Note: This dialogue is PUBLIC. Do not share any private or sensitive information. For advice on a specific situation, please contact a participant privately.
The featured resource practitioners for this dialogue include:
- Jane Barry - author of Insiste, Persiste, Resiste, Existe: Women Human Rights Defenders Security Strategies (with Vahida Nainar)
- Wojtek Bogusz of Frontline Defenders
- Rick P. Ruiz - President of VaultletSoft and initiator of Project Autonomy
- Marie Caraj of Protection International
- Edna Aquino of Stop Stoning and Killing Women Campaign
- Sarah Willcox of the Scholar Rescue Fund
- Saira Hamidi of the Urgent Action Fund
- Jackie Nolley Echegaray from JASS (Just Associates)
- Michele Braley and Nils Dybvig - former Christian Peacemaker Team members, provided unarmed accompaniment to human rights defenders in Colombia
- Ali Palh of RightsNow Pakistan
- Allen Gunn (AKA Gunner) - Executive Director of Aspiration and Ruckus Society board member
[Photo credit: hennings]
Summary
In this dialogue, practitioners that work with human rights defenders developing security strategies discussed how human rights defenders and organizations can improve their safety and security while working in the field under oppressive conditions and under the watchful eye of states and adversaries. Specifically, the participants discussed and shared tactics, strategies and resources on how human rights defenders can create effective security protocols to protect themselves against physical threats and secure their data in the field or office.
Who is a Human Rights Defender (HRD) and what is security for HRDs? Why does security matter?
A human rights defender (HRD) was defined as a person who acceptances the universality of human rights, are defined and accepted according to the rights they are defending and according to their own right to do so, and whose actions are peaceful. HRDs consciously take on risk through their work, thus human rights work might by its definition be about giving up some security.
Security and safety for HRDs is essential to their work: “The key to thinking about security/safety and well-being is first recognizing that we are as valuable as human beings as the human rights work -- and as the people we are fighting for.” A silenced human rights worker, through kidnapping, jailing or intimidation, means a human rights worker not doing their work. Protecting human rights defenders doesn’t always mean protecting them against physical violence. “slander, smear campaigns, stigmatisation, etc are all serious threats to defenders.”
There are many “non-traditional” HRDs, such as artists, academics and activists, that don’t self identify as a HRDs. They may be unaware they are entitled to protection and one participant suggested they should be informed that they are entitled to the title of human rights defender and that they there is a protection framework that is mandated to support them.
What impact does a defender’s gender (or identity) have on security?
Among LGBT human rights defenders there many challenges to developing effective security measures because many LGBT organizations are marginalized. Lack of funding for LGBT human rights work exacerbates competitiveness between organizations which hinders the creation of strong networks necessary for security. Furthermore because the prejudice and discrimination of people in the LGBT community is based on a moral argument that permeates society many “mainstream” HRDs shy away from issues affecting this community.
One story shared was about how the security of female HRDs in Pakistan increased and threats from their colleagues were reduced when respected male members of society came out using the media in favor of women in leadership roles. Religious leaders signing statements that said Islam does not bar women from taking leadership positions improved female HRDs standing and security in their communities and families.
How does security relate to information, communication and technology?
Ensuring the safety and security of records, resources, and information is essential to preserving HRDs safety and security. Everything done online, on a computer, or with something that involves transmitted data, whether analog or digital, is recordable, copyable, transferable, morphable and redistributable. And thus security considerations should be ubiquitous in all discussions relating to any of the above
Using open source software (software where the programming code is open to the public to verify its security) is the best way to share and disseminate tools and protocols when these very tools and protocols must be shared through often unprotected, unencrypted means. Following best practices with proven tools and platforms, and showing others how to do the same is an example of “hiding in plain site.”
When a group of HRDs are working together, it is important that everyone is communicating using secure measures. If one person in a group of people communicating does not follow recommended security protocols, they can expose the whole group and their clients.
With the many digital security tools available HRDs should incorporate digital security into their larger protection plans and see how it fits into their work. Some HRDs might need or want more or less digital security depending on their situation. Some are mystified at all the choices and need help deciding what tools to use.
The security of VoIP (voice over internet protocol) services like Skype depends on a host on variables and there is no silver bullet. Nothing is totally secure but participants offered a number of helpful suggestions to improve the security of VoIP calls.
For many HRDs in the developing world the only way to access the internet is through internet cafes, which can be insecure. One contributor stressed that choosing a café where you can use your own laptop which has security software on it is an effective way to stay secure. Other tips for staying secure in an Internet Café were added here. Participants gave valuable recommendations on email services that can be trusted and the many factors to consider when choosing an email service to ensure security, here and here.
What can defenders do to protect themselves?
As a starting point new employees of human rights organizations should be informed of the risks involved in human rights work.
“Self defense can be defined as a set of physical, psychological, and verbal techniques that can be used to defend one self in situations where one may be a target of verbal assault, physical abuse, or rape. It also involves knowing how to avoiding certain situations where we know we may be hurt.” Self defense need not to be aggressive, a special art or a mystery. Many HRDs on the front lines instinctually use various methods of self defense against physical violence, verbal abuse or harassment. Sometimes running away is the best defense.
In a number of countries human rights organizations have come together to create joint initiatives focused on HRD protection and this can be an important source of joint training; relocation and emergency funds; and national and international advocacy.
Many organizations and networks of activists use secondary protests at police stations after an activist has been arrested at a rally or while doing human rights work.
Using social media and mobile phones for protection can be dangerous and insecure but in certain situations they can also be used by defenders to broadcast if they are in trouble. Sometimes making a case public or informing your network of your locations can increase your security. Another way HRDs can use mobile phones is while traveling to check in daily with their organizations. It is best not to talk about specifics such as location when checking in and to use a set of code words because mobile phones should be considered insecure. Organizations should set up protocols if someone fails to check in and can’t be reached. It is important to know that the location of a HRD using a mobile phone can be pinpointed if the GPS function is turned on, but even if it is off a person’s location can be found less accurately using cell tower triangulation. Taking the battery out of one’s phone is usually the only way to prevent tracking in this manner
What do the rest of use need to do to protect defenders? What can funders of human rights work do?
With security “we’re all in this together, like a lifeboat,;” one person’s action or inaction affects others in terms of security. Every HRD leaves digital footprints that have the possibility to expose other HRDs. “Security is a set of values to be engendered and shared, not a pizza to be delivered.” Organizations can “be proactive in supporting a security-positive culture, with lots of training and ongoing dialog.” Funders can stay anonymous when necessary; encourage grantees to write security costs into all grant proposals and then fund them.
Organizations can designate a person/s to be responsible for monitoring new technologies and new security protocols and for updating passwords, and codes, as well as stressing vigilance. Secondly, international human rights orgs can develop relationships with trusted local advisers and meet regularly with them for their assessment of security risks.
Security tools and systems need to be more accessible and usable for human rights orgs. and defenders. Funders should provide additional resources for tech support. It is a challenge finding trustworthy IT support in foreign countries. Sometimes older, and simpler technologies such as a pad of paper and a pen as opposed to a laptop in the field are more secure.
Provide political accompaniment to increase safety. International or national NGOs can accompany local HRDs by acting as a witness and by providing public recognition of a HRDs work. This can involve having a physical presence or writing letters to American politicians or politicians in the host country. The political cost of harming local HRDs then increases if other people are watching and their profile is raised.
Participants noted a number of protection measures to pre-empt the imminent threats to HRDs or respond to threats after the fact. The list included such measures as: temporary relocation, trial observation, emergency grants and relief programs, emergency hotlines, safe houses, protective presence at HRDs offices or homes by internationals or influential nationals, and utilizing organizations that focus specifically on the protection of human rights defenders.
Training staff how to think critically about security rather than only specific tasks using a technology is important. If a HRD considers themselves not well versed in technology this methods helps them realize they know more than they think when it comes to common sense security approaches. They also realize security is an on-going process.
Resources:
Articles, Manuals, Reports
- Claiming Rights, Claiming Justice: A Guidebook on Women Human Rights Defenders, Asia Pacific Forum on Women, Law and Development (2007)
- Front Line Handbook for Human Rights Defenders: What protection can EU and Norwegian Diplomatic Missions offer? researched and written by Chris Collier and published by Front Line
- Insiste, Persiste, Resiste, Existe, Jane Barry with Vahida Nainar. Project partners: Urgent Action Fund for Women’s Human Rights, The Kvinna till Kvinna Foundation and Front Line International Foundation for the Protection of Human Rights Defenders (2008)
- New Protection Manual for Human Rights Defenders, researched and written by Enrique Eguren and Marie Caraj and published by Protection International (2009)
- Security in-a-box: Tools and Tactics for your Digital Security, Tactical Technology Collective and Front Line International Foundation for the Protection of Human Rights Defenders
- Self-Care and Self-Defense Manual for Feminist Activists, Marina Bernal. Artemisa, Grupo Interdisciplinario en Género, Sexualidad, Juventud y Derechos Humanos and Elige—Red de Jóvenes por los Derechos Sexuales y Reproductivos (2006). Published in English by CREA (2008)
- What’s the Point of Revolution if We Can’t Dance, Jane Barry with Jelena -Djordjevic. Urgent Action Fund for Women’s Human Rights (2007)
- Who is a Human Rights Defender: Special Rapporteur on the situation of Human Rights Defenders
- Resource Book for Human Rights Defenders
- Human Rights Defenders under threats: A Field Security Approach to their Work
- Report of the UNSR on Human Rights Defenders to the 58th Session of the UN Commission on Human Rights (See Part II-B )
- Claiming Rights, Claiming Justice: A Guidebook on Women Human Rights Defenders
- New Protection Manual for Human Rights Defenders (3rd Edition), Chapter 1.9 on Security for Women Human Rights Defenders
- Urgent Action Fund (UAF) Gender Focused Rapid Response Teams: A Preliminary Discussion of the Concept and Potential for Implementation
- “Rising up in Response” Women’s Rights Activism in conflict
- “Engendering Peace- Incorporating a Gender Perspective in Civilian Peace Teams”
- Accompaniment - Side by Side: Protecting and encouraging threatened activists with unarmed international accompaniment; Tactical Dialogue on Unarmed Accompaniment
- The Observatory for the Protection of Human Rights Defenders
Resources for Securing Technology
- Security in-a-box: Tools and tactics for your digital security
- Secure Texting - CryptoSMS, SMS 007, and Kryptext
- Secure email - Hushmail, Rise Up, and VaultletMail
- Secure internet browsing - Tor Software, Psiphon, and CCleaner
- Secure instant messaging - Pidgin
- Secure VoIP – Zfone
- Secure password storage – KeePass
- Secure mobile phones – The Guardian Project
- Hard drive encryption - Bitlocker, TrueCrypt, PGP Whole Disk Encryption, and Check Point
- "Quick Guide to Secure Information"
- “Human Rights Software: Information Support Solutions For Social Justice”
- Cell Phones and Activism: A word of caution
- Calling Front Line Emergency Support from Skype
- Digital Security and Privacy for Human Rights Defenders manual
- Anonymous Blogging with Wordpress and Tor (also version in: Chinese, French) by Global Voices Advocacy
- Blog for a Cause!: The Global Voices Guide of Blog Advocacy (also version in: Chinese, Spanish, French) by Global Voices Advocacy
- Handbook for Bloggers and Cyber-Dissidents (also version in: French, Chinese - Circumvent Censorship chapter, Chinese - Blog Anonymously chapter) by Reporters Without Borders
- Everyone's Guide to By-Passing Internet Censorship (also version in: Russian and Burmese) by CiviSec
- Protektor Manual - a guide on using security related software on Windows, Mac OS and Linux.
- Open Office and Ubuntu Linux
Please share your thoughts and ideas by replying to this 'theme-comment'
Note: This dialogue is PUBLIC. Do not share any private or sensitive information. For advice on a specific situation, please contact a participant privately.
The issue of 'who is a human rights defender' is at times hotly debated -- and it is critical to our understanding of security and the right to protection for human rights defenders.
For example, is a human rights defender...
The generally accepted definition of a human rights defender is very broad and inclusive (see 'Who is a Human Rights Defender' by the Special Rapporteur on the situation of Human Rights Defenders: http://www2.ohchr.org/english/issues/defenders/who.htm). If someone who defends human rights does not consider themselves a human rights defender, or is not seen as a defender by others, they can't access the same mechanisms for protection that 'recognized' defenders can -- so this is an important issue for discussion. I'd love to hear thoughts from others! Jane Barry
Thank you Jane and Edna for opening this question. My perceptions below might be implicit in your comments.
For some (A), there is no definition of hrd but a definition of the activities and for others (B), a definition of hrd activities is not a 'non definition of hrd'.
A) will avoid legiferation on hrd protection arguing that:
to pass a law on something one needs to know what it is.
B)would probably not bother about that just as Brazil has done by adopting a decree on hrd that basically copies and pastes the UN definition (activities that define a hrd): Decreto Nº 6.044, de 12 de febrero de 2007 (it's a link).
In both cases it is a question of political will.
If a (C)exist, it could be somewhere where human rights are not seen as accessories.
Any way, if the UN declaration is implemented litterally then a hrd is a hrd the length of an activity.
What about other simultaneous activities? or before or after that one? and coherence? Plus the many other perspectives of which some have been mentioned by you both: hrd who are not aware of it and a partial hrd is not a hrd.
(I'd add: some victims also can be unaware of being victims).
The difficulty is to talk about all hypothesis if the criteria of the UN Declaration on hrd are not enough to draw conclusions about such and such cases. (I refer to the declaration as it is 'universal').
One way out could be to take one example.
Somehow the UN declaration makes it accessible to a wider range of people to be/become/cease to be hrd. It speaks of rights/duties/actions etc. and attitude to carry them out (without violence which for me is slightly different than peaceful, but it might be a question of language) and less of 'status/identity'.
At the end of the day it sounds close to the concept of 'who we are matters less than what we do with who we are'...the actions define the hrd.
From the protection point of view, the Un declaration defines well who does what (who is who): primary, duty-bearer and key stakeholders.
From the security/protection point of view, it's fundamental.
I mostly meet hrd who know they are hrd (some simply because they have a sense of who they are or they have become aware because they are part of hrd networks etc) and are part of the wider civil society with its many shades.
They are not necessarily aware of the existence of texts and mechanisms (this is another item of this dialogue more related to advocacy/protection)
Marie
Thanks Jane, Edna and Marie for opening this topic. This is always asked by participants during trainings, workshops, discussions and in field. From my perspective: HRD is an individual who promotes and protects human rights.
Hi Todd,
Thanks for sharing this inspiring and creative work! Learning about each others' work and growing our global community of HRDs through this dialogue is an important element in increasing our security. I am grateful to add each of you and your organizations to my list of allies and resources!
Todd,
Thanks for your post. We closely follow your work and the incredible networks you have built. I wanted to add a comment to your discussion about defenders who wouldn't fall into the traditional sense of the word. And Michele, perhaps this falls in line with the allies and resources you are gathering for your work.
We (Scholar Rescue Fund) work with senior academics (professors, public intellectuals, writers, scientists, and sometimes artists) who, by the nature of their academic work are threatened by state and non-state actors seeking to silence dissent. Scarily, it is not field specific. Whether their work is in in the humanities, the sciences, or law, academics around the world are brought into the human rights discourse -- either by direct action or by circumstance -- and ultimately into the defense of human rights. The practice of their trade in free thinking and new ideas -- assuming a natural right to academic freedom -- puts them in harms way. Like other human rights defenders, many have paid dearly. They are an easy target: silence one professor and you silence their classrooms, their universities, their communities. And the silence is deafening. In less than eight years, our small program alone has received applications from over 4,000 people in the over 100 countries. (450 have received direct support.) Our work aims to protect the most severely threatened academics because their safety -- secured temporarily at host universities around the world -- goes beyond immediate protection and allows them to produce the work that would otherwise fall victim to repression. Furthermore, bringing them to safety, if only for six months or a year, provides environments in which to recover from past trauma and contribute to their fields from afar. In this way, in defense of academic freedom, in defense of the freedom of thought and academic practice, these scholars are in their own way circumnavigating the security challenges and beating the system, so to speak. Many have completed works that have made it back to their home communities, thereby feeding free thinking back to those who have suffered the loss of its departure. Some have written human rights manuals, others have led advocacy campaigns for compatriots suffering at home, and with few exceptions, most take their own safety as a responsibility, and continue to expose the human rights abuses in their home communities. All could no doubt benefit from the vast range of tools and resources posted here. I am eager to share this with them.
Sarah
Thanks Todd and Sarah, for sharing such useful resources. ………………
I believe that Art and artist have more FORCE to fight for the rights of people and WILL to resist to repressive regime. An artist also has more power to mobilize large number of people in less time..….People trust artists more than anyone else?……… At the same time art and artist face more and serious threats....... In majority of cases repressive regimes try to eliminate artists because they know it is almost difficult for them to silence an artist…. This shows artists protection needs are higher ……….. Glad to know about Scholar Rescue Fund it includes support for broader group of hrds
I really like this definition for a WHRD, and by extension the application of #s 3, 4, and 5 to all Human Rights Defenders. I hadn’t thought of it before reading these definitions, but characteristic #4 seems particularly relevant to this discussion about security. I believe that in many ways what defines us as HRDs is our willingness to take on risk.
Human Rights work assumes an environment where Human Rights are not respected. Anyone working to change this environment - often opposing powerful, entrenched interests - takes on some risk. We can work to minimize risk by implementing strong security practices, but risk is inherent in the work. And importantly, HRDs are willing to take on risk, to give up a little of their personal security, because they know that the end they are working for will justify the personal risk they assume.
Greetings to all,
This dialogue has been so helpful and rich, thank you to everyone. I really appreciate the discussion on who is a human rights defender, because it has very practical implications in our work. If you are 'recognized' as a human rights defender, you have increased access to protection. You, and your work, are visible. And valued. If you are not, then you have less access, visibility and voice.
So, in reflecting on our dialogue around this, it seems to me that we are facing two key issues.
The first, is that there are many activists, journalists, violence survivors, survivors of discrimination (LGBTIQQ people for example), artists, academics, etc. who are fighting for human rights and don’t know that they are entitled to protection -- because they may not identify as human rights defenders themselves, or because others would not recognize them as human rights defenders.
Secondly, as Marie points out, there are many human rights defenders who do recognize their work as human rights defense:
‘I mostly meet hrd who know they are hrd (some simply because they have a sense of who they are or they have become aware because they are part of hrd networks etc) and are part of the wider civil society with its many shades.’
However, even when human rights defenders know this is a title they can claim, they don’t know that this category gives them access to protection, and what forms of protection they are entitled to, as Marie elaborates:
‘They are not necessarily aware of the existence of texts and mechanisms (this is another item of this dialogue more related to advocacy/protection)’
I suggest, as a step forward from this dialogue, that we do the following to ensure a much broader and deeper protection framework for hrds:
I thought it might be helpful to recap some of the points raised in the dialogue for our review, specifically:
a) Key Principles
Edna referred to three minimum standards identified in the Declaration as follows:
Ali offered some very practical points primarily around human rights defenders’ activities (what they do) and approaches (how) -- as well as raising a core concept -- that there is no academic or professional requirement to ‘become‘ an hrd:
Jacqueline raised some key characteristics of a WHRD that emerged from the Mesoamerica meeting.
“Drawing from our experience, these are the characteristics of a WHRD: This definition cannot limit itself by closing itself off to the enormous diversity in the identity and the struggles of WHRDs. Nevertheless, we believe that the following characteristics must be taken into account by every WHRD:
b) Ensuring that all people who defend human rights are recognized as human rights defenders.
Todd and Sarah talked about human rights defenders who are not traditionally recognized as such, those who use art/creativity/expression:
Todd: These folks are sometimes artists and sometimes community organizers ... typically they wear many hats and it is hard to fit them into one vocational category. The danger can be just as severe as that experienced by other HRDs, but is often experienced in isolation.
Sarah: Academics (professors, public intellectuals, writers, scientists, and sometimes artists) who, by the nature of their academic work are threatened by state and non-state actors seeking to silence dissent. The practice of their trade in free thinking and new ideas -- assuming a natural right to academic freedom -- puts them in harms way
Shaun and Saira also raised a critical issue in defining who is a human rights defender and understanding the complexities of security from the perspective of LGBTIQQ defenders. Shaun in particular also elaborated the issues around defenders who are facing multiple discriminations.
c) Key Issues for discussion
Edna’s point about self-identification is extremely important -- she asks us to ‘recognize the interchangeability of 'human rights defender' and ‘human rights activist' and to honor how individuals and groups working for human rights would prefer to identify themselves.’
Marie brought up a key point about a literal interpretation of the UN Declaration, which could cause us to limit the definition of a human rights defender to the time in which they are perceived as active in human rights defense. She asks: What about other simultaneous activities? or before or after that one? and coherence? Plus the many other perspectives of which some have been mentioned by you both: hrd who are not aware of it and a partial hrd is not a hrd.
Jacquelyn also commented on the idea that human rights is not a profession, saying: ‘Personally, I am particularly interested in knowing how other practitioners respond to #5, as it generated some dissonance with my own definition of an HRD. The report elaborated on this idea as follows: “Defending human rights is not a profession. It is not an office job carried out from 9AM to 5PM. The defense of human rights is fed/nourished by problems from everywhere, from the street, from the neighborhoods, from everyday work and from contact with other people.”
Saira further questioned the binary of separating and supporting different genders of defenders -- how do groups who support ‘women’ human rights defenders expand in their understanding of who is a ‘woman’ in a world where we understand that there are many different gender expressions than simply ‘male’ and ‘female’ -- there are gay male defenders, transgender defenders, intersex defenders, and many defenders who choose not to identify according to gender at all. Are we excluding them?
I have many thoughts on all of these questions, but for now, will simply include them here as a recap. My apologies if this doesn’t properly represent everyone’s views, it is just my take on them at the moment.
Why do so many human rights defenders put the lives of others above their own?
Why is the response to thinking about security issues so often -- its not a priority, its not that bad (compared to the situation in xx country), I don't have time to worry about this, if they're going to get me, they'll get me -- no matter what I do.
If we don't talk about the human beings behind the human rights defense -- what motivates them to protect themselves -- or to consider security important and possible, then how can we develop practical, usable tools and tactics?
I'd love to hear experiences and thoughts about working with human rights defenders to see the value of taking care of their security and well-being.
Dear Jane,
Yours is a difficult question to start with! Existentialist (Irony given the fact that you are wondering why hrd put the lives of others above their own). Have you put the question to some of defenders?
In the training PI gives, assumptions of such positions are explored and what comes out often, is that the underlying assumption is that the hrd believe they can't do much about their own security/ risk can not be decreased. So, we work on that: on the fact that a risk has got variables that belong to the hrd/hrd organisations on which they can work: decrease vulnerability and increase capacity as to lower the feasibility of a threat and therefore, the risk. Why make it easier for the potential aggressor to get at a hrd?
Human psychology and motivation is fundamental in security and has to be taken into account. The related human behaviour is a determining factor.
It takes time to talk about it and the psychosocial impact of political violence. The psychology of liberation provides several entry points. Groups of mutual support can be set up among hrd to talk about their motivations, their feelings, choices, to carry out political analysis and call things by their names. It can help working through the different steps and put things into perspectives. It empowers the individual and the group. A Group of mutual support is also more than that.
There is a group of social workers, psychologists, psychiatrists commited to supporting hrd and who work also with victims/survivors of natural/war disaters. it is called Grupo de Apoyo Comunitario-GAC- (can easily be found on internet and some of their collaborators speak English) GAC has dedicated contact people and organisations in many countries in the world. GAC doesn't necessarily carry out its work from the perspective proper of security and hrd, yet the security of hrd has got several entry points: the risk to get to speak about the psychological and motivation dimension or the latter to get to speak about security. And many other entry points.
The above is a general opinion to your more specific questions...sorry.
Marie
Greetings,
For me, its not possible to separate the defense of human rights and vigilance about safety/security of the human rights defender. A silenced human rights defender (whether its through death, kidnapping, loss of visa, etc.) can no longer defend human rights. In my work with Christian Peacemaker Teams (accompanying communities/organizations at risk of violence due to the armed conflict) we were very diligant about our personal safety because our ability to bring attention to the threats our Colombian partners were receiving, depended on staying safe ourselves. That does not mean the work does not require risks and acceptance of the possibility of death or kidnapping, but we did not see time spent on strategizing to minimize those risks as a waste of time. I look forward to our mutual learning about how to increase our security in the discussion thread on that topic!
Michele Braley
Dear Marie,
Thanks so much for your thoughts on this. We have indeed spoken with hundreds of human rights defenders around the world about this question, and it is an integral and essential (rather than existential) part of the integrated security workshops that we've been running over the past years. Some of these conversations are reflected in What's the Point of Revolution if we Can't Dance? , Insiste, Persiste, Resiste, Existe: Women Human Rights Defenders Security Strategies and Integrated Security -- The Manual (forthcoming 2010).
The key to thinking about security/safety and well-being is first recognizing that we are as valuable as human beings as the human rights work -- and as the people we are fighting for. So that at its core, we see our security/safety/well-being as vital (and this equally and intrinsically applies to our IT/communications security). The simple message is that it is worth the 'effort' to be safe and well.
The second message -- and this was raised in our earlier conversation -- is that it is also possible to be safe and well. That every human rights defender is already doing so many things naturally to protect others (and themselves) -- many of the best strategies are within us, but just aren't recognized as strategies yet.
In our workshops, we spend a lot of time sharing those strategies among human rights defenders -- giving them space to share with, and learn from, each other.
So I completely agree with your point that:
The simplest tactics for training on security/safety/well-being involve:
In our work, we often are asked for a distinction between "safety" and "security." Are they not one in the same? As the language is developed for human rights defenders (and the relevant standards commited to either safety or security of defenders) why is it that some choose exclusively "security" while others are compelled to use what seems a semantic discussion using the two terms.
Does this distinction matter in the tactics/tools and even higher level discussions on the minimum standards of safety or security for defenders? Some interpretations include:
safe - unlikely to cause physical harm; secure - invulnerable to external attack
Dear Sarah,
Personnally, I think it does although it might appear as superfluous given that, often, in the common language, the same acception is attributed to both of them.
Words mean and evoke things, ideas.
The interpretation you mention is interesting. I personnally associate safe with status and secure with action: security providing (more probability of) safety (result).
Thanks for your question as in fact I had just decided to skip talking about safety vs security on the assumption that we were talking of security although using the word safety. Thanks.
Marie
Hi Sarah:
I think it's more than just semantics. I think the terminology 'security' has increasingly become part of our everyday language especially since after 11/09. In the Philippines - we tend to associate 'security' with the State counter-insurgency policy that extends to curtailment or restrictions of basic rights and freedoms of activists. We use 'safety' when referring to securing, protecting, ourselves as activists and those close to us; and also pre-empting the foreseeable dangers that are likely to come and underscoring that all these are temporary measures. There are reservations, too, amongst some activists - not only in the Philippines - with the word 'security' - also because of their view that they can never be secure in a very insecure environment which they have no control over. And finally - there is the question of translation. In our language - 'safety' has a direct translation while 'security' doesn't have. This ilustrates that indeed there are nuances and difference around the terminologies that we use and adopt as part of our global language and those of activists on the ground due to the latter's context -specific realities. it's always important to clarify, describe what we meant, negotiate, adjust and finally agree on what is the most appropriate terminology without losing the essence of what we meant.
Greetings!
Thank you all for raising this important question: the difference between the terms 'safety' and 'security.' I agree with Edna that it really depends on contexts and language/translation. There are many places (Kurdish cities in Turkey, Palestine, the Philippines, to name only a few) that are so militarised and repressive against activists that the thought to consider one's own security seems almost irrelevant. We see this regularly in grant requests when a WHRD is facing serious threats and will request funds for an awareness raising campaign for instance, and not for immediate measures for her own security.
My question in these cases is, when physical (not to mention emotional, financial, or otherwise) security is seemingly so unattainable that it's not even considered, would there be any distinction between the terms and/or concepts of 'security' vs. 'safety?' Or does it again depend on language and context. I believe that may well be the case but I'm not totally sure. This will indeed require some further thinking on my part...
In terms of languages, contexts, and translations, the situation Edna describes in the Philippines is similar to that in some parts of the Arab world. In Arabic for instance, the term for security is rather clear and often always associated with the state or state apparatus. However, there are different words for safety (one is the same as the word for security) that are used more for the individual state of being. One term for safety (salaama/salaameh), has at its root, the word for peace and also means integrity. I will stop here because if I launch into a discussion on Arabic etymology it may never end.
Lastly, the term 'security' can also set off some red flags within the philanthropic community in the US. Particularly post 9-11 with all of the so-called counter-'terrorism' measures that are increasingly posing obstacles to the funding world. Our colleagues at another US fund that is much larger than ours, have strongly advised us to specifically abstain from using the word 'security' when discussing grants via email that are in our Protection and Security category because it may well be flagged by authorities. Which authorities? I do not know for certain but could guess. They have requested us to use 'safety' instead. I note that they are a much larger fund than UAF because one would think there is less scrutiny on such large funds with their teams of expert lawyers but apparently not.
Thank you all for the thought provoking posts.
Until tomorrow
Peace
Saira
Hi Saira,
Thanks for your post. You've really raised for me the concerns of and the abuse of language in the HR context. We all know language can be twisted so easily for sinister effect and of course must choose our words wisely. Not only as a responsibility but as a tactic to avoid the red flags you mention that may unnecessarily hinder the work at hand. Perhaps a list of no-go words should be included in the following ICT discussions. Ironic to think that "security" may well be one of them!
Sarah
To me: Safety means protection against something and security protection against someone..............safety is protection against fire, electric shock etc which is result of an accident and there is no conscious effort behind it ...it happens due to a mistake or negligence….. Security is protection against someone/person's or an organization's action which deliberately try to harm defender to achieve an objective....
Drawing from my own experience, I would say that our activism is very much influenced or moulded by the dominant 'values system' of our movements or organisations which then partly defines how we respond to situations including safety / secuity questions. In my case, for instance, I was deeply involved for years (snce my youth days) in social movements whose value systems view valorism and embracing of hardships and personal sacrifices as 'givens' and as important tests to prove one's commitment to the cause. And if you're a woman in my society, there is another layer of value system that further reinforces these values that promote the sublimation of one's personal needs to the greater cause. Thinking of one's own safety or security before that of others can therefore easily become a source of guilt or mental baggage to many activists or HRDs coming from that similar milieu I just described. Jane Barry's insights drawn from her many conversations with WHRDS in various contexts regarding their well-being and security resonate this theme over and over again.
I think it's really important to build into any security strategy a space for HRDs to examine their perceptions and attitudes in relating their personal needs for safety and well-being with their work on behalf of others. Beyond the technological resources and infratructure, we need tools and skills , too, that would facilitate the mindshift and help build a safety-/ security-positive culture that breaks down the invisible barrier between the personal and the political aspects of our lives as human rights defenders. This would probably have a greater prospect of sustainability.
Quoting Edna : “Thinking of one's own safety or security before that of others can therefore easily become a source of guilt or mental baggage to many activists or HRDs coming from that similar milieu I just described”
Apart from the many other assumptions on which the ‘guilt feelings’ might be based on, there might be also the one of having to choose between the ‘others’ and oneself as if the security of both was not interrelated and there were no choices possible that contemplated the security of hrd as also the security of the groups they are working with. An increased security of hrd means also an increased seurity of the groups. If a hrd is hit individuals and group are hit too and viceversa.
Marie
The issue of secutiry for human rights defenders became sharp after the April events in Kyrgyzstan. The Provisional Government couldn't prevent the ethnic conflict in the South of Kyrgyzstan. Civil society and human rights defenders did their best to help people and protect the 'core' of human rights listed in art. 6 of ICCPR. However, due their active role in Osh and Djalalabad cities Human rights defenders are threatened.
This cases below show how a HRD trying to defend HR becomes himself/helself a subject of violations and is threatened. For example, Ms. Tolekan Ismailova, the director of Human Rights Center 'Citizens against Corruption' had to leave country for a while, because she was threatened for defending victims of violence. Another HRD Azimdjan Askarov was detained and without fair trial has been kept in prison. Moreover, he has been subjected to torture. Acting Prosecutor General commented on it as if 'Azimdjan quarreled with his cellmate and was hit on head, fell down and got injuries.'
It hard to establish any mechanism of security for HRD, as in Kyrgyzstan Rule of Law does not exist. The country joined UHRD 1948, ICCPR 1966, and other UN Decleration, however in most cases these international obligations are not fullfilled, and there is not effective mechanisms to 'push' Kyrgyzstan to implment these obligations. WHICH MECHANISM COULD BE USED AND BE EFFECTIVE TO ENSURE SAFETY OF HRD IN THE ACTIVITIES CARRIED OUT BY THEM?
Dear Kyrgystan,
Your question " WHICH MECHANISM COULD BE USED AND BE EFFECTIVE TO ENSURE SAFETY OF HRD IN THE ACTIVITIES CARRIED OUT BY THEM?" is not easy to explore as it would require a thorough field forces, actors mapping and risk analysis to start with. Also the current level of security implemented by hrd in Kyrgyzstan. So the risk is to repeat banalities and anyway, be general given the public nature of the dialogue.
Unfortunately, in security, there is no guarantee of result or result guaranteed. Field forces and actors mapping analysis should also help find out many factors and among them, also 'interest relations between actors' that can be used in the security strategy building. Example: if a country A depends on counries B, C,D etc for trade, then the security startegy could integrate advocacy with B, C, D embassies and pressure from organisations of countries B, C, D on their governments and parliaments aiming at country A authorities to change behaviour as the political cost of an aggression increases and margin of impunity decreases. This is based also on the assumption that amidst countries B,C,D etc, there some who are committed to the cause of hrd.
The risk analysis can help the hrd in reducing their exposure to risk. The risk is never equal to zero. Of course, theory is easier than practice. And general theory even easier than specific practice. The context is very complex especially if there is absence of Rule of Law and, consequent, lack of State structures to receive hrd complaints and follow up on them positively.
Have you had a look at the publications on PI's website for hrd? www.protectionine.org You can of course find our publications:
Risk analysis: NPMHRD suggests a checklist of information needed to assess vulnerabilities and capacities. And there is more information in the NPMHRD. Allen reminded (talking about IT security in his contribution 'Like a lifeboat'):
There is an analogy with developing security strategy, security plan and management. Post-conflict is ambiguous as it often means that there is no 'war' as such but it doesn't reflect the lack of justice that is variable of a conflict context. I feel uncomfortable with my answer as the description you sent is serious. Yet I wanted to chip.
Marie
Dear Kyrgystan,
First of all, thank you so much for sharing the situation of human rights defenders in Kyrgystan -- I am so sorry that the situation has changed so rapidly in your beautiful country, and that for you all, as human rights defenders, standing up for the rights of all the citizens of your country, and for peace, has become so urgent, and so risky.
Without getting into specific cases, as that would pose challenges if we were to discuss it on an open forum such as this, I would like us as a group to discuss some particular mechanisms that relate to both Kyrgystan, and to other countries where these issues are so similar.
1. Deploying the EU Guidelines on Human Rights Defenders
First of all, I had heard that some groups in Kyrgystan have already done some work with European Embassies in helping them understand the importance and use of the EU Guidelines -- they are a very practical tool in this instance for advocating to the European Embassies (and even to the non-European Embassies) to both provide protection to human rights defenders -- and to speak out to the government on the behalf of human rights defenders and their work. I believe that the guidelines have been mentioned a bit on this discussion so far, but I would love to hear more about their practical use here!
2. Connecting to Regional and International Coalitions
I believe there is a regional (CIS) coalition for human rights defenders? Perhaps this is a useful information and advocacy network to get your message out, and to think about concrete ways to have these discussions with the new government. Secondly, there are other networks that might be equally useful on the international level, I can think of the Women Human Rights Defenders International Coalition (http://www.defendingwomen-defendingrights.org/) as just one example (Edna, any thoughts?).
3. Collaboration with International organizations that provide advocacy and grants around security of human rights defenders
I am sure you know many of these organizations -- like Front Line, Amnesty International, Urgent Action Fund for Women's Human Rights, etc. -- but it may be worth pulling together a list of your allies such as these and keeping them up to date on your situation -- and asking for support in pushing the government to respect the work of human rights defenders.
Also, in instances related to torture, it is worth being in touch with the World Organization Against Torture (OMCT) -- http://www.omct.org/ -- they are very experienced and helpful in these cases.
4. Ensure that security/safety/well-being is included in all your project budgets
As one of our colleagues (Rick?) has already mentioned -- it is vital that we tell our donors the situation (communicating this through secure channels), and integrate into our budget requests funds for ensuring the protection of individual human rights defenders and your organizations. This includes physical protection (safe transport, communications, mobile phones, security cameras, protection for your homes, etc, as well as funds to cover health care costs and support for your families, among others). It also includes funds to ensure you have the time and space to safely strategize together. These aren't 'nice to have', they are 'must haves' -- you all need to be able to respond quickly and flexibly if a colleague is arrested or needs to temporarily relocate or falls ill or has an accident. If your donors question these costs, then have the discussion with them -- and you can remind them that there is a movement among many human rights donors to ask these very questions and to include them in the budgets they offer!
I hope these are some useful and practical thoughts, and that others will come in with more for you.
Spasibo bolshoye za Vashu vazhniyu rabotu. S glubokim uvazheniyem vsyem, Jane
Thank you all for your comments on Kyrgyzstan. We've been helping a scholar there who has committed his academic life to human rights law and working across ethnic divides. As an ethnic Uzbek, he can no longer go safely to his university and is barricaded in his home with his family, leaving only for the sparse basic necessities now available in his city. Our program is offering assistance to get him to a university outside of his country for a year, in hopes things calm enough for his return. In the meantime, he is stifled and his voice is not being heard. He says he would take more security risks, but he has family to provide for and to worry about. This brings home the difficult choices human rights defenders have to make in bringing their work home or bringing their home to work.
Meanwhile, we (www.scholarrescuefund.org) are monitoring the situation as closely as possible from afar. Jane, thank you for your list of organizations to connect to. The International Crisis Group, HRW and Amnesty have had their usual good coverage and continue to impress upon the international community that the next flare up may be imminent, and may be much worse. It seems that international intervention is absolutely necessary. Until then, how much longer can people remain prisoners in their own homes?
Sarah
Connecting human rights defenders to embassies in their countries has been brought up a few times in this dialogue (such as the quote below from Jane) and it piqued my interest.
I read the Front Line Handbook titled 'What Protection Can EU and Norwegian Diplomatic Missions Offer?' and found it very helpful with great suggestions on all the different ways that defenders can strengthen their relationships with this diplomatic missions. Here is the checklist of 'overall pointers' that the Handbook offers at the end of the document:
Now, I am curious to know more about how defenders can utilize the Special Rapporteur on the situation of Human Rights Defenders - any Handbooks on this out there?
Many of the participants have already made references to Protection mechanisms and I would like to just mention that in the Library of PI, www.protectionline.org, under PI publications, there is the following manual that I hope can add to the tools at hrds’ disposal:
Protection of human rights defenders: Best practices and lessons learnt
Volume I: legislation, national policies and defenders’ units.
Where legislation and national policies have been developped for the hrd defenders (mostly in some countries of Latin and Central America), the rate of violations against hrd has not necessarily decreased.
The manual also illustrates some non governmental initiatives by hrds' units. Hrds'units are set up by the civil societies. Their sole mission is the protection of hrds. For example, in Guatemala: Udefegua; in Colombia: Somos defensores; in Uganda: EHAHRDP.
Thank you so much, Kristin and Marie Caraj. Invaluable reading and resources for us to read and to share with our partners.
Protectin HRDs is an issue in many placese, even where we are not in danger of physical violence or arrest. In Israel there is a campaign in place against the human rights community that includes, among other things, attacks on HR and HR NGOs by extreme right wing organizations and the adoption of this deligitimizing and demonizing stance by the Government and the Legislature, as is happening in Israel. It is possible to look at the annex to PCATI's briefing the the UN Human Rights Committee to learn more about this at
http://www2.ohchr.org/english/bodies/hrc/docs/ngos/PCATI_Israel99.pdf
Also, human rights defenders, such as those who demonstrate agains the Occupation/settlements and expulsion of Palestinians from their homes in the West Bank and in East Jerusalem often face direct physical violence by the Israeli security forces. Similalry when arrested they face bannishment by the Court from the sites of the demonstrations. Also the security forces often try to close the demonstration areas, such as those in Bilin and Sheikh Jarrah, to demonstrators on a very selective basis that is clearly biased against HRDs
Thank you, Louis, for challenging the assumption that protecting human rights defenders means that there is physical violence or arrest on the line. Indeed, slander, smear campaigns, stigmatisation, etc are all serious threats to defenders. I have been thinking about your comment as I paged through Jane Barry's book Insiste, Persiste, Resiste, Existe: Women Human Rights Defenders Security Strategies and Integrated Security.
Jane starts the book by focusing on the threats that human rights defenders face - women, in particular. She analyzes why women defenders are persecuted, what the tactics have been to persecute these defenders, the baseline of these threats, how defenders are intimidated, and who is behind these threats. Next, she explores strategies that women defenders have used to face these threats. Here are a few examples (quotes from the text):
The text is sprinkled with powerful quotes from women human rights defenders from all over the world (many of the interviews are carried out by Vahida Nainar). It is an empowering and inspiring read - please take the time to download it, read it, and disseminate it to you colleagues, grant recipients, donors, and friends.
Please share your thoughts and ideas by replying to this 'theme-comment'
Note: This dialogue is PUBLIC. Do not share any private or sensitive information. For advice on a specific situation, please contact a participant privately.
Protection of LGBT Activists:
I personally think that when we are looking at how identity or identities can affect the levels of security and protection that defenders can enjoy we have to look at structural forms of prejudice and discrimination. To develop specific protection measures or to have our rights to protection legally recognised we need to unpack not only how discrimination is entrenched in legal systems but also how the practices of "mainstream" defenders communities can often perpetuate similar prejudices and forms of discrimination. Simple or multiple discrimination can in effect exclude defenders from the discussions that set protection agendas. If defenders are being marginalised and excluded then discussions that centre around protection and security management will fall short of reaching the required specificity. How do you develop security plans for defenders whose personal lives are considered illegal and possibly immoral by the prevailing legal and social system? How do defenders exercise their rights to freedom of assembly, fundamental to any rights campaigning, if those meetings are subject to raids and the defenders to imprisonment and torture? how do you address issues of secondary victimization if crimes are reported to State authorities. I speak mainly of the LGBTI defenders community as that is my main area of interest and I have unfortunately found that many organisations claiming to work on protection of LGBT activists approach the issues from a very hetero-normative perspective that can in effect distance activists from the messages the organisations are trying to deliver.
There are many countries where same-sex activity is still illegal which not only prevents people from openly forming organisations to defend human rights but actually prevents the development of communal protection measures due to fears of outing through association. When there is no recourse to the law for protection because who you are is illegal often defenders will resort to family and friends for protection and security. There are extremes where family members have outed their relatives and those defenders have had to leave their home countries. Friends can become very "fair weathered" when facing similar charges and the possibility of arrest. The work is driven underground making the "one size fits all method" of publicizing threats and talking to officialdom and diplomatic representations pretty much redundant.
Trans activists can often be arrested simply because their id documents don't match their physical appearance and often face considerable hostility when traveling to national and international conferences because the laws in their country do not recognise the right not to be discriminated against because of their gender identity or expression. Many of the trans activists I personally know are also sex workers and I have often seen their profession colour responses to their protection from the the threats they receive because of their activism. The recent case in honduras where two trans activists that denounced abuses by the police and were then subjected to violent attacks and harassment is but one example where embassies were very slow to respond despite pressure from national and international organisations.
National LGBT organisations do exist despite the tremendous obstacles many of them face. Obstacles that range from a lack of funding to having rights to privacy violated because of who you are perceived to be. The marginalisation that many LGBT organisations and activists experience is one of the greatest challenges to developing effective security and protection measures. Lack of funding for LGBT human rights work exacerbates the competitiveness between organisations which effects the capacity to build the strong networks necessary for any form of protection. International organisations that have taken up the cause of LGBT defenders are often at best misguided in their approaches to the work. The recent case of the two people in Malawi is one such example of how the international community got it wrong. In the rush to champion the "gay" issue and the rights to non-discrimination many internationals categorised both people as men when one of them clearly self-identified as a woman. Her identification and understanding of her rights to self-expression and development of one's own personhood is what was being attacked. Linked with anti-african sentiments, she was accused of being un-african and under the influences of the west. Blindness to the diversity of the LGBT community around the globe is yet another obstacle to the development of specific protection measures. In Malawi we were not dealing with a simple case of criminalized sexual activity the issue was/is more complex and that complexity needs to be recognised, unpacked and worked with if we are to effectively ensure protection.
The local organisation in Malawi whilst this case was drawing the attention of the both local and international press was also undergoing investigation having been charged with violating the local public decency ann morality laws. Charged with having pornographic material in the office and with its members facing court cases and possible prison sentences they were in no position to deal with the "other" Malawian case. The case was then taken up by internationals that had little contact with either of the two and the subsequent mistakes were made. International pressure got them released but under the threat of re-arrest should they commit similar "crimes" in the future, There is a need now for relocation yet the international community that supported them in prison has moved on to the next sensational case and one of the activists is still at risk. As they were being charged another organisation in Zimbabwe was also being investigated under similar laws and two of its members arrested for possession of pornographic material. One of them has now been released, being a woman she would have no interest in "gay" porn I think was the Judge's verdict, the other, her male colleague still awaits trial. South African organisations have complained of similar tactics being used against them and their offices being raided. Further north in Uganda people have been outed in media campaigns fueled by the religious right as homosexuals, and assumed pedophiles. In Kenya known trans activists have been picked up on the street, the police having assumed they were soliciting "why else would a man be in woman's clothing", arrested and then tortured until bribes were paid to gain their release. From my experience in Asia and Latin America the picture is very similar.
I raise these cases as I think this is one of the greatest challenges to ensuring protection, how do we counter act the prevailing public morality argument that is not only designed to spread fear in every household throughout the land, thanks to the media, but also distances Diplomatic Missions and other international multilateral bodies from becoming involved because of the morality issue?
Going back to multiple forms of discrimination and exclusion. Women within the LGBT community are often silenced and mis-represented by their male peers. Lesbian leadership is the exception not the rule presenting challenges if we are to develop the specificity needed to protect them. Unfortunately the feminist movement in many countries has also shied away from taking up the issues of lesbian activists. A seemingly obvious ally that in reality tends to reflect wider societal norms and values rather than celebrating the diversity of the women's movement. Socio-cultural norms often translated into quasi legal structures prevent women from organising and collectively campaigning for their rights. Their almost subjugation and invisibility within the LGBT movement makes it all but impossible to get discussions on protection and security on the table unless specific programmes are developed for them and the space created for them to organise and attend. Getting women out of the home is one of the primary challenges we face in developing protection measures. Combine that with a lack of funding and hetero-normative approaches to security and protection and we still have long way to go in accessing this sector of the human rights community. If the majority of women are not afforded human rights can we expect much for this minority population? How do we address discrimination within discrimination?
In short when we talk of protection of the LGBT community we need to address firstly our own approaches to the questions of security and protection and secondly to recognise the diversity of community we are working with, being prepared to challenge not only our own prejudices but also our very sense of gender. Having done this we might be ready to step up and take on the challenges that will in effect lead to real protection for LGBT activists.
For more information see PI's Protection Manual for LGBTI Defenders revised ed. 2009
Here is a list of 'essential ' readings regarding the WHRDS and which answer most of the questions related to their distinct security issues based on their gender. This is not an exhaustive list but it's worth noting that the report of the UNSR on HRDS (item 1) has inspired and has effectively provided the foundation for most if not all of these outstanding body of work on women, their gender and its impact on their work as HRDs. The proceedings of the International Consultation in 2005 (item 4) offers some very rich insights on how the specific threats to the security of WHRDS are attributable to the 'gender and identity'. Many of these resonate Shaun Kirven's earlier posting on Identity and Security.
1. Report of the UNSR on Human Rights Defenders to the 58th Session of the UN Commission on Human Rights (See Part II-B ) http://daccess-dds-ny.un.org/doc/UNDOC/GEN/G02/111/22/PDF/G0211122.pdf?O...
2. Claiming Rights, Claiming Justice: A Guidebook on Women Human Rights Defenders http://www.defendingwomen-defendingrights.org/pdf2008/EN_Claiming_Rights.pdf
3. New Protection Manual for Human Rights Defenders (3rd Edition), Chapter 1.9 on Secrity for Women Human Rights Defenders http://protectionline.org/IMG/pdf/1-9_Manual_English_3rdEd.pdf
4. The International Consultation on Women Human Rights Defenders was held in Colombo, Sri Lanka, between 29 November and 2 December 2005. 2005.http://www.defendingwomen-defendingrights.org/pdf/WHRD-Proceedings.pdf
5. Urgent Action Fund (UAF) Gender Focused Rapid Response Teams:A Preliminary Discussion of the Concept and Potential for Implementation http://www.urgentactionfund.org/assets/files/uaf-pubs/RRT%20Report_Final...
6. “Insiste, Persiste, Resiste, Existe “ Women Human Rights Defenders’ Security Strategies http://www.urgentactionfund.org/assets/files/Resiste/Resiste-Final-Web.pdf
7. “Rising up in Response” Women’s Rights Activism in conflict (Jane Barry and UAF) http://www.urgentactionfund.org/assets/files/RUiR/Rising-Up-In-Response.pdf
Thanks, Edna, for this list of resources. I would add this recent publication by Fellowship of Reconcilliation: Womens Peacemaker Program:
“Engendering Peace- Incorporating a Gender Perspective in Civilian Peace Teams”.
The lead-in to the chapter on Gender, Conflict and Peacebuilding states, "There is no conflict in recent history where women and girls have not
been targeted for sexual violence, whether as a form of torture, as a
method to humiliate the enemy, or with a view to spreading terror and
despair. If that’s not potentially relevant to the protection of international
peace and security, what is?" – Marianne Mollmann, Human Rights Watch,
Women’s Division1
Thanks Edna for sharing list of reading regarding the security of whrds. As we know, women hrds have specific threats and protection needs. In most cases, their threats were identified from their co-workers and colleagues who were not ready to accept them at leadership positions. The one of the workable strategies was recognition to women hrds by well recognized male members of society and their statement in media in the favor of their work increases the level of security of women hrds an dreduces the threats from their collegaues.
Statement of religious leaders in favor of women at leadership position not only stop other religious leader to issue verdicts against women HRDs but help creating space and acceptance in the religious pockets of the society. Also help improve whrd’s general security situation in the area. One such tactic used by one woman hrd in Pakistan was very useful when she wrote a document saying ‘women have equal leadership qualities to men and Islam does not bar women from taking leadership positions. She got it signed by more than 20 religious leaders of the area and got it published. It also had very good impact on her and other whrds security. WHRDs acceptance within their family and close social circle also help improving the general security of WHRD.
One powerful, well recognized and well-respected woman who is also elected representative (Member of National Assembly) in Pakistan visited a woman hrd which increased the acceptance for women hrd and her work in the area and improved her security. Not only is this, after such visit, whrds’ institution has started receiving funding offers from donors. So we can see how donors are influenced by the power.
Currently, 33% women representation in parliament and women ministers in the cabinet has a very positive impact on women and whrds’ security and recognition of their work.
Using statements of religious, tribal and spiritual leaders’ in favor of sexual minorities create acceptance for them in the societies.
Regarding LGBT, their acceptance within their family and their close social group has also positive impact on their security in the society. Strong financial situation also plays important role in the improvement of security and acceptance of LGBT. So does education and profession. In Pakistani society generally people think that DANCE is not allowed by Islam so if LGBT learn and do dance come under threat or face harassments. As compare to rich and educated LGBTs poor and uneducated LGBTs are more vulnerable to these threats.
Hi Ali,
Your point on raising the visibility of women hrds through public recognition is important. While we discuss the importance of security measures that help to shield the identities of hrds who could be harmed for their work, we should remember that the press, advocacy campaigns and other high visibility mechanisms are yet other means to protection. Each case is unique of course and the choice to "go public" is complicated and must be weighed with all potential repercussions. But as your examples illustrate, it can be effective and a shield in itself.
Sarah
On how the issue of security is different for HRDs of different identities and genders -
There is not much I would add to Shaun Kirven's eloquent articulation regarding security issues within LGBTQI communities. I appreciate the issue of threats to trans individuals being raised as well. As we know, due to increased visibility of trans activists, particularly those engaged in sex work, the threats and attacks against them are higher in number and often very severe.
I have been noticing what I find to be a bit of an alarming trend within the women's movements as of late. What I'm referring to is the dropping of letters, specifically the G, in the oft growing acronym LGBTQQI... I can understand the history of access argument to an extent but exclusion is not the best way to work toward social justice. Diversity within our movements is something to celebrate and from which we should learn. Shaun's point on this is excellent. In terms of diversity, I think there are different, intergenerational lenses, which, when collaborative in nature, would be very helpful in the way forward on this issue.
Threats, risks, attacks...any breach of security discriminates according to contexts and identities. Homophobia is ubiquitious. 'Passing' in certain contexts can be very important but that's not to say lesbians and gay activists do not face a high level of threats as well. Gay and trans men in Jamaica for example, are often the targets of violence and hate crime. Is it acceptable, then, to limit our support to trans or women-identified human rights defenders?
Please share your thoughts and ideas by replying to this 'theme-comment'
Note: This dialogue is PUBLIC. Do not share any private or sensitive information. For advice on a specific situation, please contact a participant privately.
Everything we do online, everything we do with a computer, everything we do that involves transmitted data, whether analog or digital, is recordable, copyable, transferable, morphable and redistributable. And thus security considerations should be ubiquitous in all discussions relating to any of the above.
The question posed should not be "how" but "where", and the answer is "everywhere". And then some.
Protecting what we store, protecting what we send, and protecting how others perceive and consume what we produce in earnest is critical to effective social change efforts in the online and digital contexts. Understanding how to encrypt, sign, authenticate and employ other verification protocols, and then faithfully following those processes, is an utterly essential component of all trust-dependent collaborations.
This also brings up the paradox of backup. We absolutely need to back up appropriate and requisite resources and records (and delete the rest via aggressive non-retention policies) in order to assert "our side" of stories that are appropriate to preserve, but we need to store such assets in a secure, encrypted fashion, away from those who would seek to confiscate or otherwise abscond with them in order to erase that which is not in their interest. Encrypted, off-site backup: it's like a safety net for your electronic reality and for your human rights work.
Hi Allan,
This is certainly an area we are most concerned with as we work "virtually" with human rights defenders around the world. Our concerns are most often related to interceptions of messages and communications. I have a question for you that most likely can't be answered as clearly as one would hope, given the nature that all (including these posts) is recorded, read and shared, and often with and by those who are not the intended recipients.
How can one securely share tools, protocols, and verification strategies when these very tools, protocols and verification techniques must be shared through often unprotected, unencrypted means? Are we relegated to face-to-face sharing/training? Or are there relatively simple techniques with basic technology that we can use to keep one step ahead of those who may be seeking to intercept our communications?
Thanks,
Sarah
I believe that open source philosophy and "hiding in plain sight" are the only way to go in disseminating security tools and associated knowledge. If "keeping tools secret" from the "other side" is your primary protection against compromise, that's a weak boundary to say the least.
Trying to be secretive about security tools is a distraction in my opinion. While there is no need to overshare or save your adversaries time by telegraphing unnecessary details, "They" know all about the tools in play and/or can pay others who do. Good security tools and platforms (TOR, Public Key Encryption, OTR, Linux) can stand the scrutiny and it makes them better.
That is distinct from being secretive about tactics, strategy and senstive knowledge and data; that's the stuff you want to keep off radar using the free and open security tools. Verification strategies fall into the category of things to be circumspect about.
But tools and protocols? The way you stay one step ahead is to follow best practices with proven tools and platforms, and show others how to do the same. Hide in plain sight!
Hi Allen, I certainly agree that ensuring the safety and security of our records, resources, and information is essential to preserving our own safety and security. Activists need to understand how to employ these tactics, as well as employ them consistently so the risk of detention or abuse is lessened.
I would like to share a piece written by Patrick Meier of DigiActive entitled "Quick Guide to Secure Information". This article includes a very thorough list of ways to stay safe and protect your data when taking part in digital activism. He includes tactics and technologies that can be used with:
The list is truly exhaustive, and I would urge anyone interested in keeping safe while participating in cyber-activism to read this piece. There are tons of links throughout the article, some of which include:
CryptoSMS, SMS 007, and Kryptext (secure texting)
Bitlocker, TrueCrypt, PGP Whole Disk Encryption, and Check Point (hard drive encryption)
Hushmail and Rise Up (encrypted email platforms)
Tor Software and Psiphon (secure browsers)
As I said, there are many more links, as well as very useful tips on how to store and access information safely, so please see the original article for more information.
Thanks Ali for sharing Patrick Meiers guide. Links are very useful. In internet communication and browsing, softwares and secure emailings improves security. Not only this, these systems gives sense of security.
In contexts, where i have worked or working hushmail emailing and true crypt are well tested and reliable. Will definitely check others.
I always stress on seriousness and responsible attitude towards security. In one communication loop if one member at the sending/receiving end doesn't follow the security rules and protocols can expose the whole group even if rest of the group members are taking security very seriously and strictly following security protocoals.
Great list! Thanks to everyone for sharing and pointing to specific resources. I already knew of some of these, but not all. This is quite useful. I've been researching software tools specifically for use in the human rights and NGO fields, and summarized some of results already (with apologies for the self plug). Obviously there's some debate about the efficacy and value of each, but there's no doubting the need for these kinds of tools.
I've been following this entire conversation with interest. Keep it up!
hi. wanted to share with you couple of thoughts..
one element that for me is very important in ICT security for human rights defenders (HRDs) is to put digital security in a process based framework. starting with bigger picture, integrating digital security with the overall protection plan HRDs may have. to understand how it falls into their work, into the context of the risk they face. and than carefully work on building security on the top of this. reviewing the physical security of the information, working on the foundation of the protection against malware, spy-ware, updating software or switching to free and open source software (however some times it is too much to ask from HRDs to switch entirely to Linux), exercising passwords skills (however simple this may seams), demystifying different elements of technology. and only than working the way towards more complex elements like encryption of the information on the computers and communications (email, web, text and voice chat), hiding the existence of the information on the computers (e.g. steganography) or "hiding" the communications (circumvention tools like TOR). it is important that this is the a process of many relatively simple elements working together.
digital security may seem overwhelming to many people. that is why, i think, the process based approach is helping. it is showing clear path. HRDs can decide how far they need, how far they are able (and some times how far they can) walk on this path. still one improves the security by taking even few steps in this process (for example just cleaning the computer from malware, and setting better passwords on the email accounts). of course the more steps you take the better :-)
there are times where taking too many steps on this path is risky. HRDs working in specific situation cant use some of the tool (e.g. encryption tools like GPG or secure email providers like VaultletSoft.com) as this may lead to increase of risk rather. but those decisions are possible only when one understands the implications of the usage of the tools, the logic behind the tools.
one other element that was interesting to see in our development of the 'security in a box' toolkit is that HRDs are very often lost in the abundance of the tools. they do not know which one to choose. this is why we decided to choose (in most of the cases) one tool to answer the given ICT security need. it may seem risky to put all the trust on one tool. but it actually let HRDs proceed.
Wojtek Bogusz
Information Security; Front Line - The International Foundation for the Protection of Human Rights Defenders; www.frontlinedefenders.org
I've really appreciated the breadth of experience in this dialogue, and since since you are on-line as a resource, I have a technical question for some of you with more expertise in these areas: How secure is encrypted VoIP (Internet telephony) technology? Is this a secure communication tool that can be useful to HRDs, or is there reason for caution? What practices do we need to enact to keep VoIP conversations secure?
Nils, that's a great question. I'm not an expert on the subject, but I can tell you what I know:
Let's start with the obvious but important point: there is no totally secure system, anywhere, ever.
That said, encrypted VOIP *can* be pretty secure. Among other things it depends on:
The above are just some key points; it is by no means a complete threat matrix by any means.
I welcome others with more knowledge to correct me and let me know what I left out :^)
hi Nils, this is very good question. people ask a lot about security of communication over Skype, Google Talk and other tools. (since i don't want to recommend yahoo or msn i will not mention them here :-) maybe you want to discuss some other specific tools? than please bring the name in. below i will concentrate on skype as this is the most popular tool at the moment.
skype voice & text communication is encrypted when you communicate between two computers in the internet. so communication is much more secure than communication between two phones or mobile phones! [1] of course when you call from skype to the landline or mobile phones the last segment of the communication is carried unencrypted over the lines of the local telephone company, local to the phone number that you call. so one need to be aware of this.
important thing about skype (and other tools mentioned above) is that this is a proprietary tool. what means that we do not know what exactly it does with the information. we (as a internet community) have no access to the source code and we cannot independently verify it. and as far as i know there is no decent free and open source tool that can offer you VoIP. so we need to take special measures:
[1] skype is a product of US company so there is an open question how easy is to tap into communication over skype for US law enforcement agencies. there are many stories/rumours about this. i do not want to go into this here :-)
Wojtek Bogusz
Information Security; Front Line - The International Foundation for the Protection of Human Rights Defenders; www.frontlinedefenders.org
Greetings to Wojtek, Nils and Gunner!
I'm glad that Wojtek took a biG chunk out of important issues surring secure VOIP - It's a tough topic to address quickly, and requires both a high level and a low-level view of all the pieces, parts and participants in a relatively secure VOIP converstation.
Here are a couple of additional possibilities to consider, although they're not all neccessarily viable options for some:
While none of the possible solutions is optimal and/or completely free, each has its pros and cons:
The one bit of good news here is that ZFone addresses all kinds of esoteric VOIP security problems and weaknesses, and is the brainchild of Phil Zimmermann http://en.wikipedia.org/wiki/Phil_Zimmermann . On top of that, it's incredibly elegant in the way it works and is extremely intuitive and easy to use with confidence.
So, with a bit of time, patience and luck, you may end up finding an Open Soure VOIP client that's compatible with ZFone and works on the operating system of your choice. We're not asking for too much here, are we ;-)
Rick
Hi, Many human rights defenders that i train during recent years ask the questions about mobile phone - but this topic was covered by Nils, Rick and others already :-) So let me bring another question that i come across often, especially in the less developed countries: Is it secure to use internet café? For some defenders this will be the only way they can use Internet.
Security in internet café is a challenging topic, please treat recommendation below as conditional, that would apply only if possible in a given situation.
All the items below are assuming that you use the computer from the Internet café:
Wojtek Bogusz
Information Security; Front Line - The International Foundation for the Protection of Human Rights Defenders; www.frontlinedefenders.org
Pages