DigiSec Rally

Credits Indira Cornelio, Alma Uguarte Perez Last Updated 2017-06

To close out the training on an energizing note, you will lead participants through a dynamic grand rally adventure to review the digital safety knowledge they have learned.

Have feedback on this content? Does something need updating?

Leave a note anywhere on this page - look for the Hypothes.is toolbar in the upper right-hand corner.

Have content you'd like to share with other trainers?

Email us at levelup@riseup.net (GPG public key here) or read our guide on Contributing to LevelUp.

 

This session was developed for, and should be attributed to, the Institute for War & Peace Reporting resource “Cyberwomen: Holistic Digital Security Training Curriculum for Women Human Rights Defenders” under a Creative Commons Attribution-Share Alike 4.0 International CC BY-SA 4.0 License

Materials to Prepare:

  • Large open air space, or indoor space with different rooms and corridors
  • Pre-printed question sheets (one for each participant)
  • Pens and paper

Trainer’s Note

  • The content of the cases you use for this rally will depend on the content that has been covered during the training. As this is meant to be a comprehensive review exercise, the rally is best done towards the very end of a training. The rally is also test for you as the trainer to identify where participants’ strengths lie, and in which areas they may need further training or support.
  • The rally is designed to provide participants with a practical, hands-on opportunity to immediately apply what they’ve learned during the training – for this reason, the cases provided to participants for this exercise (example cases for you to use are included) should be focused on scenarios of direct incident response rather than recommending preventative measures.

Running the Exercise:

Part 1 – Setting up the Rally Course

Step 1 | Before you begin, decide how many stations and cases your rally will have – for the purposes of demonstration, these instructions are based on a rally with five stations (one case each). Don’t forget to include instructions in each case indicating to which station groups should proceed next upon solving it.

Step 2 | Distribute the five stations evenly throughout the space you have available, they can all be in the same room (or in different rooms if you have you have access) - this exercise works best if stations are in different spaces, as it makes the rally more dynamic and competitive. If possible, try to find location for the rally that is outside the training venue where you and the participants have been working – this will be provide a welcome change of scene.

Step 3 | Each of the stations will feature a case that participants must solve using what they’ve learned from the training, in addition to any toolkit you provide them (see below). The rally is best done in groups, with each group sent through the course via a different route so that the response time varies and to avoid overcrowding the stations. Here below are the resources you will need to set the rally up:

Resource 1: Station and Team Route Guide

Resource 2: Case Toolkit

Resource 3: Example Cases (Sample responses are provided beneath each case description)

CASE 1

A filmmaker has just completed a documentary about forced disappearances in Mexico. One evening, she leaves her office after a late work meeting, intending to go home and send the documentary to her collaborators and relatives, as well as victims and specialists interviewed for the film. Upon arriving home though, she discovers that her apartment has been raided – worst of all, she realizes that the laptop containing the finished documentary footage is missing (with no backup available). What would you advise in this situation?

Tool to Use (from the Toolkit):

  • Immediate Response Measures

Recommendations:

  • Notifying her contacts of what has just happened, especially those involved in the production of the film;
  • Changing all passwords for her online accounts, and enabling 2-step verification where there is the option of doing so;
  • Establishing a security protocol for handling and distributing edited footage in the future;
  • Asking her if she has any physical or cloud backups of any raw footage, recorded interviews, images etc. that she can recover and store securely;
  • Reviewing any files that can be recovered to take stock of she has available, in addition locating any of the devices or equipment she used to record and edit the documentary;

CASE 2

Olga is an activist – soon, she will begin working with a group of other women activists to document feminicides in Mexico. They will need to share documents online and discuss sensitive information over the phone, and some of the women will be commissioned to travel to certain cities for interviews with families. What do you recommend?

Tool to Use (from the Toolkit):

  • Security Protocols

Recommendations:

  • Have a group meeting to make a risk assessment
  • Agree on the digital security measures that the group will have to implement as well as the travel protocol
  • Agree on using a safe app to exchange messages such as Signal
  • Explore safe ways to exchange documents, maybe encrypting them with GPG or sending them through a safe email account such as Tutanota or Riseup.

CASE 3

Nelly is the coordinator of a project dedicated to the delivery of justice for women in her country. She was invited to give a presentation abroad, being in the airport discovers that she has remained her plan without data and has decided not to buy more balance or minutes since she will leave her country. While waiting for the plane she wants to check her mail by connecting to the airport’s wi-fi network, what should she do?

Tool to Use (from the Toolkit):

  • VPN

CASE 4

Ariadna is an Ecuadorian journalist who is working on the investigation of a case of diversion of funds. To this end, she is making a requests for information to its government. What would you advise her to use to make the request securely?

Tool to Use (from the Toolkit):

  • Tor Browser & Anonymous Email Account

CASE 5

A feminist collective that defends women’s right to decide has been harassed for a week on social networks, what could they do to protect themselves?

Tool to Use (from the Toolkit):

  • Gender-Based Risk Model

Recommendations:

  • The collective can analyze the risks of the attacks, the impacts and probabilities that the risk can increase or the violence escalate, and in this way define the tools and strategies to deal with.

Part 2 – Ready, Set, Go!

Step 4 | Divide the participants into teams depending on the size of the group – so that everyone can participate and contribute equally, it is not recommended for group sizes to exceed 5 participants. Remember to let each team choose a fun, creative name for themselves!

Step 5 | Now that the teams finalized and the stations are set up, explain the rules of DigiSec Rally to participants:

  • According to the routes and station order established in the Station Order and Team Route Guide, indicate to each team at which station they should begin and at which station they will end – be sure to point out where each station is to participants ahead of time so they don’t get lost!
  • Teams must solve a case at each station, using what they’ve learned from the training and the Case Toolkit you’ve given them – they can be creative in their responses: just like in the real world, there is no “one size fits all” solution to any of the cases!
  • Give teams a moment or so to prepare themselves – then call out “Ready, Set, Go!”
  • The first team to work through each of the cases at every station and make it back to the starting point is the winner!

Once both teams have completed the entire rally course, hold a closing circle. In the circle, each team should explain their responses for each case, explaining the process by which they determined each of their solutions. Provide active feedback to teams as they explain their recommendations for each case.