Research on transnational repression: Difference between revisions

From TCU Wiki
Kristin1 (talk | contribs)
added database, added threat categories
Kristin1 (talk | contribs)
→‎TNR threat categories: added physical intimidation
Line 39: Line 39:
** Opponent may initiate a criminal case in order to carry out deportation or extradition
** Opponent may initiate a criminal case in order to carry out deportation or extradition
** Opponent may use Interpol notice in order to carry out deportation or extradition
** Opponent may use Interpol notice in order to carry out deportation or extradition
* Account and device hacking
*Physical intimidation, assault, etc
** Opponents hack social media or email accounts
* Coercion by proxy / Threats against in-country relatives
* Coercion by proxy / Threats against in-country relatives
** Opponent may harass, threaten, prosecute, and imprison family or colleagues
** Opponent may harass, threaten, prosecute, and imprison family or colleagues
*Account and device hacking
** Opponents hack social media or email accounts
* Monitoring and surveillance
* Monitoring and surveillance
** Tracking and identifying HRDs
** Tracking and identifying HRDs
Line 48: Line 49:
** Infiltration of network through informants
** Infiltration of network through informants
** Opponent may surveil/monitor communication to ascertain location and activities
** Opponent may surveil/monitor communication to ascertain location and activities
* Slander, harassment
* Slander, harassment, disinformation campaigns
** Smear campaigns, hate speech and harassment in social media
** Smear campaigns, hate speech and harassment in social media
** Opponent may carry out a defamation and smear campaign
** Opponent may carry out a defamation and smear campaign
** Reputation marring, through informant activists
** Reputation marring, through informant activists

Revision as of 17:31, 16 December 2024

Videos

Reports

Research Database on Transnational Repression (TNR)

https://tnr-research.uwazi.io/en/

This collection of research reports can help human rights defenders better understand:

  • Which TNR threats are likely or possible based on the existing evidence, to determine appropriate mitigation techniques
  • Which TNR threats are unlikely, in order to alleviate fear
  • What exiled HRDs can expect from a host country in terms of protection measures
  • Existing campaigns to strengthen protection for exiled HRDs

This database was developed and curated by the Center for Victims of Torture. To contribute to this research, email [email protected]

Reports in this database include:

  • Defending Democracy in Exile: Policy Responses to Transnational Repression, report by Freedom House
  • Silencing Across Borders: Transnational Repression and Digital Threats Against Exiled Activists, report by Marcus Michaelsen
  • Psychological and Emotional War: Digital Transnational Repression in Canada, report by Citizen Lab
  • Going after the family: Transnational repression and the proxy punishment of Middle Eastern diasporas, article co-authored with Dana M. Moss & Gillian Kennedy.

Books

The Arab Spring Abroad: Diaspora Activism against Authoritarian Regimes, book by Dana Moss. You can download this book for free here: https://www.cambridge.org/core/books/arab-spring-abroad/D7EC15ED46D37A2DB8CDDB83F06CC591#overview

TNR threat categories

  • Unlawful deportation, extradition, rendition, interpol abuse, legal cases
    • Trial in absentia
    • Opponent may initiate a criminal case in order to carry out deportation or extradition
    • Opponent may use Interpol notice in order to carry out deportation or extradition
  • Physical intimidation, assault, etc
  • Coercion by proxy / Threats against in-country relatives
    • Opponent may harass, threaten, prosecute, and imprison family or colleagues
  • Account and device hacking
    • Opponents hack social media or email accounts
  • Monitoring and surveillance
    • Tracking and identifying HRDs
    • Opponent may monitor family members’ conversations so they can access communications
    • Infiltration of network through informants
    • Opponent may surveil/monitor communication to ascertain location and activities
  • Slander, harassment, disinformation campaigns
    • Smear campaigns, hate speech and harassment in social media
    • Opponent may carry out a defamation and smear campaign
    • Reputation marring, through informant activists