Security In-a-box

Security In-a-box

Security In-a-box is a guide to digital security for activists and human rights defenders. The toolkit ranges from the basic principles of digital security, including advice on how to use social media and mobile phones more safely, to more specific regional advice for activists working in higher risk environments.

Although the toolkit was designed primarily to address the growing needs of advocates in the global South - particularly human rights defenders - the software guides and security strategies in this toolkit are relevant to everyone; specifically people working with sensitive information. This may include vulnerable minorities, independent journalists or whistleblowers, as well as advocates working on a range of issues, from environmental justice to anti-corruption.

It was first created in 2009 alongside Front Line Defenders. Since then, the website has been updated and expanded to keep up to date with a rapidly-changing digital environment.

Visit Project Website

More from this project

Related content

Consultancy Call: Digital Security Specialist

We are looking for experienced Digital Security Specialists to contribute to educational materials to train journalists, human rights defenders, and civil society on leading investigations, in particular to combat misinformation, with an emphasis on digital security. The materials will be geared toward Latin America, Sub-Saharan Africa, MENA, and Southeast Asia.

→︎ Read more

The Zoom Boom: Tools To Work from Home

Due to the pandemic and resulting quarantine, millions of people are using digital tools to continue their work and communication from home. A new article for the Heinrich-Böll-Stiftung by our Programme Director, Christy Lange, asks: how secure are the digital tools that have become a part of our everyday life?

Safety First!

Stay digitally, physically and psychologically safe and aware of potential risks by adopting some basic good practices and tools to keep your human sources, yourself and your evidence protected in this new chapter of Exposing the Invisible: The Kit.

La technologie est stupide : comment choisir la technologie pour le travail à distance

Cet article aborde les questions de savoir quelle technologie est bonne, sûre et appropriée à utiliser en ces temps complexes si nous voulons agir et travailler de manière responsable et à distance. Comment décider de la technologie à laquelle nous devons faire confiance ? Il examine également ce qui pourrait être fait à l'avenir pour répondre à cette question beaucoup plus facilement qu'aujourd'hui.

→︎ Read more

How to Manage Your Sources

From Exposing the Invisible The Kit: Start building your own contacts, learn how to develop, interact with and maintain sources and how to enrich your investigations with their cooperation.

Cultivating Your New Phone with Care

Whether you’ve gotten your new smartphone second-hand or purchased a new one, you’ve just welcomed a new device into your electronic family. As you would with any other valuable device like a computer or smart appliance, it’s not just about taking care of the outside, but making sure its insides are equipped to handle your information. The new step-by-step Data Detox guide will help you cultivate your new phone to help protect you.

Gendersec Training Curricula

A training curriculum that brings a holistic and feminist perspective to privacy and digital security trainings, including over 20 topics and workshops models.

Exposing the Invisible: The Kit

The Kit is a self-learning toolkit for investigation techniques. It's the starting point for curious minded people who want to start uncovering the evidence and information around them.

Gendersec Wiki

A website made in collaboration with the participants of the Gender and Technology Institutes to showcase activities, how-tos, storytelling and tutorials.

Holistic Security: The Trainer's Manual

The Trainer's Manual is the counterpart to the Holistic Security Strategy Manual for Human Rights Defenders. It reflects on further learnings and best practices grown out of Tactical Tech's engagements with experts and trainers on the overall protection, digital security, and psychosocial well-being for human rights defenders between 2013 and 2015.