Please note, we understand that organizing in a new terrain in the aftermath of this election can invite feelings of doubt and despair and we acknowledge and share those concerns. That said, there aren’t any tips or to-dos that will completely guarantee your safety or the safety of your group members and volunteers. And the risk level of different actions can vary depending on your identity, location, political environment, etc. When you are planning an action, your responsibility is to take reasonable precautions and make sure that everyone has all the information they need to make the best decisions for themselves.
This guide is not exhaustive, and we encourage you to adapt these tips to your local needs. Please consult with legal experts and community leaders whenever possible.
Event Planning and Physical Safety
This section provides guidance on planning as safe and effective events as possible, including considerations for choosing locations, coordinating transportation, and publicizing details responsibly. Activists must also carefully consider the risks and benefits of engaging with local law enforcement. Depending on your group’s relationship with police and the nature of your event, this decision can affect safety for attendees and the tone of the gathering. If law enforcement is involved, we provide recommendations for appointing a police liaison and using conflict de-escalation strategies on the day of the event.
Before the Event
- Location and Time Planning: Choose times and locations that prioritize visibility and safety, with clear plans for entry and exit. Consider planning in open, public spaces where you can maintain visibility and control over your group’s surroundings.
- Transportation: Ensure organizers and attendees have a safe way to and from the event. Notify a trusted contact of your plans, and if you’ll be alone, coordinate with others to travel in groups when possible.
- Publicizing Events: Share event details selectively and consider avoiding identifying language or images on social media, especially in hostile areas.
Know Your Rights at Protests
Activists should be familiar with their legal rights to ensure safe participation in protests. This section outlines essential information about protester rights, when and where permits are required, and tips for engaging with law enforcement while maintaining safety. Activists should know their rights to assemble, document the events, and avoid self-incrimination. Preparing for encounters with police and understanding how to document any rights violations will support your group’s safety.
- Right to Assemble: Public spaces (streets, sidewalks, parks) are protected for public demonstrations. You can legally photograph or video anything in plain view, including police actions.
- Permits: You do not need a permit to protest on sidewalks or streets, provided you do not obstruct traffic. Large events or amplified sound may require permits—check local regulations.
- Non-engagement with Hostile Individuals: If approached by someone aggressive, encourage participants to avoid engaging and keep a safe distance. Notify an event organizer if necessary.
Engaging with Law Enforcement
Activist groups have different approaches to notifying law enforcement about events. It is up to each group to assess their own community’s relationship with local law enforcement and decide whether or not to reach out in advance. Here are key factors to consider:
- Reasons to Notify Law Enforcement:
- Required by law or necessary for securing permits.
- Concerns about large crowds or known counter-protests.
- Established trust with local officers or officials who are supportive of de-escalation.
- Reasons Not to Notify Law Enforcement:
- Police history of bias or violence against certain groups.
- Concerns about police presence escalating tensions or targeting marginalized community members.
- No requirement for permits or expectation of conflict.
Regardless of whether you notify law enforcement ahead of time, assign a police liaison—a group member or respected community partner—who can speak with law enforcement on behalf of your group. This person should clarify your group’s nonviolent intentions, address any law enforcement concerns, and help maintain communication if tensions arise.
If Approached by Law Enforcement
Staying calm and knowing your rights can make a difference if approached by law enforcement. This section highlights strategies for managing these encounters, including how to document them if you believe your rights were violated. Keeping track of details, gathering witness contacts, and knowing what to say can help you address issues later.
- Stay Calm and Composed: Keep your hands visible and avoid arguing or resisting police. Ask if you are free to leave; if so, walk away calmly.
- Documenting Violations: If you believe your rights were violated, record the details (officer badge numbers, witnesses, any injuries) and report them later to a civilian oversight body.
Dealing with Orders to Disperse
Law enforcement should only issue dispersal orders when absolutely necessary. When this happens, it’s critical to remain calm, comply with instructions, and avoid escalating the situation.
- Comply Calmly: Law enforcement must provide a clear dispersal order, time to leave, and a safe exit route before arrests. Always follow dispersal instructions calmly to avoid escalation.
De-escalation Tips for the Day of the Event
- Remain Calm and Be Observant: Encourage participants to stay aware of their surroundings and avoid direct engagement with hostile individuals.
- Maintain a Supportive Stance: Use calm, open body language. Maintain personal space and use neutral facial expressions and gestures.
- Active Listening: Sometimes, letting a person vent can defuse a situation. Keep the focus on shared concerns rather than disagreements.
Digital Security and Online Privacy
Digital security is crucial as activists increasingly rely on online platforms to communicate, organize, and advocate. This section offers essential tips for protecting your accounts, securing sensitive information, and practicing safe browsing habits. By being mindful of what you share and taking proactive measures like enabling two-factor authentication, you can help prevent unauthorized access to your personal and group accounts. Implementing these practices reduces the risk of data breaches and cyberattacks targeting your group’s activities.
Digital Security Basics
- Passwords and Authentication:
- Use strong, unique passwords and enable two-factor authentication on all accounts, especially for email, social media, and banking.
- Avoid reusing passwords, and use a password manager to help manage and protect your credentials.
- Backup Your Data: Keep an encrypted backup of essential files on an external hard drive. Cloud services (Google Drive, Dropbox) do not count as backups since they are vulnerable to deletion.
Doxxing, Harassment, and Online Threats
Doxxing and harassment are increasingly common risks for activists, and it’s essential to know how to protect against these threats. This section offers steps for limiting your online visibility, such as conducting “opposition research” on public-facing group members to identify vulnerabilities, and provides guidance on managing and documenting harassment if it occurs. If you or your group members experience doxxing or threats, being prepared with documentation can aid in reporting and legal actions.
Preventative Measures
Taking proactive steps to reduce the amount of personal information available about you online can prevent potential harassment. It is important to to assess your public profile, remove sensitive details, and limit interactions with those who may pose a risk.
- Conduct “Opposition Research”: Periodically check what information is publicly available about your group leaders or public-facing activists. This helps understand your potential vulnerabilities.
- Implement Privacy Steps Against Doxxing: Avoid sharing personal details like addresses or contact numbers online. Adjust privacy settings, especially on high-traffic accounts. Register your events using a group email address instead of a personal one.
If You Are Doxxed or Harassed
If you experience doxxing or online harassment, it’s crucial to stay calm, document the incidents, and seek support if needed. This section details how to gather evidence and respond effectively, whether by blocking harassers, reporting incidents, or seeking legal advice.
- Document Incidents: Keep detailed records of online harassment, including screenshots, dates, and the names of those involved. This information is valuable for any potential legal action.
- Use Blocking and Reporting Tools: Most social platforms allow you to block and report harassers. Don’t hesitate to do so for anyone attempting to intimidate or threaten you.
- Legal Recourse: Many states have anti-doxxing laws that criminalize sharing personal information maliciously. Contact a legal aid service or state legal advisor for advice specific to your area.
Phishing and Malware Protection
Phishing and malware attacks can compromise your security by tricking you into sharing sensitive information. To counteract these risks, stay vigilant about email links, avoid sharing passwords through unsecured channels, and use trusted software to protect your devices. You can take basic steps to guard against phishing and malware to protect your data and online identity.
- Avoid Suspicious Links and Attachments: Phishing attempts often create urgency; only click links if you are certain of the sender’s authenticity.
- Recognize Fake Security Alerts: If prompted to re-enter passwords or credentials, ensure you’re on the official site. Use trusted sites to check the strength and security of your passwords.
Securing Sensitive Communications
In some cases, activists may need to share sensitive information within their teams. Encrypted communication platforms offer a secure way to protect these details from surveillance. There are several platforms and practices that help you control the privacy of your communications.
- Use Encrypted Platforms: For planning sensitive actions, use encrypted communication apps like Signal, which provides end-to-end encryption.
- Limit Online Storage of Sensitive Materials: Where possible, keep critical information offline or securely stored on encrypted drives.
- If online storage is needed, use a provider that uses end-to-end encryption as well as encryption at rest. Proton drive is an example.
Enhancing Online Privacy and Safety for Activists
In a climate of heightened surveillance and online harassment, activists need tools to proactively manage their personal information. This section introduces useful tools, such as Google’s "Results About You" tool and DeleteMe, which help limit online visibility and remove sensitive information from public databases. These tools can help activists protect their privacy and maintain control over what is accessible to the public.
- Google’s "Results About You" Tool: Google allows users to manage personal information that appears in search results. You can use Google’s Results About You tool to request the removal of your personal data, such as addresses and phone numbers, from search results. This tool is essential for activists wanting to limit what information is easily accessible about them online.
- DeleteMe: DeleteMe is a subscription-based service that helps you remove personal information from data broker sites. This service regularly searches and deletes your information from databases that may otherwise make your details accessible to unwanted parties. Although there is a cost, this can be a valuable service for those who want to reduce their digital footprint.
- Use “Incognito” Mode or Private Browsing: When researching or communicating online, consider using incognito or private browsing modes in your web browser. While this won’t make you anonymous, it can reduce tracking by some sites and prevent your browsing history from being saved on your device.
- Limit Social Media Details and Tagging: Regularly review privacy settings on social media accounts to control who can view your profile, posts, and tagged photos. Restrict visibility on platforms like Facebook, Instagram, and LinkedIn, and consider removing any publicly accessible posts or sensitive details that could be used to identify or locate you.
- Use a VPN (virtual private network) service when connecting to wifi in public spaces (coffee shops, hotels, airports). Here is a list of options.
Taking these additional steps can help protect your personal information from being easily accessible online, adding an extra layer of security for you and your group members.
Additional Resources for Activist Safety and Security
Electronic Frontier Foundation (EFF): Offers comprehensive guides on digital self-defense, secure communications, and privacy practices.
https://activisthandbook.org/tools/security
Access Now's Digital Security Helpline: Provides real-time assistance for civil society groups, activists, and journalists facing digital security issues.
https://www.accessnow.org/help/
Security in-a-Box: A toolkit developed by Front Line Defenders and Tactical Technology Collective, offering digital security tools and tactics for human rights defenders.
https://www.frontlinedefenders.org/en/resource-publication/security-box
Amnesty International's Digital Security Resource Hub: Curated resources to help activists build and protect their digital resilience.
https://securitylab.amnesty.org/digital-resources/
Civil Liberties Defense Center's Digital Security Program: Provides guidance on protecting against digital attacks and maintaining online privacy.
https://cldc.org/security/
Greenpeace’s Protest Safety Tips Toolkit: Provides guidance on de-escalation strategies and staying safe during public protests. https://www.greenpeace.org/usa/toolkits/protest-safety-tips-from-greenpeace/