Developing technical collaborations within the Network

Sharing our technical projects and reflections on our first in-person tech retreat.

It was day two of a three-day tech retreat in Lisbon. The night before, everyone had spent hours playing around with setting up network traffic analysis and mobile forensics tools in a private space, using the shared network infrastructure offered as a playground by one of the DRN members. While we all enjoyed experimenting with tools, we acknowledged that morning that tech staff contributions to mobile forensic collaborations – and all other collaborations – will be as diverse as the capacities of our organizations: some of us will provide the infrastructure, some will share information, and others will set up the protocols for communication.

  1. How could our Network projects embrace the diversity of the capacities and specialized areas of work across its ten member organizations?
  2. How could these collaborations engage, build, and connect to the work of the wider digital resilience ecosystem?

Threat Intelligence:

Within the few experienced technologists in the Global South, there is a huge strategic opportunity for collectively studying and identifying threats, especially in the light of the growing diversity and complexities in the spyware industry. The collaboration on threat intelligence in the Network will start with the identification, and the secure documentation of digital threats in different geographical territories, the analysis of patterns and behaviors of certain threat types, and the production and communication of findings on these patterns with expert communities, and groups from the ecosystem that are working on policy, advocacy and litigation. 

Our members that are working on the threat intelligence workstream recognize the importance of vertical and horizontal information sharing in the field of threat intelligence, especially in the light of emerging regional groups that are working on the analysis of digital threats. We will start developing an internal process to secure knowledge sharing on threats from all regions in the Global South. In parallel, we will reach out to build on the experiences and expertise of the regional threat intelligence Networks to explore ways where this documented knowledge can collectively advance this field. 

Mobile Forensics:

Our members who run forensic labs identified the need to build the literature in setting up proper methodologies for triaging, securing data collection and clear processes of the data chain of custody. This collective development and documentation of forensic processes aims to achieve higher protection of the data they collect against digital threats, and provide more efficient support for their targeted communities. It also aims to provide guiding resources for organizations in the Global South that wish to launch their own forensic labs or help desks, and secure their operations to collaborate and share information about threats with organizations that perform complex threat intelligence and analysis. 

While the Network will start building this documentation internally, we will be reaching out to external expertise on specialized areas in forensics to learn together. We will develop processes to securely share and engage the global community who are working with digital forensics.  

Risk Assessment Framework:

Understanding the different organizational and territorial contexts in which we work allows us to correctly evaluate the tools and frameworks we use to mitigate and prevent security risks. 

Taking into consideration feedback from using available auditing and risk assessment tools, we will further develop an encompassing framework to prioritize digital threats according to our likelihood and impact that can adapt to different contexts. This tool was incepted in Latin America, and the goal is to adapt it so that it is inclusive of the diverse Global South contexts through learning about common regional threats. 

Initial learnings on our ongoing technical collaborations:

As much as the Tech Retreat was a pivotal moment to shape these areas of collaborations, it was a time for learning and reflection on the process of designing technical collaborations in this network, some of which we would like to share:

Scroll to Top