Report on Digital and Physical Security Trainings Held from 16Th to 19Th October, 2019 at Kilifi Bay Hotel
Total Page:16
File Type:pdf, Size:1020Kb
REPORT ON DIGITAL AND PHYSICAL SECURITY TRAININGS HELD FROM 16TH TO 19TH OCTOBER, 2019 AT KILIFI BAY HOTEL OCTOBER, 2019. Prepared by: Tom Bicko Ooko, Project Officer, CJGEA Contents 1.0 DIGITAL SECURITY TRAINING NARRATIVE REPORT ...................................... 1 Wednesday October 16th. ........................................................................................................ 1 Introduction .............................................................................................................................. 1 Objectives of the training ........................................................................................................ 1 Commencement of the training .............................................................................................. 2 Introduction ............................................................................................................................ 2 Threat modelling ...................................................................................................................... 3 Threat assessment .................................................................................................................... 4 Threat actors ............................................................................................................................ 5 Forms of threats ....................................................................................................................... 5 Threat Analysis ........................................................................................................................ 6 Risk mitigation ......................................................................................................................... 8 Data protection ......................................................................................................................... 9 Persona .................................................................................................................................... 11 Phishing ................................................................................................................................... 11 Safe web browsing.................................................................................................................. 12 SOCIAL MEDIA SAFETY ................................................................................................... 13 EMAIL SECURITY .............................................................................................................. 13 Password managers ............................................................................................................... 15 Two-Factor Authentication/Verification ............................................................................. 15 Mobile security ....................................................................................................................... 16 CONCLUSION ...................................................................................................................... 17 2.0 PHYSICAL SECURITY. ................................................................................................ 18 Introduction ............................................................................................................................ 18 Definition of security management....................................................................................... 18 Session objective ..................................................................................................................... 18 Actors and stakeholders ........................................................................................................ 20 Analysis ................................................................................................................................... 22 PESTLE ANALYSIS MATRIX ........................................................................................... 23 STAKEHOLDER ANALYSIS ............................................................................................. 27 SECURITY INCIDENTS ...................................................................................................... 32 RISK ASSESSMENT ............................................................................................................ 32 TYPES OF THREATS .......................................................................................................... 34 AGGRESSION ....................................................................................................................... 35 ii OTHER COPING STRATEGIES ....................................................................................... 35 SECURITY PLAN ................................................................................................................. 36 CONCLUSION ...................................................................................................................... 37 iii 1.0 DIGITAL SECURITY TRAINING NARRATIVE REPORT Wednesday October 16th. Introduction Center for Justice Governance and Environmental Action (CJGEA) conducted a physical and digital security training from the 16th to 19th of October 2019, at Kilifi Bay Hotel in Kilifi County. This training was assisted by funding support received from two donors including Civil Rights Defenders (CRD) and KIOS-The Finnish Foundation for Human Rights. The exercise was conducted for four days and the participants targeted for this training were the CJGEA board members and staff. The training was successful and each of the training session i.e. digital and physical security training sessions took two days respectively. Objectives of the training The digital and physical security training was conducted to try and achieve certain objectives which would go a long way in helping CJGEA improve its security situation. The objectives were drawn from some of the current activities that CJGEA is undertaking and some of the security threats the organization has had to endure in the past. Among the activities include: Currently CJGEA is expanding to cover a wider geographical scope i.e. the whole nation from the six coastal counties where its operations were mainly based hence its most likely to face more security risks in this rapidly changing geographical context. Part of this was witnessed with the baseline survey on County Environment Committees conducted in 2018 in 30 counties where CJGEA staff faced a lot of security threats in the field ranging from arrogance and intimidation from the county leadership. The upcoming court case ruling on the Owino Uhuru class action litigation suit will escalate the security risks that the organization will be likely to face as the suit involves powerful government institutions and individuals who might use their influence and power to try and harm the organization as has been encountered before. Recent attacks on some of CJGEA members and staff during field work also brought the security issue right to our door step; many of our EHRDs have been attacked for their work in defending the environment. Our staff recently faced hostility from some unruly youths of Owino Uhuru when they went to the community for fieldwork. All these factors pushed us to want to address our security situation and hence the decision to immediately hold a physical and digital security training for the staff and board members. The following are some of the objectives which were set for the security training. 1. To expose the board members to the security risks and threats that the organization faces or is likely to face with its expansion to other counties to enable the board enact policies that will be in line with the organization’s expansion plan and shield her from any form of security harm. 2. To familiarize CJGEA staff to the security threats they are likely to encounter in line of their day to day work both in the office and in the field especially the new staff who are yet to come across some of the security risks. 3. To prepare the organization and educate them on the security threats they are likely to face upon the issuance of the judgement on the Owino Uhuru Class Action Litigation suit which is most probably going to favour the petitioners. 4. To understand the security threats that CJGEA is likely to face with the anticipated formation of a national coalition for grassroots environmental movements, EHRDs and LEDs that will first operate under the banner of CJGEA before its formally registered to exist independently. 5. To equip the organization’s personnel with practical and implementable mitigation measures for the security risks and threats they are facing or are likely to face to ensure the organization and its entire membership are safeguarded at all times. Commencement of the training Introduction At exactly 9.00 a.m. after the registration of all participants who were present for the training, Tom Bicko who happened to be the head of the programs department at CJGEA welcomed the members present for the training and introduced CJGEA board chair who gave his welcoming remarks, and officially opened the training. Thereafter, Tom gave the participants a chance to quickly introduce themselves after which he gave a brief speech on why the training was being conducted and emphasized on the importance of holding the security training at that particular time and how the same would impact on the organization’s security and that of its personnel. He finished by opening