Safety and Security in Human Rights Work
About Safety and Security Training
The Safety and Security in Human Rights Work training will equip you with the knowledge and skills to protect yourself, your team, your information, and the people whose rights you are trying to uphold from external threats. The modules on safety and security complement the Human Rights Monitoring Training and include key concepts related to security culture, personal security, psychological well-being, and digital security. The digital security modules will enable you to secure your information while in transit (communication) while at rest (in storage) and will enable you to stay safe while surfing the internet.
If you have completed this online training, get in touch with us and complete the online test to obtain your OSCE training certificate.
Enjoy your learning!
IMPORTANT NOTE: If you live in an area where human rights work entails risk, it is strongly advised that you connect to this website and its learning resources, via a VPN connection.
Trainers
-
Giorgi Iashvili
Giorgi Iashvili is an information security professional with over 15 years of experience in the field of ICT and cyber security governance.
He has solid expertise in developing Information Security Management System (ISMS), IT infrastructure resilience against advanced threats including during the electoral process and in deploying new cyber security policies within various organizations.
Giorgi has managed various teams that built data centers from the ground up, designed and implemented cybersecurity infrastructure, performed cyber security risk assessments and other risk compliance related activities and developed risk treatment plans.
-
Helena Manrique
Helena Manrique Charro is a mental health expert, who is currently working as a Mental Health Coordinator within a humanitarian organization in the occupied Palestinian Territory.
Helena has 20 years of experience in conflict and post-conflict contexts with a specialization in psychosocial support and protection. Her professional focus spans several regions incluging Latin America (Colombia, Mexico, Guatemala, Honduras) and the Middle East (Palestine, Jordan).
She has solid experience in accompanying grassroots organisations, designing and implementing care strategies for teams in different social and humanitarian contexts, giving trainings and implementing strategies for improving the well-being in human rights organizations all over the world (Ukraine, Nigeria, Balkans, Georgia, Colombia etc.)
Introduction to Digital Security and Threat modelling
Digital security is of paramount concern for every human rights defender as protecting online assets, entire networks, computer systems, and the data stored within from unauthorized access is key in any human rights investigation.
Each individual human rights defender or organisation threat modeling methodology consists of a different series of steps, and we’ll examine the nuances of each of them later in this module.
We will also examine various type of risks associated with our daily online activities, analyse our vulnerabilities and possible threat actors for us or our organisation and, of course, look into possible ways to mitigate any types of risks.
Estimated time: 35m
-
Trainers' Note
Welcome to Safety & Security in Human Rights Work course!
We are excited to have you in the class and look forward to your contributions to the learning community.
First of all, we recommend taking a few minutes to explore the content of the course. Review all the materials we will be covering in 7 Modules, and preview the quizzes and assignments you’ll need to complete to pass the course.
Don’t forget to explore FreedomLab site, its tool library and other online trainings!
If you have questions about course content, please post them in the forums to get help from others in the course community.
Good luck as you get started, and we hope you enjoy the course!
Giorgi Iashvili & Helena Manrique
-
Video lecture
Introduction to Digital Security and Threat modelling
Please, make sure you turned on Subtitles option on YouTube.
-
Quiz
Take the quiz and test your knowledge after completing the first module of the training!
1. What do we mean when we say we want to keep our data protected and guarantee its confidentiality?
Correct! Wrong!2. What do we mean when we say the integrity of our data should be guaranteed?
Correct! Wrong!3. What does availability of our data mean?
Correct! Wrong!4. Is it possible to avoid data-related risks?
Correct! Wrong!5. What does Threat Modelling mean?
Correct! Wrong!6. What are the 2 main characteristics of a risk, when assessing it?
Correct! Wrong!7. What is vulnerability?
Correct! Wrong! -
Mobile Application
To support your learning on safety and security we strongly encourage you to DOWNLOAD and use a security toolkit mobile app Umbrella
WHAT IS UMBRELLA?
Umbrella is the all-in-one mobile app for digital and physical security helping you learn about the latest risks and how to mitigate them. It is designed and used by journalists, aid workers, human rights activists, and people travelling in high-risk areas.- Available on Google Play, Apple Store, Amazon Appstore, or F-Droid.
- In English, Spanish, Chinese (traditional), Farsi, Russian and French.
- Secure and transparent.
- Always absolutely free
An essential security toolkit for NGOs.
- Lessons on relevant topics for any experience level.
- Step-by-step guides to digital security tools.
- Up-to-date security alerts for any location. Select from trusted sources or add your own.
A better way to manage security.
- Shareable checklists help prove staff are prepared for legal and insurance purposes.
- Forms streamline the paperwork you need to assess risk and debrief staff.
- Data is encrypted and password-protected.
-
1. What will I learn from this course on Safety & Security in Human Rights Work??
Safety & Security training provides you with necessary knowledge and valuable set of skills to protect you and your devices while collecting, storing and sharing sensitive data or browsing the Internet during the process of conducting human rights monitoring activities.
The course is based on a holistic approach to security which integrates both physical security, self-care and well-being as well as digital and information security practices. -
2. What are its learning objectives?
1. to strengthen the capacity of CSOs, human rights defenders, activists and human rights organizations to conduct their human rights work in a safe and secure manner
2. to equip learners with the technical knowledge and skills needed:
-
- to protect and defend themselves and their computers, mobile systems and networks as well as any data in transit against malicious attacks or surveillance
- to ensure digital privacy
- to protect the confidentiality of their sources of information while conducting interviews with victims
- to strengthen their digital and physical security and to ensure their psychological well-being
- to identify, analyze, and remediate security threats
- to analyze and evaluate their cyber security needs or the needs of their organization and to conduct a cyber security risk assessment
- to ensure the protection of information technology assets
- to regularly integrate physical and digital security practices into daily work and life
- to implement strategies of coping with psychosocial impact of trauma and other traumatic experiences while conducting human rights work or interviewing victims
-
-
3. What level of knowledge or education should I have before starting the course?
The course is primarily addressed to human rights defenders with monitoring responsibilities. The methodology is adapted to beginners with no previous technical knowledge. Safety and Security training provides a holistic approach to security and shares best practices to identify risks and vulnerabilities, build up a threat model and mitigate those risks and ensure the security of information in transit and your own privacy and security online.
-
4. Is this course available in other languages?
Yes, this course is available also in Russian.
-
5. How do I pass the course? Do you propose a certificate and if yes, how can I receive it?
To earn your Course Certificate, you’ll need to earn a passing grade on the final assessment survey. After completing Safety & Security course, please contact us to receive a link to the final assessment survey. If you reach 60% of positive answers, we will issue the Course Certificate to you in electronic format.
-
6. What if I did not find an answer to my questions?
Well, then feel free to contact us.
Securing Information in Transit
In this module, you will learn about encryption and how to make sure your communications are secure. Whether e-mail, messaging app, or forums and platforms your most sensitive information should travel safely.
Estimated time: 1h
-
Video lecture
Securing Information in Transit
Please, make sure you turned on Subtitles option on YouTube.
-
Quiz
Take the quiz and test your knowledge!
1. What is the Man-in-the-Middle-Attack?
Correct! Wrong!2. Why is free and public WiFi considered dangerous?
Correct! Wrong!3. What does the use of VPN give us?
Correct! Wrong!4. If we are not able to use VPN connection and want to safely send the sensitive data via email, what is the best option?
Correct! Wrong!5. How do we install a new app on our smartphone?
Correct! Wrong!6. One of the main things to do to avoid getting infected by malware when connecting to public and unsecure WiFi is?
Correct! Wrong!7. How to be sure that no one apart from us can get into our systems and access our online resources?
Correct! Wrong! -
1 Additional Material
Don’t forget to consult Digital Security Resources published by Frontline Defenders.
It provides you with an overview of secure tools for your specific needs including group chat and conferencing tools, secure end-to-end encrypted cloud storage, documents co-editing and email solutions, physical and emotional protection guidelines, special guides for remote working and l manuals for journalists and media professionals.
Better Passwords
When residing in storage or on the cloud your information must be protected. Learn how to use and manage multiple strong passwords, use two-factor authentication to secure your information while at rest.
Estimated time: 35m
-
Video lecture
Better Passwords
Please, make sure you turned on Subtitles option on YouTube.
-
Quiz
Take the quiz and test your knowledge!
1. What does a system need prior to giving us access to our data?
Correct! Wrong!2. Which of the following methods is NOT used to tell the system who we are?
Correct! Wrong!3. Which of the following approaches of identity confirmation is the easiest to implement?
Correct! Wrong!4. Which property makes a password stronger?
Correct! Wrong!5. What we have to avoid when selecting a password?
Correct! Wrong!6. What is the best way to remember your passwords?
Correct! Wrong!7. What is the benefit of using Password Manager?
Correct! Wrong!
Safer Browsing
Surfing on the internet may seem easy and safe, but almost all your activities online, the web pages you visit, the services you access, how long you view an item online, what apps you use, etc. can be tracked. In this module, you will learn how to surf the world wide web safely and privately.
Estimated time: 1h10m
-
Video lecture
Safer Browsing
Please, make sure you turned on Subtitles option on YouTube.
-
Quiz
Take the quiz and test your knowledge!
1. What do we aim to avoid when keeping our devices secure?
Correct! Wrong!2. Why illegal and unlicensed anti-virus software is dangerous for our security?
Correct! Wrong!3. What is Phishing?
Correct! Wrong!4. How can we guess whether the letter from the service provider is suspicious or not?
Correct! Wrong!5. What do we want to achieve when use TOR browser?
Correct! Wrong!6. If we want to avoid tracking of our online activities in regular browser, what we have to do?
Correct! Wrong!7. What differs VPN solution from a regular Proxy Server?
Correct! Wrong! -
1 Additional Material
Please check “Security in a Box” toolkit jointly developed by Front Line Defenders and Tactical Tech to find out more digital security tools and tactics to be used during your human rights work.
The Tactics Guides in this toolkit cover basic principles such as how to create strong passphrases and avoid malware. The Tool Guides offer step-by-step instructions to help you install, configure and use essential digital-security software and services.
Traumatic impact on Human Rights Defenders and Burn-out Prevention
Your work as a Human Rights Defender can be stressful. Long hours of work, travel, and all your efforts to gather information about human rights violations can become grueling work. Prolonged periods of stress can lead to burnout and trauma. Learn how to manage workloads, manage stress, and protect your wellbeing.
Estimated time: 30m
-
Video lectures
Traumatic impact on Human Rights Defenders and Burn-out Prevention
Please, make sure you turned on Subtitles option on YouTube.
-
Quiz
Take the quiz and test your knowledge!
1. When working with people that have suffered human rights violations, we:
Correct! Wrong!2. The organizational stress is a type of stress related to:
Correct! Wrong!3. Vicarious trauma happens when …
Correct! Wrong!4. Countertransference is defined as …
Correct! Wrong!5. Human rights organisations working with victims of human rights violations or in complex contexts need to always …
Correct! Wrong!
Safety and Security during Assemblies
When monitoring assemblies or other potentially dangerous sites you must make sure you are well prepared. Learn the basics about how you plan your trip, what you pack, how you behave and how you exit a situation if it becomes dangerous to you and your team.
Estimated time: 35m
-
Video lecture
Safety and Security during Assemblies
Please, make sure you turned on Subtitles option on YouTube.
-
Quiz
Take the quiz and test your knowledge!
1. Before attending a demonstration, you should always…
Correct! Wrong!2. When making a risk analysis, we need to consider:
Please select 2 correct answers
Correct! Wrong!3. Having a preparatory meeting with a group of people that are going to attend a demonstration with you is crucial to ensure that …
Correct! Wrong!4. What are the best measures to protect yourself against violent tactics (e.g. use of tear gas)?
Correct! Wrong!
Psychological Impact of Torture and Psychosocial Care during Interviewing
The information you gather and the stories you hear about injustice can affect you emotionally and mentally. Learn how to cope with the psychological impact of your work in this module.
Estimated time: 45m
-
Video lecture
Psychological Impact of Torture and Psychosocial Care during Interviewing
Please, make sure you turned on Subtitles option on YouTube.
-
Quiz
Take the quiz and test your knowledge!
1. When we are working with people that have suffered a torture, we need to take into consideration that:
Correct! Wrong!2. In some context, doctors may be the first witnesses of the mistreatment or torture. In this regard, we need to take into consideration:
Correct! Wrong!3. Very often we will need the support of interpreters for our interviews. Select a true statement below:
Correct! Wrong!4. Some people may feel reluctant to talk. Let’s find out what to do in this situation:
Correct! Wrong!5. What are some of the main strategies to minimize re-traumatization?
Correct! Wrong! -
Trainers' Note
Congratulations!
You successfully completed Safety & Security in Human Rights Work training!
Don’t forget to fill in the feedback survey below and provide your comments and suggestions on how we can make this training more useful and relevant for human rights defenders.
Don’t forget to check out our training on Human Rights Monitoring.
If you wish to obtain OSCE Course Certificate, please contact us and we will send you the link to the final assessment survey. After successfully completing this assessment, you will receive your Course Certificate in electronic format.
We wish you the best of luck in your human rights work!
Giorgi Iashvili & Helena Manrique
Safety & Security Training Feedback Survey
You feedback is extremely important for us as it can contribute to improving the methodology of the safety and security training in future editions and forthcoming updates. Therefore, we strongly encourage you to fill in this form, share your experiences and tools, but also any comments and suggestions in the form below or in the Contact Us form.