Network Resources

From TCU Wiki
Revision as of 12:35, 12 May 2023 by Kristin1 (talk | contribs)

Resources for human rights defenders in exile

This is a collection of existing resources that are particularly useful for exiled human rights defenders. This list has been curated by the Center for Victims of Torture. While the intended audience for this list are those in exile, this list contains resources on topics that are applicable to any human rights defender, including: well-being and resilience, safety and security, emergency support, protection networks and legal support.

The Holistic Security Protocol for Human Rights Defenders

This page uses the Holistic Security Protocol for Human Rights Defenders (the Defender’s Protocol) by Open Briefing as a framework to organize existing security and resilience resources. Within the Holistic Security Protocol for Human Rights Defenders, Open Briefing provides an infographic, the Holistic Security Handbook, and a series of exercises and resources. As of May 2023, the Protocol and Handbook is available in 21 languages: AR, AZ, EN, ES, FA, FR, KO, LO, MS, MY, PS, PT, RU, TK, TL, TR, UK, UZ, VI, ZH, ZH-HK.

Security resources organized by topic

This is a collection of existing resources that are related to physical, digital and holistic security. This list has been curated by the Center for Victims of Torture. Topics include: ways to securely store and share files, ways to protect yourself from spyware, ways to deal with online threats and harassment, etc.

Resources organized by language

français (French)

عربى (Arabic)

ဗမာဘာသာစကား (Burmese)

Tiếng Việt (Vietnamese)

español (Spanish)


Resources by language

Security resources by topic

[under construction]

How to mitigate your risk of being subject to Pegasus surveillance

How to deal with online harassment and threats

Secure your devices - These resources will help you understand when to use full disk encryption and antivirus.

Protect your accounts using strong passwords, pw managers, 2fa - These resources include videos that explain why strong passwords are so important, how to use password managers, and how to use two factor authentication to protect your accounts.

Safe internet browsing using VPN and Tor browser - These resources will help you keep your internet activities private by using a virtual private network (VPN) or the Tor internet browser. These are very helpful tools if you think an adversary has the capacity and interest to monitor and surveil your activities online.

Protect your information

Ways to securely store and share files

Tools for securely documenting human rights violations

Protect your communication

How the internet works

Assessment and planning tools