Research on transnational repression: Difference between revisions
From TCU Wiki
Created page with "'''Defending Democracy in Exile''', report by Freedom House What is Transnational Repression? It is governments reaching across borders to silence dissent among diasporas and..." |
|||
(13 intermediate revisions by 2 users not shown) | |||
Line 1: | Line 1: | ||
== Videos == | |||
* [https://www.youtube.com/watch?v=FkPCec7jG5I Digital Transnational Repression Explained], by Citizen Lab | |||
* [https://www.youtube.com/watch?v=8YcHajYQLSw Digital Transnational Repression Explained: Activists], by Citizen Lab | |||
* [https://www.youtube.com/watch?v=N72UV-aD9r4 Gender-based Digital Transnational Repression Explained], by Citizen Lab | |||
* [https://www.youtube.com/watch?v=3D4EjMq5FK4 Responding to Transnational Repression] - recorded panel discussion from Dec 2021 | |||
* [https://www.orionpolicy.org/orionforum/111/transnational-repression-the-long-arm-of-authoritarianism Transnational Repression: The Long Arm of Authoritarianism] (parts 1 and 2) - recorded panel discussion from Sept/Oct 2022. | |||
* [https://www.youtube.com/watch?v=86Q_9IUosCE&t=71s Defending Democracy in Exile: Policy Responses to Transnational Repression] by Freedom House | |||
== Reports == | |||
=== Research Database on Transnational Repression (TNR) === | |||
https://tnr-research.uwazi.io/en/ | |||
This collection of research reports can help human rights defenders better understand: | |||
* Which TNR threats are likely or possible based on the existing evidence, to determine appropriate mitigation techniques | |||
* Which TNR threats are unlikely, in order to alleviate fear | |||
* What exiled HRDs can expect from a host country in terms of protection measures | |||
* Existing campaigns to strengthen protection for exiled HRDs | |||
This database was developed and curated by the Center for Victims of Torture. To contribute to this research, email research@freedomhouse.org | |||
Reports in this database include: | |||
Marcus | * Defending Democracy in Exile: Policy Responses to Transnational Repression, report by Freedom House | ||
* Silencing Across Borders: Transnational Repression and Digital Threats Against Exiled Activists, report by Marcus Michaelsen | |||
* Psychological and Emotional War: Digital Transnational Repression in Canada, report by Citizen Lab | |||
* Going after the family: Transnational repression and the proxy punishment of Middle Eastern diasporas, article co-authored with Dana M. Moss & Gillian Kennedy. | |||
== Books == | |||
''' | '''The Arab Spring Abroad: Diaspora Activism against Authoritarian Regimes''', book by Dana Moss. You can download this book for free here: https://www.cambridge.org/core/books/arab-spring-abroad/D7EC15ED46D37A2DB8CDDB83F06CC591#overview | ||
== TNR threat categories == | |||
* Unlawful deportation, extradition, rendition, Interpol abuse, legal cases | |||
** Examples: trial in absentia, initiate a criminal case in order to carry out deportation or extradition | |||
*Physical intimidation, assault, etc | |||
* Coercion by proxy / Threats against in-country relatives | |||
** Examples: Opponent may harass, threaten, prosecute, and imprison family or colleagues | |||
*Account and device hacking | |||
** Examples: Opponents hack social media or email accounts | |||
* Monitoring and surveillance | |||
** Examples: Tracking and identifying HRDs, monitor family members’ conversations so they can access communications, infiltration of network through informants, surveil/monitor communication to ascertain location and activities | |||
* Slander, harassment, disinformation campaigns | |||
** Examples: Smear campaigns, hate speech and harassment in social media | |||
== TNR mitigation techniques == | |||
{| class="wikitable" | |||
|+ | |||
!Threat category | |||
!Mitigation techniques | |||
!Resources and research | |||
|- | |||
|Unlawful deportation, extradition, rendition, Interpol abuse, legal cases | |||
| | |||
| | |||
|- | |||
|Physical intimidation, assault, etc | |||
|Personal safety awareness (see Umbrella app) | |||
| | |||
|- | |||
|Coercion by proxy / Threats against in-country relatives | |||
| | |||
|[https://tnr-research.uwazi.io/en/entity/s0hrhs72n7n Going after the family: Transnational repression and the proxy punishment of Middle Eastern diasporas] (Moss, Michaelsen, Kennedy (2022)) | |||
|- | |||
|Account and device hacking | |||
| | |||
* [[Protect your accounts using strong passwords, pw managers, 2fa|Use two factor authentication for all accounts]] | |||
* [[Protect your accounts using strong passwords, pw managers, 2fa|Use unique, complex passwords for all accounts]] | |||
* [[Protect your accounts using strong passwords, pw managers, 2fa|Use a password manager to create, store and protect those passwords]] | |||
* [[Protect your website|Protect your website from DDOS attacks]] | |||
* [[Trusted hosting companies in the human rights community|Use a host company that you trust]] | |||
| | |||
|- | |||
|Monitoring and surveillance | |||
| | |||
* [[Safe internet browsing using VPN and Tor browser|Use a VPN and/or Tor browser]] | |||
* [[Use a secure messaging app]] | |||
* [[How to collect and store information in a secure way]] | |||
* [[Protect your accounts using strong passwords, pw managers, 2fa#Be aware of spear phishing attacks|Protect yourselves against (spear) phishing attacks]] | |||
* Use a second device for sensitive activities | |||
* [[How to mitigate your risk of being subject to Pegasus surveillance|Restart your device regularly to disrupt spyware]] | |||
* [[Secure your devices|Use anti virus]] | |||
* [[How to mitigate your risk of being subject to Pegasus surveillance]], and other spyware | |||
| | |||
|- | |||
|Slander, harassment, disinformation campaigns | |||
|[[How to deal with online harassment and threats]] | |||
| | |||
|} |
Latest revision as of 20:45, 17 December 2024
Videos
- Digital Transnational Repression Explained, by Citizen Lab
- Digital Transnational Repression Explained: Activists, by Citizen Lab
- Gender-based Digital Transnational Repression Explained, by Citizen Lab
- Responding to Transnational Repression - recorded panel discussion from Dec 2021
- Transnational Repression: The Long Arm of Authoritarianism (parts 1 and 2) - recorded panel discussion from Sept/Oct 2022.
- Defending Democracy in Exile: Policy Responses to Transnational Repression by Freedom House
Reports
Research Database on Transnational Repression (TNR)
https://tnr-research.uwazi.io/en/
This collection of research reports can help human rights defenders better understand:
- Which TNR threats are likely or possible based on the existing evidence, to determine appropriate mitigation techniques
- Which TNR threats are unlikely, in order to alleviate fear
- What exiled HRDs can expect from a host country in terms of protection measures
- Existing campaigns to strengthen protection for exiled HRDs
This database was developed and curated by the Center for Victims of Torture. To contribute to this research, email [email protected]
Reports in this database include:
- Defending Democracy in Exile: Policy Responses to Transnational Repression, report by Freedom House
- Silencing Across Borders: Transnational Repression and Digital Threats Against Exiled Activists, report by Marcus Michaelsen
- Psychological and Emotional War: Digital Transnational Repression in Canada, report by Citizen Lab
- Going after the family: Transnational repression and the proxy punishment of Middle Eastern diasporas, article co-authored with Dana M. Moss & Gillian Kennedy.
Books
The Arab Spring Abroad: Diaspora Activism against Authoritarian Regimes, book by Dana Moss. You can download this book for free here: https://www.cambridge.org/core/books/arab-spring-abroad/D7EC15ED46D37A2DB8CDDB83F06CC591#overview
TNR threat categories
- Unlawful deportation, extradition, rendition, Interpol abuse, legal cases
- Examples: trial in absentia, initiate a criminal case in order to carry out deportation or extradition
- Physical intimidation, assault, etc
- Coercion by proxy / Threats against in-country relatives
- Examples: Opponent may harass, threaten, prosecute, and imprison family or colleagues
- Account and device hacking
- Examples: Opponents hack social media or email accounts
- Monitoring and surveillance
- Examples: Tracking and identifying HRDs, monitor family members’ conversations so they can access communications, infiltration of network through informants, surveil/monitor communication to ascertain location and activities
- Slander, harassment, disinformation campaigns
- Examples: Smear campaigns, hate speech and harassment in social media
TNR mitigation techniques
Threat category | Mitigation techniques | Resources and research |
---|---|---|
Unlawful deportation, extradition, rendition, Interpol abuse, legal cases | ||
Physical intimidation, assault, etc | Personal safety awareness (see Umbrella app) | |
Coercion by proxy / Threats against in-country relatives | Going after the family: Transnational repression and the proxy punishment of Middle Eastern diasporas (Moss, Michaelsen, Kennedy (2022)) | |
Account and device hacking | ||
Monitoring and surveillance |
|
|
Slander, harassment, disinformation campaigns | How to deal with online harassment and threats |