Research on transnational repression: Difference between revisions

From TCU Wiki
Kristin1 (talk | contribs)
added database, added threat categories
Kristin1 (talk | contribs)
 
(4 intermediate revisions by the same user not shown)
Line 35: Line 35:
== TNR threat categories ==
== TNR threat categories ==


* Unlawful deportation, extradition, rendition, interpol abuse, legal cases
* Unlawful deportation, extradition, rendition, Interpol abuse, legal cases
** Trial in absentia
** Examples: trial in absentia, initiate a criminal case in order to carry out deportation or extradition
** Opponent may initiate a criminal case in order to carry out deportation or extradition
*Physical intimidation, assault, etc
** Opponent may use Interpol notice in order to carry out deportation or extradition
* Account and device hacking
** Opponents hack social media or email accounts
* Coercion by proxy / Threats against in-country relatives
* Coercion by proxy / Threats against in-country relatives
** Opponent may harass, threaten, prosecute, and imprison family or colleagues
** Examples: Opponent may harass, threaten, prosecute, and imprison family or colleagues
*Account and device hacking
** Examples: Opponents hack social media or email accounts
* Monitoring and surveillance
* Monitoring and surveillance
** Tracking and identifying HRDs
** Examples: Tracking and identifying HRDs, monitor family members’ conversations so they can access communications, infiltration of network through informantssurveil/monitor communication to ascertain location and activities
** Opponent may monitor family members’ conversations so they can access communications
* Slander, harassment, disinformation campaigns
** Infiltration of network through informants
** Examples: Smear campaigns, hate speech and harassment in social media
** Opponent may surveil/monitor communication to ascertain location and activities
 
* Slander, harassment
== TNR mitigation techniques ==
** Smear campaigns, hate speech and harassment in social media
{| class="wikitable"
** Opponent may carry out a defamation and smear campaign
|+
** Reputation marring, through informant activists
!Threat category
!Mitigation techniques
!Resources and research
|-
|Unlawful deportation, extradition, rendition, Interpol abuse, legal cases
|
|
|-
|Physical intimidation, assault, etc
|Personal safety awareness (see Umbrella app)
|
|-
|Coercion by proxy / Threats against in-country relatives
|
|[https://tnr-research.uwazi.io/en/entity/s0hrhs72n7n Going after the family: Transnational repression and the proxy punishment of Middle Eastern diasporas] (Moss, Michaelsen, Kennedy (2022))
|-
|Account and device hacking
|
* [[Protect your accounts using strong passwords, pw managers, 2fa|Use two factor authentication for all accounts]]
* [[Protect your accounts using strong passwords, pw managers, 2fa|Use unique, complex passwords for all accounts]]
* [[Protect your accounts using strong passwords, pw managers, 2fa|Use a password manager to create, store and protect those passwords]]
* [[Protect your website|Protect your website from DDOS attacks]]
* [[Trusted hosting companies in the human rights community|Use a host company that you trust]]
|
|-
|Monitoring and surveillance
|
* [[Safe internet browsing using VPN and Tor browser|Use a VPN and/or Tor browser]]
* [[Use a secure messaging app]]
* [[How to collect and store information in a secure way]]
 
* [[Protect your accounts using strong passwords, pw managers, 2fa#Be aware of spear phishing attacks|Protect yourselves against (spear) phishing attacks]]
* Use a second device for sensitive activities
* [[How to mitigate your risk of being subject to Pegasus surveillance|Restart your device regularly to disrupt spyware]]
* [[Secure your devices|Use anti virus]]
* [[How to mitigate your risk of being subject to Pegasus surveillance]], and other spyware
|
|-
|Slander, harassment, disinformation campaigns
|[[How to deal with online harassment and threats]]
|
|}

Latest revision as of 20:45, 17 December 2024

Videos

Reports

Research Database on Transnational Repression (TNR)

https://tnr-research.uwazi.io/en/

This collection of research reports can help human rights defenders better understand:

  • Which TNR threats are likely or possible based on the existing evidence, to determine appropriate mitigation techniques
  • Which TNR threats are unlikely, in order to alleviate fear
  • What exiled HRDs can expect from a host country in terms of protection measures
  • Existing campaigns to strengthen protection for exiled HRDs

This database was developed and curated by the Center for Victims of Torture. To contribute to this research, email [email protected]

Reports in this database include:

  • Defending Democracy in Exile: Policy Responses to Transnational Repression, report by Freedom House
  • Silencing Across Borders: Transnational Repression and Digital Threats Against Exiled Activists, report by Marcus Michaelsen
  • Psychological and Emotional War: Digital Transnational Repression in Canada, report by Citizen Lab
  • Going after the family: Transnational repression and the proxy punishment of Middle Eastern diasporas, article co-authored with Dana M. Moss & Gillian Kennedy.

Books

The Arab Spring Abroad: Diaspora Activism against Authoritarian Regimes, book by Dana Moss. You can download this book for free here: https://www.cambridge.org/core/books/arab-spring-abroad/D7EC15ED46D37A2DB8CDDB83F06CC591#overview

TNR threat categories

  • Unlawful deportation, extradition, rendition, Interpol abuse, legal cases
    • Examples: trial in absentia, initiate a criminal case in order to carry out deportation or extradition
  • Physical intimidation, assault, etc
  • Coercion by proxy / Threats against in-country relatives
    • Examples: Opponent may harass, threaten, prosecute, and imprison family or colleagues
  • Account and device hacking
    • Examples: Opponents hack social media or email accounts
  • Monitoring and surveillance
    • Examples: Tracking and identifying HRDs, monitor family members’ conversations so they can access communications, infiltration of network through informants, surveil/monitor communication to ascertain location and activities
  • Slander, harassment, disinformation campaigns
    • Examples: Smear campaigns, hate speech and harassment in social media

TNR mitigation techniques

Threat category Mitigation techniques Resources and research
Unlawful deportation, extradition, rendition, Interpol abuse, legal cases
Physical intimidation, assault, etc Personal safety awareness (see Umbrella app)
Coercion by proxy / Threats against in-country relatives Going after the family: Transnational repression and the proxy punishment of Middle Eastern diasporas (Moss, Michaelsen, Kennedy (2022))
Account and device hacking
Monitoring and surveillance
Slander, harassment, disinformation campaigns How to deal with online harassment and threats