Tools and tactics for women human rights defenders
This guide is no longer being maintained
This is a customisation of Security in-a-Box for Women Human Rights Defenders (WHRDs). By WHRDs we refer to women who are leading, campaigning for or otherwise working toward the promotion and maintenance of human rights in their communities. The case studies presented here show the complex interconnections between digital technology and activism on gender rights in order to identify the risks faced by WHRDs; the collection of resources within Security in-a-box are offered as guidance towards mitigating these risks.
Not all WHRDs use social media, nor do they all work on issues related to digital rights, internet access or technology. And not all experience surveillance either from governments or corporations or locally from within their own movements. Their work may involve community based activism on issues related to land rights, women's health, water, natural resources, transparency, anti corruption work, LGBTQ rights, and so on. The spaces they are trying to protect therefore extend beyond online identities and networks.
Many activists, some of who are profiled here, have to contend with infrastructural, political, socio-cultural and financial barriers associated with internet use. The sharing of devices, use of cyber-cafes, a reliance on legacy or 'dumb' phones, and an overall limited access to technology contribute to certain digital risks. Moreover, contextual issues contribute to creating specific patterns of harassment and harm, from the the use of social media as a social space as well as a political one, to geo-political tensions and local laws governing the internet. The case studies attempt to show how this happens and present select content from SiaB to address the digital component of the risks faced.
Read a more detailed background of the ideas informing this guide here.
These tactics guides cover digital security basics and identify tools related to each topic
- [Unmaintained] Digital Security for Women Human Rights Defenders
- [Unmaintained] Case 1 - The price of exposing corruption
- [Unmaintained] Case 2 - Security as a shared process
- [Unmaintained] Case 3 - Undermined by surveillance
- [Unmaintained] Risk Assessment
- [Unmaintained] Online Violence and Social Media
- [Unmaintained] Basic Computer Hygiene
- Protect your device from malware and phishing attacks
- Protect your information from physical threats
- Create and maintain strong passwords
- Protect the sensitive files on your computer
- Recover from information loss
- Destroy sensitive information
- Keep your digital communication private
- Remain anonymous and bypass censorship on the Internet
- [Unmaintained] Protect yourself and your data when using social networking sites
- Use your smartphone as securely as possible
Step-by-step guides on digital security tools for GNU/Linux
Step-by-step guides on digital security tools for Microsoft Windows
- VeraCrypt for Windows - Secure File Storage
- Firefox and Security Add-Ons for Windows - Secure Web Browser
- [Out-of-date] Thunderbird, Enigmail and OpenPGP for Windows - Secure Email
- Tor Browser for Windows - Online anonymity and censorship circumvention
- [Out-of-date] CCleaner for Windows - secure file deletion and session cleanup
Step-by-step guides on digital security tools for Google Android
Guides to web-based services and using social networks safely