Threat analysis - Digital Security Indicators

From Gender and Tech Resources

Revision as of 07:56, 29 July 2015 by Eva (Talk | contribs)

Title of the tutorial Security Indicators: sharing and analysis
Attributions
Kind of learning session Holistic
Tutorial category Discussion
Duration (hours) 75m
"m" can not be assigned to a declared number type with value 75.
Learning objectives To define and explore security indicators in their current situation. To know best practices around sharing and analysis of security indicators.
Prerequisites Ideally, output from Situational Analysis exercise
Methodology Methodology

Activity (10 minutes) Give participants a scenario or series of scenarios wherein a HRD identifies security indicators and takes decisions which keep them safer. Example: We noticed taxis started parking outside our office. Staff would often take these taxis rather than going to the nearest taxi rank as usual. The taxi drivers started conversations with the passengers, asking what they had been doing that day. Our organisation regularly met with other organisations to discuss their work and security issues. At the next meeting, we mentioned this security incident. Members of the other organisations present then realised that taxis had also started parking outside their offices too. We concluded that the authorities were either using taxi drivers to collect information on us, or had planted security personnel as taxi drivers. Our organisations then decided that the safest response would be to pretend we had not noticed , but we warned the staff not to say anything about their work in the taxis but instead to chat about harmelss issues.

Number of facilitators involved 1
Technical needs Flipchart
Theoretical and on line resources Holistic Security Guide

Front Line Defenders Workbook on Security https://www.frontlinedefenders.org/files/workbook_eng.pdf

Protection International Manual http://protectioninternational.org/publication/new-protection-manual-for-human-rights-defenders-3rd-edition/