Digital Security and Privacy for Human Rights Defenders

3.1 Case Study 1
Creating a Security Policy

When developing a security policy for yourself or your organisation, you must also develop a clear understanding of the risks to the security of your computers and information. The level of risk increases in direct proportion to threats and your vulnerability to them, as shown by this equation:

RISK = THREATS x VULNERABILITIES

Threats represent a possibility that someone will harm the security of your computers, information stored on them and online communications. Making a threat assessment means analysing the likelihood of a particular threat being put into action. Examples of threats include:

  • A virus attack
  • Confiscation of computer equipment
  • A website block

Vulnerability means the degree to which you are susceptible to loss, damage and suffering in the event of an attack (if a threat is realised) that varies with situation and time. Vulnerability is always relative, because all people and groups are vulnerable to some extent. Often, the main vulnerability in the realm of technology is lack of understanding or insufficient training. Another vulnerability comes from over-relying on technology that one does not fully comprehend.

  • Vulnerability can be about location. For example, your computer screen and operations are easily observed when you operate from an Internet café. If you live in a country suffering droughts and electricity shortages, then your vulnerability will be lack of electricity (or electrical surges) and hence inoperable computers and the Internet.
  • Vulnerabilities can also include lack of communication means, like not having access to a phone or to an Internet connection.
  • Vulnerabilities may also be connected with team work and fear: a defender who receives a threat may feel fear, and his/her work will be affected by fear. If s/he has no proper way to deal with this fear (somebody to talk to, a good team of colleagues, etc.) chances are that s/he could make mistakes or poor decisions. This is a non-computer-related threat, but one which could be of great relevance to computer security because it increases an already existing threat.

Capacities are strengths and resources a group or a defender can access to achieve a reasonable degree of security. Examples of capacities could be training in computer or security-related issues. Knowledge of the computer/Internet environment is an essential capacity for dealing with possible insecurities. Access to a trusted computer technician or a network of skilled people is a great resource.

  • security policies within the organisation: efficient file storage, backup and online communications
  • secure office entrance and strong locks on doors and windows
  • copies of all hardware warranties and licences for software (alternatively, using only open source software)

Not knowing enough about your work environment and the technology you operate with is a vulnerability, while having this knowledge is a capacity. The risk, created by threats and vulnerabilities, can be reduced if defenders have enough capacities (the more capacities, the lesser the risk).

Risk = (threats x vulnerability) : capacities

So, for example, the risk of losing your digital documents because of a virus attack equals: the risk of a virus attack, multiplied by the vulnerability of not having a virus cleaner and firewall software installed, and divided by the capacity brought when you obtained the Digital Security Toolkit.
Of course, this is not a mathematical formula, but its main advantage lies in helping you identify the elements that may cause the risk to eventuate, and therefore work to eliminate them.

Drafting a security plan

Components of the plan

A security plan is aimed at reducing your risk. It will therefore have at least three objectives, based on your risk assessment:
  • Reducing the level of threat you are experiencing.
  • Reducing your vulnerabilities.
  • Enhancing your capacities.

It could be useful if your security plan also includes:

  • Preventive plans or protocols to ensure routine work is done within security standards. For example, how to communicate by email on sensitive topics with a group of people
  • Emergency plans for dealing with specific problems, for example, confiscation of office equipment.

Responsibilities and resources for implementing the plan

To ensure that the plan is implemented, security routines must be integrated into daily work activities:
  • Include context assessment and security points routinely in your agendas.
  • Register and analyse security incidents.
  • Allocate responsibilities.
  • Allocate resources, i.e. time and funds, for security.

Drafting the plan – how to begin

If you have done a risk assessment for a defender or an organisation, you might have a long list of vulnerabilities, several kinds of threats and a number of capacities. You can't realistically cover everything at the same time. So where to begin? It's very easy:
  • Select a few threats. Prioritise the threats you have listed, be it actual or potential ones, using one of these criteria: The most serious threat – loss of all computer data, for example; OR the most probable and serious threat: if organisations similar to yours have been attacked, that is a clear potential threat for you; OR the threat which corresponds most to your vulnerabilities – because you are more at risk of that specific threat.
  • List the vulnerabilities you have which correspond to the threats you have listed. These vulnerabilities should be addressed first, but remember that not all vulnerabilities correspond to all threats. For example, if you have no idea whether a backup of all your computer data exists, then this relates directly to the threat of losing your computer data irrecoverably.
  • List the capacities you have which correspond to the threats you have listed. You are now in a position to address the selected threats, vulnerabilities and capacities in your security plan, and can be reasonably sure that you will be able to reduce your risk from the right starting point.

Applying in Practice

The purpose of this plan is to ensure that the information held on our computers is not lost, stolen or damaged irrecoverably in any way.

Threats Vulnerabilities Capacities
Virus attack - Staff open emails without caution
- Nobody knows if virus scanner is on all machines or updated
- no backup of information
- Just received a copy of ‘Digital Security Toolkit ’ from https://security.ngoinabox.org/en/
Confidcation of computers - Easy access to office
- No backup
- No funds to purchase new equipment
- information is not protected
- good team of colleagues who know each other and co-operate very well
- good contact with funders
Computers are damaged by weather or other external forces - No Backup
- No knowledge of how to protect network and electrical equipment
- good contact with funders
- a relative of a staff member is a skilled plumber

Now we begin to work on decreasing our vulnerabilities and hence in- creasing our capacity for dealing with this and other threats that may arise in the future. Your solutions and resources may differ in each case. Notice that lack of information backup is a common vulnerability that would cause great harm should any of the threats be realised. Below is a list of actions you could take to decrease the vulnerabilities (all tools and explanations on how to perform these actions can be found in this manual and the Digital Security Toolkit.

Virus attack

  • ntroduce strict policy on opening mail from unknown sources or replying to spam. In plain words, forbid anyone to do so. People who receive hundreds of viruses and spam should change their email address.
  • Install a free anti-virus (Avast, AntiVir, AVG) on all computers and update the virus definitions from the Internet. Program files and guides can be found in the Digital Security Toolkit. Make sure every computer in the office is operating with a fully functional anti-virus program.
  • When your computer is clean of viruses, make a backup of all important user documents. Keep this on a separate media (CD, USB stick) and away from the office. If you do suffer a virus attack, at least you can recover your files.

Confiscation of computers

  • To prevent theft you have to secure your offices and work premises. Strong doors and bars on windows are essential (especially if you are located on the ground floor), as is an intercom or other form of visitor identification system. Ideally, your office should have a reception desk, where visitors will be greeted before gaining access to the main room.
  • Backup of all information should be made and kept securely in a different location.
  • You should have access to emergency funds to purchase new equipment and to load the backup data onto it.
  • If computers are confiscated, at least the documents on them should be protected from unauthorised access. Use encryption software to protect a part of the hard drive. Likewise, wipe all unnecessary data to prevent its restoration by the confiscators. (See Information Backup, Destruction and Recovery chapter )
  • Be aware of who has keys to the office and how many copies are in existence. If your computers are not protected by encryption or you store sensitive data on paper and computers, then make sure that no one has unaccompanied access to your office, even the cleaning staff.

Computers are damaged by weather or other external forces

  • Ideally, a plumber or an electrician should check your premises regularly to report on their stability, any water damage sustained and the amount of fire insulation. All loose electric cables should be discarded and faulty connections patched. This may be costly but it is necessary, as computers are extremely delicate and cannot survive water or heat damage.
  • Backup of all information should be made and kept securely in a different location.
  • You can purchase an Uninterrupted Power Supply (UPS) battery for your computers to prevent sudden shutdown in case of electricity loss. Power sockets or power boards should have surge protectors, so that they switch off in case of electric spikes. Regions that suffer loss of electricity for months at a time should consider a petrol-powered generator or other
    sources of energy.

It is difficult to introduce security policies without undermining some aspect of productivity in your office. Paying attention to security usually takes time and concentration. Carelessness, deadlines and insufficient manpower are the enemies of good security. It is therefore necessary that the rules are agreed upon and rationalised by all. Their implementation should apply to everyone and directors of the organisation must take the lead in setting an example. Good security also requires you to be pro-active and realise your threats and ways to handle them before they occur.