Reporting & Recommendation Development
Summary
Purpose
Guiding Questions
Operational Security
Outputs
Activities
Creating a Risk Matrix_
Roadmap Development_
Resource Identification_
Report Creation_
- General debrief meeting
References and resources for Reporting & Recommendation Development
-
Directory: "Selected International and Regional Organisations providing support to HRD" (Workbook on Security: Practical Steps for Human Rights Defenders at Risk)
-
Directory: "Security Training Firms" (CPJ)
-
Digital Emergency Contacts: "Seeking Remote Help" (The Digital First Aid Kit)
-
Directory: "Resource Handbooks" (Center for Investigative Journalism)
-
Guide: "Additional Resources: p. 298" (Operational Security Management in Violent Environments (Revised Edition))
-
Multi-lingual Guides: Security in a Box
-
Resource: Front Line Defenders
-
Guide: "Surveillance Self-Defense" (EFF)
-
Guide: "The Digital First Aid Kit" (RaReNet)
-
Guide: "How to organize a cryptoparty" (CryptoParty)
- Directory: "Security Training Firms" (CPJ)
-
Directory: "Resource Handbooks" (Center for Investigative Journalism)
-
Directory: "Selected International and Regional Organisations providing support to HRD" (Workbook on Security: Practical Steps for Human Rights Defenders at Risk)
-
Guide: "Additional Resources: p. 298" (Operational Security Management in Violent Environments (Revised Edition))
-
Database: "A Collaborative Knowledge Base for Netizens" (Tasharuk)
-
Guidelines: "Microsoft nonprofit discount eligibility guidelines per country" (Microsoft)
-
Organization: "TechSoup, nonprofits and libraries can access donated and discounted products and services from partners like Microsoft, Adobe, Cisco, Intuit, and Symantec." (TechSoup)
-
Guide: "Mitigation Recommendation" (NIST SP 800-115)
-
Overview: "How Is Risk Managed?" (An Introduction to Information System Risk Management)
-
Book: "Digging Deeper into Mitigations - p. 130" (Threat Modeling - Adam Shostack)[^shostack]
-
Resource: The Psychological Underpinnings of Security Training (Craig Higson-Smith)
-
Article: "No money, no problem: Building a security awareness program on a shoestring budget"
-
Tip Sheet: Facilitator Preparation Tips ( Integrated Security )
-
Guidelines: "Facilitator Guidelines" (Aspiration Tech)
-
Guide: "Session_Design" (Aspiration Tech)
-
Kit: "Resource Kit" (eQualit.ie)
-
Questions: "Pre-Event_Questions" (Aspiration Tech)
-
Guide: "Break Outs" (Aspiration Tech)
-
Resources: "Be a Better Trainer" (Level-up)
Resource Identification:
Digital Security Guides:
Possible Financial Resources for Host Organizations:
International organisations that may provide security grants
Frontline Defenders Security Grants Programme _See also the "Alternative Sources of Funding" list on this page
Digital Defenders Digital Security Emergency and Support Grants
Training Resources:
Emergency Resources:
International protection mechanisms for human rights defenders
What Protection Can The United Nations Field Presences Provide?
24/7 Digital Security Helpline: [email protected] PGP key fingerprint: 6CE6 221C 98EC F399 A04C 41B8 C46B ED33 32E8 A2BC
CiviCERT - a coordination of rapid response organizations. CiviCERT members offering emergency support are listed in the Digital First Aid Kit
Resource Lists:
Recommendation Development:
Identifying Recommendations:
Debrief:
Facilitation Preparation: