March 29, 2016

Protest Tech

Surveillance and the intimidation of human rights defenders and community activists is increasing in the mobile communications age. The following suggestions and applications can help you guard against people accessing your personal information during protests.


CONTROL / TURN OFF DATA SHARING

Enabling GPS and Wireless allows your cellphone company and the applications accessing your location data to have a more precise location history, so it is advised to turn these services off when you don’t need them. Also, the history of every wireless network you have ever connected to is stored on your phone. It broadcasts this information whenever it searches for available networks.


PASSWORD AND ENCRYPTION

It is advisable to lock the SIM card and the phone screen with a PIN code for enhanced security. It is also possible to add another layer of security to the accounts, settings, applications, photos and files stored on the device by setting a pass-phrase and encrypting the data.


SECURE MOBILE COMMUNICATIONS

To secure your mobile communications, try using Open Whisper Systems (similar to WhatsApp) and Jitsi Meet (similar to Skype).

ACCESS MORE RESOURCES:

RECENTLY RELEASED REPORTS AND FACTSHEETS

 

LEGISLATION, CASE LAW, AND NATIONAL INSTRUCTIONS / STANDING ORDERS

 

AFRICAN COMMISSION AND UNITED NATIONS TREATIES, GENERAL COMMENTS, AND RESOLUTIONS