Digital Rights Primer: Difference between revisions

From TCU Wiki
No edit summary
 
(54 intermediate revisions by the same user not shown)
Line 2: Line 2:


== '''Digital Rights Community & Field Primer''' ==
== '''Digital Rights Community & Field Primer''' ==
[[File:Digitalrightsprimer.png|thumb|349x349px|''The digital rights primer covers the field and global community of people working at the intersection of rights and technology. ]]
[[File:Digital rights community of practice.png|alt=digital rights community of practice|thumb|467x467px|''The digital rights primer covers the field and global community of people working at the intersection of rights and technology. ]]
''<big>This primer is based on our experience and point-of-view of having worked as community conveners in the digital rights space for more than 12+ years.</big>''


''This primer is based on our experience and point-of-view of having worked in the digital rights space for more than 12+ years. It is designed for people new to the <u>digital rights field</u>, as well as adjacent practitioners—journalists, activists, technologists, funders, and policymakers—who want a grounded understanding of both the issues and the community working to address them.''
''<big>It is designed for people new to the <u>digital rights field</u>, as well as adjacent practitioners—journalists, activists, technologists, funders, and policymakers—who want a grounded understanding of the community of practice working to addressing digital rights issues.</big>''  


=== ✊🏽 First, What are Digital Rights ===
''<big>For a better understanding of digital rights as a</big>'' ''<big>rights</big>'' ''<big>concept, we strongly recommend the [https://www.digitalrights.community/blog/what-are-digital-rights What are Digital Rights] primer.</big>''<div style="clear:both;"></div>
Before we explain the field, its important we understand what digital rights are and why they matter.
== '''✊🏽 First, A Quick Introduction to Digital Rights''' ==
[[File:Technology is political.png|left|frameless|293x293px|Technology is political]]<div style="max-width:75%; margin:24px auto; padding-left:18px; border-left:4px solid #000; font-size:1.35em; font-style:italic; line-height:1.45;">
Digital rights matter because they determine who gets to participate safely in society — and who is silenced.
</div>


Digital technologies shape nearly every part of our lives — from how we communicate and work, to how governments deliver services and corporations handle our data.  
Digital technologies shape nearly every part of our lives — from how we communicate and work, to how governments deliver services and corporations handle our data. With these opportunities come risks and threats such as surveillance, censorship, and disinformation. As technologies evolve, so does the list of problems negatively impacting societies. 


With these opportunities come risks and threats such as surveillance, censorship, and disinformation. As technologies evolve, so does the list of problems negatively impacting societies.  
Digital rights are the extension of human rights into the online and technological sphere. They ensure that the freedoms we hold offline — freedom of expression, privacy, assembly, and access to information — are also protected in the digital age.  


Digital rights are the extension of human rights into the online and technological sphere. They ensure that the freedoms we hold offline — freedom of expression, privacy, assembly, and access to information — are also protected in the digital age.  
[[File:Marginalized Communities Impacted.png|alt=Marginalized Communities Impacted|416x416px|thumb|Marginalized communities experience the most acute attacks against their digital rights. ]]


==== 🫶 A Fight to Protect the Most Vulnerable ====
=== 🫶 A Fight to Protect the Most Vulnerable and Marginalized ===
The fight for digital rights affects everyone, but it weighs heavily on the most vulnerable communities around the globe. This is because technology is not neutral. The design of platforms, algorithms, and data systems reflects existing power structures, and those without power often pay the highest price.
The fight for digital rights affects everyone, but it weighs heavily on the most vulnerable communities around the globe. This is because technology is not neutral. The design of platforms, algorithms, and data systems reflects existing power structures, and those without power often pay the highest price.


This includes marginalized and vulnerable groups such as women, LGBTQI+ people, ethnic, religious and racial minorities, individuals with disabilities, and children, as well as those standing up to power, such as journalists and civil society actors. These groups are disproportionately surveilled, censored, and targeted online.  
This includes marginalized and vulnerable groups such as women, LGBTQI+ people, ethnic, religious and racial minorities, individuals with disabilities, and children, as well as those standing up to power, such as journalists and civil society actors. These groups are disproportionately surveilled, censored, and targeted online. <br><br>
</big>''<div style="clear:both;"></div>


<big>'''Digital rights matter because they determine who gets to participate safely in society — and who is silenced.'''</big>
<div style="display:flex; gap:12px; align-items:stretch; justify-content:space-between; flex-wrap:nowrap;">


We encourage you to check out the following articles to strengthen your understanding. 
<div style="flex:1 1 0; padding:15px; background:#FFF4CC; border:2px solid #FFD203; border-radius:20px;">
[[File:Policies.png|left|frameless|143x143px|protect your communities]]'''<big>Additional Resources on Digital Rights Issues</big>''' 


* [https://www.digitalrights.community/blog/what-are-digital-rights What are Digital Rights] helps you develop a more robust explanation and overview of the issues.
[https://www.digitalrights.community/blog/what-are-digital-rights What are Digital Rights] a more robust explanation of the issues.


* [https://www.digitalrights.community/blog/what-is-a-targeted-attack What are Targeted Attacks] lists how and why bad faith actors target civil society digitally,
[https://www.digitalrights.community/blog/what-is-a-targeted-attack What are Targeted Attacks] how and why bad faith actors target civil society.


* [https://www.digitalrights.community/blog/what-is-digital-literacy What is Digital Literacy and Why It Matters], provides an introduction into the basis of all digital security work.
[https://www.digitalrights.community/blog/what-is-digital-literacy What is Digital Literacy and Why It Matters], an intro of the basis.
</div>


(A further list of work or challenges addressed by the digital rights field is found below).  
<div style="flex:1 1 0; padding:15px; background:#FFF4CC; border:2px solid #FFD203; border-radius:20px;">[[File:GG (2).png|border|left|frameless|140x140px]]'''<big>How to Get Involved And Learn More About Digital Rights</big>'''


=='''How to Get Involved in the Digital Rights Community'''==
TCU's [https://www.digitalrights.community/weekly-newsletter Digital Rights Newsletter] delivers a weekly curated roundup of essential digital rights news, funding and job opportunities, community updates, upcoming events, and learning resources. This includes updates on TCU's workshops, monthly digital rights town hall meetups, and more!
[[File:Newsletter Team CommUNITY's logo.png|left|91x91px]]
</div>
Keeping yourself informed about the digital rights issues around the world is a great start. The good news: each week [https://www.digitalrights.community/home Team CommUNITY (TCU)] rounds up the most noteworthy digital rights headlines, as well as funding and job opportunities, community news, upcoming events, educational materials and much more in the [https://www.digitalrights.community/weekly-newsletter TCU Weekly Digital Rights Newsletter].
</div>
<div style="clear:both;"></div>
[[File:Calendar of events.png|left|95x95px]]
<br><br>
Another good way to get involved is to attend meetups and workshops. Not only can you learn about diverse topics, but you get to engage with individuals and organizations that are active in the community. Check out our [https://wiki.digitalrights.community/index.php?title=Calendar_of_Events Calendar of Events], for up-coming community building activities hosted by TCU. In addition, in our newsletter we have a list of upcoming digital rights events hosted by diverse organizations throughout the world.<br>
----


=='''The Emerging Community of Practice: The Digital Rights Community'''==
=='''The Emerging Community of Practice: The Digital Rights Community'''==
[[File:Digitalrightsdefenders.png|502x502px|thumb]]
[[File:Digitalrightsdefenders.png|545x545px|thumb|The Digital Rights Community is a global community of practice of diverse practitioners working at the intersection of technology and rights.]]
The ''Digital Rights Community'' is a global community of practice that works at the intersection of rights and technology and work collaboratively on issues such as:   
The ''Digital Rights Community'' is a global community of practice that works at the intersection of rights and technology and work collaboratively on issues such as:   


Line 50: Line 55:
● Community-focused approaches to issues like AI, disinformation, internet policy and governance, climate and tech, among others.  
● Community-focused approaches to issues like AI, disinformation, internet policy and governance, climate and tech, among others.  


The field brings together representatives of diverse backgrounds, professions, and experiences from around the world. This includes profiles such as movement leaders, technologists, security experts, civil society organization employees, journalists, researchers, policymakers, and policy advocates, and many others. (We have a longer list of profiles further down in the article).  
The field brings together representatives of diverse backgrounds, professions, and experiences from around the world.
 
This includes profiles such as movement leaders, technologists, security experts, civil society organization employees, journalists, researchers, policymakers, and policy advocates, and many others. (We have a longer list of profiles further down in the article).  


<big>'''The digital rights community is global and interdisciplinary because digital rights challenges are transnational and complex in scope, and require transnational solutions.'''</big>
<big>'''The digital rights community is global and interdisciplinary because digital rights challenges are transnational and complex in scope, and require transnational solutions.'''</big>
Line 56: Line 63:
Ss digital rights issues grow, so does the need to attract new talent to the community of practice. However, in recent years, historic funding cuts to the field, increased regional instability, and rising exhaustion related to years of difficult work in low resourced environments, where often people's own safety is at risk, has lead to a historic brain drain.  This poses a significant risk to the future of human rights and social justice worldwide, given the steep learning curve required to enter the field, and the combination of skills needed to be effective.   
Ss digital rights issues grow, so does the need to attract new talent to the community of practice. However, in recent years, historic funding cuts to the field, increased regional instability, and rising exhaustion related to years of difficult work in low resourced environments, where often people's own safety is at risk, has lead to a historic brain drain.  This poses a significant risk to the future of human rights and social justice worldwide, given the steep learning curve required to enter the field, and the combination of skills needed to be effective.   


=== Vulnerable Groups Are The Best-in-Breed Digital Rights Experts ===
=== Vulnerable and Targeted Communities Are the Leading Experts on Digital Rights Threats ===
[[File:Canaries in the coal mine.png|alt=canaries in the coal mine|thumb|269x269px|canaries in the coal mine|left]]
The digital rights community includes a high proportion of people from historically marginalized and vulnerable groups, precisely because these communities experience the most acute and persistent attacks on their digital rights. Their lived experience on the frontlines of surveillance, censorship, harassment, and repression makes them uniquely qualified subject-matter experts on understanding the tactics and methods used by adversaries.  
The digital rights community includes a high proportion of people from historically marginalized and vulnerable groups, precisely because these communities experience the most acute and persistent attacks on their digital rights. Their lived experience on the frontlines of surveillance, censorship, harassment, and repression makes them uniquely qualified subject-matter experts on understanding the tactics and methods used by adversaries.  


In many ways, they act as early indicators of future threats, or canaries in the coal mines - Tools and tactics are often tested on these communities first before being scaled to the wider public. Moreover, adversaries and authoritarian regimes routinely share and refine these tactics across borders, meaning that methods used against one marginalized group today often become the blueprint for targeting broader populations tomorrow.
In many ways, they act as early indicators of future threats for all of society worldwide - Tools and tactics are often tested on these communities first before being scaled to the wider public. Moreover, adversaries and authoritarian regimes routinely share and refine these tactics across borders, meaning that methods used against one marginalized group today in one country often become the blueprint for targeting broader populations tomorrow in other countries.  


Marginalized and vulnerable groups that are usually attacked are religious and ethnic minorities from the Global Majority, BIPOC from the Global North, and LGBTQ+ and women from around the world, particularly in places where it may be illegal to be themselves.  
Marginalized and vulnerable groups that are usually targeted include religious and ethnic minorities from the Global Majority, BIPOC from the Global North, and LGBTQ+ and women from around the world, particularly in places where it may be illegal to be themselves.


== '''The Cultural Values and Challenges Inherited from Hacker and FLOSS Spaces''' ==
== '''The Cultural Values and Challenges Inherited from Hacker and FLOSS Spaces''' ==
The digital rights field has its origins in open-source/FLOSS technology and hacker spaces. As both architects and builders of technology, they were the first to identify how digital systems could be exploited—by corporations, governments, and other powerful actors—to surveil, censor, discriminate against, or otherwise harm individuals and communities. Their early warnings were shaped not by theory alone, but by hands-on experience designing, breaking, and stress-testing technologies in real-world conditions.  
[[File:Hackers.png|alt=hackers|thumb|It is not uncommon to find technologists in the digital rights field who identify as [[wikipedia:White_hat_(computer_security)|white hat hackers]], or ethically motivated to help. ]]
The digital rights field has its origins in two separate but interconnected communities: open-source and free/libre open-source software (FLOSS) technologists, and hacker spaces. As both architects and builders of technology, they were the first to identify how digital systems could be exploited—by corporations, governments, and other powerful actors—to surveil, censor, discriminate against, or otherwise harm individuals and communities.
 
Their early warnings were shaped not by theory alone, but by hands-on experience designing, breaking, and stress-testing technologies in real-world conditions.  


Notably, hacker communities tend to attract systems thinkers who have long understood that privacy, security, and anonymity are not optional features, but essential safeguards in a digitally mediated world. As a result, it is not uncommon to find technologists in the digital rights field who identify as [[wikipedia:White_hat_(computer_security)|white hat hackers]] and/or [[wikipedia:Hacktivism|hacktivists]] —individuals who use hacking or other digital tactics as a form of political or social activism.   
Hacker communities have long understood that privacy, security, and anonymity are not optional features, but essential safeguards in a digitally mediated world. As a result, it is not uncommon to find technologists in the digital rights field who identify as [[wikipedia:White_hat_(computer_security)|white hat hackers]] and/or [[wikipedia:Hacktivism|hacktivists]] —individuals who use hacking or other digital tactics as a form of political or social activism.   


It is important to note, however, that not all hackers or open-source technologists are concerned with digital rights or motivated by the public interest; like any community, these spaces encompass a wide range of profiles.
It is important to note, however, that not all hackers or open-source technologists are concerned with digital rights or motivated by the public interest; like any community, these spaces encompass a wide range of profiles. For example, [[wikipedia:Black_hat_(computer_security)|black hat hackers]] violate laws and ethical standards for nefarious purposes such as cybercrime or cyberwarfare.  


=== Influencing How Technology is Shaped and the Culture is Made Security-Conscious ===
=== Influencing How Technology is Shaped and the Culture is Made Security-Conscious ===
This lineage also helps explain why Internet Freedom was a concept first embraced by the digital rights community - it was clear early on that an open, interoperable, and globally accessible network was essential to protecting freedom of expression, access to information, and the ability to organize and participate in public life. Internet freedom emerged as a framework that connected technical design choices with human rights outcomes, emphasizing that the structure of the internet itself could either enable or constrain fundamental freedoms.  
[[File:TOR logo.png|left|thumb|320x320px|Tor is widely recognized as one of the most robust and interference-resistant public-interest tools for anonymity and privacy.]]
This lineage also helps explain why Internet Freedom was a concept embraced by the digital rights community - it was clear early on that an open, interoperable, and globally accessible network was essential to protecting freedom of expression, access to information, and the ability to organize and participate in public life.
 
Internet freedom emerged as a framework that connected technical design choices with human rights outcomes, emphasizing that the structure of the internet itself could either enable or constrain fundamental freedoms.  


This same lineage explains why tools developed and/or championed by these communities—such as the Tor Project—have played a foundational role in shaping the digital rights ecosystem. Tor is not only widely recognized as one of the most robust and interference-resistant public-interest tools for anonymity and privacy; through its research and development, it has influenced an entire generation of privacy-preserving technologies, threat models, and security practices. Its design principles reflect values central to the digital rights movement: decentralization, resilience against censorship, and protection for users operating in hostile or high-risk conditions  
This same lineage explains why tools developed and/or championed by these communities—such as the Tor Project—have played a foundational role in shaping the digital rights ecosystem. Tor is not only widely recognized as one of the most robust and interference-resistant public-interest tools for anonymity and privacy; through its research and development, it has influenced an entire generation of privacy-preserving technologies, threat models, and security practices. Its design principles reflect values central to the digital rights movement: decentralization, resilience against censorship, and protection for users operating in hostile or high-risk conditions  


=== The Cultural Values ===
=== The Cultural Values ===
Together, hackers and FLOSS technologists have helped define both the technical and ethical foundations of digital rights work. Their contributions continue to inform how civil society responds to emerging threats—from mass surveillance and internet shutdowns to AI-enabled repression—ensuring that the field remains grounded in practical, user-centered, and rights-respecting approaches to technology. Values include:  
Together, hackers and FLOSS technologists have helped define both the technical and some of the ethical foundations of digital rights work. Their contributions continue to inform how civil society responds to emerging threats—from mass surveillance and internet shutdowns to AI-enabled repression—ensuring that the field remains grounded in practical, user-centered, and rights-respecting approaches to technology. Values include:  
 
<div style=" display:grid; gap:12px; grid-template-columns:repeat(auto-fit, minmax(clamp(160px, 23%, 240px), 1fr)); align-items:start;">


==== '''Decentralized versus Centralized Methods of Cultivating Community''' ====
<div style="border:1px solid #6ED7D9; border-radius:8px; padding:10px; background:#F3E8FF; box-sizing:border-box;"><br>'''Decentralized vs. Centralized Community Models'''
Technology teaches us that distributed systems are harder to censor, surveil, or shut down, making them more resilient in hostile environments. The same applies to human networks, who are more resilient, adaptive, and effective when they are decentralized and supported by multiple, interconnected nodes of trust and collaboration. Decentralized community models reduce single points of failure, distribute leadership and knowledge, and enable communities to continue functioning even when individual nodes are disrupted or under attack.
Just as distributed technologies are more resilient and secure, so are decentralized communities. By distributing leadership, trust, and knowledge across interconnected nodes, single points of failure are reduced. This allow communities to endure even when parts of the network are disrupted.
</div>


==== '''Transparency and Verifiability for both Human and Tech Networks''' ====
<div style="border:1px solid #6ED7D9; border-radius:8px; padding:10px; background:#F3E8FF; box-sizing:border-box;"><br>'''Transparency and Verifiability'''<br><br>Open-source tech is more secure because vulnerabilities can be identified and fixed by many, rather than hidden behind secrecy. These principles extend to communities: transparency builds shared understanding, while verifiability allows people to independently confirm information —strengthening trust through evidence, not blind faith
In the context of technology, open source tech are more secure because vulnerabilities can be identified and fixed by a broad community, rather than hidden behind secrecy or proprietary claims. These values extend into how projects are governed, decisions are made, and relationships are built within communities. Transparency creates shared understanding, while verifiability ensures that claims, processes, and information can be independently confirmed, and thus trust strengthened - not because  people are asked to believe blindly, but because they have the ability to verify what is being shared.
</div>


==== '''Freedom and User Autonomy''' ====
<div style="border:1px solid #6ED7D9; border-radius:8px; padding:10px; background:#F3E8FF;; box-sizing:border-box;"><br>'''Freedom and Autonomy'''<br><br>Freedom in technology means preserving user agency—ensuring people can understand, choose, and adapt the tools they rely on, rather than being constrained by opaque or coercive systems that may conceal harmful functions. Technology should empower users, not lock them into closed systems they cannot inspect, control, or modify.  
People should be able to use, modify, and understand the tools they rely on. Technology should empower users, not lock them into systems they cannot inspect or control.
</div>


==== '''Privacy and Anonymity by Design''' ====
<div style="border:1px solid #6ED7D9; border-radius:8px; padding:10px; background:#F3E8FF; box-sizing:border-box;"><br>'''Privacy by Design'''<br><br>Privacy is a fundamental right and should be a core design principle of any technology. Tools should minimize invasive data collection and retention, limit unnecessary data retention, and supporting anonymity. For journalists and rights defenders, it allows for the ability to  communicate, organize, and participate in public life safely and without fear of retaliation </div>
Privacy is a fundamental right, not a feature to be traded away. Many groups prioritize minimizing data collection and building tools that protect anonymity, especially for people at risk.


==== '''Collaboration and Knowledge Sharing''' ====
<div style="border:1px solid #6ED7D9; border-radius:8px; padding:10px; background:#F3E8FF; box-sizing:border-box;"><br>'''Collaboration and Knowledge Sharing'''<br><br>Open collaboration, peer review, and shared learning are prioritized over competition or siloed expertise. Meaningful progress happens through collective effort, where knowledge is openly exchanged and diverse perspectives are actively included, strengthening both solutions and the communities that build them.
Progress happens through collective effort. Open collaboration, peer review, and shared learning are preferred over competition or siloed expertise.
</div>


==== '''Experimentation and Curiosity''' ====
<div style="border:1px solid #6ED7D9; border-radius:8px; padding:10px; background:#F3E8FF; box-sizing:border-box;"><br>'''Resisting Abuse of Power'''<br><br>Systems that centralize power and enable harm must be questioned, audited, and challenged. People should be free to communicate, organize, and share information —without surveillance, coercion, or interference.  
Tinkering, testing boundaries, and learning by doing is highly valued. Failure is often treated as a step toward better understanding and stronger systems.
</div>


==== '''Resistance to Abuse of Power and Public Interest Orientation''' ====
<div style="border:1px solid #6ED7D9; border-radius:8px; padding:10px; background:#F3E8FF; box-sizing:border-box;"><br>'''Serving the Public Good'''<br><br>Technology should improve the human condition and serve the common good. In the digital rights context, this means building and sustaining tools, infrastructure, and support systems that enable journalists, human rights defenders, and communities to safely inform, organize, and serve their societies. <br>
The community is motivated by a desire to challenge surveillance, censorship, monopolization, and other abuses of technological or political power. The overall purpose of the work is to serve the common good, especially providing support to journalists, defenders, and communities operating under risk.<br><br>
</div>
</div>


=== '''The Cultural Challenges''' ===
=== '''The Cultural Challenges''' ===
Line 104: Line 121:
The good news is that these challenges have been increasingly recognized and actively addressed over the past decade, though the work remains ongoing. Within this context, Team CommUNITY’s efforts have played a critical role in supporting the growth of the field in more equitable and inclusive ways, while also helping to shift norms toward healthier, more sustainable community cultures. If you would like to learn more about this history and the work underway, we invite you to reach out to us at [email protected].
The good news is that these challenges have been increasingly recognized and actively addressed over the past decade, though the work remains ongoing. Within this context, Team CommUNITY’s efforts have played a critical role in supporting the growth of the field in more equitable and inclusive ways, while also helping to shift norms toward healthier, more sustainable community cultures. If you would like to learn more about this history and the work underway, we invite you to reach out to us at [email protected].


== '''The Introduction of State Actors and the Human Rights Field''' ==
== '''The Human Rights Field and Multilateral Government Entities''' ==
 
Digital Rights is now part of the human rights field, while still being an emerging field of practice.
 


=='''The Growing List of Digital Rights Challenges'''==
=='''The Growing List of Digital Rights Challenges'''==

Latest revision as of 10:51, 17 December 2025


Digital Rights Community & Field Primer

digital rights community of practice
The digital rights primer covers the field and global community of people working at the intersection of rights and technology.

This primer is based on our experience and point-of-view of having worked as community conveners in the digital rights space for more than 12+ years.

It is designed for people new to the digital rights field, as well as adjacent practitioners—journalists, activists, technologists, funders, and policymakers—who want a grounded understanding of the community of practice working to addressing digital rights issues.

For a better understanding of digital rights as a rights concept, we strongly recommend the What are Digital Rights primer.

✊🏽 First, A Quick Introduction to Digital Rights

Technology is political
Technology is political

Digital rights matter because they determine who gets to participate safely in society — and who is silenced.

Digital technologies shape nearly every part of our lives — from how we communicate and work, to how governments deliver services and corporations handle our data. With these opportunities come risks and threats such as surveillance, censorship, and disinformation. As technologies evolve, so does the list of problems negatively impacting societies.

Digital rights are the extension of human rights into the online and technological sphere. They ensure that the freedoms we hold offline — freedom of expression, privacy, assembly, and access to information — are also protected in the digital age.

Marginalized Communities Impacted
Marginalized communities experience the most acute attacks against their digital rights.

🫶 A Fight to Protect the Most Vulnerable and Marginalized

The fight for digital rights affects everyone, but it weighs heavily on the most vulnerable communities around the globe. This is because technology is not neutral. The design of platforms, algorithms, and data systems reflects existing power structures, and those without power often pay the highest price.

This includes marginalized and vulnerable groups such as women, LGBTQI+ people, ethnic, religious and racial minorities, individuals with disabilities, and children, as well as those standing up to power, such as journalists and civil society actors. These groups are disproportionately surveilled, censored, and targeted online.

protect your communities
protect your communities
Additional Resources on Digital Rights Issues

What are Digital Rights a more robust explanation of the issues.

What are Targeted Attacks how and why bad faith actors target civil society.

What is Digital Literacy and Why It Matters, an intro of the basis.

How to Get Involved And Learn More About Digital Rights

TCU's Digital Rights Newsletter delivers a weekly curated roundup of essential digital rights news, funding and job opportunities, community updates, upcoming events, and learning resources. This includes updates on TCU's workshops, monthly digital rights town hall meetups, and more!



The Emerging Community of Practice: The Digital Rights Community

The Digital Rights Community is a global community of practice of diverse practitioners working at the intersection of technology and rights.

The Digital Rights Community is a global community of practice that works at the intersection of rights and technology and work collaboratively on issues such as:

● Holistic digital security and protection of civil society;

● Counteracting online censorship and surveillance;

● Community-focused approaches to issues like AI, disinformation, internet policy and governance, climate and tech, among others.

The field brings together representatives of diverse backgrounds, professions, and experiences from around the world.

This includes profiles such as movement leaders, technologists, security experts, civil society organization employees, journalists, researchers, policymakers, and policy advocates, and many others. (We have a longer list of profiles further down in the article).

The digital rights community is global and interdisciplinary because digital rights challenges are transnational and complex in scope, and require transnational solutions.

Ss digital rights issues grow, so does the need to attract new talent to the community of practice. However, in recent years, historic funding cuts to the field, increased regional instability, and rising exhaustion related to years of difficult work in low resourced environments, where often people's own safety is at risk, has lead to a historic brain drain. This poses a significant risk to the future of human rights and social justice worldwide, given the steep learning curve required to enter the field, and the combination of skills needed to be effective.

Vulnerable and Targeted Communities Are the Leading Experts on Digital Rights Threats

canaries in the coal mine
canaries in the coal mine

The digital rights community includes a high proportion of people from historically marginalized and vulnerable groups, precisely because these communities experience the most acute and persistent attacks on their digital rights. Their lived experience on the frontlines of surveillance, censorship, harassment, and repression makes them uniquely qualified subject-matter experts on understanding the tactics and methods used by adversaries.

In many ways, they act as early indicators of future threats for all of society worldwide - Tools and tactics are often tested on these communities first before being scaled to the wider public. Moreover, adversaries and authoritarian regimes routinely share and refine these tactics across borders, meaning that methods used against one marginalized group today in one country often become the blueprint for targeting broader populations tomorrow in other countries.

Marginalized and vulnerable groups that are usually targeted include religious and ethnic minorities from the Global Majority, BIPOC from the Global North, and LGBTQ+ and women from around the world, particularly in places where it may be illegal to be themselves.

The Cultural Values and Challenges Inherited from Hacker and FLOSS Spaces

hackers
It is not uncommon to find technologists in the digital rights field who identify as white hat hackers, or ethically motivated to help.

The digital rights field has its origins in two separate but interconnected communities: open-source and free/libre open-source software (FLOSS) technologists, and hacker spaces. As both architects and builders of technology, they were the first to identify how digital systems could be exploited—by corporations, governments, and other powerful actors—to surveil, censor, discriminate against, or otherwise harm individuals and communities.

Their early warnings were shaped not by theory alone, but by hands-on experience designing, breaking, and stress-testing technologies in real-world conditions.

Hacker communities have long understood that privacy, security, and anonymity are not optional features, but essential safeguards in a digitally mediated world. As a result, it is not uncommon to find technologists in the digital rights field who identify as white hat hackers and/or hacktivists —individuals who use hacking or other digital tactics as a form of political or social activism.

It is important to note, however, that not all hackers or open-source technologists are concerned with digital rights or motivated by the public interest; like any community, these spaces encompass a wide range of profiles. For example, black hat hackers violate laws and ethical standards for nefarious purposes such as cybercrime or cyberwarfare.

Influencing How Technology is Shaped and the Culture is Made Security-Conscious

Tor is widely recognized as one of the most robust and interference-resistant public-interest tools for anonymity and privacy.

This lineage also helps explain why Internet Freedom was a concept embraced by the digital rights community - it was clear early on that an open, interoperable, and globally accessible network was essential to protecting freedom of expression, access to information, and the ability to organize and participate in public life.

Internet freedom emerged as a framework that connected technical design choices with human rights outcomes, emphasizing that the structure of the internet itself could either enable or constrain fundamental freedoms.

This same lineage explains why tools developed and/or championed by these communities—such as the Tor Project—have played a foundational role in shaping the digital rights ecosystem. Tor is not only widely recognized as one of the most robust and interference-resistant public-interest tools for anonymity and privacy; through its research and development, it has influenced an entire generation of privacy-preserving technologies, threat models, and security practices. Its design principles reflect values central to the digital rights movement: decentralization, resilience against censorship, and protection for users operating in hostile or high-risk conditions

The Cultural Values

Together, hackers and FLOSS technologists have helped define both the technical and some of the ethical foundations of digital rights work. Their contributions continue to inform how civil society responds to emerging threats—from mass surveillance and internet shutdowns to AI-enabled repression—ensuring that the field remains grounded in practical, user-centered, and rights-respecting approaches to technology. Values include:


Decentralized vs. Centralized Community Models

Just as distributed technologies are more resilient and secure, so are decentralized communities. By distributing leadership, trust, and knowledge across interconnected nodes, single points of failure are reduced. This allow communities to endure even when parts of the network are disrupted.


Transparency and Verifiability

Open-source tech is more secure because vulnerabilities can be identified and fixed by many, rather than hidden behind secrecy. These principles extend to communities: transparency builds shared understanding, while verifiability allows people to independently confirm information —strengthening trust through evidence, not blind faith

Freedom and Autonomy

Freedom in technology means preserving user agency—ensuring people can understand, choose, and adapt the tools they rely on, rather than being constrained by opaque or coercive systems that may conceal harmful functions. Technology should empower users, not lock them into closed systems they cannot inspect, control, or modify.

Privacy by Design

Privacy is a fundamental right and should be a core design principle of any technology. Tools should minimize invasive data collection and retention, limit unnecessary data retention, and supporting anonymity. For journalists and rights defenders, it allows for the ability to communicate, organize, and participate in public life safely and without fear of retaliation

Collaboration and Knowledge Sharing

Open collaboration, peer review, and shared learning are prioritized over competition or siloed expertise. Meaningful progress happens through collective effort, where knowledge is openly exchanged and diverse perspectives are actively included, strengthening both solutions and the communities that build them.

Resisting Abuse of Power

Systems that centralize power and enable harm must be questioned, audited, and challenged. People should be free to communicate, organize, and share information —without surveillance, coercion, or interference.

Serving the Public Good

Technology should improve the human condition and serve the common good. In the digital rights context, this means building and sustaining tools, infrastructure, and support systems that enable journalists, human rights defenders, and communities to safely inform, organize, and serve their societies.

The Cultural Challenges

This lineage has introduced a number of structural and cultural challenges within the digital rights field, particularly related to equity. This is not surprising, given that open-source and hacker communities have historically exhibited lower levels of representation than the broader technology sector.

The good news is that these challenges have been increasingly recognized and actively addressed over the past decade, though the work remains ongoing. Within this context, Team CommUNITY’s efforts have played a critical role in supporting the growth of the field in more equitable and inclusive ways, while also helping to shift norms toward healthier, more sustainable community cultures. If you would like to learn more about this history and the work underway, we invite you to reach out to us at [email protected].

The Human Rights Field and Multilateral Government Entities

Digital Rights is now part of the human rights field, while still being an emerging field of practice.

The Growing List of Digital Rights Challenges

It is impossible to list the growing number of issues and challenges addressed by the digital rights community because as technology use grows in our societies, so do the problems associated with it. However, to-date, most problems can be categorized under the following buckets:

  • Countering Online Censorship and Surveillance: Two challenges that continue to become more sophisticated as adversaries improve the tools and tactics they use repress and silence groups and journalists, and close civil society spaces. Notably, non-technical tactics are also used, such as online harassment and transnational repression. Most recently, we are also seeing an increase of sophisticated spyware used by authoritarian governments on the local, regional, and national level.
  • Protection of Civil Society, Journalists, and Defenders: Especially relating to the cybersecurity issues and attacks they face. This includes designing both trustworthy open source privacy and security tools (Tor and Signal being the most known), as well as tactics.
  • Community-focused approaches to issues like AI, disinformation, internet policy and governance, climate and tech; among others.
  • Infrastructure Ownership & Design: This includes advocating for and advancing the creation of independent infrastructures, such as mesh networks, that are community owned and driven.
  • Network Interference: This can include Internet shutdowns to computation or information propaganda, such as disinformation, done either by humans or artificial intelligence.
  • Legal Persecution: In the last few years, we have seen an increase in laws that criminalize online behaviors, used to persecute people. For example, using encryption technology, or online expression.
  • Governance: Attempts to sway international norms, and standards governing how the Internet functions and connects globally, for example, coordinated attacks on encryption, or advancing extreme national data sovereignty laws.

Samples of work conducted by Digital Rights Defenders:

  • Creating technology solutions that allow users to circumvent online surveillance and censorship.
  • Securing movements and journalists through holistic and digital security training.
  • Advocacy, for example fighting draconian laws that penalize the use of encryption or tools like VPNs.
  • Pushing for industry standards. For example, advocating in international government bodies overseeing the actual infrastructure of the Internet, pushing for systems to encourage the privacy and security of users.
  • Researching and mapping emerging challenges, such as the impact of AI, disinformation, and smart cities.
  • Creating collective action around issues like platform accountability, or issues like shadow banning.

However, as more and more issues arise at the intersection of human rights and technology, the list of work becomes longer for digital rights.

The Organizations/Projects

The list is long and diverse, but below we are including some categories and examples for your understanding:


The Profiles

Digital Rights Defenders come from all regions, disciplines, and backgrounds. They work on different aspects of digital rights, but ultimately are trying to protect and advocate for activists, journalists, and civil societies from attacks and risks. Here are some common profiles we see:

  • Movement Leaders
  • Journalists & Media Workers
  • Community Organizers
  • Security Professionals
  • Digital Security Trainers
  • Software Developers
  • Tool Makers (UX, designers, etc.)
  • System Administration and Network Experts
  • Academic Researchers
  • Community Researchers
  • Policy Advocates
  • Policymakers
  • Technologists that come in different shapes, sizes, and skill sets. For example, one can be a technologist who focuses on analyzing the impact tech has on society.
  • Diverse professionals working at different types of civil society organizations including grassroots organizations, and large international NGOs.

Want to Work In Digital Rights? Things You Should Know

For many of us working in digital rights, we are passionate about the work we do - the significant need there is for it, many times in our own personal communities, for the impact it has, which many times is global in scale, and the amount of creativity and intellectual capital needed to address emerging challenges, which are representative of the most urgent and next-generation issues affecting humankind. In addition, the number of unique and interesting individuals attracted to this work, who truly are some of the best system thinkers found on earth.

Check out our Digital Rights Job Board, which gets updated with opportunities on a weekly basis!

A Young, Emerging Community Experiencing Growing Pains

As digital rights is an emerging field, digital rights defenders have to navigate many of the growing pains associated with startups and common challenges found in the nonprofit sector. Things to keep in mind:

  • Most digital rights organizations are small and less than 10 years in age.
  • Funding is not stable, and most traditional funders are still scared of funding in what they consider a technology area, despite movements, journalists, and citizens experiencing more diverse attacks against their digital rights.
  • There is no formalized career path, and many individuals achieve expertise in the field through a combination of self study, actively seeking opportunities, and sheer luck that employment roles open up that fit their profiles. Also, many individuals are “unicorns'' making it difficult to onboard new talent. For example, in many smaller organizations, which make up a large chunk of entities in the space, people wear multiple hats out of necessity. This means that organizational leaders sometimes face difficulties scaling up or hiring effectively.

This is one of the reasons community engagement projects like Team CommUNITY are so needed - they help onboard new talent and communities.

Sometimes there are pathways through program management roles (for example at medium to large nonprofits), or through more specialized expertise in specific sub-fields (for example, researchers at universities focusing on security).

In 2025, severe funding cuts have impacted a large majority of organizations in the space across the globe. Until this funding crisis is resolved, we suspected most opportunities will fall within the technical realm (developer, sys admin, etc) or development realm (fundraising, partnership development etc).

History: How Did Digital Rights Start?

Digital Rights evolved alongside the growth of technology and the Internet. The massification of the Internet began in the 90’s. While this brought incredible improvements, it also marked the rise of online surveillance, censorship, and the privatization of digital resources. Around this time, people started to recognize the importance of protecting various rights and freedoms in the digital realm, similar to those in the physical world.

For the most part, in the early days, most people that instigated this movement were part of technology groups, particularly open source technology communities, which were also core to movements like Internet Freedom and Free Culture. This is because they were also the first to see the rise of cyber threats, data breaches, and privacy violations that showcased the need for protecting personal information online.

Not surprisingly, many of the earliest people addressing digital rights challenges, were technologists that were part of communities such as the 2600 hacker group, which published a popular magazine that covered digital rights issues, or adjacent issues such as freedom of information and expression and speech. They also played a key role in promoting security awareness among the public, and emphasized the importance of understanding security vulnerabilities to protect against potential threats.

Since then, many technologists, directly or indirectly associated with these groups, have played a leading role in creating “circumvention tools,” which are technology tools that circumvent surveillance and censorship.

The 2000's and Now

By the early 2000’s we also began to see the involvement of more social justice oriented groups, as more communities throughout the world began to experience oppression online. Notably, in 2001, the Association of Progressive Communications (APC) published the Internet Rights charter, which served as an Internet Bill of Rights, which served as a catalyst to introduce human rights groups into the discussion. APC was well situated for this, given that it was considered a pioneer in the use of information and communication technology (ICT) for civil society.

Despite these efforts, however, digital rights continued and the impact of technology on societies continued to be enigmatic for the general public and non-technologists. In addition, precisely because of its origin story, the digital rights field itself also began inheriting many of the internal challenges found in the technology field: lack of diversity and equity, a high barrier to entry, and few safe and secure spaces for minority groups.

In the early 2010s, we began to see the digital rights field begin to grow and professionalize as new and significant government money was being injected into Internet Freedom, mostly coming from the US. A large percentage of this money was directed to funding open source technology tools, which means the code was open for all to see and licensed under a copyleft license. The motivation behind this was to promote the free flow and access to information online, which the US government saw as the foundation of stronger democratic societies as they felt it helped citizens hold their government accountable, generate new ideas, and encourage creativity and entrepreneurship.

However, the availability of this new US backed funding was also in reaction to the rise in online surveillance and censorship across the world, which has only worsened throughout the years. This is because authoritarian actors have continued to increase their investment into weaponizing technology to be a tool of oppression.

Alternatively, around this same time, we also begin to see more and more authoritarian adversaries begin to “discover” digital. Either because of the powerful mobilization capacity it provides their citizens (Arab Spring) or because they begin to invest in tactics and strategies that allow them to weaponize the Internet and digital communications. However, some authoritarian regimes were early adopters. China, for example, began to develop their Great Firewall in the late 1990s, which represented extensive censorship and internet control measures.

By 2012, the digital rights community began work to grow and diverse the community for two main reasons:

  • Ensuring diverse representation were part of strategic conversations influencing the shape and priorities of Internet Freedom, digital rights, and technology standards. Most circumvention tools and strategies being created by technologists in the “North” were not working for at-risk users in the “South”.
  • More and more groups around the world were starting to directly experience digital rights issues, mostly related to surveillance and censorship. This meant more talent was needed to meet demand.

Since then, the digital rights community has grown to have networks in virtually every region and (sometimes) country in the world. This also reflects the growing number of bad actors that are using digital to oppress and attack a significant growing list of movements, civil society organizations, journalists and citizens. In addition, the evolution of tactics and strategies they are using.

In 2023, for example, common problems, on top of historical surveillance and censorship, include Internet shutdowns, online harassment, disinformation, and biometrics, among others. Much of this evolution is because adversaries have begun to share knowledge, repressive legislative templates, tactics, and resources amongst themselves.

Please contact us at [email protected] if you have any feedback about our Digital Rights Primer.