Research on transnational repression: Difference between revisions
From TCU Wiki
No edit summary |
|||
(10 intermediate revisions by 2 users not shown) | |||
Line 1: | Line 1: | ||
== Videos == | |||
* [https://www.youtube.com/watch?v=FkPCec7jG5I Digital Transnational Repression Explained], by Citizen Lab | |||
* [https://www.youtube.com/watch?v=8YcHajYQLSw Digital Transnational Repression Explained: Activists], by Citizen Lab | |||
* [https://www.youtube.com/watch?v=N72UV-aD9r4 Gender-based Digital Transnational Repression Explained], by Citizen Lab | |||
* [https://www.youtube.com/watch?v=3D4EjMq5FK4 Responding to Transnational Repression] - recorded panel discussion from Dec 2021 | |||
* [https://www.orionpolicy.org/orionforum/111/transnational-repression-the-long-arm-of-authoritarianism Transnational Repression: The Long Arm of Authoritarianism] (parts 1 and 2) - recorded panel discussion from Sept/Oct 2022. | |||
* [https://www.youtube.com/watch?v=86Q_9IUosCE&t=71s Defending Democracy in Exile: Policy Responses to Transnational Repression] by Freedom House | |||
== Reports == | |||
=== Research Database on Transnational Repression (TNR) === | |||
https:// | https://tnr-research.uwazi.io/en/ | ||
This collection of research reports can help human rights defenders better understand: | |||
* Which TNR threats are likely or possible based on the existing evidence, to determine appropriate mitigation techniques | |||
* Which TNR threats are unlikely, in order to alleviate fear | |||
* What exiled HRDs can expect from a host country in terms of protection measures | |||
* Existing campaigns to strengthen protection for exiled HRDs | |||
This database was developed and curated by the Center for Victims of Torture. To contribute to this research, email research@freedomhouse.org | |||
Reports in this database include: | |||
* Defending Democracy in Exile: Policy Responses to Transnational Repression, report by Freedom House | |||
* Silencing Across Borders: Transnational Repression and Digital Threats Against Exiled Activists, report by Marcus Michaelsen | |||
* Psychological and Emotional War: Digital Transnational Repression in Canada, report by Citizen Lab | |||
* Going after the family: Transnational repression and the proxy punishment of Middle Eastern diasporas, article co-authored with Dana M. Moss & Gillian Kennedy. | |||
== Books == | |||
https:// | '''The Arab Spring Abroad: Diaspora Activism against Authoritarian Regimes''', book by Dana Moss. You can download this book for free here: https://www.cambridge.org/core/books/arab-spring-abroad/D7EC15ED46D37A2DB8CDDB83F06CC591#overview | ||
== TNR threat categories == | |||
* Unlawful deportation, extradition, rendition, Interpol abuse, legal cases | |||
** Examples: trial in absentia, initiate a criminal case in order to carry out deportation or extradition | |||
*Physical intimidation, assault, etc | |||
* Coercion by proxy / Threats against in-country relatives | |||
** Examples: Opponent may harass, threaten, prosecute, and imprison family or colleagues | |||
*Account and device hacking | |||
** Examples: Opponents hack social media or email accounts | |||
* Monitoring and surveillance | |||
** Examples: Tracking and identifying HRDs, monitor family members’ conversations so they can access communications, infiltration of network through informants, surveil/monitor communication to ascertain location and activities | |||
* Slander, harassment, disinformation campaigns | |||
** Examples: Smear campaigns, hate speech and harassment in social media | |||
== TNR mitigation techniques == | |||
{| class="wikitable" | |||
|+ | |||
!Threat category | |||
!Mitigation techniques | |||
!Resources and research | |||
|- | |||
|Unlawful deportation, extradition, rendition, Interpol abuse, legal cases | |||
| | |||
| | |||
|- | |||
|Physical intimidation, assault, etc | |||
|Personal safety awareness (see Umbrella app) | |||
| | |||
|- | |||
|Coercion by proxy / Threats against in-country relatives | |||
| | |||
|[https://tnr-research.uwazi.io/en/entity/s0hrhs72n7n Going after the family: Transnational repression and the proxy punishment of Middle Eastern diasporas] (Moss, Michaelsen, Kennedy (2022)) | |||
|- | |||
|Account and device hacking | |||
| | |||
* [[Protect your accounts using strong passwords, pw managers, 2fa|Use two factor authentication for all accounts]] | |||
* [[Protect your accounts using strong passwords, pw managers, 2fa|Use unique, complex passwords for all accounts]] | |||
* [[Protect your accounts using strong passwords, pw managers, 2fa|Use a password manager to create, store and protect those passwords]] | |||
* [[Protect your website|Protect your website from DDOS attacks]] | |||
* [[Trusted hosting companies in the human rights community|Use a host company that you trust]] | |||
| | |||
|- | |||
|Monitoring and surveillance | |||
| | |||
* [[Safe internet browsing using VPN and Tor browser|Use a VPN and/or Tor browser]] | |||
* [[Use a secure messaging app]] | |||
* [[How to collect and store information in a secure way]] | |||
* [[Protect your accounts using strong passwords, pw managers, 2fa#Be aware of spear phishing attacks|Protect yourselves against (spear) phishing attacks]] | |||
* Use a second device for sensitive activities | |||
* [[How to mitigate your risk of being subject to Pegasus surveillance|Restart your device regularly to disrupt spyware]] | |||
* [[Secure your devices|Use anti virus]] | |||
* [[How to mitigate your risk of being subject to Pegasus surveillance]], and other spyware | |||
| | |||
|- | |||
|Slander, harassment, disinformation campaigns | |||
|[[How to deal with online harassment and threats]] | |||
| | |||
|} | |||
Latest revision as of 20:45, 17 December 2024
Videos
- Digital Transnational Repression Explained, by Citizen Lab
- Digital Transnational Repression Explained: Activists, by Citizen Lab
- Gender-based Digital Transnational Repression Explained, by Citizen Lab
- Responding to Transnational Repression - recorded panel discussion from Dec 2021
- Transnational Repression: The Long Arm of Authoritarianism (parts 1 and 2) - recorded panel discussion from Sept/Oct 2022.
- Defending Democracy in Exile: Policy Responses to Transnational Repression by Freedom House
Reports
Research Database on Transnational Repression (TNR)
https://tnr-research.uwazi.io/en/
This collection of research reports can help human rights defenders better understand:
- Which TNR threats are likely or possible based on the existing evidence, to determine appropriate mitigation techniques
- Which TNR threats are unlikely, in order to alleviate fear
- What exiled HRDs can expect from a host country in terms of protection measures
- Existing campaigns to strengthen protection for exiled HRDs
This database was developed and curated by the Center for Victims of Torture. To contribute to this research, email [email protected]
Reports in this database include:
- Defending Democracy in Exile: Policy Responses to Transnational Repression, report by Freedom House
- Silencing Across Borders: Transnational Repression and Digital Threats Against Exiled Activists, report by Marcus Michaelsen
- Psychological and Emotional War: Digital Transnational Repression in Canada, report by Citizen Lab
- Going after the family: Transnational repression and the proxy punishment of Middle Eastern diasporas, article co-authored with Dana M. Moss & Gillian Kennedy.
Books
The Arab Spring Abroad: Diaspora Activism against Authoritarian Regimes, book by Dana Moss. You can download this book for free here: https://www.cambridge.org/core/books/arab-spring-abroad/D7EC15ED46D37A2DB8CDDB83F06CC591#overview
TNR threat categories
- Unlawful deportation, extradition, rendition, Interpol abuse, legal cases
- Examples: trial in absentia, initiate a criminal case in order to carry out deportation or extradition
- Physical intimidation, assault, etc
- Coercion by proxy / Threats against in-country relatives
- Examples: Opponent may harass, threaten, prosecute, and imprison family or colleagues
- Account and device hacking
- Examples: Opponents hack social media or email accounts
- Monitoring and surveillance
- Examples: Tracking and identifying HRDs, monitor family members’ conversations so they can access communications, infiltration of network through informants, surveil/monitor communication to ascertain location and activities
- Slander, harassment, disinformation campaigns
- Examples: Smear campaigns, hate speech and harassment in social media
TNR mitigation techniques
Threat category | Mitigation techniques | Resources and research |
---|---|---|
Unlawful deportation, extradition, rendition, Interpol abuse, legal cases | ||
Physical intimidation, assault, etc | Personal safety awareness (see Umbrella app) | |
Coercion by proxy / Threats against in-country relatives | Going after the family: Transnational repression and the proxy punishment of Middle Eastern diasporas (Moss, Michaelsen, Kennedy (2022)) | |
Account and device hacking | ||
Monitoring and surveillance |
|
|
Slander, harassment, disinformation campaigns | How to deal with online harassment and threats |