{"id":77184,"date":"2016-08-08T12:00:43","date_gmt":"2016-08-08T11:00:43","guid":{"rendered":"https:\/\/www.transcend.org\/tms\/?p=77184"},"modified":"2016-08-03T13:19:15","modified_gmt":"2016-08-03T12:19:15","slug":"a-guide-to-online-security-for-activists","status":"publish","type":"post","link":"https:\/\/www.transcend.org\/tms\/2016\/08\/a-guide-to-online-security-for-activists\/","title":{"rendered":"A Guide to Online Security for Activists"},"content":{"rendered":"<p><em>2 Aug 2016 &#8211;<\/em> The last year has seen an uptick in digital threats faced by individuals and organizations around the world, and those working on the question of Palestine are no exception.<\/p>\n<p>Over the past few months, there have been attacks on boycott, divestment and sanctions (BDS) movement websites, threatening emails to activists and new information emerging on Israel\u2019s surveillance capabilities.<\/p>\n<div id=\"attachment_77185\" style=\"width: 610px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/08\/activism.jpg\" ><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-77185\" class=\"wp-image-77185\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/08\/activism.jpg\" alt=\"Amid growing digital threats from Israel and other governments, individual activists and organizations can take practical steps to protect themselves and their communities. Ryan Rodrick Beiler ActiveStills\" width=\"600\" height=\"401\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/08\/activism.jpg 800w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/08\/activism-300x200.jpg 300w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/08\/activism-768x513.jpg 768w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/a><p id=\"caption-attachment-77185\" class=\"wp-caption-text\">Amid growing digital threats from Israel and other governments, individual activists and organizations can take practical steps to protect themselves and their communities.<br \/> Ryan Rodrick Beiler ActiveStills<\/p><\/div>\n<p>\u201cThe latest cyber-attacks against BDS seem to be part of a full-fledged Israeli war on the movement that includes McCarthyite legal repression, use of intelligence services and yet more funding for \u2018brand Israel\u2019 propaganda,\u201d <a target=\"_blank\" href=\"https:\/\/bdsmovement.net\/news\/attacks-bds-websites-smack-israel%E2%80%99s-despair-its-growing-isolation\" >said<\/a> Mahmoud Nawajaa, the general coordinator of the Palestinian Boycott, Divestment and Sanctions National Committee (BNC). \u201cThese attacks smack of Israel\u2019s despair at its growing isolation around the world, after failing for years to stem the growing support for the nonviolent BDS movement as a strategic and effective means to achieve Palestinian rights under international law.\u201d<\/p>\n<p>Following several new stories involving digital threats to BDS and solidarity activists, I started speaking with different people in the movement to learn more about the specific concerns faced by individuals.<\/p>\n<p>The concerns they raised vary, as do the threats they perceive to their work and the work of others, but everyone I spoke with agreed that digital threats to the movement are on the rise.<\/p>\n<p>Omar Barghouti, a Palestinian human rights activist and co-founder of the BDS movement, told me that the common response to such threats has been \u201cto further enhance our electronic security but without panicking or adopting stringent measures in that regard.\u201d<\/p>\n<p>Barghouti says that an \u201cunexpected common outcome\u201d of such attacks \u201chas been to raise the morale of activists who feel further reassured about the effectiveness of the human rights campaigning that we are conducting.\u201d<\/p>\n<p>Although such attacks can serve as an affirmation, they are nevertheless a hindrance to important work.<\/p>\n<p>This article serves as a concise resource to address the most commonly cited concerns. It is by no means exhaustive, but should provide a series of first steps toward improving digital security for activists and organizations.<\/p>\n<p><strong>Problem: Solidarity websites are regularly experiencing distributed denial of service (DDoS) attacks.<\/strong><\/p>\n<p>As eQualit.ie \u2013 an organization that provides free and open source digital security for civil society \u2013 <a target=\"_blank\" href=\"https:\/\/electronicintifada.net\/blogs\/ali-abunimah\/attacks-bds-websites-linked-israel\" >reported in June<\/a>, there were six recorded incidents against <a target=\"_blank\" href=\"https:\/\/bdsmovement.net\/\" >bdsmovement.net<\/a>, the high-profile website of the BNC between February and March of 2016.<\/p>\n<p>Ali Abunimah of The Electronic Intifada, which has <a target=\"_blank\" href=\"https:\/\/electronicintifada.net\/blogs\/ali-abunimah\/palestine-news-websites-including-ei-knocked-offline-internet-attackers\" >experienced DDoS attacks as well<\/a>, <a target=\"_blank\" href=\"https:\/\/electronicintifada.net\/blogs\/ali-abunimah\/attacks-bds-websites-linked-israel\" >observed<\/a> that the attacks \u201clook like another element of Israel\u2019s increasingly aggressive effort to silence the BDS movement by all means.\u201d<\/p>\n<p>The technical report from eQualit.ie \u201cuncovers important evidence that the distributed denial of service (DDoS) attacks carried out on the main website of the BDS movement and websites of other groups critical of Israel\u2019s occupation and violations of human rights are complex and highly coordinated,\u201d Barghouti said. \u201cWe\u2019re encouraging all of our partners to use anti-DDoS services such as the Deflect service provided by eQualit.ie and to encrypt their communications wherever possible.\u201d<\/p>\n<p>A <a target=\"_blank\" href=\"https:\/\/ssd.eff.org\/en\/glossary\/distributed-denial-service-attack\" >DDoS attack<\/a> can prevent a website from functioning efficiently, temporarily or indefinitely.<\/p>\n<p>Typically, the attack saturates its target with server requests designed to flood its bandwidth, leaving the server incapable of responding to legitimate traffic. To the user, this results in an inability to access the site in question.<\/p>\n<p>Although a DDoS attack can be leveraged against any website, journalists and activists are frequent targets. And where a corporation or government may have the resources to fend off such an attack, many smaller organizations or individuals don\u2019t know what to do when they experience one.<\/p>\n<p><strong>What you can do:<\/strong><\/p>\n<ul>\n<li>The eQualit.ie <a target=\"_blank\" href=\"https:\/\/deflect.ca\/\" >Deflect<\/a> service \u2013 which was employed to protect bdsmovement.net \u2013 offers DDoS protection to <a target=\"_blank\" href=\"https:\/\/wiki.deflect.ca\/wiki\/Eligibility\" >eligible<\/a> organizations.<\/li>\n<li>Cloudflare\u2019s <a target=\"_blank\" href=\"https:\/\/www.cloudflare.com\/galileo\/\" >Project Galileo<\/a> provides DDoS protection for at-risk public interest websites.<\/li>\n<li>Regularly backing up your website is important and can ensure that even if a DDoS attack takes it offline, your content remains intact.<\/li>\n<li><a target=\"_blank\" href=\"https:\/\/www.eff.org\/keeping-your-site-alive\/mirrors\" >Mirroring<\/a> your site is another good option for ensuring that your content remains online during an attack.<\/li>\n<\/ul>\n<p><strong>Problem: Governments are monitoring and capturing communications and could use them against activists.<\/strong><\/p>\n<p>Three years ago, Edward Snowden, leaking information from the National Security Agency, demonstrated the <a target=\"_blank\" href=\"https:\/\/www.eff.org\/nsa-spying\" >capacity of the United States<\/a> and other world governments to spy on their citizens.<\/p>\n<p>This built upon previous suspicions and information that governments have been conducting surveillance on the digital communications of their own citizens and of people in other countries.<\/p>\n<p>\u201cIsrael\u2019s military and intelligence services act with impunity. It seems highly likely that Israel is using them in its surveillance of electronic communications and phone calls of BDS activists in western countries, in contravention of these countries\u2019 respective laws,\u201d Barghouti said. \u201cGovernments must take action to protect their citizens from the intrusive surveillance of Israel\u2019s intelligence services.\u201d<\/p>\n<p>Many organizations and institutions are working to combat surveillance by challenging the system through legal and legislative means.<\/p>\n<p>At the same time, it is important that individuals and communities protect themselves by changing their habits and\/or adopting new technologies that offer additional protection from spying.<\/p>\n<p>Barghouti agrees. \u201cWe\u2019re keen to raise awareness of the fact that while it\u2019s important to take basic online security measures, Israel has huge cyberwar capabilities at its disposal so is likely able to intercept even encrypted communications \u2013 don\u2019t communicate anything via telephone or online that you\u2019re not prepared for your adversaries to intercept.\u201d<\/p>\n<p>The type of strategy you should take depends on what you\u2019re trying to protect, and who you\u2019re trying to protect it from \u2013 as well as the amount of effort you\u2019re willing to put in, and the likelihood that you\u2019re at risk.<\/p>\n<p>Before changing your behaviors, it\u2019s helpful to <a target=\"_blank\" href=\"https:\/\/ssd.eff.org\/en\/module\/introduction-threat-modeling\" >conduct a risk assessment<\/a> by thinking through some questions about your work and lifestyle.<\/p>\n<p><strong>What you can do:<\/strong><\/p>\n<ul>\n<li>Mobile apps that employ <a target=\"_blank\" href=\"https:\/\/ssd.eff.org\/en\/glossary\/end-end-encryption\" >end-to-end encryption<\/a> and allow users to verify one another using <a target=\"_blank\" href=\"https:\/\/ssd.eff.org\/en\/glossary\/fingerprint\" >fingerprints<\/a> include <a target=\"_blank\" href=\"https:\/\/whispersystems.org\/\" >Signal<\/a>, WhatsApp, and <a target=\"_blank\" href=\"https:\/\/wire.com\/?hl=en\" >Wire<\/a>, all of which also have desktop and encrypted voice calling options. It\u2019s also possible to add end-to-end encryption to many messaging tools, including Facebook, by using desktop apps Adium or <a target=\"_blank\" href=\"https:\/\/www.pidgin.im\/\" >Pidgin<\/a> along with <a target=\"_blank\" href=\"https:\/\/en.wikipedia.org\/w\/index.php?title=Off-the-Record_Messaging&amp;oldid=725339119\" >off-the-record (OTR) messaging<\/a>.<\/li>\n<li>Device security is also important. Understanding <a target=\"_blank\" href=\"https:\/\/ssd.eff.org\/en\/module\/problem-mobile-phones\" >how mobile phones can be insecure<\/a> can help you make informed decisions about how you use them in your advocacy.<\/li>\n<li>For more information and guides on how to use some of these tools, see the Electronic Frontier Foundation\u2019s <a target=\"_blank\" href=\"https:\/\/ssd.eff.org\/en\/index\" >Surveillance Self-Defense<\/a> or <a target=\"_blank\" href=\"https:\/\/securityinabox.org\/\" >Security in a Box<\/a>, a project of the Tactical Technology Collective and Frontline Defenders.<\/li>\n<\/ul>\n<p><strong>Problem: Facebook groups and other communities are often infiltrated, putting individuals and their networks at risk.<\/strong><\/p>\n<p>Student groups, both activist and academic in nature, have long expressed suspicions that anti-Palestinian political groups are spying on them. In 2014, The Electronic Intifada <a target=\"_blank\" href=\"https:\/\/electronicintifada.net\/content\/documents-reveal-zionist-group-spied-us-student-delegation-palestine\/13130\" >published documents<\/a> demonstrating that a student spied on members of a University of California \u201cconflict analysis\u201d group called the Olive Tree Initiative and reported back to <a target=\"_blank\" href=\"https:\/\/electronicintifada.net\/tags\/amcha-initiative\" >the AMCHA Initiative<\/a>, an anti-Palestinian group \u201cbehind a number of initiatives to silence and intimidate students and teachers perceived to be critical of Israel.\u201d The AMCHA Initiative was <a target=\"_blank\" href=\"http:\/\/www.amchainitiative.org\/about\/\" >co-founded<\/a> by Tammi Rossman-Benjamin, a lecturer at the University of California, Santa Cruz.<\/p>\n<p>Online, digitally savvy organizations employ similar tactics. <a target=\"_blank\" href=\"https:\/\/electronicintifada.net\/tags\/canary-mission\" >Canary Mission<\/a>, which launched in April 2015, targets campus BDS activists, tarring them with labels like \u201cfake Jew\u201d with the \u201cstated aim of denying future employment opportunities to the students they had targeted,\u201d journalists Max Blumenthal and Julia Carmel <a target=\"_blank\" href=\"http:\/\/www.alternet.org\/tea-party-and-right\/modern-day-mccarthyists-are-going-extremes-slime-activists-fighting-israels\" >wrote<\/a> last year.<\/p>\n<p>There have also been incidents, <a target=\"_blank\" href=\"http:\/\/www.al-monitor.com\/pulse\/originals\/2016\/07\/israel-cyber-warfare-individual-intifada-technology-monitor.html\" >some publicized<\/a>, some not, in which members of pro-Israel groups and intelligence agencies have disguised themselves in order to infiltrate BDS or Palestine solidarity groups.<\/p>\n<p>Many individuals I spoke with expressed concern that their online communities could be, or had been, infiltrated by those seeking to do harm. Most expressed that this threat came from groups that at least appear nominally independent from government (such as AMCHA).<\/p>\n<p>When I asked a followup question \u2013 \u201cDo you feel that you\u2019re careful when accepting new friends on Facebook?\u201d \u2013 several people admitted that they base their decision on the number of mutual friends they have with the person trying to add them, rather than on other trust factors (such as confirmation with a mutual friend that the person is known).<\/p>\n<p><strong>What you can do:<\/strong><\/p>\n<ul>\n<li>When accepting friend requests from individuals you can\u2019t immediately identify \u2013 even if you have many mutual friends on Facebook \u2013 check in with someone to verify the person\u2019s identity.<\/li>\n<li>Check the privacy settings on your Facebook account. Facebook\u2019s <a target=\"_blank\" href=\"https:\/\/www.facebook.com\/help\/443357099140264\" >privacy checkup<\/a> feature walks users through the various settings applied to posts, photos and other content and allows them to make changes, including ones that apply to all older content.<\/li>\n<li>Consider using encryption tools for more private communication. Facebook and other social networks can sometimes be vital for activists organizing across borders, but some conversations might be better off taking place using some of the more secure messaging apps mentioned above.<\/li>\n<li>Surveillance Self-Defense has more information on <a target=\"_blank\" href=\"https:\/\/ssd.eff.org\/en\/module\/protecting-yourself-social-networks\" >protecting yourself and your privacy on social networks<\/a>.<\/li>\n<\/ul>\n<p><strong>Problem: Activists sometimes receive suspicious attachments or links in emails and aren\u2019t sure how to assess whether it\u2019s safe to open them.<\/strong><\/p>\n<p>In June, a number of Palestine solidarity activists <a target=\"_blank\" href=\"https:\/\/electronicintifada.net\/blogs\/ali-abunimah\/jewish-brigade-email-threatens-bds-activists\" >received threatening emails<\/a> from a group calling itself \u201cBrigade Juive\u201d (\u201cJewish Brigade\u201d in French) that contained suspicious links.<\/p>\n<p>Although the links were found not to contain <a target=\"_blank\" href=\"https:\/\/ssd.eff.org\/en\/module\/how-do-i-protect-myself-against-malware\" >malware<\/a>, it\u2019s important to be vigilant when receiving links and attachments.<\/p>\n<p>Malicious content can pose huge risks to the security and privacy of your device. It can allow an attacker to record from your webcam or microphone, disable the notification settings for certain anti-virus programs, record what you type, copy your content, steal passwords and more.<\/p>\n<p><strong>What you can do:<\/strong><\/p>\n<ul>\n<li>Follow your gut. If an attachment or link looks suspicious, take a few minutes to think about who the sender is, what the email says and other contextual clues.<\/li>\n<li>For further advice, read the Surveillance Self-Defense <a target=\"_blank\" href=\"https:\/\/ssd.eff.org\/en\/module\/how-do-i-protect-myself-against-malware\" >guide to protecting yourself against malware<\/a>.<\/li>\n<li>Security in a Box contains a guide to <a target=\"_blank\" href=\"https:\/\/securityinabox.org\/en\/guide\/malware\" >protecting your device from malware and hackers<\/a>.<\/li>\n<\/ul>\n<p><strong>Problem: It\u2019s hard to convince people to use encryption.<\/strong><\/p>\n<p>A common response to the revelations about government surveillance has been \u201cI have nothing to hide.\u201d<\/p>\n<p>In the American context, this response often comes out of privilege; the perception that one is doing nothing wrong or illegal and therefore has nothing to hide.<\/p>\n<p>Much has been <a target=\"_blank\" href=\"http:\/\/chronicle.com\/article\/Why-Privacy-Matters-Even-if\/127461\" >written<\/a> about the phenomenon, and <a target=\"_blank\" href=\"http:\/\/www.wired.com\/2013\/06\/why-i-have-nothing-to-hide-is-the-wrong-way-to-think-about-surveillance\/\" >an article<\/a> by Whisper Systems founder and Signal developer Moxie Marlinspike perhaps explains it most concisely: We won\u2019t always know when we have something to hide (because structures of authority and <a target=\"_blank\" href=\"https:\/\/ssd.eff.org\/en\/module\/introduction-threat-modeling\" >threat models<\/a> change), and sometimes we do have something to hide.<\/p>\n<p>Marlinspike reminds us that free speech allows us to \u201ccreate a marketplace of ideas, from which we can use the political process to collectively choose the society we want,\u201d a process that sometimes results in agitating or advocating for changes to the law and involves discussion of the forbidden, something with which activists are well acquainted.<\/p>\n<p>In talking with Palestinian activists, I found that the \u201cnothing to hide\u201d argument takes a different turn. \u201cIn the movement, we assume everything we say and do is monitored,\u201d said Nadia Hijab of <a target=\"_blank\" href=\"https:\/\/al-shabaka.org\/en\/\" >Al-Shabaka: The Palestinian Policy Network<\/a>. \u201cSo, everything we do or say is above water. We feel we have nothing to hide. But it is kind of a spooky thing to think that if you write a person an email, that it\u2019s being monitored.\u201d<\/p>\n<p>Barghouti expressed a similar sentiment: \u201cSince we launched the BDS movement in 2005, we worked with the assumption that Israel can and will use advanced surveillance to monitor everything we communicate. A major advantage that the BDS movement has, however, is that it is anchored in the Universal Declaration of Human Rights, rejects all forms of racism and seeks to nonviolently pressure Israel\u2019s regime of occupation, settler-colonialism and apartheid in order to achieve Palestinian rights under international law, just as apartheid South Africa was pressured. There is nothing clandestine about that.\u201d<\/p>\n<p>Another activist, who did not want to be named, told me that in the West Bank there\u2019s a division between two realities. \u201cIf you have something to hide, you\u2019re a militant, or planning something militant in nature. As long as you don\u2019t do the act or are not planning to do anything, then you have nothing to hide.\u201d<\/p>\n<p>This can result in a false sense of security for activists or journalists whose work is legal or \u201cabove board,\u201d when <a target=\"_blank\" href=\"https:\/\/electronicintifada.net\/blogs\/charlotte-silver\/israel-imprisons-journalist-facebook-status\" >new threats emerge<\/a> \u2013 Israel has aggressively jailed journalists, activists and academics merely for comments they\u2019ve allegedly posted on Facebook.<\/p>\n<p>Furthermore, in a context where activists can be viewed as militants for using privacy-enhancing technologies, it can create an impossible conundrum: Use encryption, and risk getting labeled, or don\u2019t, and risk getting in trouble.<\/p>\n<p>\u201cNot every tool or technique is applicable to every situation,\u201d said Morgan Marquis-Boire, a senior researcher at the University of Toronto\u2019s Citizen Lab. \u201cWhat works for a journalists working on leaks in the US may not work for a human rights activist in the [Middle East and North Africa region].\u201d<\/p>\n<p>One idea that many privacy advocates agree on is that when more people adopt encryption, its use becomes normalized; in other words, the more people who are using it, the more difficult it becomes for others to accuse us of wrongdoing.<\/p>\n<p>\u201cCertain approaches rely on the principle that people don\u2019t stand out in crowds,\u201d Marquis-Boire explained. \u201cIn sensitive situations, where someone is likely to be under scrutiny, the observed use of certain security tools might be viewed as suspicious behavior. In such environments, the use of common software [like WhatsApp] that has strong security built in might be less suspicious.\u201d<\/p>\n<p>For those of us who are less at risk, using encryption can be an act of solidarity. Here\u2019s how this practice can look in action: In 2004, an Italian project emerged called <a target=\"_blank\" href=\"http:\/\/bfi.s0ftpj.org\/dev\/BFi13-dev-08\" >Cryptokitchen<\/a>.<\/p>\n<p>In order to encourage mass adoption of <a target=\"_blank\" href=\"https:\/\/ssd.eff.org\/en\/module\/introduction-public-key-cryptography-and-pgp\" >PGP<\/a>, an <a target=\"_blank\" href=\"https:\/\/ssd.eff.org\/en\/module\/what-encryption\" >encryption<\/a> program that provides privacy and authentication for email and other communications, a group of activists created Cryptokitchen with the following tagline: \u201cCrypto-Recipes 4 the masses, recipes and encryption for all!\u201d<\/p>\n<p>The idea was to practice and spread the use of encryption by using it to send innocuous (and delicious!) recipes to one another \u2013 perhaps an idea Palestinians can get behind.<\/p>\n<p>There is no one-size-fits-all solution to any of these problems, but by taking small steps to improve our awareness and digital security (and the security of those around us), we can create a safer space in which to do our work.<\/p>\n<p><strong>Resources:<\/strong><\/p>\n<ul>\n<li>Access Now\u2019s <a target=\"_blank\" href=\"https:\/\/www.accessnow.org\/help\/\" >Digital Security Helpline<\/a> offers round-the-clock assistance to civil society actors around the world, free of charge.<\/li>\n<li>The <a target=\"_blank\" href=\"https:\/\/www.digitaldefenders.org\/\" >Digital First Aid Kit<\/a> is helpful for individuals with digital security skills who have been tasked with helping individuals or organizations. It aims to provide preliminary support for people facing the most common types of digital threats.<\/li>\n<li>The Electronic Frontier Foundation\u2019s <a target=\"_blank\" href=\"https:\/\/ssd.eff.org\/en\/index\" >Surveillance Self-Defense<\/a> guide is available in 11 languages and aims to help users protect themselves from digital surveillance.<\/li>\n<li>The Tactical Technology Collective offers a number of useful guides designed to help users improve their security and privacy.\n<ul>\n<li><a target=\"_blank\" href=\"https:\/\/securityinabox.org\/\" >Security in a Box<\/a> contains digital security resources and guides in 17 languages.<\/li>\n<li>The <a target=\"_blank\" href=\"https:\/\/holistic-security.tacticaltech.org\/\" >Holistic Security Manual<\/a> seeks to help individuals create a process to develop or improve personal strategies for security.<\/li>\n<li><a target=\"_blank\" href=\"https:\/\/gendersec.tacticaltech.org\/wiki\/index.php\/Complete_manual\" >Zen and the Art of Making Tech Work for You<\/a> is a community-built resource especially for women and trans activists.<\/li>\n<li><a target=\"_blank\" href=\"https:\/\/tacticaltech.org\/projects\/me-and-my-shadow\" >Me and My Shadow<\/a> helps users discover and remedy the digital traces they leave behind.<\/li>\n<li><a target=\"_blank\" href=\"https:\/\/www.level-up.cc\/\" >LevelUp<\/a> provides resources to those who are trying to teach digital security to their communities.<\/li>\n<li><a target=\"_blank\" href=\"https:\/\/mayfirst.org\/en\/index.html\" >May First\/People Link<\/a> \u201cengages in building movements by advancing the strategic use and collective control of technology for local struggles, global transformation, and emancipation without borders\u201d and offers highly recommended resources to its membership.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>_______________________________________<\/p>\n<p><em>Jillian C. York is Director for International Freedom of Expression at The Electronic Frontier Foundation.<\/em><\/p>\n<p><a target=\"_blank\" href=\"https:\/\/electronicintifada.net\/content\/guide-online-security-activists\/17536?utm_source=EI+readers&amp;utm_campaign=2451ffd267-RSS_EMAIL_CAMPAIGN&amp;utm_medium=email&amp;utm_term=0_e802a7602d-2451ffd267-299191973\" >Go to Original \u2013 electronicintifada.net<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>2 Aug 2016 &#8211; The last year has seen an uptick in digital threats faced by individuals and organizations around the world. Over the past few months, there have been attacks on boycott, divestment and sanctions (BDS) movement websites, threatening emails to activists and new information emerging on Israel\u2019s surveillance capabilities.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-77184","post","type-post","status-publish","format-standard","hentry","category-activism"],"_links":{"self":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/77184","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/comments?post=77184"}],"version-history":[{"count":0,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/77184\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/media?parent=77184"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/categories?post=77184"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/tags?post=77184"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}