Research on transnational repression: Difference between revisions
From TCU Wiki
→TNR threat categories: added physical intimidation |
|||
Line 35: | Line 35: | ||
== TNR threat categories == | == TNR threat categories == | ||
* Unlawful deportation, extradition, rendition, | * Unlawful deportation, extradition, rendition, Interpol abuse, legal cases | ||
** | ** Examples: trial in absentia, initiate a criminal case in order to carry out deportation or extradition | ||
*Physical intimidation, assault, etc | *Physical intimidation, assault, etc | ||
* Coercion by proxy / Threats against in-country relatives | * Coercion by proxy / Threats against in-country relatives | ||
** Opponent may harass, threaten, prosecute, and imprison family or colleagues | ** Examples: Opponent may harass, threaten, prosecute, and imprison family or colleagues | ||
*Account and device hacking | *Account and device hacking | ||
** Opponents hack social media or email accounts | ** Examples: Opponents hack social media or email accounts | ||
* Monitoring and surveillance | * Monitoring and surveillance | ||
** Tracking and identifying HRDs | ** Examples: Tracking and identifying HRDs, monitor family members’ conversations so they can access communications, infiltration of network through informants, surveil/monitor communication to ascertain location and activities | ||
* Slander, harassment, disinformation campaigns | * Slander, harassment, disinformation campaigns | ||
** Smear campaigns, hate speech and harassment in social media | ** Examples: Smear campaigns, hate speech and harassment in social media | ||
Revision as of 20:34, 17 December 2024
Videos
- Digital Transnational Repression Explained, by Citizen Lab
- Digital Transnational Repression Explained: Activists, by Citizen Lab
- Gender-based Digital Transnational Repression Explained, by Citizen Lab
- Responding to Transnational Repression - recorded panel discussion from Dec 2021
- Transnational Repression: The Long Arm of Authoritarianism (parts 1 and 2) - recorded panel discussion from Sept/Oct 2022.
- Defending Democracy in Exile: Policy Responses to Transnational Repression by Freedom House
Reports
Research Database on Transnational Repression (TNR)
https://tnr-research.uwazi.io/en/
This collection of research reports can help human rights defenders better understand:
- Which TNR threats are likely or possible based on the existing evidence, to determine appropriate mitigation techniques
- Which TNR threats are unlikely, in order to alleviate fear
- What exiled HRDs can expect from a host country in terms of protection measures
- Existing campaigns to strengthen protection for exiled HRDs
This database was developed and curated by the Center for Victims of Torture. To contribute to this research, email [email protected]
Reports in this database include:
- Defending Democracy in Exile: Policy Responses to Transnational Repression, report by Freedom House
- Silencing Across Borders: Transnational Repression and Digital Threats Against Exiled Activists, report by Marcus Michaelsen
- Psychological and Emotional War: Digital Transnational Repression in Canada, report by Citizen Lab
- Going after the family: Transnational repression and the proxy punishment of Middle Eastern diasporas, article co-authored with Dana M. Moss & Gillian Kennedy.
Books
The Arab Spring Abroad: Diaspora Activism against Authoritarian Regimes, book by Dana Moss. You can download this book for free here: https://www.cambridge.org/core/books/arab-spring-abroad/D7EC15ED46D37A2DB8CDDB83F06CC591#overview
TNR threat categories
- Unlawful deportation, extradition, rendition, Interpol abuse, legal cases
- Examples: trial in absentia, initiate a criminal case in order to carry out deportation or extradition
- Physical intimidation, assault, etc
- Coercion by proxy / Threats against in-country relatives
- Examples: Opponent may harass, threaten, prosecute, and imprison family or colleagues
- Account and device hacking
- Examples: Opponents hack social media or email accounts
- Monitoring and surveillance
- Examples: Tracking and identifying HRDs, monitor family members’ conversations so they can access communications, infiltration of network through informants, surveil/monitor communication to ascertain location and activities
- Slander, harassment, disinformation campaigns
- Examples: Smear campaigns, hate speech and harassment in social media