Research on transnational repression: Difference between revisions

From TCU Wiki
Kristin1 (talk | contribs)
Kristin1 (talk | contribs)
Line 46: Line 46:
* Slander, harassment, disinformation campaigns
* Slander, harassment, disinformation campaigns
** Examples: Smear campaigns, hate speech and harassment in social media
** Examples: Smear campaigns, hate speech and harassment in social media
== TNR mitigation techniques ==
{| class="wikitable"
|+
!Threat category
!Mitigation techniques
!Resources and research
|-
|Unlawful deportation, extradition, rendition, Interpol abuse, legal cases
|
|
|-
|Physical intimidation, assault, etc
|
|
|-
|Coercion by proxy / Threats against in-country relatives
|
|[https://tnr-research.uwazi.io/en/entity/s0hrhs72n7n Going after the family: Transnational repression and the proxy punishment of Middle Eastern diasporas] (Moss, Michaelsen, Kennedy (2022))
|-
|Account and device hacking
|
* [[Protect your accounts using strong passwords, pw managers, 2fa|Use two factor authentication for all accounts]]
* [[Protect your accounts using strong passwords, pw managers, 2fa|Use unique, complex passwords for all accounts]]
* [[Protect your accounts using strong passwords, pw managers, 2fa|Use a password manager to create, store and protect those passwords]]
|
|-
|Monitoring and surveillance
|
* [[Safe internet browsing using VPN and Tor browser|Use a VPN and/or Tor browser]]
* [[Use a secure messaging app]]
* [[How to collect and store information in a secure way]]
* [[Protect your accounts using strong passwords, pw managers, 2fa#Be aware of spear phishing attacks|Protect yourselves against (spear) phishing attacks]]
* Use a second device for sensitive activities
* [[How to mitigate your risk of being subject to Pegasus surveillance|Restart your device regularly to disrupt spyware]]
* [[Secure your devices|Use anti virus]]
* [[How to mitigate your risk of being subject to Pegasus surveillance]], and other spyware
|
|-
|Slander, harassment, disinformation campaigns
|
|
|}

Revision as of 20:41, 17 December 2024

Videos

Reports

Research Database on Transnational Repression (TNR)

https://tnr-research.uwazi.io/en/

This collection of research reports can help human rights defenders better understand:

  • Which TNR threats are likely or possible based on the existing evidence, to determine appropriate mitigation techniques
  • Which TNR threats are unlikely, in order to alleviate fear
  • What exiled HRDs can expect from a host country in terms of protection measures
  • Existing campaigns to strengthen protection for exiled HRDs

This database was developed and curated by the Center for Victims of Torture. To contribute to this research, email [email protected]

Reports in this database include:

  • Defending Democracy in Exile: Policy Responses to Transnational Repression, report by Freedom House
  • Silencing Across Borders: Transnational Repression and Digital Threats Against Exiled Activists, report by Marcus Michaelsen
  • Psychological and Emotional War: Digital Transnational Repression in Canada, report by Citizen Lab
  • Going after the family: Transnational repression and the proxy punishment of Middle Eastern diasporas, article co-authored with Dana M. Moss & Gillian Kennedy.

Books

The Arab Spring Abroad: Diaspora Activism against Authoritarian Regimes, book by Dana Moss. You can download this book for free here: https://www.cambridge.org/core/books/arab-spring-abroad/D7EC15ED46D37A2DB8CDDB83F06CC591#overview

TNR threat categories

  • Unlawful deportation, extradition, rendition, Interpol abuse, legal cases
    • Examples: trial in absentia, initiate a criminal case in order to carry out deportation or extradition
  • Physical intimidation, assault, etc
  • Coercion by proxy / Threats against in-country relatives
    • Examples: Opponent may harass, threaten, prosecute, and imprison family or colleagues
  • Account and device hacking
    • Examples: Opponents hack social media or email accounts
  • Monitoring and surveillance
    • Examples: Tracking and identifying HRDs, monitor family members’ conversations so they can access communications, infiltration of network through informants, surveil/monitor communication to ascertain location and activities
  • Slander, harassment, disinformation campaigns
    • Examples: Smear campaigns, hate speech and harassment in social media

TNR mitigation techniques

Threat category Mitigation techniques Resources and research
Unlawful deportation, extradition, rendition, Interpol abuse, legal cases
Physical intimidation, assault, etc
Coercion by proxy / Threats against in-country relatives Going after the family: Transnational repression and the proxy punishment of Middle Eastern diasporas (Moss, Michaelsen, Kennedy (2022))
Account and device hacking
Monitoring and surveillance
Slander, harassment, disinformation campaigns