Research on transnational repression

From TCU Wiki
Revision as of 20:45, 17 December 2024 by Kristin1 (talk | contribs) (→‎TNR mitigation techniques)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Videos

Reports

Research Database on Transnational Repression (TNR)

https://tnr-research.uwazi.io/en/

This collection of research reports can help human rights defenders better understand:

  • Which TNR threats are likely or possible based on the existing evidence, to determine appropriate mitigation techniques
  • Which TNR threats are unlikely, in order to alleviate fear
  • What exiled HRDs can expect from a host country in terms of protection measures
  • Existing campaigns to strengthen protection for exiled HRDs

This database was developed and curated by the Center for Victims of Torture. To contribute to this research, email [email protected]

Reports in this database include:

  • Defending Democracy in Exile: Policy Responses to Transnational Repression, report by Freedom House
  • Silencing Across Borders: Transnational Repression and Digital Threats Against Exiled Activists, report by Marcus Michaelsen
  • Psychological and Emotional War: Digital Transnational Repression in Canada, report by Citizen Lab
  • Going after the family: Transnational repression and the proxy punishment of Middle Eastern diasporas, article co-authored with Dana M. Moss & Gillian Kennedy.

Books

The Arab Spring Abroad: Diaspora Activism against Authoritarian Regimes, book by Dana Moss. You can download this book for free here: https://www.cambridge.org/core/books/arab-spring-abroad/D7EC15ED46D37A2DB8CDDB83F06CC591#overview

TNR threat categories

  • Unlawful deportation, extradition, rendition, Interpol abuse, legal cases
    • Examples: trial in absentia, initiate a criminal case in order to carry out deportation or extradition
  • Physical intimidation, assault, etc
  • Coercion by proxy / Threats against in-country relatives
    • Examples: Opponent may harass, threaten, prosecute, and imprison family or colleagues
  • Account and device hacking
    • Examples: Opponents hack social media or email accounts
  • Monitoring and surveillance
    • Examples: Tracking and identifying HRDs, monitor family members’ conversations so they can access communications, infiltration of network through informants, surveil/monitor communication to ascertain location and activities
  • Slander, harassment, disinformation campaigns
    • Examples: Smear campaigns, hate speech and harassment in social media

TNR mitigation techniques

Threat category Mitigation techniques Resources and research
Unlawful deportation, extradition, rendition, Interpol abuse, legal cases
Physical intimidation, assault, etc Personal safety awareness (see Umbrella app)
Coercion by proxy / Threats against in-country relatives Going after the family: Transnational repression and the proxy punishment of Middle Eastern diasporas (Moss, Michaelsen, Kennedy (2022))
Account and device hacking
Monitoring and surveillance
Slander, harassment, disinformation campaigns How to deal with online harassment and threats