Direct Action & Event Safety
Digital Safety
Organizational Safety
Legacy & Lineage
200

These two Safety team roles should never be combined.

Police negotiator & Security Coordinator

200

This term refers to the extra layer of protection used to ensure the security of online accounts beyond just a username and password.

Two Factor Authentication

200

In addition to training, this practice will keep your security protocols from becoming outdated

Evaluation

200

These two organizations are the foundation of the VCW safety and security lineage

Young Lords and Black Panther Party

300

This Safety Team role is important because it is the ‘eyes and ears’ of the team.

Marshalls

300

This term refers to a form of online harassment where a person’s private information like contact information, address, or phone number is shared publicly.

Doxxing

300

An example of a fiscal threat to an organization

Challenging non-profit status, financial IRS audits, etc.

300

This movement leader trained a number of VCW security practitioners and was an instrumental member of the young lords

Richie Pérez

400

This safety team formation is useful when there is a person or group of people who may be specifically targeted at an action or event.

Detail Formation

400

This digital security tool scrambles text between sender and receiver in order to secure the information in transit to the receiver.

End-to-End Encryption

400

It is important to create trainings for your safety protocols at LEAST this often

Once a year

400

This person was Tupac Shakur’s business manager, intellectual teacher, and Black Panther Party movement member.

Watani Tyehimba

600

This tool should be used to assess likelihood of risk when developing security protocols.

Risk Assessment

600

This digital security practice tool maps the information/data you collect, generate, or use in order to track where data is stored, who has access to it, and how it’s currently protected.

Data inventory

600

The five steps to organizational safety planning

1. Conduct an inventory

2. Create safety guidelines and values to align with organizational     politics:

3. Create safety protocols:

4. Develop a regular training and practice schedule:

5  Evaluation and update protocols

600

FBI Director who issued directives governing COINTELPRO

J. Edgar Hoover