

In an era where the online landscape is increasingly weaponized against activists and organizers, understanding and implementing robust digital security is not optional – it's essential for survival and effective resistance. This urgent message comes from the "Digital Defenders: Securing Our Resistance – Infosecurity for Everyday Activists" webinar hosted by Women's March, featuring experts Dr. Leslie Honer and Dr. Heather Woods. Their mission is clear: to equip everyday activists with the tangible, usable skills needed to safeguard themselves, their communities, and their movements in the face of growing surveillance and authoritarian actions.
The experts lay bare the stark reality of the digital world: it is a changing landscape where information security is constantly under threat. Platforms, while serving as vital tools for community building and advocacy, actively participate in, and sometimes incentivize, anti-democratic practices like data collection and surveillance. Algorithms prioritize engagement over truth, often amplifying misinformation and hatred. It's a space where you cannot easily opt out of digital surveillance systems, and where data is everywhere. Dr. Woods starkly notes, if you're not paying for a service, you are the service.
This pervasive data collection extends beyond social media. Surveillance exists at governmental and state levels (policing, border control), institutional levels (employment, finance, healthcare, public services), and even within our own homes via smart devices that we actively opt into. The critical concern is the weaponization of this data.
Crucially, information security is presented not as an individual pursuit, but a worked and collective practice. Your actions and choices online directly influence the safety and risk level of others in your network. This means being mindful of who you tag, what pictures you share (especially at protests), and how you interact with others online. Trusting and verifying the collectives you engage with is also paramount, particularly with the rise of fake online actions.
Given this challenging environment, the key takeaway is to lean into layers of protection over perfection. You cannot eliminate all online risk, but you can build strong barriers around your information. Info security is an ongoing practice requiring long-term investment and constant vigilance as technologies, laws, and risks evolve. Something is better than nothing, and baby steps make a real difference.
Essential Digital Defense Basics to Implement NOW:
- Assume everything is public. Be mindful of what you post online, treating it as if it could be on the front page of a newspaper.
- Divide your devices. Use separate devices for work and personal life to prevent employer access to personal data.
- Keep devices and software updated. Patches and updates often include crucial security measures.
- Use strong password management. Create long, complex passwords (14+ characters) and consider using a reliable password manager.
- Enable two-factor authentication (2FA) on all possible accounts.
- Use a VPN (Virtual Private Network) to add a layer of privacy to your online activity. (Explore options like built-in phone VPNs, or third-party providers).
- Back up your data in multiple locations, including offline storage, to protect against breaches or loss.
- Choose tools that prioritize privacy. As of the webinar date, Signal was recommended as the best messaging system for private communication due to end-to-end encryption.
Stepping Up Your Game:
- Conduct Regular Data Audits. Evaluate how much time you spend on apps and how your data is used. Check for security or fraud alerts in your email. Use free online tools like Have I Been Pwned or Cyber News Personal Data Leak Check to see if your data has been compromised.
- Set aside dedicated time (monthly or quarterly) to review and update your digital security settings.
- Pinpoint Risks for Specific Scenarios.
- At Protests: Remove Face ID/biometrics, use a long passcode, set a short auto-lock time. Be cautious about taking pictures of others' faces or identifying features. Assume your location is public (cell towers can triangulate). High-risk individuals might consider using a burner phone. Consider resources like Faraday bags
- At Borders: This is complex and evolving. Consider removing biometrics and using passcodes. Know your rights (though experience may vary based on risk). Some wipe phones, but being "too clean" can also raise suspicion. Consult immigration attorneys or experienced collectives for specific advice.
- Build Your Collective's Defenses. Monitor each other's digital footprints for threats. Host "infosec parties" or privacy reading groups to share knowledge. Consider the book "The Smart Girls Guide to Privacy" by Violet Blue
The message is clear: the digital fight is intertwined with the fight for justice. By understanding the risks and implementing layers of protection, activists can strengthen their organizing, protect each other, and resist the forces seeking to divide and suppress them. Your voice matters, your impact matters, and becoming safer online is a powerful act of resistance.
Written by
Comments







