Description: This interactive workshop will look at challenges of digital security and human rights by combining expert inputs, a threat modelling scenario, and dynamic brainstorming with participants.
First, we will hear a threat model on securing development cooperation in an environment of insecurity, in which an organization gets funding to strengthen the digital rights in a country of the Global South and seeks to build a Digital Human Rights Lab to investigate how their government might misuse its surveillance capabilities to target members of civil society. Specific challenges (like protecting communication, securing internet research, protecting project data, protecting bank account data, and securing the integrity of devices) will be presented as priorities.
Next, there will be input from 4 practitioners to give more sector specific inputs. They will discuss their main challenges, and potential solutions to these challenges. These will be the first examples of "best practices" dicussed. These solutions, or best practices will be expanded upon and added to during the brainstorming session.
In three different rounds, the larger group will divide itself first into pairs for a lightening-round session to identify one best practice. Each pair will find a second pair and in this quartette, the solutions will be narrowed down into the most urgent best practice to focus on. Then, each quartette will find a second quartette. In the groups of 8 people, these best practices will be shared and compared, and the group will need to determine which of them should be pitched to the large group as the most urgent solution that could be implemented.
These final best practices will be pitched to the larger group in a final round. The online moderator will share some of the best practices from the online discussion.
Expected Outcomes: - Some best practices of achieving sustainable human rights centered cybersecurity training for vulnerable groups - A better understanding of what human rights centered capacity building means for different stakeholders and their responsibility for implementation - Putting the focus on security and safety via cybersecurity of the people by shifting away from solely looking at "national" security of the states, which sometimes violates security and safety of the citizens