THE DEFENDER'S protocol

ENGLISH

The Holistic Security Protocol for Human Rights Defenders (the Defender’s Protocol) helps us advance our physical safety, digital security, and wellbeing and resilience. By following the Protocol, we enhance our individual and collective security, and can reduce the burden of attacks, harassment, and censorship on us and our communities.

The Defender’s Protocol is based on Open Briefing’s experiences working with at-risk defenders all over the world; however, there will be important local differences that cannot be reflected in universal guidance, and you should adapt the Protocol to suit your situation, work, and profile.

SAFETY AND SECURITY

  1. Seek to better understand and manage the risks that you face:

  • Consider who your allies and adversaries are. Understand the resources and networks that your allies might leverage in your defence. Understand the capabilities and intentions of your adversaries so that you can better judge the threat that they pose.

  • Consider how your work, identity, tactics, and other factors and characteristics increase or decrease your vulnerability or exposure to the threats.

  • Assess the likelihood of an attack or other incident occurring and the impact should it occur, in order to understand the level of risk to you.

  • Take concrete steps to reduce the likelihood and/or impact of each of your risks.

  1. Maintain awareness of what is going on around you and be alert to any changes to the people and things in your environments.

  2. At high-risk times or locations, travel with friends, family members or co-workers or request international protective accompaniment.

  3. Ask a trusted and capable friend, co-worker or family member to be your safety contact. At times of heightened risk, tell them in advance where you are going, what you are doing, and when you will return. Check in with your safety contact at pre-agreed regular times throughout the day. Agree with them what they will do and who they will contact should they not hear from you.

  4. Prepare your family and co-workers so that they are better able to cope should the worst happen:

  • Make a will and ensure that your family knows where your important financial and legal documents are stored.

  • Develop a continuity plan with co-workers so that they can continue working in your absence.

  • Help your family and co-workers draw up plans for them to relocate, seek sanctuary or asylum, or otherwise keep themselves safe from any further reprisals.

  1. If possible, complete holistic security training designed for human rights defenders. Also consider completing advanced first aid training and purchase individual trauma kits for your home, vehicle, and office.

  2. Understand the level of risk to you and your family that you are prepared to accept. Do not be afraid to ask for help or pause your work if the situation becomes riskier than you are comfortable with.

DIGITAL SECURITY

  1. Consider the different types of information that you hold and seek to better understand both their value to your work and the harms to you and others that could result from an attacker accessing them. Put in place additional measures to protect those assets representing the greatest value or potential harms.

  2. If it has to be shared, communicate sensitive information with co-workers face-to-face or using communication tools that allow end-to-end encryption and disappearing messages.

  3. Ensure that any computer or mobile device that you use:

  • Cannot be physically accessed by unauthorised persons.

  • Requires a password or passcode to unlock.

  • Is running the latest available versions of the operating system and all installed apps/software.

  • Has full-disk encryption enabled, if legal in your country.

  • Has anti-virus software and a firewall installed, updated and configured correctly.

  • Is not rooted or jailbroken and does not have any pirated software installed on it.

  • Is shut down and powered off as frequently as possible, rather than just put into sleep or hibernate state.

  1. Ensure that any online service that you use:

  • Requires a complex, unique password to access.

  • Has two-factor authentication (2FA/2SV) enabled, if available.

  1. Use an encrypted password manager to keep track of all your online passwords and store your 2FA backup codes.

  2. Use a privacy-focussed VPN if accessing the internet through a public or untrusted network.

  3. Securely delete sensitive information in all its forms and variations as soon as it is no longer needed, and ensure that it is not recoverable.

  4. Securely store any sensitive written notes, hard copies and other printed material and shred or burn them as soon as they are no longer needed.

Be aware that there are also risks in adopting some of the above digital security guidance, including potentially losing access to your data. Further, this advice will only help you to work in a potentially less insecure manner, and will not guarantee the security of sensitive information. You should seek guidance or training if you are unsure how to safely use any device or tool.

WELLBEING AND RESILIENCE

  1. Maintain good sleep hygiene, including establishing a regular nightly routine and a pleasant sleep environment, if possible.

  2. Eat regular meals and maintain a healthy diet.

  3. Regularly walk, exercise or play sport.

  4. Address physical illness or injury, and give yourself time to heal.

  5. Engage daily in self-reflection and contemplative practices.

  6. Do not use drugs or alcohol as a way of coping with stress or trauma.

  7. Maintain relationships with friends, family, co-workers and community members who can support you.

  8. Seek appropriate help if your health or wellbeing is deteriorating.

v.1.0First published: 21 May 2020This version: 21 May 2020