Date: 26-28 November
Venue: Nairobi
Introduction
The Tatua Digital Resilience Centre conducted a three-day digital security training for 130 human rights defenders (HRDs) from 47 counties in Kenya. This training was part of the Annual HRD academy hosted by the National Coalition of Human Rights Defenders—Kenya (Defenders Coalition) to strengthen their capacities to work more effectively. This training was part of the Annual HRD Academy and aimed to strengthen the HRDs’ capacities to work more effectively in a dynamic and increasingly hostile digital environment. The training equipped HRDs with essential skills in data protection, cyber hygiene, and navigating internet shutdowns, ultimately enhancing their ability to safeguard sensitive information and continue their advocacy work.
Background and Context
In today’s digital age, Human Rights Defenders (HRDs) increasingly rely on online platforms to promote advocacy, transparency, and accountability. However, this shift to the digital sphere exposes them to a variety of cyber threats, including hacking, surveillance, phishing attacks, and unauthorized data breaches. These threats compromise not only the personal safety of HRDs but also the integrity of their work. Therefore, a comprehensive understanding of data security and cyber hygiene practices is essential. By equipping HRDs with knowledge of encryption, secure communication tools, and strong password management, they can better protect sensitive information from falling into the wrong hands. Training on Kenya’s Data Protection Act is equally critical, as many HRDs are unaware of their legal rights regarding data privacy and security. Understanding the provisions of this Act ensures HRDs know how to defend their rights when their data is compromised, empowering them to continue their advocacy without fear of persecution.
Moreover, with the rise of AI technologies, there are both opportunities and risks that HRDs need to navigate. AI tools, such as those used for content moderation and cybersecurity, can help HRDs monitor, report, and prevent Technology-Facilitated Gender-Based Violence (TFGBV), which disproportionately affects them. However, the same technologies can also be misused for surveillance or data exploitation, raising concerns about privacy and freedom of expression. Discussions around AI, therefore, need to explore both the pros and cons, ensuring that HRDs can leverage AI to their advantage while minimizing potential risks. At the same time, training on TFGBV is crucial, as HRDs, particularly women, face growing incidents of online harassment, cyberbullying, and doxxing. Understanding reporting mechanisms and the support available to victims is vital for protecting HRDs from these digital threats and enabling them to continue their work in a safer online environment.
Objectives
- Equip HRDs with practical skills in data protection and cyber hygiene to reduce their vulnerability to digital threats.
- Enhance HRDs’ understanding of responsible AI adoption and use, ensuring ethical considerations are integrated into their digital practices.
- Provide strategies for navigating internet restrictions, enabling HRDs to maintain communication and coordination during crises.
- Offer personalized assistance through a Digital Security Clinic, addressing specific digital security issues and vulnerabilities faced by HRDs.
- Promote collaboration and peer-to-peer learning for HRDs to share experiences and best practices.
Expected Outcomes
- Increased awareness of cyber threats like phishing attacks and surveillance, empowering HRDs to take proactive security measures.
- Improved implementation of cyber hygiene best practices.
- Development of strategies for navigating internet restrictions, ensuring continuity in advocacy work and access to information during critical periods.
- Greater confidence among HRDs in navigating digital security challenges, leading to more effective and secure human rights advocacy.
- Establishment of a collaborative network among HRDs, facilitating ongoing support and knowledge sharing to address evolving digital security threats.
Format of the Training
Each day consisted of a structured program that covered the following topics:
Time | Session | Facilitator |
8:20 – 8:30 AM | Opening remarks | Defenders Coalition |
8:30 – 9:00 AM | Data Protection for HRDs | Barrack Otieno, KICTANet |
9:00 – 9:30 AM | Responsible adoption and use of Artificial Intelligence | Barrack Otieno, KICTANet |
9:30 – 10:00 AM | Plenary | All |
10:00 – 10: 30 AM | Introduction to cyber hygiene | Jacinta Wothaya, Tatua |
10:30 – 11:00 AM | TEA BREAK | |
11:00 – 11:30 AM | Cyber Hygiene for Device and Software | Neno Newa, Tatua |
11:30 – 12:00 PM | Cyber Hygiene for Networks | Jacinta Wothaya, Tatua |
12:00 – 1:00 PM | Practical Session: Cyber Hygiene Best Practices | Neno Newa, Tatua |
1:00 – 2:00 PM | LUNCH BREAK | |
2:00 – 2:30 PM | Practical activity: Phishing Quiz | Neno Newa, Tatua |
2:30 – 3:30 PM | Group work: navigating Internet restrictions | Jacinta Wothaya, Tatua |
3:30 – 4:00 PM | Group work presentations | All |
4:00 – 4:30 PM | Plenary, post-training survey, and comments from Defenders Coalition | Defenders Coalition |
4:30 PM | TEA BREAK AND SESSION END | |
5:00 – 6:30 PM | Digital Security Clinic (On a need basis) | Tatua & Defenders Coalition |
Overall Outcomes
The training successfully equipped HRDs with vital skills in data protection and cyber hygiene. Participants reported increased confidence in navigating digital security challenges effectively. Immediate outcomes included enhanced awareness of potential cyber threats, practical strategies for safeguarding sensitive information, and improved collaboration among participants.
Conclusion
The training was a great experience for all the trainers and participants alike. Investing in the development of HRDs’ digital security skills empowers them to better conduct their advocacy and human rights work. Finally, it is essential for HRDs to remain agile as Kenya continues to navigate an increasingly complex digital landscape characterized by rising cybersecurity threats, the emergence of new digital laws, censorship, and increased surveillance efforts against them.