1. Risk Assessment and Planning
- Conduct a Security Audit: Evaluate both digital and physical security to identify vulnerabilities.
- Threat Modeling: Consider specific threats, such as cyberattacks from well-sponsored actors, doxxing, and physical threats to staff.
- Develop a Security Policy: Create comprehensive guidelines that include incident response, data protection, and staff safety protocols.
2. Cyber Security Implementation
- Encrypt Communication: Use end-to-end encryption for all communications. Tools like Signal and ProtonMail can be important for secure messaging and email. (While there is NO evidence that Signal is compromised, there will still be analog only discussions)
- Secure Devices: Ensure that all devices are secured with up-to-date antivirus software, firewalls, and encrypted storage.
- Multi-Factor Authentication (MFA): Implement MFA on all critical systems and accounts to add an additional layer of security. (DO THIS IMMEDIATELY)
- Regular Software Updates: Keep all software and systems updated to protect against vulnerabilities.
- Secure Network Practices: Utilize VPNs for secure browsing and consider using secure, private networks over public Wi-Fi.
- Data Backup: Regularly back up data with secure and encrypted storage solutions to prevent data loss from cyber incidents.
3. Physical Security Measures
- Access Control: Limit physical access to essential personnel to secure areas where sensitive information is stored or meetings are held.
- Security Training: Conduct regular security training for all staff members to recognize threats like phishing attacks and social engineering.
- Incident Response Plan: Prepare a detailed response plan for different scenarios, including both cyberattacks and physical security breaches.
4. Legal Protection and Compliance
- Consult Legal Experts: Understand the legal frameworks and regulations that impact the organization’s operations, especially in hostile environments.
- Anonymity Tools: Utilize tools to maintain the anonymity of those involved, particularly when operating under regimes that may monitor activist activities.
- Collaborate with Security Professionals: Establish relationships with cybersecurity and legal professionals for ongoing support and crisis response.
5. Monitoring and Response
- Continuous Monitoring: Keep track of organizational and personal digital footprints to quickly identify and respond to threats.
- Regular Updates and Audits: Periodically review and update security measures and conduct new audits to adapt to evolving threats.
- Crisis Management Team: Have a designated team that is trained and ready to manage emergencies and execute the incident response plan efficiently.
6. Community and Network Security
- Secure Collaboration: Ensure that tools and platforms used for collaboration among activists and stakeholders are secure and trusted.
- Information Sharing Protocols: Establish protocols for safely sharing sensitive information within the network, ensuring it doesn’t fall into the wrong hands.