versions:&lt;br /&gt;
* [https://www.bitdefender.com BitDefender] (Android, iOS, Mac, Windows) - Warning: This can be a heavy program for many computers. &lt;br /&gt;
* [https://www.malwarebytes.com/ Malwarebytes] (Android, iOS, Mac, Windows). Malwarebytes full version is free for 2 week, but you can manually scan your device without time limits.&lt;br /&gt;
* [https://www.avast.com/ Avast antivirus] (Android, iOS, Mac, Windows)&lt;br /&gt;
&lt;br /&gt;
Not recommended:&lt;br /&gt;
* [https://www.avg.com/ AVG antivirus] (Android, iOS, Mac, Windows)&lt;br /&gt;
* [https://www.avira.com/en/free-antivirus Avira antivirus] (Android, iOS, Mac, Windows)&lt;br /&gt;
&lt;br /&gt;
From the community: AVG, Avira were found to be running mining operations on consumers PC and they don&#039;t offer proper protection.&lt;br /&gt;
&lt;br /&gt;
Note that all antivirus and anti-malware apps collect information on how the protected devices are being used. Some of this information may be shared with companies which own them. There have been cases where this information was sold to third parties.&lt;br /&gt;
&lt;br /&gt;
== Full disk encryption ==&lt;br /&gt;
&lt;br /&gt;
=== For computers ===&lt;br /&gt;
&#039;&#039;&#039;Apple&#039;&#039;&#039; provides a built-in, full-disk encryption feature on macOS called [[wikipedia:FileVault|FileVault]]. Guide: How to encrypt your [https://ssd.eff.org/module/how-encrypt-your-iphone iPhone] (available in 10+ languages)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Linux&#039;&#039;&#039; distributions usually offer full-disk encryption when you first set up your system.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Windows Vista or later&#039;&#039;&#039; includes a full-disk encryption feature called [https://learn.microsoft.com/en-us/windows/security/operating-system-security/data-protection/bitlocker/ BitLocker]. Guide: How to encrypt your [https://ssd.eff.org/module/how-encrypt-your-windows-device Windows device] (available in 10+ languages)&lt;br /&gt;
&lt;br /&gt;
=== For smartphones and tablets ===&lt;br /&gt;
&#039;&#039;&#039;Apple&#039;&#039;&#039; devices such as the iPhone and iPad describe it as “Data Protection” and turn it on if you set a passcode.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Android&#039;&#039;&#039; offers full-disk encryption when you first set up your device on newer devices, or anytime afterwards under its “Security” settings for all devices.&lt;br /&gt;
&lt;br /&gt;
=== Disk encryption vulnerabilities ===&lt;br /&gt;
There are some risks related to disk encryption that you need to consider before moving forward, and find ways to mitigate these risks:&lt;br /&gt;
# Data is exposed as soon as it leaves the protected disk&lt;br /&gt;
# Data is exposed in the clear if a user session is hijacked &lt;br /&gt;
# Data is exposed if device credentials are compromised&lt;br /&gt;
# All data is protected by a single key, which means that if you lose that one key, you lose access to the device&lt;br /&gt;
&lt;br /&gt;
== Disable features that create vulnerabilities ==&lt;br /&gt;
&#039;&#039;&#039;iPhone and Mac devices offers [https://support.apple.com/en-us/HT212650 Lockdown Mode]&#039;&#039;&#039; - &amp;quot;When Lockdown Mode is enabled, your device won’t function like it typically does. To reduce the attack surface that potentially could be exploited by highly targeted mercenary spyware, certain apps, websites, and features are strictly limited for security and some experiences might not be available at all. Lockdown Mode is available in iOS 16, iPadOS 16, and macOS Ventura.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Android also offers a version of [https://www.zdnet.com/article/how-to-use-the-android-lockdown-mode-and-why-you-should/ Lockdown Mode]&#039;&#039;&#039; - &amp;quot;When lockdown mode is enabled, fingerprint sensors, facial recognition, and voice recognition do not function. Once you&#039;ve activated lockdown mode, the only way to gain access to your device is either via PIN, password, or pattern. One thing you must know about lockdown mode is that it&#039;s a one-time thing. In other words, once you&#039;ve enabled it, it will immediately be disabled upon successful login. That means you have to re-enable lockdown mode every time you want to use it.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
== Separate your phone number from your device ==&lt;br /&gt;
[https://theintercept.com/2017/09/28/signal-tutorial-second-phone-number/ How to use signal without giving out your phone number] (article) - A step-by-step guide to protecting your private phone number while enjoying the security of encrypted texting app Signal.&lt;br /&gt;
----&lt;br /&gt;
&#039;&#039;Last updated June 18, 2024&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Source for this content: [https://securityinabox.org/en/phones-and-computers/malware/#use-antivirus-or-anti-malware Security in a Box]&#039;&#039; , [https://ssd.eff.org/ Electronic Frontier SSD], and discussions with human rights security practitioners.&#039;&#039;&lt;/div&gt;</summary>
		<author><name>Kristin1</name></author>
	</entry>
	<entry>
		<id>https://wiki.digitalrights.community/index.php?title=Secure_your_devices&amp;diff=50687</id>
		<title>Secure your devices</title>
		<link rel="alternate" type="text/html" href="https://wiki.digitalrights.community/index.php?title=Secure_your_devices&amp;diff=50687"/>
		<updated>2024-06-18T15:13:36Z</updated>

		<summary type="html">&lt;p&gt;Kristin1: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Use licensed operating systems and software ==&lt;br /&gt;
Some general advice is almost always true, however. When you buy a device or an operating system, keep it up-to-date with software updates. Updates will often fix security problems in older code that attacks can exploit. Note that some older phones and operating systems may no longer be supported, even for security updates. In particular, Microsoft has made it clear that versions of Windows Vista, XP, and below will not receive fixes for even severe security problems. This means that if you use these, you cannot expect them to be secure from attackers. The same is true for OS X before 10.11 or El Capitan. &lt;br /&gt;
&lt;br /&gt;
== Use antivirus or anti-malware ==&lt;br /&gt;
&lt;br /&gt;
=== Advice ===&lt;br /&gt;
1. Know how to check if your antivirus or anti-malware app is working and updating itself.&lt;br /&gt;
&lt;br /&gt;
2. Perform periodic manual scans.&lt;br /&gt;
&lt;br /&gt;
3. Choose and run only one anti-malware app; if you run more than one on a device, they may interfere with each other.&lt;br /&gt;
&lt;br /&gt;
[https://freedom.press/training/blog/what-about-antivirus/ What about antivirus?] Article by David Huerta (2020) of the Freedom of the Press Foundation Here&#039;s a good article &lt;br /&gt;
Excerpt: &amp;quot;Antivirus software is one of the oldest offerings available from the now billion-dollar cybersecurity industry. But what does antivirus software do to help protect our devices, what does it not do, and do we really need it?&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== Antivirus software options ===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Windows&#039;&#039;&#039;&lt;br /&gt;
On Windows 10, Security in a Box recommends to turn on Windows&#039;s own anti-malware protection [https://securityplanner.consumerreports.org/tool/turn-on-windows-defender-antivirus Windows Defender]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Linux&#039;&#039;&#039;&lt;br /&gt;
On Linux you can manually scan your device for malware with [https://www.clamav.net/ ClamAV]. But be aware it is only a scanner, and will not monitor your system to protect you from infection. You can use it to determine whether or not a file or directory contains known malware — and it can be run from a USB memory stick in case you do not have permission to install software on the suspect computer. You may also consider using paid antivirus (e.g. ESET NOD32)&lt;br /&gt;
&lt;br /&gt;
Software available on multiple operating systems that offer free versions:&lt;br /&gt;
* [https://www.bitdefender.com BitDefender] (Android, iOS, Mac, Windows) - Warning: This can be a heavy program for many computers. &lt;br /&gt;
* [https://www.malwarebytes.com/ Malwarebytes] (Android, iOS, Mac, Windows). Malwarebytes full version is free for 2 week, but you can manually scan your device without time limits.&lt;br /&gt;
* [https://www.avast.com/ Avast antivirus] (Android, iOS, Mac, Windows)&lt;br /&gt;
&lt;br /&gt;
Not recommended:&lt;br /&gt;
* [https://www.avg.com/ AVG antivirus] (Android, iOS, Mac, Windows)&lt;br /&gt;
* [https://www.avira.com/en/free-antivirus Avira antivirus] (Android, iOS, Mac, Windows)&lt;br /&gt;
&lt;br /&gt;
From the community: AVG, Avira were found to be running mining operations on consumers PC and they don&#039;t offer proper protection.&lt;br /&gt;
&lt;br /&gt;
Note that all antivirus and anti-malware apps collect information on how the protected devices are being used. Some of this information may be shared with companies which own them. There have been cases where this information was sold to third parties.&lt;br /&gt;
&lt;br /&gt;
== Full disk encryption ==&lt;br /&gt;
&lt;br /&gt;
=== For computers ===&lt;br /&gt;
&#039;&#039;&#039;Apple&#039;&#039;&#039; provides a built-in, full-disk encryption feature on macOS called [[wikipedia:FileVault|FileVault]]. Guide: How to encrypt your [https://ssd.eff.org/module/how-encrypt-your-iphone iPhone] (available in 10+ languages)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Linux&#039;&#039;&#039; distributions usually offer full-disk encryption when you first set up your system.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Windows Vista or later&#039;&#039;&#039; includes a full-disk encryption feature called [https://learn.microsoft.com/en-us/windows/security/operating-system-security/data-protection/bitlocker/ BitLocker]. Guide: How to encrypt your [https://ssd.eff.org/module/how-encrypt-your-windows-device Windows device] (available in 10+ languages)&lt;br /&gt;
&lt;br /&gt;
=== For smartphones and tablets ===&lt;br /&gt;
&#039;&#039;&#039;Apple&#039;&#039;&#039; devices such as the iPhone and iPad describe it as “Data Protection” and turn it on if you set a passcode.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Android&#039;&#039;&#039; offers full-disk encryption when you first set up your device on newer devices, or anytime afterwards under its “Security” settings for all devices.&lt;br /&gt;
&lt;br /&gt;
=== Disk encryption vulnerabilities ===&lt;br /&gt;
There are some risks related to disk encryption that you need to consider before moving forward, and find ways to mitigate these risks:&lt;br /&gt;
# Data is exposed as soon as it leaves the protected disk&lt;br /&gt;
# Data is exposed in the clear if a user session is hijacked &lt;br /&gt;
# Data is exposed if device credentials are compromised&lt;br /&gt;
# All data is protected by a single key, which means that if you lose that one key, you lose access to the device&lt;br /&gt;
&lt;br /&gt;
== Disable features that create vulnerabilities ==&lt;br /&gt;
&#039;&#039;&#039;iPhone and Mac devices offers [https://support.apple.com/en-us/HT212650 Lockdown Mode]&#039;&#039;&#039; - &amp;quot;When Lockdown Mode is enabled, your device won’t function like it typically does. To reduce the attack surface that potentially could be exploited by highly targeted mercenary spyware, certain apps, websites, and features are strictly limited for security and some experiences might not be available at all. Lockdown Mode is available in iOS 16, iPadOS 16, and macOS Ventura.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Android also offers a version of [https://www.zdnet.com/article/how-to-use-the-android-lockdown-mode-and-why-you-should/ Lockdown Mode]&#039;&#039;&#039; - &amp;quot;When lockdown mode is enabled, fingerprint sensors, facial recognition, and voice recognition do not function. Once you&#039;ve activated lockdown mode, the only way to gain access to your device is either via PIN, password, or pattern. One thing you must know about lockdown mode is that it&#039;s a one-time thing. In other words, once you&#039;ve enabled it, it will immediately be disabled upon successful login. That means you have to re-enable lockdown mode every time you want to use it.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
== Separate your phone number from your device ==&lt;br /&gt;
[https://theintercept.com/2017/09/28/signal-tutorial-second-phone-number/ How to use signal without giving out your phone number] (article) - A step-by-step guide to protecting your private phone number while enjoying the security of encrypted texting app Signal.&lt;br /&gt;
----&lt;br /&gt;
&#039;&#039;Last updated June 18, 2024&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Source for this content: [https://securityinabox.org/en/phones-and-computers/malware/#use-antivirus-or-anti-malware Security in a Box]&#039;&#039; , [https://ssd.eff.org/ Electronic Frontier SSD], and discussions with human rights security practitioners.&#039;&#039;&lt;/div&gt;</summary>
		<author><name>Kristin1</name></author>
	</entry>
	<entry>
		<id>https://wiki.digitalrights.community/index.php?title=Building_a_trauma-informed_organization&amp;diff=50686</id>
		<title>Building a trauma-informed organization</title>
		<link rel="alternate" type="text/html" href="https://wiki.digitalrights.community/index.php?title=Building_a_trauma-informed_organization&amp;diff=50686"/>
		<updated>2024-06-17T12:21:51Z</updated>

		<summary type="html">&lt;p&gt;Kristin1: /* Resources for building a trauma-informed organization */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Key principles of a trauma-informed approach ==&lt;br /&gt;
There are six key principles of a trauma-informed approach:&lt;br /&gt;
&lt;br /&gt;
# Safety&lt;br /&gt;
# Trustworthiness and transparency&lt;br /&gt;
# Peer support&lt;br /&gt;
# Collaboration and mutuality&lt;br /&gt;
# Empowerment, voice, and choice&lt;br /&gt;
# Cultural, historical, and gender issues&lt;br /&gt;
&lt;br /&gt;
=== Safety ===&lt;br /&gt;
Safety considers both the physical and emotional safety of staff and individuals with which we work. Physical safety can include:&lt;br /&gt;
&lt;br /&gt;
* Physical space for trainings&lt;br /&gt;
* Accessibility of work spaces&lt;br /&gt;
* Timing of workshops/training&lt;br /&gt;
&lt;br /&gt;
Emotional safety requires constant feedback from staff and individuals to ensure their physical safety needs are met. For instance, supervisors conduct regular check-ins to ask about workload, mental health, needs, etc.&lt;br /&gt;
&lt;br /&gt;
=== Trustworthiness and transparency ===&lt;br /&gt;
Trustworthiness and transparency involves providing clear information about what is being done, by whom, when, and why. This can include job descriptions, roles clarity, expectations. It also means maintaining respectful boundaries, prioritizing privacy and confidentiality. It can include:&lt;br /&gt;
&lt;br /&gt;
* Providing the people we work with the reports we write that involve them&lt;br /&gt;
* Involving the people we work with in decision-making about the project&lt;br /&gt;
* Providing a clear job description and expectations to staff&lt;br /&gt;
&lt;br /&gt;
=== Peer Support ===&lt;br /&gt;
Peer Support and mutual self-help establish safety, hope, trust. “Peers” refers to people who have shared experiences of trauma or stress. It also acknowledges that the trauma itself may be used as a galvanizing tool for action, solidarity, etc.&lt;br /&gt;
&lt;br /&gt;
=== Collaboration and mutuality ===&lt;br /&gt;
Collaboration and mutuality levels power differences between staff and those who we work with. It demonstrates that healing can happen in relationships and in meaningful sharing of power. The organization recognizes that everyone has an important role to play. It is the attitude of doing something “with” someone, not “to” or “for”. It emphasizes autonomy and agency.&lt;br /&gt;
&lt;br /&gt;
=== Empowerment, voice and choice ===&lt;br /&gt;
Empowerment, voice and choice requires the organization to place people above projects. The organization seeks to empower both staff and stakeholders. It allows those we work with decision-making power, a voice in our projects, the ability to say no without fear of punishment or ostracization. It also focuses on individual’s strengths over weaknesses.&lt;br /&gt;
&lt;br /&gt;
=== Cultural, historical and gender issues ===&lt;br /&gt;
Cultural, historical and gender issues involves the organization conscientiously acknowledging the role it has played in perpetuating harm (e.g. the aid sector or “international development” and the consequences of that) as well as structural forms of racism, ableism, sexism, etc. It moves past acknowledgement into action: how can we transform the organization and those within it to ensure that we are not upholding harmful stereotypes, world systems, or oppression?&lt;br /&gt;
&lt;br /&gt;
All six principles are intertwined and do not exist in a vacuum. They are interdependent. &lt;br /&gt;
&lt;br /&gt;
== What is a trauma-informed organization? ==&lt;br /&gt;
&amp;quot;A trauma-informed organization is one that operates with an understanding of trauma and its negative effects on the organization’s employees and the communities it serves and works to mitigate those effects.&amp;quot; (Source: [https://hbr.org/2022/03/we-need-trauma-informed-workplaces Harvard Business Review])&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Trauma-informed organizations are able to:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Realize the impact of trauma&lt;br /&gt;
* Recognize the signs and symptoms&lt;br /&gt;
* Respond by integrating this knowledge into policies, procedures, practices&lt;br /&gt;
* Resist re-traumatization&lt;br /&gt;
&lt;br /&gt;
== Recognize the signs and symptoms ==&lt;br /&gt;
&lt;br /&gt;
=== Physiological responses to threat ===&lt;br /&gt;
Humans, like all animals, have built-in responses to threats that have helped us survive as we’ve evolved as a species. When we perceive acute danger, many of these responses kick in without our being able to control them: they are hard-wired to our bodies and minds. &lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;The &#039;freeze response&#039;&#039;&#039;&#039; is when a person becomes utterly still while remaining highly alert and poised for action. This response relies on escaping notice until the danger has passed. For example, we might cease the work that we are doing, stop communicating through our usual channels, or reduce communication with someone with whom we are in conflict. In each case, we are hoping that the unwelcome attention will pass if we become inactive. &lt;br /&gt;
* &#039;&#039;&#039;The &#039;flight response&#039;&#039;&#039;&#039; is when a person quickly tries to get as far away from the danger as possible. We might move our operations to a safer location, abandon certain activities or modes of communication, or separate ourselves from people who might cause us harm. &lt;br /&gt;
* &#039;&#039;&#039;The &#039;comply response&#039;&#039;&#039;&#039; involves doing what an aggressor instructs in the hope that our cooperation will result in the attack ending quickly and without injury. We might agree to suspend or abandon certain objectives or activities, or give up passwords to secure information. &lt;br /&gt;
* &#039;&#039;&#039;The &#039;tend response&#039;&#039;&#039;&#039; happens when people try to protect other, more vulnerable people who are being victimized. Many human rights defenders are motivated to help others because of our own experiences of oppression and exploitation. &lt;br /&gt;
* &#039;&#039;&#039;The &#039;befriend response&#039;&#039;&#039;&#039; involves trying to build some kind of relationship with the aggressor in the hope that this will limit the harm perpetrated against oneself or others. For example, by telling aggressors about our families we might try to humanize ourselves in their eyes, a strategy that is sometimes useful in reducing violence. &lt;br /&gt;
* &#039;&#039;&#039;The &#039;posture response&#039;&#039;&#039;&#039; is an attempt to drive off the danger by pretending to have greater power than one actually does. As human rights defenders, we often threaten to expose threats of violence in order to publicly embarrass our adversaries. &lt;br /&gt;
* &#039;&#039;&#039;The &#039;fight response&#039;&#039;&#039;&#039; is when a person attacks with the intent of driving off or destroying an aggressor. (There are many ways to fight, and we all make our own ethical choices about this.) &lt;br /&gt;
&lt;br /&gt;
If we have been through dangerous, stressful or traumatic experiences, sometimes these reactions can kick in when we are stressed or frightened, even if there is no &#039;real&#039; danger present. Therefore, it is a good idea to look for indicators in our behavior when we are under stress, and to work with them in order to reduce our stress.&lt;br /&gt;
&lt;br /&gt;
(Source: [https://holistic-security.tacticaltech.org/ckeditor_assets/attachments/60/holisticsecurity_trainersmanual.pdf Holistic Security Training Manual], page 53)&lt;br /&gt;
&lt;br /&gt;
=== Group responses to threat ===&lt;br /&gt;
Threats and stress affect group dynamics in a number of ways, and this varies greatly due to organizational culture and many other factors. There are some common reactions, however. Consider these potential changes to group dynamics under stress and see if they resonate. &lt;br /&gt;
&lt;br /&gt;
# &amp;lt;u&amp;gt;&#039;&#039;&#039;Harder group boundaries&#039;&#039;&#039;&amp;lt;/u&amp;gt; - One predictable change experienced by groups under threat is the boundaries that define the group becoming less permeable. Those within the group become more closely connected to each other, and those outside the group become more distant. It also becomes more difficult for people to join or leave the group. While such changes can be protective, there are also some potential difficulties with this. The impermeable boundaries of the group may distance the group from existing and potential allies, leaving it more isolated than it might otherwise be. These boundaries also reduce the flow of information into and out of the group. This may result in members of the group being less informed than they might otherwise have been, and having fewer opportunities to check their perception of the world with those ‘outside’ of their group. Less permeable boundaries also make it difficult to leave groups. Members who wish to leave might be branded as traitors or sell-outs in a way that is harmful to the individual and those perceived to be his or her allies. It is very helpful for groups to regularly discuss the ways in which people and information enter and leave the group, and how to manage this in a holistic way that truly promotes security. &lt;br /&gt;
# &amp;lt;u&amp;gt;&#039;&#039;&#039;Fixed patterns&#039;&#039;&#039;&amp;lt;/u&amp;gt; - Secondly, patterns of behaviour become more fixed and harder to change. This makes it more difficult for members of the group to question (supposedly) shared beliefs, or challenge the behaviour of other members. When we lose the ability to question each others’ assumptions or point out potentially unhealthy behaviours, our ability to constructively and compassionately build group security is greatly compromised. For this reason, it is important for groups to regularly revisit and discuss their shared values in an honest way. &lt;br /&gt;
# &amp;lt;u&amp;gt;&#039;&#039;&#039;Authoritarianism&#039;&#039;&#039;&amp;lt;/u&amp;gt; - A third predictable change relates to leadership and power dynamics within groups. When groups feel unsafe, group members tolerate greater authoritarianism from leaders or more powerful members of the group. This results in reduced levels of information exchange within the group, and fewer opportunities for group members to check their perceptions of the world with other members of their team. In extreme cases, powerful members of the group may become abusive, and the increased rigidity of the group boundaries may prevent victims of such abuse from escaping. Again, it is important for groups to talk about power dynamics and leadership styles on a regular basis, and to make sure that every person has an opportunity to contribute.&lt;br /&gt;
&lt;br /&gt;
Looking into the links between decision-making processes and security, we should not underestimate the positive effects of having fair and transparent decision-making processes. If a group has shared knowledge and responsibilities, it reduces the impact when perpetrators target the leaders of a group. &lt;br /&gt;
&lt;br /&gt;
(Source: [https://holistic-security.tacticaltech.org/ckeditor_assets/attachments/60/holisticsecurity_trainersmanual.pdf Holistic Security Training Manual], page 57)&lt;br /&gt;
&lt;br /&gt;
== Respond by integrating knowledge into policies, procedures, practices ==&lt;br /&gt;
&lt;br /&gt;
=== Crisis management ===&lt;br /&gt;
Being prepared to handle crisis situations is a crucial part of the organization’s commitment to protecting the physical and emotional well-being of its staff.&lt;br /&gt;
&lt;br /&gt;
Conveys a strong message that staff safety is a top priority. &lt;br /&gt;
&lt;br /&gt;
==== Before the crisis (preparedness) ====&lt;br /&gt;
&lt;br /&gt;
# Determine what types of crisis events might be faced by an organization, and develop a list of potential risks.&lt;br /&gt;
# Gain an understanding of how staff respond to crisis events and what stress reactions they might have before, during, and after such events.  This will help determine what strategies might be useful to individuals or groups (see the section above on [[Building a trauma-informed organization#Physiological%20responses%20to%20threat|Physiological responses to threat]])&lt;br /&gt;
# Create a staff support plan that can be used in the event of a crisis.&lt;br /&gt;
# Create a crisis response team with clearly defined roles and responsibilities. It is crucial that the crisis team understands the psychosocial and mental health effects of trauma, how to provide support, and the options available to staff requiring specialized assessment and care.&lt;br /&gt;
# Prepare a list of internal and external resources available to staff in the organization. Ensure that these lists are reviewed regularly and kept up to date.&lt;br /&gt;
# Develop communication plans that include how to inform staff members immediately about the nature of the event, how to protect themselves in case of danger, and how to keep them informed about the crisis.&lt;br /&gt;
# Practice responding to different crisis scenarios with all staff members. &lt;br /&gt;
&lt;br /&gt;
==== During the crisis ====&lt;br /&gt;
&#039;&#039;&#039;Look&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
# Identify people who need immediate attention or support.&lt;br /&gt;
# Focus on safety.&lt;br /&gt;
# Pay attention to physical and emotional reactions.&lt;br /&gt;
# Be attentive to staff members who want to share their reactions.&lt;br /&gt;
# Assess how the crisis is impacting staff members’ decision making and abilities to fulfill their given roles and responsibilities. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Listen&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
# Listen with your eyes, ears and heart&lt;br /&gt;
# Pay attention to body language and words&lt;br /&gt;
# Validate staff reactions to the crisis&lt;br /&gt;
# Provide comfort and reassurance where possible&lt;br /&gt;
# Obtain multiple perspectives on the situation if possible&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
# Remind staff members about the internal and external resources available to them if they need support&lt;br /&gt;
# When you suspect any staff member is having a difficult time dealing with his or her situation or having severe symptoms, recommend that they seek professional support&lt;br /&gt;
# Give permission for anyone who is severely impacted to step away from their responsibilities if possible and get the support/rest that they need.&lt;br /&gt;
&lt;br /&gt;
==== After the crisis ====&lt;br /&gt;
&lt;br /&gt;
# Debrief the event as an organization. Analyze how the incident occurred, how to prevent it from happening again, and what measures must be taken in the meantime to control the risk.&lt;br /&gt;
# Consult with staff members about the effectiveness of the existing plan. Update the procedures and protocols as necessary.&lt;br /&gt;
# Follow-up with staff about how they were impacted by the incident, and what ongoing needs them might have.&lt;br /&gt;
# Make adjustments to work schedules according to staff capacity and needs.&lt;br /&gt;
&lt;br /&gt;
== Resources for building a trauma-informed organization ==&lt;br /&gt;
&lt;br /&gt;
=== Articles ===&lt;br /&gt;
[https://hbr.org/2022/03/we-need-trauma-informed-workplaces We need trauma-informed workplaces] (Harvard Business Review, 2022)&lt;br /&gt;
&lt;br /&gt;
For the past few years, we’ve been experiencing collective trauma. But trauma is not new in our organizations, and it’s not going away, either. Estimates are that six in 10 men and five in 10 women experience at least one trauma, and approximately 6% of the population will experience PTSD at some point in their lives. As we’ve seen the lines between work and home blur and a fundamental shift in our expectations of the places we work, organizations have struggled to provide the support and leadership that their employees and customers need. That’s why it’s so important that they take steps now to build the cultures that can see them through this crisis and the ones we’ll all inevitably face in the future. To do that, we need to build trauma-informed organizations. A trauma-informed organization is one that operates with an understanding of trauma and its negative effects on the organization’s employees and the communities it serves and works to mitigate those effects. It may not be possible to predict or avoid the next crisis our organizations will face. However, with forethought, planning, and commitment, we can be prepared to meet the next challenge — whatever it may be — and come through it stronger.&lt;br /&gt;
&lt;br /&gt;
=== Assessment resources ===&lt;br /&gt;
&lt;br /&gt;
* [https://ctrinstitute.com/trauma-informed-workplace-assessment/ Trauma-Informed Workplace Assessment] by the Crisis and Trauma Resource Institute&lt;br /&gt;
* [https://www.hca.wa.gov/assets/program/trauma-informed-self-assessment-national-council-for-behavioral-health.pdf Organizational Self-Assessment: Adoption of trauma-informed care practice] by the National Council for Behavioral Health&lt;br /&gt;
* [https://nhchc.org/wp-content/uploads/2020/12/NHCHC-TIO-Assessment-Manual.pdf Trauma-Informed Organization Assessment Manual](PDF) by National Healthcare for the Homeless Council (NHCHC), 2020&lt;br /&gt;
* [https://traumainformedoregon.org/tic-resources/creating-cultures-trauma-informed-care-cctic-self-assessment-planning-protocol/ Creating Cultures of Trauma-Informed Care (CCTIC): A Self-Assessment and Planning Protocol] - This assessment tool provides guidelines for agencies or programs interested in facilitating trauma-informed modifications in their service systems. For use by administrators, providers, and survivor-consumers in the development, implementation, evaluation, and ongoing monitoring of trauma-informed programs. (Source: Community Connections; Washington, D.C. Roger D. Fallot, Ph.D. and Maxine Harris, Ph.D., 2009)&lt;br /&gt;
&lt;br /&gt;
=== Resource hub ===&lt;br /&gt;
[https://safeguardingsupporthub.org/what-rsh The Safeguarding Resource and Support Hub (RSH)] is a programme that aims to support organisations in the aid sector to strengthen their safeguarding policy and practice against Sexual Exploitation, Abuse and Sexual Harassment (SEAH). RSH supports organisations working in both the humanitarian and development sectors but is driven by the needs of smaller national or local organisations in developing countries. RSH has an Online Hub website available in English, Arabic, French and Swahili and is free for anyone working in the aid sector to use.&lt;/div&gt;</summary>
		<author><name>Kristin1</name></author>
	</entry>
	<entry>
		<id>https://wiki.digitalrights.community/index.php?title=Security_resources_organized_by_topic&amp;diff=50685</id>
		<title>Security resources organized by topic</title>
		<link rel="alternate" type="text/html" href="https://wiki.digitalrights.community/index.php?title=Security_resources_organized_by_topic&amp;diff=50685"/>
		<updated>2024-06-14T17:56:42Z</updated>

		<summary type="html">&lt;p&gt;Kristin1: /* Security planning */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Building awareness of how we respond to threat and stress ==&lt;br /&gt;
&#039;&#039;Developing a useful security strategy is heavily dependent on our perception – we need to be able to identify and analyse threats in order to implement ways of avoiding or reducing them. But we all perceive the world around us differently based on our circumstances, experiences and many other factors. As a result, our perception can sometimes be hindered: threats which may be evident to some people may go unrecognised by others; similarly, we also need to be able to tell the difference between threats which are genuinely possible and those which we falsely perceive, called &#039;unfounded fears&#039;. It&#039;s a good idea to become familiar with factors that condition our perceptions of threat, and consider ways that we can take these into account in our security planning.&#039;&#039; (Source: [https://holistic-security.tacticaltech.org/chapters/prepare/1-2-individual-responses-to-threat.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Resources:&lt;br /&gt;
&lt;br /&gt;
* [https://holistic-security.tacticaltech.org/chapters/prepare/1-2-individual-responses-to-threat.html &#039;&#039;&#039;Exploring individual responses to threat&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
* [https://holistic-security.tacticaltech.org/chapters/prepare/1-4-team-and-peer-responses-to-threat.html &#039;&#039;&#039;Exploring group responses to threat&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
* [https://holistic-security.tacticaltech.org/chapters/prepare/1-5-communicating-about-threats-in-teams-and-organisations.html &#039;&#039;&#039;Communicating about security in teams and organizations&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
&lt;br /&gt;
== Understanding our threats and context ==&lt;br /&gt;
&lt;br /&gt;
=== Situation monitoring and analysis ===&lt;br /&gt;
Situation monitoring and analysis is the broadest kind of analysis of our context: observing the political, economic, social, technological, legal and environmental developments in society which are relevant to our work, and may impact our security situation. (Source: [https://holistic-security.tacticaltech.org/chapters/explore/2-2-situation-monitoring-and-analysis.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Exercise: [https://holistic-security.tacticaltech.org/exercises/explore/situational-monitoring-a-quick-pestle-analysis.html &#039;&#039;&#039;Pestle analysis&#039;&#039;&#039;] (Holistic Security Manual) &lt;br /&gt;
&lt;br /&gt;
Tool: &#039;&#039;&#039;[https://tnr-research.uwazi.io/ Research Database on transnational repression]&#039;&#039;&#039; - This collection of research reports on transnational repression can help human rights defenders better understand: &lt;br /&gt;
&lt;br /&gt;
* Transnational Repression (TNR) threats that are possible, to determine appropriate mitigation techniques&lt;br /&gt;
* Which TNR threats are unlikely, in order to alleviate fear&lt;br /&gt;
* What exiled HRDs can expect from a host country in terms of protection measures&lt;br /&gt;
* Existing campaigns to strengthen protection for exiled HRDs&lt;br /&gt;
&lt;br /&gt;
=== Identifying, analyzing and prioritizing threats ===&lt;br /&gt;
&lt;br /&gt;
==== Map the actors ====&lt;br /&gt;
&#039;&#039;It is valuable to get a clear picture of all the actors in our environment (individuals, institutions, organizations, etc). Threats almost always come from someone or something. Knowing as much as we can about the actors in our context improves our perception of our environment and thereby, our ability to carry out activities to maintain or expand our space for work.&#039;&#039; (Source: [https://holistic-security.tacticaltech.org/chapters/explore/2-3-vision-strategy-and-actors.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Exercise:&lt;br /&gt;
&lt;br /&gt;
* [https://holistic-security.tacticaltech.org/exercises/explore/visual-actor-mapping-part-1.html &#039;&#039;&#039;Spectrum of allies&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
* [https://newtactics.org/resource/exercises-identifying-allies-opponents &#039;&#039;&#039;Spectrum of allies&#039;&#039;&#039;] (New Tactics in Human Rights project)&lt;br /&gt;
&lt;br /&gt;
==== Brainstorm threats ====&lt;br /&gt;
This exercise is a first attempt at identifying the threats to yourself, your group or organization and your work in defense of human rights. This initial list of threats can then be refined so as to focus in more depth on the threats which are most likely or potentially most harmful. (Source: [https://holistic-security.tacticaltech.org/exercises/explore/threat-brainstorm.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Exercise: [https://holistic-security.tacticaltech.org/exercises/explore/threat-brainstorm.html &#039;&#039;&#039;Threat brainstorm&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
&lt;br /&gt;
==== Analyzing risk, prioritizing threats ====&lt;br /&gt;
Threats can be viewed and categorized in light of the following: the likelihood that the threat will take place, and the impact if and when it does. Likelihood and impact are concepts which help us determine risk: the higher the likelihood or impact of a threat, the higher the risk. Categorizing threats can help to keep us from feeling overwhelmed and keep our perception of threats realistic. (Source: [https://holistic-security.tacticaltech.org/chapters/explore/2-8-identifying-and-analysing-threats.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Exercise: [https://holistic-security.tacticaltech.org/chapters/explore/2-8-identifying-and-analysing-threats.html &#039;&#039;&#039;Threat matrix&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
&lt;br /&gt;
Tools:&lt;br /&gt;
&lt;br /&gt;
* The Ford Foundation’s [https://www.fordfoundation.org/work/our-grants/building-institutions-and-networks/cybersecurity-assessment-tool/ &#039;&#039;&#039;Cybersecurity Assessment Tool (CAT)&#039;&#039;&#039;] is designed to measure the maturity, resiliency, and strength of an organization’s cybersecurity efforts. We have created this questionnaire with busy nontechnical grant makers, grantee partners, civil society organizations, and nonprofits in mind, and we hope it helps shine some light on a recommended path forward for any organization undertaking a cybersecurity journey&lt;br /&gt;
&lt;br /&gt;
==== Analyze threats ====&lt;br /&gt;
This exercise will help you prioritize threats and divine the causes, ramifications, sources as well as the required resources, existing actions and possible next steps.&lt;br /&gt;
&lt;br /&gt;
Exercise: [https://holistic-security.tacticaltech.org/exercises/explore/threat-inventory.html &#039;&#039;&#039;Threat inventory&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
&lt;br /&gt;
== Risk mitigation ==&lt;br /&gt;
In order to build a response to the threats we face, we can consider them in terms of the factors which make us more or less susceptible to them. Read more in [https://holistic-security.tacticaltech.org/chapters/strategise/3-1-responding-to-threats.html this chapter of the Holistic Security Manual]. &lt;br /&gt;
&lt;br /&gt;
=== Mitigation techniques for common threats to information ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
! Threat&lt;br /&gt;
!Mitigation techniques and links to guidance &lt;br /&gt;
|-&lt;br /&gt;
|Data loss&lt;br /&gt;
|&lt;br /&gt;
* [[Ways to securely store and share files|Have your information securely in the cloud or on a server]]&lt;br /&gt;
* Have a backup process&lt;br /&gt;
|-&lt;br /&gt;
|Compromised accounts&lt;br /&gt;
|&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa|Use two factor authentication for all accounts]]&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa|Use unique, complex passwords for all accounts]]&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa|Use a password manager to create, store and protect those passwords]]&lt;br /&gt;
|-&lt;br /&gt;
|Device inspection at checkpoints&lt;br /&gt;
|&lt;br /&gt;
* [[Use a secure messaging app#Tip: use automatic disappearing messages|Use automated disappearing messages on your messaging apps]]&lt;br /&gt;
* [[Ways to securely store and share files|Have your sensitive information stored safely in the cloud and off of your device]]&lt;br /&gt;
* Hide or delete any apps that would provide access to this information (you can restore that app later)&lt;br /&gt;
|-&lt;br /&gt;
|Device confiscation or theft&lt;br /&gt;
|&lt;br /&gt;
* [[Secure your devices#Full disk encryption|Encrypt your devices]]&lt;br /&gt;
* And, review and adapt the same advice above for “device inspection” threat&lt;br /&gt;
|-&lt;br /&gt;
|Information handover&lt;br /&gt;
|&lt;br /&gt;
* [[Trusted hosting companies in the human rights community|Host your information with a company you trust]], who will not turn over information to your opponents (via subpoena, request, etc)&lt;br /&gt;
|-&lt;br /&gt;
|Targeted malware or spyware&lt;br /&gt;
|&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa|Protect yourselves against (spear) phishing attacks]]&lt;br /&gt;
* Use a second device for sensitive activities&lt;br /&gt;
* [[How to mitigate your risk of being subject to Pegasus surveillance|Restart your device regularly to disrupt spyware]]&lt;br /&gt;
* [[Secure your devices|Use anti virus]]&lt;br /&gt;
* [[How to mitigate your risk of being subject to Pegasus surveillance]], and other spyware&lt;br /&gt;
|-&lt;br /&gt;
|Surveillance and monitoring&lt;br /&gt;
|&lt;br /&gt;
* [[Safe internet browsing using VPN and Tor browser|Use a VPN and/or Tor browser]]&lt;br /&gt;
* [[Use a secure messaging app]]&lt;br /&gt;
* [[How to collect and store information in a secure way]]&lt;br /&gt;
* [[Ways to securely store and share files|How to use Google Drive safely and alternatives to Google Drive]]&lt;br /&gt;
|-&lt;br /&gt;
|Website hacking and takeover&lt;br /&gt;
|&lt;br /&gt;
* [[Protect your website|Protect your website from DDOS attacks]]&lt;br /&gt;
* [[Trusted hosting companies in the human rights community|Use a host company that you trust]]&lt;br /&gt;
* And, review and adapt the same advice above for &amp;quot;compromised accounts&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
Other important considerations when collecting, storing, using sensitive information:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Consideration&lt;br /&gt;
!Resources&lt;br /&gt;
|-&lt;br /&gt;
|Make sure you have informed consent from the people you are collecting information&lt;br /&gt;
|[[Guidance on informed consent]]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
* [[Information Security for Human Rights Defenders]]&lt;br /&gt;
&lt;br /&gt;
===Mitigation techniques for online harassment===&lt;br /&gt;
[[How to deal with online harassment and threats]]&lt;br /&gt;
&lt;br /&gt;
==Security planning ==&lt;br /&gt;
Once we have clarity about the threats we face during our activities, we can begin to organize our security protocols into security plans or agreements. There are three main areas to consider when developing any security plans: &lt;br /&gt;
&lt;br /&gt;
# Prepare&lt;br /&gt;
# Respond&lt;br /&gt;
# TreatPrepare:&lt;br /&gt;
&lt;br /&gt;
* Identify &amp;amp; assess the threats and your     vulnerabilities: This involves systematically analyzing your     assets (physically, digitally) to understand potential threats and knowing     your vulnerabilities that could be exploited.&lt;br /&gt;
* Develop security policies and procedures: Create clear policies outlining acceptable behavior regarding     physical and digital security, and incident reporting.&lt;br /&gt;
* Implement preventive measures: based on identified threats, implement safeguards procedures and     tools, with considering staff training programs to minimize the potential     threats impact.&lt;br /&gt;
* Invest in Security Awareness Programs: regularly educate your staff/colleagues on the founded security     plans and measures, this empowers them to identify, respond and report     effectively.&lt;br /&gt;
* Conduct Security testing: regularly assess the effectiveness of security measures through     penetration testing (simulated attacks) and security drills. This helps     identify weaknesses and refine procedures.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Respond:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Build Incident Response Plan:&#039;&#039;&#039; develop a clear plan outlining actions to be taken in case of a     security threat. This includes identifying the designated responders,     notification procedures (internal teams, authorities), and containment     strategies to mitigate impact.&lt;br /&gt;
* &#039;&#039;&#039;Communication Strategy:&#039;&#039;&#039; Establish a communication plan for internal and external     stakeholders during a security incident. This ensures timely and accurate     information is disseminated, minimizing confusion and panic.&lt;br /&gt;
* &#039;&#039;&#039;Business continuity plan:&#039;&#039;&#039; A strategy to ensure critical operations continue with minimal     disruption during an incident. &lt;br /&gt;
* &#039;&#039;&#039;Disaster recovery plan (Data     Backups and Recovery):&#039;&#039;&#039; establish a specific plan for     recovering IT systems and data, maintain robust data backup and recovery     procedures to ensure business continuity in case of after a disaster like     a fire, flood, or cyberattack.&lt;br /&gt;
* &#039;&#039;&#039;Communication and Collaboration:&#039;&#039;&#039; effective communication and     collaboration across teams are crucial for successful incident response     and recovery.&lt;br /&gt;
* &#039;&#039;&#039;Train your people:&#039;&#039;&#039; Regularly train staff on security policies, incident reporting     procedures, and their roles during a contingency. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Treat:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Analyze lessons learned:&#039;&#039;&#039; conduct a thorough assessment to     understand the cause and scope of the security incidents. This helps     identify your vulnerabilities, prevent future occurrences, and establish     better prevention plans.&lt;br /&gt;
* &#039;&#039;&#039;Recovery and Remediation&#039;&#039;&#039;: Implement measures to restore     affected systems and data. This might involve patching vulnerabilities in     software, restoring lost data from backups, and implementing additional     security measures to prevent similar incidents.&lt;br /&gt;
* &#039;&#039;&#039;psychological safety considerations,&#039;&#039;&#039; give priority to those affected by incident, and ensure that     appropriate care is provided to them if physically or psychologically     injured, and treat with causes of the incident accordingly later.&lt;br /&gt;
* &#039;&#039;&#039;Review and update your security plans and approach:&#039;&#039;&#039; Following an incident, review your security posture and update     policies, procedures, and preventative measures based on the lessons     learned. &lt;br /&gt;
&lt;br /&gt;
Review [https://holistic-security.tacticaltech.org/chapters/strategise/3-3-creating-security-plans-and-agreements.html this chapter of the Holistic Security Manual]. &lt;br /&gt;
&lt;br /&gt;
[[General guidance for creating security plans and agreements]] &lt;br /&gt;
&lt;br /&gt;
Resources:  &lt;br /&gt;
&lt;br /&gt;
* Consumer Reports [https://securityplanner.consumerreports.org/ &#039;&#039;&#039;Security Planner&#039;&#039;&#039;] is a free, easy-to-use guide to staying safer online. It provides personalized recommendations and expert advice on topics such as keeping social media accounts from being hacked, locking down devices ranging from smartphones to home security cameras, and reducing intrusive tracking by websites.&lt;br /&gt;
* [https://www.nist.gov/itl/smallbusinesscyber/nist-cybersecurity-framework-0 &#039;&#039;&#039;NIST Cybersecurity Framework 2.0&#039;&#039;&#039;]:  Small Business Quick Start Guide - provides small-to-medium sized businesses (SMB), specifically those who have modest or no cybersecurity plans in place, with considerations to kick-start their cybersecurity risk management strategy using the NIST Cybersecurity Framework (CSF) 2.0. (by the &#039;&#039;National Institute of Standards and Technology)&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Security planning on specific topics===&lt;br /&gt;
&lt;br /&gt;
* [[General tips for international travel]]&lt;br /&gt;
* [[General tips for home security]]&lt;br /&gt;
&lt;br /&gt;
== Building a culture of security within a team ==&lt;br /&gt;
[https://level-up.cc/ &#039;&#039;&#039;LevelUp&#039;&#039;&#039;] is a collection of resources for the global digital safety training community.&lt;br /&gt;
&lt;br /&gt;
[https://wiki.orgsec.community/ &#039;&#039;&#039;Organisational security community wiki&#039;&#039;&#039;] is a resource created by and for security practitioners from all backgrounds to share useful resources and document innovative approaches to long-term security work. &lt;br /&gt;
&lt;br /&gt;
==Resource collections ==&lt;br /&gt;
[https://digitalfirstaid.org/ &#039;&#039;&#039;Digital First Aid Kit&#039;&#039;&#039;] - The Digital First Aid Kit is a free resource to help rapid responders, digital security trainers, and tech-savvy activists to better protect themselves and the communities they support against the most common types of digital emergencies. It can also be used by activists, human rights defenders, bloggers, journalists or media activists who want to learn more about how they can protect themselves and support others. If you or someone you are assisting is experiencing a digital emergency, the Digital First Aid Kit will guide you in diagnosing the issues you are facing, and refer you to support providers for further help if needed.&lt;br /&gt;
&lt;br /&gt;
[https://communitydocs.accessnow.org/ &#039;&#039;&#039;Access Now Help Desk documentation&#039;&#039;&#039;]&lt;br /&gt;
&lt;br /&gt;
[https://cyber-star.org/ &#039;&#039;&#039;CyberSTAR&#039;&#039;&#039;], by SecDev, makes it easier for small organizations and individuals to understand and manage digital safety by organizing it around six themes. This site presents learning resources to help you be safer online—plus teaching resources for digital safety trainers.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
More info:&lt;br /&gt;
&lt;br /&gt;
[[Ways to securely store and share files|Secure storage for sensitive information]] &lt;br /&gt;
&lt;br /&gt;
[[Protect your accounts using strong passwords, pw managers, 2fa|Secure access to sensitive information]] &lt;br /&gt;
&lt;br /&gt;
[[Secure your devices]]&lt;/div&gt;</summary>
		<author><name>Kristin1</name></author>
	</entry>
	<entry>
		<id>https://wiki.digitalrights.community/index.php?title=Building_a_trauma-informed_organization&amp;diff=50684</id>
		<title>Building a trauma-informed organization</title>
		<link rel="alternate" type="text/html" href="https://wiki.digitalrights.community/index.php?title=Building_a_trauma-informed_organization&amp;diff=50684"/>
		<updated>2024-06-14T17:16:49Z</updated>

		<summary type="html">&lt;p&gt;Kristin1: added trauma-informed principles&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Key principles of a trauma-informed approach ==&lt;br /&gt;
There are six key principles of a trauma-informed approach:&lt;br /&gt;
&lt;br /&gt;
# Safety&lt;br /&gt;
# Trustworthiness and transparency&lt;br /&gt;
# Peer support&lt;br /&gt;
# Collaboration and mutuality&lt;br /&gt;
# Empowerment, voice, and choice&lt;br /&gt;
# Cultural, historical, and gender issues&lt;br /&gt;
&lt;br /&gt;
=== Safety ===&lt;br /&gt;
Safety considers both the physical and emotional safety of staff and individuals with which we work. Physical safety can include:&lt;br /&gt;
&lt;br /&gt;
* Physical space for trainings&lt;br /&gt;
* Accessibility of work spaces&lt;br /&gt;
* Timing of workshops/training&lt;br /&gt;
&lt;br /&gt;
Emotional safety requires constant feedback from staff and individuals to ensure their physical safety needs are met. For instance, supervisors conduct regular check-ins to ask about workload, mental health, needs, etc.&lt;br /&gt;
&lt;br /&gt;
=== Trustworthiness and transparency ===&lt;br /&gt;
Trustworthiness and transparency involves providing clear information about what is being done, by whom, when, and why. This can include job descriptions, roles clarity, expectations. It also means maintaining respectful boundaries, prioritizing privacy and confidentiality. It can include:&lt;br /&gt;
&lt;br /&gt;
* Providing the people we work with the reports we write that involve them&lt;br /&gt;
* Involving the people we work with in decision-making about the project&lt;br /&gt;
* Providing a clear job description and expectations to staff&lt;br /&gt;
&lt;br /&gt;
=== Peer Support ===&lt;br /&gt;
Peer Support and mutual self-help establish safety, hope, trust. “Peers” refers to people who have shared experiences of trauma or stress. It also acknowledges that the trauma itself may be used as a galvanizing tool for action, solidarity, etc.&lt;br /&gt;
&lt;br /&gt;
=== Collaboration and mutuality ===&lt;br /&gt;
Collaboration and mutuality levels power differences between staff and those who we work with. It demonstrates that healing can happen in relationships and in meaningful sharing of power. The organization recognizes that everyone has an important role to play. It is the attitude of doing something “with” someone, not “to” or “for”. It emphasizes autonomy and agency.&lt;br /&gt;
&lt;br /&gt;
=== Empowerment, voice and choice ===&lt;br /&gt;
Empowerment, voice and choice requires the organization to place people above projects. The organization seeks to empower both staff and stakeholders. It allows those we work with decision-making power, a voice in our projects, the ability to say no without fear of punishment or ostracization. It also focuses on individual’s strengths over weaknesses.&lt;br /&gt;
&lt;br /&gt;
=== Cultural, historical and gender issues ===&lt;br /&gt;
Cultural, historical and gender issues involves the organization conscientiously acknowledging the role it has played in perpetuating harm (e.g. the aid sector or “international development” and the consequences of that) as well as structural forms of racism, ableism, sexism, etc. It moves past acknowledgement into action: how can we transform the organization and those within it to ensure that we are not upholding harmful stereotypes, world systems, or oppression?&lt;br /&gt;
&lt;br /&gt;
All six principles are intertwined and do not exist in a vacuum. They are interdependent. &lt;br /&gt;
&lt;br /&gt;
== What is a trauma-informed organization? ==&lt;br /&gt;
&amp;quot;A trauma-informed organization is one that operates with an understanding of trauma and its negative effects on the organization’s employees and the communities it serves and works to mitigate those effects.&amp;quot; (Source: [https://hbr.org/2022/03/we-need-trauma-informed-workplaces Harvard Business Review])&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Trauma-informed organizations are able to:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Realize the impact of trauma&lt;br /&gt;
* Recognize the signs and symptoms&lt;br /&gt;
* Respond by integrating this knowledge into policies, procedures, practices&lt;br /&gt;
* Resist re-traumatization&lt;br /&gt;
&lt;br /&gt;
== Recognize the signs and symptoms ==&lt;br /&gt;
&lt;br /&gt;
=== Physiological responses to threat ===&lt;br /&gt;
Humans, like all animals, have built-in responses to threats that have helped us survive as we’ve evolved as a species. When we perceive acute danger, many of these responses kick in without our being able to control them: they are hard-wired to our bodies and minds. &lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;The &#039;freeze response&#039;&#039;&#039;&#039; is when a person becomes utterly still while remaining highly alert and poised for action. This response relies on escaping notice until the danger has passed. For example, we might cease the work that we are doing, stop communicating through our usual channels, or reduce communication with someone with whom we are in conflict. In each case, we are hoping that the unwelcome attention will pass if we become inactive. &lt;br /&gt;
* &#039;&#039;&#039;The &#039;flight response&#039;&#039;&#039;&#039; is when a person quickly tries to get as far away from the danger as possible. We might move our operations to a safer location, abandon certain activities or modes of communication, or separate ourselves from people who might cause us harm. &lt;br /&gt;
* &#039;&#039;&#039;The &#039;comply response&#039;&#039;&#039;&#039; involves doing what an aggressor instructs in the hope that our cooperation will result in the attack ending quickly and without injury. We might agree to suspend or abandon certain objectives or activities, or give up passwords to secure information. &lt;br /&gt;
* &#039;&#039;&#039;The &#039;tend response&#039;&#039;&#039;&#039; happens when people try to protect other, more vulnerable people who are being victimized. Many human rights defenders are motivated to help others because of our own experiences of oppression and exploitation. &lt;br /&gt;
* &#039;&#039;&#039;The &#039;befriend response&#039;&#039;&#039;&#039; involves trying to build some kind of relationship with the aggressor in the hope that this will limit the harm perpetrated against oneself or others. For example, by telling aggressors about our families we might try to humanize ourselves in their eyes, a strategy that is sometimes useful in reducing violence. &lt;br /&gt;
* &#039;&#039;&#039;The &#039;posture response&#039;&#039;&#039;&#039; is an attempt to drive off the danger by pretending to have greater power than one actually does. As human rights defenders, we often threaten to expose threats of violence in order to publicly embarrass our adversaries. &lt;br /&gt;
* &#039;&#039;&#039;The &#039;fight response&#039;&#039;&#039;&#039; is when a person attacks with the intent of driving off or destroying an aggressor. (There are many ways to fight, and we all make our own ethical choices about this.) &lt;br /&gt;
&lt;br /&gt;
If we have been through dangerous, stressful or traumatic experiences, sometimes these reactions can kick in when we are stressed or frightened, even if there is no &#039;real&#039; danger present. Therefore, it is a good idea to look for indicators in our behavior when we are under stress, and to work with them in order to reduce our stress.&lt;br /&gt;
&lt;br /&gt;
(Source: [https://holistic-security.tacticaltech.org/ckeditor_assets/attachments/60/holisticsecurity_trainersmanual.pdf Holistic Security Training Manual], page 53)&lt;br /&gt;
&lt;br /&gt;
=== Group responses to threat ===&lt;br /&gt;
Threats and stress affect group dynamics in a number of ways, and this varies greatly due to organizational culture and many other factors. There are some common reactions, however. Consider these potential changes to group dynamics under stress and see if they resonate. &lt;br /&gt;
&lt;br /&gt;
# &amp;lt;u&amp;gt;&#039;&#039;&#039;Harder group boundaries&#039;&#039;&#039;&amp;lt;/u&amp;gt; - One predictable change experienced by groups under threat is the boundaries that define the group becoming less permeable. Those within the group become more closely connected to each other, and those outside the group become more distant. It also becomes more difficult for people to join or leave the group. While such changes can be protective, there are also some potential difficulties with this. The impermeable boundaries of the group may distance the group from existing and potential allies, leaving it more isolated than it might otherwise be. These boundaries also reduce the flow of information into and out of the group. This may result in members of the group being less informed than they might otherwise have been, and having fewer opportunities to check their perception of the world with those ‘outside’ of their group. Less permeable boundaries also make it difficult to leave groups. Members who wish to leave might be branded as traitors or sell-outs in a way that is harmful to the individual and those perceived to be his or her allies. It is very helpful for groups to regularly discuss the ways in which people and information enter and leave the group, and how to manage this in a holistic way that truly promotes security. &lt;br /&gt;
# &amp;lt;u&amp;gt;&#039;&#039;&#039;Fixed patterns&#039;&#039;&#039;&amp;lt;/u&amp;gt; - Secondly, patterns of behaviour become more fixed and harder to change. This makes it more difficult for members of the group to question (supposedly) shared beliefs, or challenge the behaviour of other members. When we lose the ability to question each others’ assumptions or point out potentially unhealthy behaviours, our ability to constructively and compassionately build group security is greatly compromised. For this reason, it is important for groups to regularly revisit and discuss their shared values in an honest way. &lt;br /&gt;
# &amp;lt;u&amp;gt;&#039;&#039;&#039;Authoritarianism&#039;&#039;&#039;&amp;lt;/u&amp;gt; - A third predictable change relates to leadership and power dynamics within groups. When groups feel unsafe, group members tolerate greater authoritarianism from leaders or more powerful members of the group. This results in reduced levels of information exchange within the group, and fewer opportunities for group members to check their perceptions of the world with other members of their team. In extreme cases, powerful members of the group may become abusive, and the increased rigidity of the group boundaries may prevent victims of such abuse from escaping. Again, it is important for groups to talk about power dynamics and leadership styles on a regular basis, and to make sure that every person has an opportunity to contribute.&lt;br /&gt;
&lt;br /&gt;
Looking into the links between decision-making processes and security, we should not underestimate the positive effects of having fair and transparent decision-making processes. If a group has shared knowledge and responsibilities, it reduces the impact when perpetrators target the leaders of a group. &lt;br /&gt;
&lt;br /&gt;
(Source: [https://holistic-security.tacticaltech.org/ckeditor_assets/attachments/60/holisticsecurity_trainersmanual.pdf Holistic Security Training Manual], page 57)&lt;br /&gt;
&lt;br /&gt;
== Respond by integrating knowledge into policies, procedures, practices ==&lt;br /&gt;
&lt;br /&gt;
=== Crisis management ===&lt;br /&gt;
Being prepared to handle crisis situations is a crucial part of the organization’s commitment to protecting the physical and emotional well-being of its staff.&lt;br /&gt;
&lt;br /&gt;
Conveys a strong message that staff safety is a top priority. &lt;br /&gt;
&lt;br /&gt;
==== Before the crisis (preparedness) ====&lt;br /&gt;
&lt;br /&gt;
# Determine what types of crisis events might be faced by an organization, and develop a list of potential risks.&lt;br /&gt;
# Gain an understanding of how staff respond to crisis events and what stress reactions they might have before, during, and after such events.  This will help determine what strategies might be useful to individuals or groups (see the section above on [[Building a trauma-informed organization#Physiological%20responses%20to%20threat|Physiological responses to threat]])&lt;br /&gt;
# Create a staff support plan that can be used in the event of a crisis.&lt;br /&gt;
# Create a crisis response team with clearly defined roles and responsibilities. It is crucial that the crisis team understands the psychosocial and mental health effects of trauma, how to provide support, and the options available to staff requiring specialized assessment and care.&lt;br /&gt;
# Prepare a list of internal and external resources available to staff in the organization. Ensure that these lists are reviewed regularly and kept up to date.&lt;br /&gt;
# Develop communication plans that include how to inform staff members immediately about the nature of the event, how to protect themselves in case of danger, and how to keep them informed about the crisis.&lt;br /&gt;
# Practice responding to different crisis scenarios with all staff members. &lt;br /&gt;
&lt;br /&gt;
==== During the crisis ====&lt;br /&gt;
&#039;&#039;&#039;Look&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
# Identify people who need immediate attention or support.&lt;br /&gt;
# Focus on safety.&lt;br /&gt;
# Pay attention to physical and emotional reactions.&lt;br /&gt;
# Be attentive to staff members who want to share their reactions.&lt;br /&gt;
# Assess how the crisis is impacting staff members’ decision making and abilities to fulfill their given roles and responsibilities. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Listen&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
# Listen with your eyes, ears and heart&lt;br /&gt;
# Pay attention to body language and words&lt;br /&gt;
# Validate staff reactions to the crisis&lt;br /&gt;
# Provide comfort and reassurance where possible&lt;br /&gt;
# Obtain multiple perspectives on the situation if possible&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
# Remind staff members about the internal and external resources available to them if they need support&lt;br /&gt;
# When you suspect any staff member is having a difficult time dealing with his or her situation or having severe symptoms, recommend that they seek professional support&lt;br /&gt;
# Give permission for anyone who is severely impacted to step away from their responsibilities if possible and get the support/rest that they need.&lt;br /&gt;
&lt;br /&gt;
==== After the crisis ====&lt;br /&gt;
&lt;br /&gt;
# Debrief the event as an organization. Analyze how the incident occurred, how to prevent it from happening again, and what measures must be taken in the meantime to control the risk.&lt;br /&gt;
# Consult with staff members about the effectiveness of the existing plan. Update the procedures and protocols as necessary.&lt;br /&gt;
# Follow-up with staff about how they were impacted by the incident, and what ongoing needs them might have.&lt;br /&gt;
# Make adjustments to work schedules according to staff capacity and needs.&lt;br /&gt;
&lt;br /&gt;
== Resources for building a trauma-informed organization ==&lt;br /&gt;
&lt;br /&gt;
=== Assessment resources ===&lt;br /&gt;
&lt;br /&gt;
* [https://ctrinstitute.com/trauma-informed-workplace-assessment/ Trauma-Informed Workplace Assessment] by the Crisis and Trauma Resource Institute&lt;br /&gt;
* [https://www.hca.wa.gov/assets/program/trauma-informed-self-assessment-national-council-for-behavioral-health.pdf Organizational Self-Assessment: Adoption of trauma-informed care practice] by the National Council for Behavioral Health&lt;br /&gt;
* [https://nhchc.org/wp-content/uploads/2020/12/NHCHC-TIO-Assessment-Manual.pdf Trauma-Informed Organization Assessment Manual](PDF) by National Healthcare for the Homeless Council (NHCHC), 2020&lt;br /&gt;
* [https://traumainformedoregon.org/tic-resources/creating-cultures-trauma-informed-care-cctic-self-assessment-planning-protocol/ Creating Cultures of Trauma-Informed Care (CCTIC): A Self-Assessment and Planning Protocol] - This assessment tool provides guidelines for agencies or programs interested in facilitating trauma-informed modifications in their service systems. For use by administrators, providers, and survivor-consumers in the development, implementation, evaluation, and ongoing monitoring of trauma-informed programs. (Source: Community Connections; Washington, D.C. Roger D. Fallot, Ph.D. and Maxine Harris, Ph.D., 2009)&lt;br /&gt;
&lt;br /&gt;
=== Resource hub ===&lt;br /&gt;
[https://safeguardingsupporthub.org/what-rsh The Safeguarding Resource and Support Hub (RSH)] is a programme that aims to support organisations in the aid sector to strengthen their safeguarding policy and practice against Sexual Exploitation, Abuse and Sexual Harassment (SEAH). RSH supports organisations working in both the humanitarian and development sectors but is driven by the needs of smaller national or local organisations in developing countries. RSH has an Online Hub website available in English, Arabic, French and Swahili and is free for anyone working in the aid sector to use.&lt;/div&gt;</summary>
		<author><name>Kristin1</name></author>
	</entry>
	<entry>
		<id>https://wiki.digitalrights.community/index.php?title=Security_resources_organized_by_topic&amp;diff=50668</id>
		<title>Security resources organized by topic</title>
		<link rel="alternate" type="text/html" href="https://wiki.digitalrights.community/index.php?title=Security_resources_organized_by_topic&amp;diff=50668"/>
		<updated>2024-06-11T15:44:11Z</updated>

		<summary type="html">&lt;p&gt;Kristin1: /* Security planning */ adding a section on building a culture of security&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Building awareness of how we respond to threat and stress ==&lt;br /&gt;
&#039;&#039;Developing a useful security strategy is heavily dependent on our perception – we need to be able to identify and analyse threats in order to implement ways of avoiding or reducing them. But we all perceive the world around us differently based on our circumstances, experiences and many other factors. As a result, our perception can sometimes be hindered: threats which may be evident to some people may go unrecognised by others; similarly, we also need to be able to tell the difference between threats which are genuinely possible and those which we falsely perceive, called &#039;unfounded fears&#039;. It&#039;s a good idea to become familiar with factors that condition our perceptions of threat, and consider ways that we can take these into account in our security planning.&#039;&#039; (Source: [https://holistic-security.tacticaltech.org/chapters/prepare/1-2-individual-responses-to-threat.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Resources:&lt;br /&gt;
&lt;br /&gt;
* [https://holistic-security.tacticaltech.org/chapters/prepare/1-2-individual-responses-to-threat.html &#039;&#039;&#039;Exploring individual responses to threat&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
* [https://holistic-security.tacticaltech.org/chapters/prepare/1-4-team-and-peer-responses-to-threat.html &#039;&#039;&#039;Exploring group responses to threat&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
* [https://holistic-security.tacticaltech.org/chapters/prepare/1-5-communicating-about-threats-in-teams-and-organisations.html &#039;&#039;&#039;Communicating about security in teams and organizations&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
&lt;br /&gt;
== Understanding our threats and context ==&lt;br /&gt;
&lt;br /&gt;
=== Situation monitoring and analysis ===&lt;br /&gt;
Situation monitoring and analysis is the broadest kind of analysis of our context: observing the political, economic, social, technological, legal and environmental developments in society which are relevant to our work, and may impact our security situation. (Source: [https://holistic-security.tacticaltech.org/chapters/explore/2-2-situation-monitoring-and-analysis.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Exercise: [https://holistic-security.tacticaltech.org/exercises/explore/situational-monitoring-a-quick-pestle-analysis.html &#039;&#039;&#039;Pestle analysis&#039;&#039;&#039;] (Holistic Security Manual) &lt;br /&gt;
&lt;br /&gt;
Tool: &#039;&#039;&#039;[https://tnr-research.uwazi.io/ Research Database on transnational repression]&#039;&#039;&#039; - This collection of research reports on transnational repression can help human rights defenders better understand: &lt;br /&gt;
&lt;br /&gt;
* Transnational Repression (TNR) threats that are possible, to determine appropriate mitigation techniques&lt;br /&gt;
* Which TNR threats are unlikely, in order to alleviate fear&lt;br /&gt;
* What exiled HRDs can expect from a host country in terms of protection measures&lt;br /&gt;
* Existing campaigns to strengthen protection for exiled HRDs&lt;br /&gt;
&lt;br /&gt;
=== Identifying, analyzing and prioritizing threats ===&lt;br /&gt;
&lt;br /&gt;
==== Map the actors ====&lt;br /&gt;
&#039;&#039;It is valuable to get a clear picture of all the actors in our environment (individuals, institutions, organizations, etc). Threats almost always come from someone or something. Knowing as much as we can about the actors in our context improves our perception of our environment and thereby, our ability to carry out activities to maintain or expand our space for work.&#039;&#039; (Source: [https://holistic-security.tacticaltech.org/chapters/explore/2-3-vision-strategy-and-actors.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Exercise:&lt;br /&gt;
&lt;br /&gt;
* [https://holistic-security.tacticaltech.org/exercises/explore/visual-actor-mapping-part-1.html &#039;&#039;&#039;Spectrum of allies&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
* [https://newtactics.org/resource/exercises-identifying-allies-opponents &#039;&#039;&#039;Spectrum of allies&#039;&#039;&#039;] (New Tactics in Human Rights project)&lt;br /&gt;
&lt;br /&gt;
==== Brainstorm threats ====&lt;br /&gt;
This exercise is a first attempt at identifying the threats to yourself, your group or organization and your work in defense of human rights. This initial list of threats can then be refined so as to focus in more depth on the threats which are most likely or potentially most harmful. (Source: [https://holistic-security.tacticaltech.org/exercises/explore/threat-brainstorm.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Exercise: [https://holistic-security.tacticaltech.org/exercises/explore/threat-brainstorm.html &#039;&#039;&#039;Threat brainstorm&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
&lt;br /&gt;
==== Analyzing risk, prioritizing threats ====&lt;br /&gt;
Threats can be viewed and categorized in light of the following: the likelihood that the threat will take place, and the impact if and when it does. Likelihood and impact are concepts which help us determine risk: the higher the likelihood or impact of a threat, the higher the risk. Categorizing threats can help to keep us from feeling overwhelmed and keep our perception of threats realistic. (Source: [https://holistic-security.tacticaltech.org/chapters/explore/2-8-identifying-and-analysing-threats.html Holistic Security Manual])&lt;br /&gt;
&lt;br /&gt;
Exercise: [https://holistic-security.tacticaltech.org/chapters/explore/2-8-identifying-and-analysing-threats.html &#039;&#039;&#039;Threat matrix&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
&lt;br /&gt;
Tools:&lt;br /&gt;
&lt;br /&gt;
* The Ford Foundation’s [https://www.fordfoundation.org/work/our-grants/building-institutions-and-networks/cybersecurity-assessment-tool/ &#039;&#039;&#039;Cybersecurity Assessment Tool (CAT)&#039;&#039;&#039;] is designed to measure the maturity, resiliency, and strength of an organization’s cybersecurity efforts. We have created this questionnaire with busy nontechnical grant makers, grantee partners, civil society organizations, and nonprofits in mind, and we hope it helps shine some light on a recommended path forward for any organization undertaking a cybersecurity journey&lt;br /&gt;
&lt;br /&gt;
==== Analyze threats ====&lt;br /&gt;
This exercise will help you prioritize threats and divine the causes, ramifications, sources as well as the required resources, existing actions and possible next steps.&lt;br /&gt;
&lt;br /&gt;
Exercise: [https://holistic-security.tacticaltech.org/exercises/explore/threat-inventory.html &#039;&#039;&#039;Threat inventory&#039;&#039;&#039;] (Holistic Security Manual)&lt;br /&gt;
&lt;br /&gt;
== Risk mitigation ==&lt;br /&gt;
In order to build a response to the threats we face, we can consider them in terms of the factors which make us more or less susceptible to them. Read more in [https://holistic-security.tacticaltech.org/chapters/strategise/3-1-responding-to-threats.html this chapter of the Holistic Security Manual]. &lt;br /&gt;
&lt;br /&gt;
=== Mitigation techniques for common threats to information ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
! Threat&lt;br /&gt;
!Mitigation techniques and links to guidance &lt;br /&gt;
|-&lt;br /&gt;
|Data loss&lt;br /&gt;
|&lt;br /&gt;
* [[Ways to securely store and share files|Have your information securely in the cloud or on a server]]&lt;br /&gt;
* Have a backup process&lt;br /&gt;
|-&lt;br /&gt;
|Compromised accounts&lt;br /&gt;
|&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa|Use two factor authentication for all accounts]]&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa|Use unique, complex passwords for all accounts]]&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa|Use a password manager to create, store and protect those passwords]]&lt;br /&gt;
|-&lt;br /&gt;
|Device inspection at checkpoints&lt;br /&gt;
|&lt;br /&gt;
* [[Use a secure messaging app#Tip: use automatic disappearing messages|Use automated disappearing messages on your messaging apps]]&lt;br /&gt;
* [[Ways to securely store and share files|Have your sensitive information stored safely in the cloud and off of your device]]&lt;br /&gt;
* Hide or delete any apps that would provide access to this information (you can restore that app later)&lt;br /&gt;
|-&lt;br /&gt;
|Device confiscation or theft&lt;br /&gt;
|&lt;br /&gt;
* [[Secure your devices#Full disk encryption|Encrypt your devices]]&lt;br /&gt;
* And, review and adapt the same advice above for “device inspection” threat&lt;br /&gt;
|-&lt;br /&gt;
|Information handover&lt;br /&gt;
|&lt;br /&gt;
* [[Trusted hosting companies in the human rights community|Host your information with a company you trust]], who will not turn over information to your opponents (via subpoena, request, etc)&lt;br /&gt;
|-&lt;br /&gt;
|Targeted malware or spyware&lt;br /&gt;
|&lt;br /&gt;
* [[Protect your accounts using strong passwords, pw managers, 2fa|Protect yourselves against (spear) phishing attacks]]&lt;br /&gt;
* Use a second device for sensitive activities&lt;br /&gt;
* [[How to mitigate your risk of being subject to Pegasus surveillance|Restart your device regularly to disrupt spyware]]&lt;br /&gt;
* [[Secure your devices|Use anti virus]]&lt;br /&gt;
* [[How to mitigate your risk of being subject to Pegasus surveillance]], and other spyware&lt;br /&gt;
|-&lt;br /&gt;
|Surveillance and monitoring&lt;br /&gt;
|&lt;br /&gt;
* [[Safe internet browsing using VPN and Tor browser|Use a VPN and/or Tor browser]]&lt;br /&gt;
* [[Use a secure messaging app]]&lt;br /&gt;
* [[How to collect and store information in a secure way]]&lt;br /&gt;
* [[Ways to securely store and share files|How to use Google Drive safely and alternatives to Google Drive]]&lt;br /&gt;
|-&lt;br /&gt;
|Website hacking and takeover&lt;br /&gt;
|&lt;br /&gt;
* [[Protect your website|Protect your website from DDOS attacks]]&lt;br /&gt;
* [[Trusted hosting companies in the human rights community|Use a host company that you trust]]&lt;br /&gt;
* And, review and adapt the same advice above for &amp;quot;compromised accounts&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
Other important considerations when collecting, storing, using sensitive information:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Consideration&lt;br /&gt;
!Resources&lt;br /&gt;
|-&lt;br /&gt;
|Make sure you have informed consent from the people you are collecting information&lt;br /&gt;
|[[Guidance on informed consent]]&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
* [[Information Security for Human Rights Defenders]]&lt;br /&gt;
&lt;br /&gt;
===Mitigation techniques for online harassment===&lt;br /&gt;
[[How to deal with online harassment and threats]]&lt;br /&gt;
&lt;br /&gt;
==Security planning ==&lt;br /&gt;
Once we have clarity about the threats we face during our activities, we can begin to organize our security protocols into security plans or agreements. Review [https://holistic-security.tacticaltech.org/chapters/strategise/3-3-creating-security-plans-and-agreements.html this chapter of the Holistic Security Manual]. &lt;br /&gt;
&lt;br /&gt;
[[General guidance for creating security plans and agreements]] &lt;br /&gt;
&lt;br /&gt;
Resources:  &lt;br /&gt;
&lt;br /&gt;
* Consumer Reports [https://securityplanner.consumerreports.org/ &#039;&#039;&#039;Security Planner&#039;&#039;&#039;] is a free, easy-to-use guide to staying safer online. It provides personalized recommendations and expert advice on topics such as keeping social media accounts from being hacked, locking down devices ranging from smartphones to home security cameras, and reducing intrusive tracking by websites.&lt;br /&gt;
* [https://www.nist.gov/itl/smallbusinesscyber/nist-cybersecurity-framework-0 &#039;&#039;&#039;NIST Cybersecurity Framework 2.0&#039;&#039;&#039;]:  Small Business Quick Start Guide - provides small-to-medium sized businesses (SMB), specifically those who have modest or no cybersecurity plans in place, with considerations to kick-start their cybersecurity risk management strategy using the NIST Cybersecurity Framework (CSF) 2.0. (by the &#039;&#039;National Institute of Standards and Technology)&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Security planning on specific topics===&lt;br /&gt;
&lt;br /&gt;
* [[General tips for international travel]]&lt;br /&gt;
* [[General tips for home security]]&lt;br /&gt;
&lt;br /&gt;
== Building a culture of security within a team ==&lt;br /&gt;
[https://level-up.cc/ &#039;&#039;&#039;LevelUp&#039;&#039;&#039;] is a collection of resources for the global digital safety training community.&lt;br /&gt;
&lt;br /&gt;
[https://wiki.orgsec.community/ &#039;&#039;&#039;Organisational security community wiki&#039;&#039;&#039;] is a resource created by and for security practitioners from all backgrounds to share useful resources and document innovative approaches to long-term security work. &lt;br /&gt;
&lt;br /&gt;
==Resource collections ==&lt;br /&gt;
[https://digitalfirstaid.org/ &#039;&#039;&#039;Digital First Aid Kit&#039;&#039;&#039;] - The Digital First Aid Kit is a free resource to help rapid responders, digital security trainers, and tech-savvy activists to better protect themselves and the communities they support against the most common types of digital emergencies. It can also be used by activists, human rights defenders, bloggers, journalists or media activists who want to learn more about how they can protect themselves and support others. If you or someone you are assisting is experiencing a digital emergency, the Digital First Aid Kit will guide you in diagnosing the issues you are facing, and refer you to support providers for further help if needed.&lt;br /&gt;
&lt;br /&gt;
[https://communitydocs.accessnow.org/ &#039;&#039;&#039;Access Now Help Desk documentation&#039;&#039;&#039;]&lt;br /&gt;
&lt;br /&gt;
[https://cyber-star.org/ &#039;&#039;&#039;CyberSTAR&#039;&#039;&#039;], by SecDev, makes it easier for small organizations and individuals to understand and manage digital safety by organizing it around six themes. This site presents learning resources to help you be safer online—plus teaching resources for digital safety trainers.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
More info:&lt;br /&gt;
&lt;br /&gt;
[[Ways to securely store and share files|Secure storage for sensitive information]] &lt;br /&gt;
&lt;br /&gt;
[[Protect your accounts using strong passwords, pw managers, 2fa|Secure access to sensitive information]] &lt;br /&gt;
&lt;br /&gt;
[[Secure your devices]]&lt;/div&gt;</summary>
		<author><name>Kristin1</name></author>
	</entry>
	<entry>
		<id>https://wiki.digitalrights.community/index.php?title=Ways_to_securely_store_and_share_files&amp;diff=50659</id>
		<title>Ways to securely store and share files</title>
		<link rel="alternate" type="text/html" href="https://wiki.digitalrights.community/index.php?title=Ways_to_securely_store_and_share_files&amp;diff=50659"/>
		<updated>2024-06-10T18:20:46Z</updated>

		<summary type="html">&lt;p&gt;Kristin1: /* Cryptpad Drive (alternative to Google) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Like any group of people working on a project, human rights defenders need ways to easily share and work on digital files. Many of us use Google Drive to share and collaborate on documents with colleagues, but human rights defenders often wonder -- &amp;quot;Is Google Drive a secure platform to use for this?&amp;quot;.  &lt;br /&gt;
&lt;br /&gt;
This page is meant to explain ways to use Google Drive and other alternatives for creating, storing, collaborating, and sharing files. To learn about additional tools to help you collect and store sensitive information securely, see this page: [[How to collect and store information in a secure way]] &lt;br /&gt;
&lt;br /&gt;
== Google Drive and Google Workspace ==&lt;br /&gt;
If the Google company itself is not your adversary, their platform provides a lot of great free and low-cost tools for individuals and team. Google Drive includes many important security features, such as two factor authentication.  &lt;br /&gt;
&lt;br /&gt;
There are at least three different ways to set up the use the Google platform for file sharing and collaboration:  &lt;br /&gt;
&lt;br /&gt;
# Google Drive (which is mostly for individuals), &lt;br /&gt;
# Google Workspace for businesses&lt;br /&gt;
# Google for Nonprofits (which is basically Google Workspace, but free if you are an eligible &amp;lt;u&amp;gt;nonprofit&amp;lt;/u&amp;gt; organization)&lt;br /&gt;
&lt;br /&gt;
==== Google Drive (for individuals) ====&lt;br /&gt;
&amp;quot;Store, share, and collaborate on files and folders from your mobile device, tablet, or computer.&amp;quot;  Many of us already have personal email addresses on Google and this gives us automatic access to Google Drive for individuals. [https://www.google.com/drive/ More information on Google Drive.] &lt;br /&gt;
&lt;br /&gt;
=== Google Workspace (for businesses) ===&lt;br /&gt;
For those organization in countries that are not eligible for Google for Nonprofits, you can consider purchasing Google Workspace for Businesses. [https://workspace.google.com/pricing.html Pricing] is around 12 USD per month per user. [https://workspace.google.com/ More information on Google Workspace]. &lt;br /&gt;
&lt;br /&gt;
=== Google for Nonprofits ===&lt;br /&gt;
Google for Nonprofits provides free tools to nonprofit organizations that allow them to work more quickly and efficiently reach a wider audience, spur more supporters to take action, and tell their story in a more compelling way. This offer is available to our community directly through Google, and it is made possible in part by TechSoup Validation Services.  [https://www.techsoup.org/validation-services/?__hstc=241563805.f8b53c84c499be80aa290dd91d0bb736.1572459597322.1572459597322.1585783970635.2&amp;amp;__hssc=241563805.1.1585783970635&amp;amp;__hsfp=3015930617 Learn more] about how TechSoup works with leading companies to bring offers like this one to the nonprofit sector.&lt;br /&gt;
&lt;br /&gt;
[https://support.google.com/nonprofits/answer/3215869?hl=en&amp;amp;ref_topic=3247288&amp;amp;sjid=5846275294374651668-NA Google for Nonprofits Eligibility Guidelines] (including the countries that your organization must be registered in)&lt;br /&gt;
&lt;br /&gt;
=== Important considerations for making Google Drive more secure ===&lt;br /&gt;
For each of these Google file sharing options, you will want to make sure to:&lt;br /&gt;
* have all contributors use strong, unique passwords,&lt;br /&gt;
* have all contributors use two factor authentication, and &lt;br /&gt;
* create some policies around permissions and access levels to certain kinds of information, and policies around how to add and remove people from access.&lt;br /&gt;
&lt;br /&gt;
== Proton (alternative to Google) ==&lt;br /&gt;
[https://proton.me/about Proton] was born in Switzerland in 2014 when a team of scientists who met at CERN (the European Organization for Nuclear Research) decided to build a better internet where privacy is the default.&lt;br /&gt;
&lt;br /&gt;
=== Proton Drive ===&lt;br /&gt;
&#039;&#039;[https://proton.me/drive Proton Drive] is an end-to-end encrypted Swiss vault for your files that protects your data. Proton Drive&#039;s strong encryption goes beyond other secure cloud solutions. End-to-end encryption ensures that no one, not even us, can access your files. Files, file names, folder names, and more, are all fully encrypted at rest and in transit to the secure cloud. Proton Drive&#039;s end-to-end encryption also works when sharing files and folders. Optional features like password protected files and expiring file sharing links enhance security even further. Best of all, there are no file size limits.&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
[https://proton.me/support/drive-web-guide Proton Drive guide]&lt;br /&gt;
&lt;br /&gt;
=== Proton for Business ===&lt;br /&gt;
[https://proton.me/business Secure business] email, calendar, VPN, and much more, built on the principle of your data, your rules. Pricing: about 11 USD per month per person. &lt;br /&gt;
&lt;br /&gt;
== CryptPad (alternative to Google) ==&lt;br /&gt;
[https://cryptpad.org/ CryptPad] is a collaborative office suite that is end-to-end encrypted and open-source. &lt;br /&gt;
&lt;br /&gt;
Flagship instance of [https://cryptpad.fr/ CryptPad], the end-to-end encrypted and open-source collaboration suite. Administered by the CryptPad development team. Encrypted data hosted in France. Free to use!  &lt;br /&gt;
&lt;br /&gt;
== Stackspin (alternative to Google) ==&lt;br /&gt;
[https://www.stackspin.net/ Stackspin], built and managed by Greenhost, is an online office suite in which you control your data. It includes everything a small organisation needs to get themselves organised. The Stackspin dashboard is a single place for installing and managing apps, adding and managing users, and customizing your Stackspin instance. The project is aimed at CSOs and individual activists that require online solutions and are weary of the corporate offering (or are keen to move away from them). They want these services hosted on a system that they can rely on, but do not need to maintain.&lt;br /&gt;
As of May 2023, the suite includes:&lt;br /&gt;
&lt;br /&gt;
* NextCloud for file sharing&lt;br /&gt;
* Only Office for document collaboration&lt;br /&gt;
* Zulip for team chat&lt;br /&gt;
* Wordpress for website creation&lt;br /&gt;
* NextCloud for password management&lt;br /&gt;
* Wekan for task management&lt;br /&gt;
&lt;br /&gt;
== Secure hosting companies for human rights defenders ==&lt;br /&gt;
See [[Trusted hosting companies in the human rights community]] &amp;gt;&amp;gt;&lt;/div&gt;</summary>
		<author><name>Kristin1</name></author>
	</entry>
	<entry>
		<id>https://wiki.digitalrights.community/index.php?title=Ways_to_securely_store_and_share_files&amp;diff=50658</id>
		<title>Ways to securely store and share files</title>
		<link rel="alternate" type="text/html" href="https://wiki.digitalrights.community/index.php?title=Ways_to_securely_store_and_share_files&amp;diff=50658"/>
		<updated>2024-06-10T18:19:53Z</updated>

		<summary type="html">&lt;p&gt;Kristin1: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Like any group of people working on a project, human rights defenders need ways to easily share and work on digital files. Many of us use Google Drive to share and collaborate on documents with colleagues, but human rights defenders often wonder -- &amp;quot;Is Google Drive a secure platform to use for this?&amp;quot;.  &lt;br /&gt;
&lt;br /&gt;
This page is meant to explain ways to use Google Drive and other alternatives for creating, storing, collaborating, and sharing files. To learn about additional tools to help you collect and store sensitive information securely, see this page: [[How to collect and store information in a secure way]] &lt;br /&gt;
&lt;br /&gt;
== Google Drive and Google Workspace ==&lt;br /&gt;
If the Google company itself is not your adversary, their platform provides a lot of great free and low-cost tools for individuals and team. Google Drive includes many important security features, such as two factor authentication.  &lt;br /&gt;
&lt;br /&gt;
There are at least three different ways to set up the use the Google platform for file sharing and collaboration:  &lt;br /&gt;
&lt;br /&gt;
# Google Drive (which is mostly for individuals), &lt;br /&gt;
# Google Workspace for businesses&lt;br /&gt;
# Google for Nonprofits (which is basically Google Workspace, but free if you are an eligible &amp;lt;u&amp;gt;nonprofit&amp;lt;/u&amp;gt; organization)&lt;br /&gt;
&lt;br /&gt;
==== Google Drive (for individuals) ====&lt;br /&gt;
&amp;quot;Store, share, and collaborate on files and folders from your mobile device, tablet, or computer.&amp;quot;  Many of us already have personal email addresses on Google and this gives us automatic access to Google Drive for individuals. [https://www.google.com/drive/ More information on Google Drive.] &lt;br /&gt;
&lt;br /&gt;
=== Google Workspace (for businesses) ===&lt;br /&gt;
For those organization in countries that are not eligible for Google for Nonprofits, you can consider purchasing Google Workspace for Businesses. [https://workspace.google.com/pricing.html Pricing] is around 12 USD per month per user. [https://workspace.google.com/ More information on Google Workspace]. &lt;br /&gt;
&lt;br /&gt;
=== Google for Nonprofits ===&lt;br /&gt;
Google for Nonprofits provides free tools to nonprofit organizations that allow them to work more quickly and efficiently reach a wider audience, spur more supporters to take action, and tell their story in a more compelling way. This offer is available to our community directly through Google, and it is made possible in part by TechSoup Validation Services.  [https://www.techsoup.org/validation-services/?__hstc=241563805.f8b53c84c499be80aa290dd91d0bb736.1572459597322.1572459597322.1585783970635.2&amp;amp;__hssc=241563805.1.1585783970635&amp;amp;__hsfp=3015930617 Learn more] about how TechSoup works with leading companies to bring offers like this one to the nonprofit sector.&lt;br /&gt;
&lt;br /&gt;
[https://support.google.com/nonprofits/answer/3215869?hl=en&amp;amp;ref_topic=3247288&amp;amp;sjid=5846275294374651668-NA Google for Nonprofits Eligibility Guidelines] (including the countries that your organization must be registered in)&lt;br /&gt;
&lt;br /&gt;
=== Important considerations for making Google Drive more secure ===&lt;br /&gt;
For each of these Google file sharing options, you will want to make sure to:&lt;br /&gt;
* have all contributors use strong, unique passwords,&lt;br /&gt;
* have all contributors use two factor authentication, and &lt;br /&gt;
* create some policies around permissions and access levels to certain kinds of information, and policies around how to add and remove people from access.&lt;br /&gt;
&lt;br /&gt;
== Proton (alternative to Google) ==&lt;br /&gt;
[https://proton.me/about Proton] was born in Switzerland in 2014 when a team of scientists who met at CERN (the European Organization for Nuclear Research) decided to build a better internet where privacy is the default.&lt;br /&gt;
&lt;br /&gt;
=== Proton Drive ===&lt;br /&gt;
&#039;&#039;[https://proton.me/drive Proton Drive] is an end-to-end encrypted Swiss vault for your files that protects your data. Proton Drive&#039;s strong encryption goes beyond other secure cloud solutions. End-to-end encryption ensures that no one, not even us, can access your files. Files, file names, folder names, and more, are all fully encrypted at rest and in transit to the secure cloud. Proton Drive&#039;s end-to-end encryption also works when sharing files and folders. Optional features like password protected files and expiring file sharing links enhance security even further. Best of all, there are no file size limits.&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
[https://proton.me/support/drive-web-guide Proton Drive guide]&lt;br /&gt;
&lt;br /&gt;
=== Proton for Business ===&lt;br /&gt;
[https://proton.me/business Secure business] email, calendar, VPN, and much more, built on the principle of your data, your rules. Pricing: about 11 USD per month per person. &lt;br /&gt;
&lt;br /&gt;
== Cryptpad Drive (alternative to Google) ==&lt;br /&gt;
Flagship instance of [https://cryptpad.fr/ CryptPad], the end-to-end encrypted and open-source collaboration suite. Administered by the CryptPad development team. Encrypted data hosted in France. &lt;br /&gt;
&lt;br /&gt;
== Stackspin (alternative to Google) ==&lt;br /&gt;
[https://www.stackspin.net/ Stackspin], built and managed by Greenhost, is an online office suite in which you control your data. It includes everything a small organisation needs to get themselves organised. The Stackspin dashboard is a single place for installing and managing apps, adding and managing users, and customizing your Stackspin instance. The project is aimed at CSOs and individual activists that require online solutions and are weary of the corporate offering (or are keen to move away from them). They want these services hosted on a system that they can rely on, but do not need to maintain.&lt;br /&gt;
As of May 2023, the suite includes:&lt;br /&gt;
&lt;br /&gt;
* NextCloud for file sharing&lt;br /&gt;
* Only Office for document collaboration&lt;br /&gt;
* Zulip for team chat&lt;br /&gt;
* Wordpress for website creation&lt;br /&gt;
* NextCloud for password management&lt;br /&gt;
* Wekan for task management&lt;br /&gt;
&lt;br /&gt;
== Secure hosting companies for human rights defenders ==&lt;br /&gt;
See [[Trusted hosting companies in the human rights community]] &amp;gt;&amp;gt;&lt;/div&gt;</summary>
		<author><name>Kristin1</name></author>
	</entry>
	<entry>
		<id>https://wiki.digitalrights.community/index.php?title=Protect_your_accounts_using_strong_passwords,_pw_managers,_2fa&amp;diff=50657</id>
		<title>Protect your accounts using strong passwords, pw managers, 2fa</title>
		<link rel="alternate" type="text/html" href="https://wiki.digitalrights.community/index.php?title=Protect_your_accounts_using_strong_passwords,_pw_managers,_2fa&amp;diff=50657"/>
		<updated>2024-06-07T14:53:03Z</updated>

		<summary type="html">&lt;p&gt;Kristin1: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;h1&amp;gt;Passwords&amp;lt;/h1&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;&amp;lt;strong&amp;gt;Passwords are your first line of defense&amp;lt;/strong&amp;gt; against anyone who would like to hack into these accounts. They are what keep your information safe; they enable you to keep control of your data.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;But preventing your accounts from being hacked requires passwords that are long, strong, complex, unique and practical; and you need to have a DIFFERENT long, strong, unique and practical password for each account.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;Why do we need strong passwords?&amp;lt;/h2&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;The internet stores a lot of data about you. Your credit card information might be tied to your Apple ID or Android Device ID, as well as to your online shopping accounts. Personal photos, including of your family, children, and friends, might be stored on Facebook, on your phone and and on the servers of your cloud storage. Your email and messaging app accounts have all your conversations with partners, friends and family, as well as work-related discussions and other information.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Your passwords need to be strong enough so you can keep control of your accounts. Once an account is hacked, an attacker can:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Access all the information in that account&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Lock you out of that account&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Impersonate you and communicate with, or send phishing emails to, your network&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Try to use this account to gain access to other accounts or use it to try to gain access to your financial information&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A good password is the only thing keeping this information from being accessed. In short, it gives you control over your data.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;&amp;lt;strong&amp;gt;No need to change your strong passwords once they are in place.&amp;lt;/strong&amp;gt; Changing passwords regularly was a common recommendation until a couple of years ago. This is outdated now because if you follow this list of best practices, there is absolutely no need to change your passwords regularly. The reason why changing passwords is no longer recommended is the following: Researchers have found that changing passwords regularly does more harm than good as it encourages people to choose weaker passwords. Better choose a strong and unique password once, instead of regularly changing a weak one to another weak one.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;Resources on creating strong passwords&amp;lt;/h2&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;&amp;lt;strong&amp;gt;[Online course] Totem&#039;s course about secure passwords&amp;lt;/strong&amp;gt; (free) - Passwords are your first line of defence online, so it&amp;amp;rsquo;s really important that these are long and unique. But how can you manage this for all your accounts? The course will guide you through setting up KeePassXC, a password manager that makes creating and storing passwords easier and safer. You&amp;amp;rsquo;ll also look at Two-Factor Authentication (2FA), for added security. You should end the course with a solid password-management strategy that protects your accounts, without taking up too much of your time (or brain-power!).&amp;amp;nbsp; This course is available in: [https://learn.totem-project.org/courses/course-v1:Totem+TP_SP_001+course/course/ English], [https://learn.totem-project.org/courses/course-v1:Totem+TP_SP_ES+001/about Spanish], [https://learn.totem-project.org/courses/course-v1:Totem+TP_SP_FR_001+cours/about French], [https://learn.totem-project.org/courses/course-v1:Totem+TP_SP_AR+001/about Arabic], [https://learn.totem-project.org/courses/course-v1:Totem+TP_SP_RU+001/about Russian], [https://learn.totem-project.org/courses/course-v1:Totem+TP_SP_FA+001/about Farsi]&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;&amp;lt;strong&amp;gt;[Guide] Creating strong passwords&amp;lt;/strong&amp;gt;&amp;amp;nbsp; [by Electronic Frontier Foundation] - This guide is designed for human rights defenders and is available in [https://ssd.eff.org/en/module/creating-strong-passwords English], [https://ssd.eff.org/es/module/creando-contrase%C3%B1as-seguras Spanish], [https://ssd.eff.org/fr/module/cr%C3%A9er-des-mots-de-passe-robustes French], [https://ssd.eff.org/ar/module/%D9%88%D8%B6%D8%B9-%D9%83%D9%84%D9%85%D8%A7%D8%AA-%D8%B3%D8%B1-%D9%82%D9%88%D9%8A%D8%A9 Arabic], [https://ssd.eff.org/ru/module/%D1%81%D0%BE%D0%B7%D0%B4%D0%B0%D0%BD%D0%B8%D0%B5-%D0%BD%D0%B0%D0%B4%D1%91%D0%B6%D0%BD%D1%8B%D1%85-%D0%BF%D0%B0%D1%80%D0%BE%D0%BB%D0%B5%D0%B9 Russian], and other languages. &amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h1&amp;gt;Password managers&amp;lt;/h1&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;&amp;amp;nbsp;A password manager is a tool that creates and stores passwords for you, so you can use many different passwords on different sites and services without having to memorize them. You only need to remember one master password that allows you to access the encrypted password manager database of all your passwords.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;&amp;lt;strong&amp;gt;[Video] Animated Overview&amp;lt;/strong&amp;gt;: [https://ssd.eff.org/en/module/animated-overview-using-password-managers-stay-safe-online Using Password Managers to Stay Safe Online] (by EFF) - available in many languages&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;Password manager: Bitwarden&amp;lt;/h2&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;[https://bitwarden.com/ Bitwarden] is a&amp;amp;nbsp;free and open-source&amp;amp;nbsp;password management service&amp;amp;nbsp;that stores sensitive information such as website credentials in an&amp;amp;nbsp;encrypted&amp;amp;nbsp;vault. The Bitwarden platform offers a variety of client applications including a&amp;amp;nbsp;web interface,&amp;amp;nbsp;desktop applications,&amp;amp;nbsp;browser extensions,&amp;amp;nbsp;mobile apps, and a command-line interface. It is a popular password manager option among human rights defenders.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Bitwarden resources:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
    &amp;lt;li&amp;gt;[Videos] [https://vimeo.com/showcase/8692945 Getting Started with Bitwarden](English) &amp;lt;/li&amp;gt;&lt;br /&gt;
    &amp;lt;li&amp;gt;[Guide] How to use Bitwarden to manage passwords on all devices, including phones. Free, open source software.&amp;lt;/li&amp;gt;&lt;br /&gt;
    &amp;lt;li&amp;gt;[Guide] [https://bitwarden.com/help/get-started-individual-user/ Get Started with Bitwarden] (English)&amp;lt;/li&amp;gt;&lt;br /&gt;
    &amp;lt;li&amp;gt;[Slide deck] [https://docs.google.com/presentation/d/e/2PACX-1vRj4oFJeS4hW6RnS3SPctCDAPeEe2XpAq4Iolr9LME3PDG2wKx-hpCNsqhjqz01UmFpTX8IVKObdvNM/embed?start=false&amp;amp;loop=false&amp;amp;delayms=3000&amp;amp;slide=id.gd279e4f08d_1_1062 Bitwarden for Beginners] (English)&amp;lt;/li&amp;gt;&lt;br /&gt;
    &amp;lt;li&amp;gt;[Guide] [https://www.pantallasamigas.net/guia-configuracion-programa-gestor-contrasenas-bitwarden-ciberseguridad/ Install and Configure Bitwarden]&amp;lt;/li&amp;gt;&lt;br /&gt;
    &amp;lt;li&amp;gt;[Video] [https://vimeo.com/539797097 How to send sensitive info (files or text) securely to anyone, using Bitwarden] (English)&amp;lt;/li&amp;gt;&lt;br /&gt;
    &amp;lt;li&amp;gt;[Video] [https://vimeo.com/579574710 How to set up Bitwarden for your internet browser] (English)&amp;lt;/li&amp;gt;&lt;br /&gt;
    &amp;lt;li&amp;gt;[Guide] [https://bitwarden.com/help/getting-started-mobile/ Getting started with Bitwarden mobile] (English)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== How can you trust Bitwarden to protect your passwords? ===&lt;br /&gt;
It&#039;s natural to feel a bit conflicted about putting all your important passwords in one place, online. It can feel like a vulnerable thing to do! This is a totally valid concerns and is a really good instinct. No company can ever guarantee that your information will be &#039;&#039;protected&#039;&#039; and &#039;&#039;accessible&#039;&#039; in perpetuity. That being said, there are things to keep in mind to mitigate against risks:&lt;br /&gt;
&lt;br /&gt;
# According to their policies, Bitwarden cannot access your data. &amp;quot;[[Source: https://bitwarden.com/help/bitwarden-security-white-paper/|Zero knowledge encryption]]&#039;&#039;&#039;:&#039;&#039;&#039; Bitwarden team members can not see your passwords. Your data remains encrypted end-to-end with your individual email and Master Password. We never store and cannot access your Master Password or your cryptographic keys.&amp;quot;&lt;br /&gt;
# To further protect your Bitwarden account from hackers trying to break into it, you could use a Yubikey as multifactor authentication, which means that in order to access your account, the person trying to break in will also need to get your Yubikey. &lt;br /&gt;
# To mitigate against the risk of Bitwarden losing your information someday, or you losing access to it, you can [https://bitwarden.com/help/export-your-data/ export your data] and keep it in a safe place (such as an encrypted folder on a device or in cloud).&amp;lt;h2&amp;gt;Password manager: KeepassXC&amp;lt;/h2&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;[https://keepassxc.org/ KeePassXC] is a free and open-source password manager. It started as a community fork of KeePassX. It is built using Qt5 libraries, making it a multi-platform application which can be run on Linux, Windows, and macOS.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
KeepassXC resources:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
    &amp;lt;li&amp;gt;[Video] [https://www.youtube-nocookie.com/embed/Dm3Xeo0hIQk Manage your passwords using KeePassXC] (by Justice and Peace Netherlands, English)&lt;br /&gt;
    &amp;lt;/li&amp;gt;[Guide] How to use KeepassXC (by EFF) - available in [https://ssd.eff.org/en/module/how-use-keepassxc English], [https://ssd.eff.org/es/module/c%C3%B3mo-usar-keepassxc Spanish], [https://ssd.eff.org/fr/module/guide-pratique-utiliser-keepassxc French], [https://ssd.eff.org/ar/module/%D9%83%D9%8A%D9%81%D9%8A%D8%A9-%D8%A7%D8%B3%D8%AA%D8%AE%D8%AF%D8%A7%D9%85-%D9%83%D9%8A-%D8%A8%D8%A7%D8%B3-%D8%A7%D9%83%D8%B3 Arabic], [https://ssd.eff.org/ru/module/%D1%80%D1%83%D0%BA%D0%BE%D0%B2%D0%BE%D0%B4%D1%81%D1%82%D0%B2%D0%BE-%D0%BF%D0%BE-keepassxc Russian] and other languages.&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h1&amp;gt;Two factor (or multi factor) authentication (2fa or mfa)&amp;lt;/h1&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Multi-factor authentication is an electronic authentication method in which a user is granted access to a website or application only after successfully presenting two or more pieces of evidence to an authentication mechanism: knowledge, possession, and inherence.(Source: [https://en.wikipedia.org/wiki/Multi-factor_authentication Wikipedia])&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;Resources on 2fa&amp;lt;/h2&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
    &amp;lt;li&amp;gt;[Video] [https://www.youtube-nocookie.com/embed/0mvCeNsTa1g What is two factor authentication?]&amp;lt;/li&amp;gt;&lt;br /&gt;
    &amp;lt;li&amp;gt;[Guide] How to enable 2fa (by EFF) - available in [https://ssd.eff.org/en/module/how-enable-two-factor-authentication English], [https://ssd.eff.org/es/module/c%C3%B3mo-habilitar-la-autenticaci%C3%B3n-de-dos-factores Spanish], [https://ssd.eff.org/fr/module/guide-pratique-activer-l%E2%80%99authentification-%C3%A0-deux-facteurs French], [https://ssd.eff.org/ar/module/%D8%AF%D9%84%D9%8A%D9%84-%D9%83%D9%8A%D9%81%D9%8A%D8%A9-%D8%AA%D9%81%D8%B9%D9%8A%D9%84-%D8%A7%D9%84%D8%AA%D9%88%D8%AB%D9%8A%D9%82-%D8%A7%D9%84%D8%AB%D9%86%D8%A7%D8%A6%D9%8A-two-factor-authentication Arabic], [https://ssd.eff.org/ar/module/%D8%AF%D9%84%D9%8A%D9%84-%D9%83%D9%8A%D9%81%D9%8A%D8%A9-%D8%AA%D9%81%D8%B9%D9%8A%D9%84-%D8%A7%D9%84%D8%AA%D9%88%D8%AB%D9%8A%D9%82-%D8%A7%D9%84%D8%AB%D9%86%D8%A7%D8%A6%D9%8A-two-factor-authentication Russian] and other languages. &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h1&amp;gt;Be aware of spear phishing attacks&amp;lt;/h1&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;Phishing happens to everyone, but most people only become aware of it once they have become a victim of an attack. Protecting yourself from phishing attacks starts with identifying an email or message as an attack before you click on the link or download the file. But even if you are careful, a phishing attack can still sometimes be successful. Don&amp;amp;rsquo;t panic. If you have clicked on a phishing link and given an attacker access to your data, you can still reduce the damage - to yourself as well as to your colleagues, friends, and family.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;Resources to avoid spear phishing attacks&amp;lt;/h2&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
    &amp;lt;li&amp;gt;[Video] [https://vimeo.com/444354623 Very brief phishing overview] by Renee McLaughlin&amp;lt;/li&amp;gt;&lt;br /&gt;
    &amp;lt;li&amp;gt;[Online course] Totem online course on Phishing Attacks - In this course you will learn about phishing attacks: what they are, what they are used for, how you can identify them, and what you can do if you have been phished. Available in [https://learn.totem-project.org/courses/course-v1:Totem+TP_PM_001+course/about English], [https://learn.totem-project.org/courses/course-v1:Totem+TP_PM_ES+001/about Spanish], [https://learn.totem-project.org/courses/course-v1:Totem+TP_PM_FR001+cours/about French], [https://learn.totem-project.org/courses/course-v1:Totem+TP_PM_RU+001/about Russian], [https://learn.totem-project.org/courses/course-v1:Totem+TP_PM_AR+001/about Arabic], and [https://learn.totem-project.org/courses/course-v1:Totem+TP_PM_FA+001/about Farsi].&amp;lt;/li&amp;gt;&lt;br /&gt;
    &amp;lt;li&amp;gt;[Guide] How to avoid a phishing attack (by EFF) - This guide will help you to identify phishing attacks when you see them and outline some practical ways to help defend against them. Available in [https://ssd.eff.org/en/module/how-avoid-phishing-attacks English], [https://ssd.eff.org/es/module/c%C3%B3mo-evitar-los-ataques-de-phishing-o-suplantaci%C3%B3n-de-identidad Spanish], [https://ssd.eff.org/fr/module/guide-pratique-%C3%A9viter-les-attaques-par-hame%C3%A7onnage French], [https://ssd.eff.org/ar/module/%D8%AF%D9%84%D9%8A%D9%84-%D9%83%D9%8A%D9%81%D9%8A%D8%A9-%D8%AA%D8%AC%D9%86%D8%A8-%D9%87%D8%AC%D9%85%D8%A7%D8%AA-%D8%A7%D9%84%D8%AA%D8%B5%D9%8A%D8%AF-phishing Arabic], [https://ssd.eff.org/ru/module/%D1%80%D1%83%D0%BA%D0%BE%D0%B2%D0%BE%D0%B4%D1%81%D1%82%D0%B2%D0%BE-%D0%BF%D0%BE-%D0%B7%D0%B0%D1%89%D0%B8%D1%82%D0%B5-%D0%BE%D1%82-%D1%84%D0%B8%D1%88%D0%B8%D0%BD%D0%B3%D0%BE%D0%B2%D1%8B%D1%85-%D0%B0%D1%82%D0%B0%D0%BA Russian], and other languages.&amp;lt;/li&amp;gt;&lt;br /&gt;
    &amp;lt;li&amp;gt;[Toolkit] [https://gcatoolkit.org/mission-based-orgs/prevent-phishing-and-malware/ GCA Cyber Toolkit] - The tools included in this toolbox aim to help prevent these types of attacks. Included are: DNS security (DNS, or Domain Name System, is the method by which you are able to navigate the internet) to help prevent you from going to infected websites; anti-virus software to help prevent viruses and other malicious software from getting into your systems; and ad blockers, together with correct filter lists, help prevent malicious activity and access to malicious websites while browsing the Internet.&amp;lt;/li&amp;gt;&lt;br /&gt;
    &amp;lt;li&amp;gt;[Training quiz] [https://phishingquiz.withgoogle.com/ Google Phishing Quiz] - Can you spot when you&amp;amp;rsquo;re being phished? Identifying phishing can be harder than you think. Phishing is an attempt to trick you into giving up your personal information by pretending to be someone you know. Can you tell what&#039;s fake?&amp;lt;/li&amp;gt;&lt;br /&gt;
    &amp;lt;li&amp;gt;[Guide] [https://safecomputing.umich.edu/be-aware/phishing-and-suspicious-email/shortened-url-security#:~:text=There%20are%20a%20number%20of,tinyurl.com. How to reveal full URLs]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;/div&gt;</summary>
		<author><name>Kristin1</name></author>
	</entry>
	<entry>
		<id>https://wiki.digitalrights.community/index.php?title=How_to_collect_and_store_information_in_a_secure_way&amp;diff=50579</id>
		<title>How to collect and store information in a secure way</title>
		<link rel="alternate" type="text/html" href="https://wiki.digitalrights.community/index.php?title=How_to_collect_and_store_information_in_a_secure_way&amp;diff=50579"/>
		<updated>2024-06-03T22:45:31Z</updated>

		<summary type="html">&lt;p&gt;Kristin1: /* Use end-to-end encryption for information in motion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Principles for protecting information ==&lt;br /&gt;
&lt;br /&gt;
=== Enable (and use) multi-factor authentication on any accounts ===&lt;br /&gt;
If you are requiring someone to create an account in order to send you information, make sure that it&#039;s possible to protect that account by using multi-factor authentication. Multi-factor authentication is an electronic authentication method in which a user is granted access to a website or application only after successfully presenting two or more pieces of evidence to an authentication mechanism: knowledge, possession, and inherent. Without multi-factor authentication, the information is only as protected as the strength of the user&#039;s password. &lt;br /&gt;
&lt;br /&gt;
Learn more about two factor authentication here: [[Protect your accounts using strong passwords, pw managers, 2fa]]&lt;br /&gt;
&lt;br /&gt;
=== Use end-to-end encryption for information in motion ===&lt;br /&gt;
When protecting information that is &amp;quot;in motion&amp;quot; (being transferred from one person/device to another), It&#039;s a good practice to use a tool that provides end-to-end encryption. End-to-end encryption (E2EE) is a type of information transfer or messaging that keeps the information private from everyone, including the messaging service. When E2EE is used, the information being transferred only appears in decrypted form for the person sending the message and the person receiving the message. [https://holistic-security.tacticaltech.org/chapters/explore/2-6-information-in-motion.html Learn more about protecting information in motion].&lt;br /&gt;
&lt;br /&gt;
=== Host sensitive information with a company you trust ===&lt;br /&gt;
For things that are extremely sensitive and you don&#039;t need to actually need to use it (analyze it) or share it, you can always lock it away in an encrypted folder (using [https://www.veracrypt.fr/code/VeraCrypt/ VeraCrypt]) on any server. But for information that you want to organize, understand, analyze, use and share, you will want it more accessible than having it in an encrypted folder. For these cases, you will want to [[Trusted hosting companies in the human rights community|host your information with a company that you trust]].  &lt;br /&gt;
&lt;br /&gt;
== Tools to collect information ==&lt;br /&gt;
&lt;br /&gt;
=== Tella app ===&lt;br /&gt;
[https://tella-app.org/ Tella] is a free app that is available for Android devices and will be available for iOS soon. It can be used by anyone who engages in collecting information on injustices. Tella allows users to produce high-quality documentation that can be used for research, advocacy or transitional justice. Tella can be connected to KoboToolbox, Uwazi, or another database platform to store, organize and analyze the information.&lt;br /&gt;
&lt;br /&gt;
=== LimeSurvey ===&lt;br /&gt;
[https://www.limesurvey.org/ LimeSurvey] is a simple, quick and anonymous online survey tool. It is open source, allowing people to host LimeSurvey themselves. This self-hosted version is called LimeSurvey Community Edition, and all your data is stored on your or your provider’s server (usually the one where you installed LimeSurvey). You can also work with a [[Trusted hosting companies in the human rights community|web hosting company that you trust]] to host and manage this software for you, such as Greenhost. &lt;br /&gt;
&lt;br /&gt;
=== SecureDrop ===&lt;br /&gt;
[https://securedrop.org/ SecureDrop] is an open source whistleblower submission system that media organizations and NGOs can install to securely accept documents from anonymous sources. SecureDrop is available in 22 languages.&lt;br /&gt;
&lt;br /&gt;
=== Globaleaks ===&lt;br /&gt;
[https://www.globaleaks.org/ GlobaLeaks] is free, open-source software enabling anyone to easily set up and maintain a secure whistleblowing platform. It is possible to host this software with [https://greenhost.net/products/managed/ Greenhost]. &lt;br /&gt;
&lt;br /&gt;
=== OnionShare ===&lt;br /&gt;
🧅 [https://onionshare.org OnionShare] is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network.  &lt;br /&gt;
&lt;br /&gt;
== Tools to store information ==&lt;br /&gt;
&lt;br /&gt;
=== Uwazi database to store information ===&lt;br /&gt;
[https://uwazi.io/ Uwazi] is a web-based tool designed for managing your data in one easy-to-search place. This open-source database application allows you to capture, organise and make sense of a set of facts, observations, testimonies, research, documents and more. You can work with a [[Trusted hosting companies in the human rights community|web hosting company that you trust]] to host and manage this software for you, such as Greenhost.&lt;br /&gt;
&lt;br /&gt;
=== NextCloud ===&lt;br /&gt;
[https://nextcloud.com/about/ Nextcloud] Hub is the industry-leading, fully open-source, on-premises content collaboration platform. Teams access, share and edit their documents, chat and participate in video calls and manage their mail and calendar and projects across mobile, desktop and web interfaces. It is hosted and managed by [[Trusted hosting companies in the human rights community|Greenhost and other web hosting companies]]. &lt;br /&gt;
&lt;br /&gt;
== Ways to collect and store information ==&lt;br /&gt;
&lt;br /&gt;
=== Tella to collect and Uwazi to store information ===&lt;br /&gt;
Organisations who already use Uwazi to store their information, can connect Tella to one or more of their databases to upload data. Using Tella for the information collection enables users who work offline to collect data, add it to the submission forms, save it and upload the information when it is convenient. In addition to the protection and encryption features, working in offline mode is a huge benefit for those who collect information in risky environments and areas with limited or no connectivity. [https://huridocs.org/2022/07/the-new-tella-app-lets-uwazi-users-document-violations-safely-and-while-offline/ More information]on the HURIDOCS website.&lt;br /&gt;
&lt;br /&gt;
== Other tools ==&lt;br /&gt;
For more tools used for documenting human rights violations, see [[Tools for securely documenting human rights violations]]&lt;br /&gt;
&lt;br /&gt;
To learn more about &#039;&#039;&#039;how to use Google Drive safely and alternatives to Google Drive&#039;&#039;&#039;, see [[Ways to securely store and share files]]&lt;/div&gt;</summary>
		<author><name>Kristin1</name></author>
	</entry>
</feed>