Training
Practical, adversarial-thinking-based training for journalists, human rights defenders, and the organisations that support them. Topics cover digital security, OSINT, and hostile environments. Available in English and Spanish, online or in person.
Languages
English and Spanish
Format
Online or in person · Half-day to multi-day
Approach
Scenario-based · Adversarial thinking · Progressive learning
Collaborations
HPC · RSF · ECPMF · GIJN and others
Who it's for
Journalists & Reporters
Especially those covering sensitive topics, corruption, or working in high-risk environments where digital threats are a daily reality.
Human Rights Defenders
Activists, advocates, and civil society actors who are frequent targets of online harassment, surveillance, and deanonymisation attempts.
NGOs & Support Organisations
Organisations that protect or support journalists and HRDs, building internal capacity and delivering consistent training to their networks.
Researchers & Academics
Independent and institutional researchers working on disinformation, extremism, or digital threats who need operational security frameworks.
What I offer
Each topic can be delivered as a standalone session, a half-day workshop, a full-day training, or combined with others into a multi-day programme. Every session is built from scratch around the participants: their context, their threat landscape, and their experience level. Nothing is off-the-shelf.
Digital Security Foundations for Journalists
A comprehensive introduction to the digital threat landscape for journalists and media workers. Covers device security, account protection, secure communications, and building a personal threat model adapted to your specific risk profile and context.
OSINT for Investigative Journalists
Practical open-source intelligence gathering for journalists. Tools, techniques, and workflows for digital investigations: verifying identities, and tracking disinformation networks to analysing social media data and documenting evidence. Hands-on with real tools.
Investigating Trolling & Online Harassment Campaigns
How to identify, document, and report on coordinated online harassment targeting journalists, activists, and public figures. Covers campaign anatomy, actor mapping, attribution methodology, and how to safely gather evidence without exposing yourself.
Hostile Environments & Risk Assessment
Grounded in emergency management methodology, this module teaches journalists and HRDs to systematically assess risk before, during and after field work, covering both physical and digital dimensions. Includes scenario planning, contingency protocols, and decision-making under pressure. Adapted from public safety training frameworks.
Disinformation & Influence Operations: Detection and Reporting
Understanding how coordinated disinformation campaigns are built, amplified, and sustained. You will learn how to investigate and report on them responsibly. Covers influence operation anatomy, platform dynamics, narrative tracking, and the journalist's role in avoiding amplification.
Security Protocol Design for Newsrooms
Working with editorial leadership and security officers to build institutional digital security protocols adapted to the newsroom's specific threat model. Includes policy templates, training cascades, and incident response frameworks. Based on active collaboration with RSF, HPC, and ECPMF.
Methodology
Every session is built around one core principle: participants should leave able to make better decisions independently, without depending on a trainer or a checklist. That means the learning has to stick, which means it has to feel real.
The framework comes directly from public safety and emergency management practice, where you train for the worst case, not the average case. You plan for failure. You rehearse under conditions that simulate real pressure. And you build the mental models that let you improvise when the scenario does not match the plan. It never does.
Content is always adapted to the group's context, experience level, and threat landscape. A training for a newsroom in Central America looks different from one for researchers in Europe, even if the topic title is the same.
The four stages
Awareness
Who the threat actors are, what their tools and motivations look like, and why you are a potential target.
Threat modelling
Building a personal or institutional threat model. Which risks apply to this specific person, in this specific context.
Adversarial scenarios
Working through real scenarios from the attacker's perspective. Think like the threat to anticipate and counter it.
Strategy & autonomy
Leaving with a realistic, actionable plan grounded in your own context. Not a checklist. Not dependence on a trainer.
Track record
Training delivered in collaboration with leading press freedom, human rights, and investigative journalism organisations across Europe, Latin America, and the Middle East.
Trainings per year
Across organisations and contexts globally
Countries reached
Europe, Latin America, Middle East and beyond
Participants per session
Individual, small group (5–8) and cohort (20–25) formats
Knight Center for Journalism in the Americas
Online course on digital security and OSINT for journalists, delivered in English and Spanish through the Knight Center's MOOC platform at the University of Texas at Austin. The largest single training event by reach.
5,000+
Participants
Practical information
Duration
Half-day to multi-day
From 3-hour focused workshops to 2–3 day intensive programmes. Duration is adapted to module complexity and group needs.
Group size
Small cohorts preferred
Works best with groups of 8–25 participants. Smaller groups allow deeper scenario work. Larger groups can be accommodated for conference-style delivery.
Languages
English & Spanish
All modules available in both languages. Mixed groups can be accommodated. Materials provided in the delivery language.
Format
Online or in person
Both formats fully supported. In-person preferred for scenario-based and institutional protocol modules. Online works well for awareness and OSINT sessions.
Customisation
Always adapted
No session is delivered off-the-shelf. Every training begins with a context assessment covering threat landscape, participant profiles, and organisational needs before content is finalised.
Materials
Provided
Participants receive session materials and reference resources. For institutional trainings, a tailored protocol document or training cascade guide can be produced.
Request training
Send a message with a brief description of your organisation, the training you're looking for, your target audience, and preferred format and timeline. I'll get back to you to discuss whether it's a good fit.