​​​​ ​​​​

Blog

Targeted messaging 101

Remember, targeting a group as broad as “the general public” is far too inexact and can be a recipe for campaign disaster.Your digital campaign should target a specific, primary audience and its motivators.

Although you should continue to test and adapt your messaging throughout your campaign, having clear agreement on who you’re talking to and what’s important to them will get you started in the right direction.

Here are some things to consider:

Persona

Describing your target audience in terms of a fictional character that represents them in general can help you gain a better understanding of the groups you’re engaging with, and helps you better plan your communication with them. Ask yourself questions like:

  • What sort of job might this person have, and in what industry? • What are their demographics? (age, income, location, etc.)
  • How do they find, consume, and share content?
  • What are their biggest challenges and how do they work to overcome them?
  • What goals might this person have?

Motivators

Get a deep understanding of what motivates an individual in your audience and the group as a whole to take action.

Using this understanding, try to align your campaign goals around what these audiences care about.

Key Messaging

Establish a single, clear message you want to get across to an audience, and treat it as a core tenet of each part of your campaign.

Next, craft a few “bylines” or sub-messages that can include specific wording you’d like to incorporate into your marketing collateral. These should be specialized for certain channels, like Facebook or email, as well as specific segments of your audience.

How to Assess Your Digital Security Risk

How to Assess Your Digital Security Risk

In order to stay safe online in both a personal and professional capacity, we need to understand, identify, and assess our digital security needs and risks. Through this process, you will learn how to assess and maintain your digital security, think through the differences and similarities of “security” and “digital security”, and identify threats, capacities and vulnerabilities.

lgbti_mena

For a comprehensive guide on how to assess your digital security risk, check out this great “Security-in-a-box: Tools and Tactics for Digital Security” done in collaboration with tactical tech and human rights defenders in the MENA region  for the LGBTI community in Sub-Saharan Africa.

Introduction to Queer Theory

Understanding theories of oppression and marginalization can help you link your campaign to those of others fighting for different causes but against the same systems, structures and intricate complexities of how power seeks to divide and rule us. This can enable us to build broad, emancipatory and inclusive movements fighting for the empowerment of everyone rather than excluding potential allies.


The slogan “The personal is political” which was first used 1960s and one of the defining characterizations of the student and feminist movements of the 60s and 70s, remains just as important today as it was then. It reminds us that just because we build campaigns against oppression and discrimination (by authorities, institutions, or businesses), we are by no means outside these frameworks and our actions should be mindful of oppressive behaviour and patterns at all times. We have to continuously address and analyse how we as individuals and groups are subject to and perpetuate multiple and intersecting forms of oppression, privilege and power. These will often lead us to reproduce discriminatory, exclusionary and dehumanizing behaviors, structures and language which limit our capabilities to achieve real freedoms and emancipation.

In order for our activism and daily lives to be truly mindful of others and intersectional in our approach, we need to understand the basics of the academic theories and political movements that have shaped present-day socio-political rhetoric and help determine the types of actions and tactics taken on by queer organizers globally. Here, we have compiled summaries of theoretical frameworks to keep in mind and further links to guide you through your readings:

5 Online Security Steps to Take Now!

These days, online security is as essential as the basic security measures you would take for yourself and your material possessions in your daily life. With reports of government surveillance on activists, academics, and civilians on the rise, taking security precautions to assure you and your data are safe online is a necessary step. Here are our five must-do tips on how to maintain data security online and resources for why online safety and digital freedom are, in fact, an LGBT matter.

  1. Install ToR and browse LGBT-related content through the ToR Browser. By bouncing your communications off multiple networks, the ToR browser ensures your location, identity, and the content you’re browsing to only be known by you. The ToR browser can be used on Windows, Mac OS X, and Linux  (as well as launched through a USB) without the need to install software.
    You can download it for your computer here.
    For Android devices, try ToR’s project Orbot.
  2. Use an anonymous email on ALL social media sites.

    Nowadays, all social media sites demand an email to log in and to create a profile. Many apps also require you to sync with your Facebook or Gmail.  All these profiles and apps store information and can make tracking your movements online easily discoverable by governments or other parties interested in your information. It is best to create an email address that is anonymous and separate from your personal email.Unfortunately, the most popular email services are not known to be the safest in terms of online security as companies and governments can request access to your information or cater advertisements based on your cookies and search history (if you are browsing online and don’t want record of it in your search history – make sure to browse incognito!).These steps for anonymity online are particularly important when organizing around sensitive subjects such as gender and sexual and bodily rights. Unlike corporate email services which rely on advertisements and corporations to maintain their services, RiseUp is a non-corporate, volunteer run email service. While RiseUp offers less space than corporate email service providers, they encrypt incoming/outgoing traffic, do not disclose your location/IP address, and don’t log your internet addresses. RiseUp has been used by organizations and groups globally to ensure safe and encrypted communications. Join the movement for Digital Security and switch to RiseUp here.

     

  3. Mask your IP Address.
    Your IP address is just like your home mailing address in that it is your personal unique identifier. Since every device on a network has it’s own IP address, you may prefer to mask your IP when browsing websites (particularly on sensitive subjects such as LGBT rights). To do so, you would need to use a proxy server to bypass your network and operate outside of it as well as mask your IP address. Proxy.org has an abundant resource of proxy servers available for your use. Make sure to check the pros and cons to any proxy server you intend to you as each offer different services and varying degrees of anonymity online.
  4. Set up two-step verification for ALL of your social media and email services.

two-step-verification

Due to hacking, identity theft, data leaking, and other online security risks; most big online companies have adopted heightened security measures with a  two-step verification policy. Facebook, Twitter, LinkedIn, Google, and Evernote each have an option for two-step verification to ensure your accounts are only accessed by you.  This requires users to have a security code which is usually automatically generated and sent via text to the users phone as well as enter their password to access their information.

Here’s how to set each one of them up:

  1. Facebook: To turn on your two-step verification on Facebook you need to enable login approval. Go to Settings > Security > Login Approvals and enter your cell phone number. Once this has been enabled, Facebook automatically sends you a text with an access code every time your account is accessed from an unknown device.
  2. Twitter: To set up two-step verification on Twitter, go to Settings > Account Security > “Require Verification Code When I Sign In”. This will require you to confirm both an active email address and cellphone number to your account. Each time you access your account from a new device, twitter will send you a fresh code to that number.
  3. LinkedIn: LinkedIn tends to hold a lot of personal professional information as well as what you share with your connections and the general public. If you have a profile on LinkedIn (as well as all your social media accounts), it is advisable to set up two-step verification. To do so go to Account & Settings (scroll over profile icon for options to appear) > Privacy & Settings > Account tab > “Manage security settings”.
  4. Google: To set up two-step verification on Google, login to your account on google then scroll to the top right corner of Gmail and click on Settings > Accounts > Change account settings.
  5. Apple: Two-step verification on Apple takes slightly longer to set up then some other accounts. To do so go to “Manage your Apple ID” > “Password and Security” >”Get Started” > follow the onscreen instructions. Apple will then send you an email in three days, with instructions on how to finalize the two-step verification process.

*Be wary of your “location settings” and “app access” (also located in your general settings and your app settings) on all of these social media sites.

5. Use Alternative Chatting Sites to Communicate and Organize*

In the 21st Century, most of our communication and organization is done online. When the Arab Spring took place in Tunisia and Egypt, most organization and coordination for the protests took place on Facebook groups and chats as well as Twitter. However, these are not the safest modes of communication to use as these sites are increasingly cooperating with governments to share information when requested. In order for you to organize and communicate openly without the fear that your conversation is being logged or stored somewhere.

Here are some alternative chatting sites / apps you can use to make sure your information is as secure as you can possibly make it:

Cryptocat is a fun, accessible app for having encrypted chat with your friends, right in your browser and mobile phone. Everything is encrypted before it leaves your computer. Even the Cryptocat network itself can’t read your messages. Cryptocat is open source, free software, developed by encryption professionals to make privacy accessible to everyone.

Off-the-RecordSoftware can be added to free open-source instant messaging platforms like Pidgin or Adium. On these platforms, you’re able to organize and manage different instant messaging accounts on one interface. When you then install OTR, your chats are encrypted and authenticated, so you can rest assured you’re talking to a friend.

ChatSecure: Encrypted Messages on iOS and Android. ChatSecure is a free and open source messaging app that features OTR encryption over XMPP. You can connect to your existing accounts on Facebook or Google, create new accounts on public XMPP servers(including via Tor), or even connect to your own server for extra security.

All of the above chat software and apps require an Internet connection provided by either Wifi or your mobile carrier. As we witnessed with the Arab Spring and other moments of national political tension, governments can switch off or limit connectivity in public spaces to make communications about public actions, safety protocols, and other information between activists and citizens even harder to share to the widespread audiences that social media platforms provide. This is where FireChat comes in.

FireChat is the messaging app that works when and where others cannot. FireChat uses peer-to-peer mesh networking technology to connect people and mobile devices even when no Internet connection or mobile data service is available. FireChat has been among the top 10 social networking applications in 124 countries. From Burning Man to Taiwan, HongKong, Delhi, Moscow, Manila, Paris, Srinagar, Kuala Lumpur and Austin, pro-democracy protesters, disaster relief organizations, leaders, and artists are choosing FireChat to stay connected to their friends and communities.

*Always check what each service provides, what information – if any – is stored, and if your traffic is encrypted.

 

Further Reading

Egypt jails eight men after ‘gay marriage’ ceremony on Nile

Russia bans five online LGBT youth groups under anti-gay law

‘Perfect Surveillance,’ Says Edward Snowden, Could Have Snuffed Out the LGBT Movement. He’s Right.

Digital Freedom Is an LGBT Issue

IP address: What is it and How can I mask it?

What is an IP address?

If you were to send a letter to a friend of yours through the mail, you would need to write their address on the envelope for it to reach them. Similarly, each computer has its own IP address which is the machine’s unique identifier when sending data out to other computers on a network.  

Generally, most networks and all computers on the internet use a  TCP/IP (Transmission Control Protocol/Internet Protocol) as a standard communication language or protocol over a network. Every computer’s unique identifier is located within the TCP/IP protocol.

router-assigning-ip-address

The standard IP addresses come in two formats. The first – that all computer with an IP address currently use – is the IPv4 (IP version 4) address which is made up of  32 binary bits that creates a unique code for each device such as 96.35.982.692

 

The IPv6 (IP version 6) address uses 128 binary bits. IPv6 addresses are denoted by eight groups of hexadecimal quartets separated by colons in between them.

Here is an example of a valid IPv6 address: 2001:cdba:0000:0000:0000:0000:3257:9652

 

How can I keep my IP address hidden? 

Whether you are researching sensitive information, organizing with other activists, or just prefer to keep a low profile online there are ways to mask your IP address from prying eyes.

proxy-server

A proxy server is a server that acts as the ‘middle person’ for requests between an individual and the resources on the intended server which is being accessed. As well as masking your IP address, using a proxy allows you to bypass restrictions to websites. In short, once you have connected to a proxy server, you are “outside” of your network and any ‘traffic’ or data being viewed or uploaded/downloaded appears to be coming from the proxy server rather than from your direct network.

Each proxy server offers different services and it is well worth researching which one may be right for your needs. Proxy.org offers a comprehensive and regularly updated web proxy list of the proxy servers out there that you can use.

Secure & Encrypted: Virtual Private Network (VPN)

What is VPN?

A Virtual Private Network (commonly referred to as VPN) is a “network technology that creates a secure network connection over a public network such as the internet or a private network owned by a service provider.” Basically, a VPN is a group of computers that network ‘privately’ together over the internet – a ‘public’ network. VPN is an important tool while browsing securely online as it is a method for securing and encrypting communications when on an untrusted public network. While you may think that this is an excessive step to take while online, with increasing government surveillance and intrusion into individual’s private information, it is a vital technology to ensure your security while researching, organizing campaigns, uploading/downloading content, or simply just browsing online.

Whether you want to access sensitive information remotely, websites/movies/files that are blocked in the country you reside in, research controversial subjects, or just don’t want any record of your online presence – VPN is the way to go.

The most important thing for you to remember is that using a Virtual Private Network secures your computer’s internet connection. This guarantees that all of the data you’re sending and receiving is encrypted and secure from prying eyes.

Check out this video to better understand VPN – What is it? How does it work?

Which VPNs are the Best?

With so many sites on the internet, it’s hard to know which VPNs are the best. Here are some reliable VPN service providers that can help you on your way to securing and encrypting your data online.

TorVPN

Private Internet Access

TorGuard

ProXPN

BTGuard

Buffered VPN