[HacktionLab] Fwd: Security Best Practice for vetting tech volunteers.

Garcon du Monde gdm at fifthhorseman.net
Mon Jan 27 17:42:22 UTC 2025


hi there,

i might be slightly late to the game, but fascinating question!

On Tue, Jan 14, 2025 at 05:18:33PM +0000, Tim Dobson wrote:
> I'm looking at a potentially memorable activist job, assisting people in
> $other_country with stuff that you and me might look at as important.
> 
> The government of $other_country would deem the organisation as Very
> Interesting or Very Interesting Eager To Disrupt, and have active
> operations.
> 
> An interview question is
> > A volunteer from the $other_country has applied to your organization. How
> can you verify them? Describe the procedure.


i think there are 2 solutions:

 1. they need a friend of a friend recommmendation;

 2. they need to prove some other way that they "do good stuff".

of course, neither of these is infallible. but they each have something
going for them:

 - in the first case, the "friend" has made the recommendation, so
   ultimately you can say it's down to them - not you. You can even
   strengthen this by using a requirement for two friends, or three,
   or...

 - for option two, they've given some proof that they can do "good
   stuff" and so the challenge is then to get them to do (or keep them
   doing) "good stuff" for your organisation. as long as you can do
   this, then things are fine. they may well *also* do "bad things"
   (e.g. provide intel to the "enemy") - but you run that risk with
   every single existing member of your organisation anyway, including
   you!! that is, you never know when someone is going to be
   compromised: we all have shady things in our past that can be used
   against us if you figure out how, that's one of the main
   characteristics of being human.

> It occurs to me that basically, you'll _never_ be able to defeat a
> nation-state intelligence test with screening procedures, and if you're
> relying on volunteer support, you'll need to recruit volunteers... and so
> you have to assume your behind the scenes work and infrastructure is
> transparent to the other side?

yes, probably.

> Does anyone have a counterpoint to this? Or best practice?

figuring out specific threats/threat levels, then assigning people
accordingly?

solidarity,

	--gdm

-- 
GPG: 5607 E4BC C6B6 90F4 5EBC  B348 D01B 9D77 912F 963C
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: not available
URL: <https://lists.aktivix.org/pipermail/hacktionlab/attachments/20250127/dfd6f668/attachment.sig>


More information about the HacktionLab mailing list