Difference between revisions of "Threat analysis - Digital Security Indicators"
From Gender and Tech Resources
(Created page with "{{Tutorial |Title of the tutorial=Security Indicators: sharing and analysis |Kind of learning session=Holistic |Tutorial category=Discussion |Duration (hours)=75m |Learning ob...") |
|||
Line 10: | Line 10: | ||
Activity (10 minutes) | Activity (10 minutes) | ||
Give participants a scenario or series of scenarios wherein a HRD identifies security indicators and takes decisions which keep them safer. Example: | Give participants a scenario or series of scenarios wherein a HRD identifies security indicators and takes decisions which keep them safer. Example: | ||
− | + | ''We noticed taxis started parking outside our office. Staff would often take these taxis rather than going to the nearest taxi rank as usual. The taxi drivers started conversations with the passengers, asking what they had been doing that day. Our organisation regularly met with other organisations to discuss their work and security issues. At the next meeting, we mentioned this security incident. Members of the other organisations present then realised that taxis had also started parking outside their offices too. We concluded that the authorities were either using taxi drivers to collect information on us, or had planted security personnel as taxi drivers. Our organisations then decided that the safest response would be to pretend we had not noticed , but we warned the staff not to say anything about their work in the taxis but instead to chat about harmelss issues.'' | |
− | + | ||
− | + | ||
− | + | ||
|Number of facilitators involved=1 | |Number of facilitators involved=1 | ||
|Technical needs=Flipchart | |Technical needs=Flipchart |
Revision as of 07:56, 29 July 2015
Title of the tutorial | Security Indicators: sharing and analysis |
---|---|
Attributions | |
Kind of learning session | Holistic |
Tutorial category | Discussion |
Duration (hours) | 75m "m" can not be assigned to a declared number type with value 75.
|
Learning objectives | To define and explore security indicators in their current situation. To know best practices around sharing and analysis of security indicators. |
Prerequisites | Ideally, output from Situational Analysis exercise |
Methodology | Methodology
Activity (10 minutes) Give participants a scenario or series of scenarios wherein a HRD identifies security indicators and takes decisions which keep them safer. Example: We noticed taxis started parking outside our office. Staff would often take these taxis rather than going to the nearest taxi rank as usual. The taxi drivers started conversations with the passengers, asking what they had been doing that day. Our organisation regularly met with other organisations to discuss their work and security issues. At the next meeting, we mentioned this security incident. Members of the other organisations present then realised that taxis had also started parking outside their offices too. We concluded that the authorities were either using taxi drivers to collect information on us, or had planted security personnel as taxi drivers. Our organisations then decided that the safest response would be to pretend we had not noticed , but we warned the staff not to say anything about their work in the taxis but instead to chat about harmelss issues. |
Number of facilitators involved | 1 |
Technical needs | Flipchart |
Theoretical and on line resources | Holistic Security Guide
Front Line Defenders Workbook on Security https://www.frontlinedefenders.org/files/workbook_eng.pdf Protection International Manual http://protectioninternational.org/publication/new-protection-manual-for-human-rights-defenders-3rd-edition/ |