MediaDev Fundraising Guide
FUNDRAISING HELP DESK: Sign up for fundraising support and mentoring
  • MediaDev Fundraising Guide
  • Feedback & collaboration
  • NEW: Resources related to US funding suspension
  • THE GUIDE
    • 1. Preparation & planning
    • 2. Competitive advantages
    • 3. Donor engagement
    • 4. Identifying opportunities
    • 5. Types of application
    • 6. Application process
    • 7. Building partnerships
    • 8. Writing a proposal
    • 9. Common templates
      • Guide to completing logframes
      • European Commission
      • ++ EC Concept note
      • ++ EC - Full application
      • ++ EC Logical framework
      • FCDO (UK)
      • ++ FCDO Project Proposal Form
      • US Department of State
      • ++ Form of Application Submission
    • 10. Project staffing
    • 11. Budgeting
  • Annex
    • + Fundraising lexicon
      • Call for proposals & terms of reference
      • Applications & offers
      • Application forms
      • Contracts & agreements
      • Stakeholders
      • Budgets
    • + MediaDev funding experts
    • + MediaDev funding webinars
  • MediaDev funding
    • + MediaDev Funders
      • Government agencies
      • Foundations
      • UN agencies
      • Other international bodies
      • Other funders
      • Crowdsourcing platforms
    • + Funding opportunities
  • Crisis & emergencies
    • + Crisis/emergency funding
    • + Crisis/emergency resources
      • Logistical support
      • Physical Safety
      • Digital Support
      • Fact-checking
      • Mental health resources
      • Monitoring Crimes Against Journalists
      • Legal Support
      • Directory
    • Resources for Lebanon
    • Resources for Ukraine
      • + Fundraising and Crowdfunding for Media and Journalists in Ukraine
      • Displaced Journalists
    • Resources for Palestinian media
      • + Fundraising and Crowdfunding for Media and Journalists in Palestine
      • Displaced Journalists
    • Media in Exile
  • Other tools & resources
    • How-to guides on fundraising
      • AI in Fundraising
    • For journalism nonprofits
    • For nonprofits
    • Articles and videos
  • The GFMD Fundraising Guide in other languages
    • Guide sur la collecte de fonds pour le développement des médias
    • Guía de recaudación de fondos de MediaDev
    • Посібник з фандрейзингу MediaDev
    • Руководство по фандрейзингу MediaDev
    • دليل التمويل MediaDev
    • Ghidul de fundraising GFMD MediaDev
  • Other GFMD Resource Spaces
    • GFMD IMPACT
    • GFMD homepage
Powered by GitBook
On this page
  • GIJN Journalist Security Assessment Tool
  • A practical guide for women journalists on how to respond to online harassment
  • Pro-bono protection against DDOS attacks
  • Free DW Resources to Avoid Disinformation and Circumvent Censorship
  • Digital safety advice from CPJ
  • Satellite Communication Threats
  • Five Ways to Stay Online During a Government Internet Shutdown
  • Open Technology Fund (OTF) Rapid Response Fund
  • Tierra Común
  • Greenhost
  • Qurium Media Foundation (QMF)
  • Totem
  • Other Tech Solutions

Was this helpful?

Export as PDF
  1. Crisis & emergencies
  2. + Crisis/emergency resources

Digital Support

PreviousPhysical SafetyNextFact-checking

Last updated 1 month ago

Was this helpful?

See a summary of GFMD's held together with the in June 2023.

There are further resources available from civil society on GFMD's Tech and Journalism Mechanism Gitbook page .

GIJN Journalist Security Assessment Tool

The has worked with experts at the Ford Foundation to adapt Ford’s Cybersecurity Assessment Tool (CAT) for use by watchdog journalism groups. The JSAT, translated into a dozen languages, offers an online diagnosis of an organisation’s physical and digital security strength and resiliency, with recommendations on how to improve your security.

You can read more about the tool .

A practical guide for women journalists on how to respond to online harassment

Journalists frequently receive death threats, threats of sexual violence, and threats directed at their families and are targeted by disinformation campaigns. Research has shown that these attacks disproportionately affect women journalists.

  • How to prepare for online harassment

  • What to do during and after an attack

  • A list of resources to support women journalists with responding to online harassment

Pro-bono protection against DDOS attacks

Free DW Resources to Avoid Disinformation and Circumvent Censorship

Digital safety advice from CPJ

"Journalists should protect themselves and their sources by keeping up to date on the latest digital security news and threats such as hacking, phishing, and surveillance. Journalists should think about the information they are responsible for and what could happen if it falls into the wrong hands, and take measures to defend their accounts, devices, communications, and online activity."

Satellite Communication Threats

Risks are inherent in using any form of communication tool when speaking truth to power. Satellite communication tools are often rolled out quickly during crises as they provide critical access and are difficult – but not impossible – to block. However, the risks of using these tools must be considered.

Internews has published a guide discussing threats which are widely applicable to 2-way satellite communications devices, such as satellite phones and pagers, Inmarsat BGANs, Starlinks, and VSAT terminals.

Five Ways to Stay Online During a Government Internet Shutdown

Open Technology Fund (OTF) Rapid Response Fund

Listed below are trusted service partners that offer technological services:

Tierra Común

Their main objective is for the people they work with to manage their own protection without intermediaries, without expensive software licenses, and gradually strengthening their own capacities.

Tierra Común provides the following services:

  • Advice: Consulting on digital security diagnosis and risk analysis and design of protocols and regulations in computing

  • Information backup

  • Communications receipt

  • Trainings: Basic and advanced computer self-defense

  • Technical support

  • Web services: Website creation and security audit

Languages supported by Tierra Comun:

  • English

  • Spanish

Greenhost

Greenhosts' web hosting services includes:

  • Clustered web hosting

  • Cloud platform

  • Deflect anti-DDoS protection

  • Infrastructure as a Service (IAAS)

  • Real-time Monitoring

Please reach out to this dedicated address for rapid response requests: rr@greenhost.net.

Qurium Media Foundation (QMF)

The support that Qurium assists with is classified in thee categories:

Preventative measures:

  • Sanitation and audit of at-risk websites – cleaning and upgrading outdated and insecure websites to improve resilience against attacks

  • Mentorship – a 3-6 months remote mentorship program to strengthen and improve existing organizational procedures in digital security. Available in English, Spanish and Arabic.

  • Customized support during special events – secure hosting and close monitoring of websites of public interest under election periods, military coups, and situations of civil unrest.

During attack:

Mitigation of ongoing attacks against websites, including:

  • DDoS attacks

  • Scanning and probing

  • Brute-force attacks

  • Unauthorized access

Post attack:

  • Sanitation of compromised website – identification and removal of malware/backdoors as well as insecure code to prevent future attacks.

  • Digital forensics – forensics investigation with focus on modus-operandi and attribution of targeted attacks, including:

    • Website attacks (DDoS, unauthorized access, scanning, probing)

    • Targeted phishing

  • Internet blocking of websites and web applications – forensics investigation of Internet blocking with focus on how the blocking is taking place, by whom and by which means.

  • Compromised mobile phones – digital forensics investigation of compromised mobile phones

Qurium may offer services that are not listed above, depending on its scope and the human resources available. If your needs don’t fit within the list of services, feel free to send an encrypted email to rr@virtualroad.or.

Totem

The following are featured courses from Totem:

  • Risk analysis

  • Human rights documentation

  • Device security

  • How to protect your identity online

  • How to be a journalist and manage your online privacy

  • Tools for journalists to help identify their online abusers and the tactics that they use

  • Why field research matters

  • Going undercover on Instagram

  • How to bypass internet censorship

  • Good password management

  • Secure messaging apps

  • Phishing attacks

  • How the internet works

Other Tech Solutions

The following solutions have also been employed by journalism and media organisations globally.

This from pro bono legal programme has been written to support women journalists as they navigate the challenges of online violence. It includes information on:

If you are the victim of a DDOS attack, the (NED) can refer your organisation to , an American web infrastructure and website security company that provides content delivery network and DDoS mitigation services. Cloudflare offers pro-bono protections against DDOS attacks for organisations referred by NED. For assistance, please fill out an application on .

, a project of Deutsche Welle highlights complex issues surrounding free speech, free expression and a free press around the world. In connection with the ongoing crisis in Ukraine they .

DW Innovation also recommends accessing , “a news and information site for migrants to counter misinformation at every point of their journey: in their country of origin, along the route, or in the places where they hope to start a new life.” The site is a joint-venture of DW, and .

See more on CPJ's . You can also read their article about how to .

International nonprofit journalism organisation has spoken to experts in privacy and security to get their advice on the tools and tactics for skirting shutdowns.

From the , "Experts advise that if you live in a place where shutdowns are a risk — and that risk is spreading — be prepared. Download VPNs and other apps; be sure to have a contingency plan, including a phone number that doesn’t rely on the internet to connect; and have a phone tree of important people to call should something happen."

To resolve digital emergencies, OTF's works with partners who are highly sensitive to and well-aware of the specific needs and challenges of human rights activists, journalists, and the Internet freedom community.

is a Latin American network made up of a group of professionals and experts in free technologies, computer protection and training that promotes a comprehensive approach to privacy and digital security.

Reach out to Terra Común here: .

offers web hosting from small, simple websites to complex setups with multiple Virtual Private Servers (VPSes) using 100% Dutch wind energy.

is a Swedish digital forensic group that offers . The pro-bono service is dedicated to independent media, investigative journalists and human rights activists in Internet repressive regimes that have been targets of digital attacks, or are likely to become a target due to its scope of work, and are in need of immediate support.

Secure Hosting of at-risk websites – 12 months hosting with , including DDoS mitigation and forensics investigations of targeted attacks

Secure Hosting – 12 months hosting with , including DDoS mitigation and forensics investigations of targeted attacks.

Circumvention of Internet blocking – deployment of block-resilient mirror of blocked WordPress website ()

Apply for Rapid Response support .

Developed in collaboration by and , is an online learning platform that offers educational courses about digital security and privacy, and related tools and tactics for journalists, activists and human rights defenders in a safe, online classroom environment.

The Totem platform is built using the open-source (Massive Open Online Course) software. The platform has been carefully designed to be safe and privacy-preserving by collecting minimal data about its users and also using secure, modern encryption to prevent any eavesdropping.

View all 63 courses .

Anti-virus software - : This is anti-virus software that works to protect your device against cyber intrusions such as malware attacks and data breaches. One ESET license can be installed on five different devices. Valid for three years.

Virtual Private Network (VPN) - : TunnelBear encrypts your internet connection and protects your privacy, which prevents hackers or other nefarious actors from viewing or accessing your browsing activity, hiding your real IP address, and helps you to bypass internet censorship.

online guide
Thomson Reuters Foundation's
TrustLaw
National Endowment for Democracy
Cloudflare
Cloudflare’s website
DW Freedom (Twitter)
recommend a series of articles they have published on circumventing censorship and moving unrecognised on the internet
InfoMigrants
ANSA
France Médias Monde
Digital Safety Kit
prepare for internet shut-downs
Rest of World
article
Rapid Response Fund
Tierra Común
infosec@tierracomun.org
Greenhost
Qurium Media Foundation (QMF)
Rapid Response support
Virtualroad.org
Virtualroad.org
Bifrost
here
Greenhost
Free Press Unlimited
Totem
Open edX MOOC
here
ESET
TunnelBear
RightsCon workshop on encryption and media freedom
Internet Society
here
Global Investigative Journalism Network
here
LogoThe Journalist Security Assessment ToolAdvisory Services
LogoNational Endowment for Democracy partners with Project Galileo to offer free cybersecurity protection to democracy organizations - NATIONAL ENDOWMENT FOR DEMOCRACYNATIONAL ENDOWMENT FOR DEMOCRACY
LogoInfoMigrants: reliable and verified news for migrants - InfoMigrantsInfoMigrants
LogoDigital Safety KitCommittee to Protect Journalists
LogoDigital Safety: Internet shutdownsCommittee to Protect Journalists
LogoSatellite Communication ThreatsSatellite Communiction Threats
LogoFive ways to stay online during a government internet shutdownRest of World
LogoServicios · Tierra Comun
LogoProductsgreenhost
2MB
TRF+Practical+Guide+JUL+2021+V15.pdf
pdf
35KB
satcom-mitigations-en.pdf
pdf
96KB
SATCOM threat-model UA_FINAL.pdf
pdf