Bypass Censorship addresses the issue of censorship affecting audiences globally by connecting people to effective tools that make it possible for them to access the Internet and the vital information they need.
38 results found
Holistic Security is a strategy manual to help human rights defenders maintain their well-being in action. The holistic approach integrates self-care, well-being, digital security, and information security into traditional security management practices.
You have a right to exist safely in digital spaces. Although we have to rely on outside parties for technology to access these spaces, there are tons of helpful tools and strategies that allow you to take greater control of your digital life and mitigate the risk of malicious threats. We’ll walk through common areas of digital life such as web browsing, private data, and smartphones to show you different ways that you can implement as much or little security as you’re comfortable with. You have power to set boundaries and protections in your digital spaces as you see fit: we hope that this guide will help you to make informed, personal decisions on what is right for you.
Signal is a free and open-source encrypted voice calling and instant messaging application for Android and iOS. It uses end-to-end encryption to secure all communications to other Signal users. Signal can be used to send and receive encrypted instant messages, group messages, attachments and media messages.
Given the risk of attacks and threats suffered by WHRDs as a direct result of their work and by changes in the context in which this is performed, specialized training on various aspects of safety and protection when facing emergency situations is essential to save their lives and avoid further aggressions. Trainings are intended to build or strengthen the capacity of WHRDs to respond or prevent attacks, as well as other aspects related to comprehensive safety measures, risks assessments, protection strategies, documentation, digital security, among others. The following is a list of organizations sorted by trainings.
The internet can represent an open door for many kinds of violations to the integrity of women’s human rights advocates if security measures are not adopted. Women defenders in particular face many unique threats and obstacles both offline and online. Technology-related violence against women in particular, is a frightening new reality. The following list of organizations are involved in training, support and advice in relation to digital security, women’s rights and safety online and human rights on the internet.
The Dignity for All: LGBTI Assistance Program provides emergency assistance; security, opportunity, and advocacy rapid response grants (SOAR grants); and security assessment and training to human rights defenders (HRDs) and civil society organizations (CSOs) under threat or attack due to their work for lesbian, gay, bisexual, transgender and intersex (LGBTI) human rights.
Protective accompaniment is a strategy inspired by Gandhi and other non-violent traditions that seeks to protect defenders and communities whose lives and work are threatened by violence and repression. Accompaniment ranges from volunteers standing side by side with highly threatened human rights defenders as they go about their work, to regular phone calls to organizations to check on their safety. The following is a list of organizations sorted by region, that will perform protective accompaniment, solidarity and monitoring visits.
Some organizations provide some form of temporary relocation for human rights defenders at risk, intended to help them escape from dangerous situations or continuous persecution. Emergency hotlines provide an instant and effective mechanism for human rights defenders at immediate risk to contact means for assistance. They are intended to mobilize rapid international support and action. The following is a list of organizations sorted by region, that will perform temporary relocation and emergency hotline.
The most effective security lessons come from defenders themselves – from their daily experiences and the tactics and strategies they develop over time in order to protect others and their own working environments. This manual must therefore be understood as a work in progress which will need to be updated and adapted as we gather more input from human rights defenders working on the front line. There are also lessons to be learned from international humanitarian NGOs, who have recently started to develop their own rules and procedures to maintain staff security. These manuals were written largely based on the work of PBI.