Our proven, battle-tested operational security guidance has protected organisations and front line activists the world over, some in the harshest of operational environments. Before you plan your next campaign or mission, have a chat with us to ensure you’re locked down and good to go.
Lock it down
Adversaries are a natural expression of any world-changing work, a part of the operational environment. Preparing with this in mind builds team confidence and morale, while ensuring the worst outcomes are avoided.
- Data sharing and data hygiene
- Device security and lockdown
- Infiltration and social engineering: detection, mitigation and resilience
- Threat modeling, adversarial projection
- Pre- and post-arrest planning
Our relationship with our clients is under strict NDA. Any process documentation is stored and shared with clients on our strongly end-to-end encrypted and self-hosted document server, with AES-XTS encryption at the file system.
Please note we strictly work with non-violent forms of protest, actions and civil disobedience.
Get in touch if you’d like a hand locking-down your next mission.