Summary
Blueprints for Change how-to guides are put together by campaign innovators in order to help progressive organizers and groups up their game more quickly. The “blueprints” capture, communicate and inform innovative campaigning strategies and tactics. You can download BfC’s guides as pdfs from the Commons (see the box at the bottom of the page) or view the evolving Google docs.
Digital security practices help protect campaigners from malicious online attacks and intrusive surveillance efforts led either by groups that are hostile to your agenda or by repressive government agencies.
Who needs this?
Groups working on social/racial justice, environmental, immigration and refugee issues, as well as gender and reproductive rights are being targeted by hackers/trolls that are intent on subverting their work for political reasons. These groups often learn the price of unsecured digital tools the hard way when their accounts are accessed and corrupted by malicious actors. Campaigners working in environments under repressive regimes must also adapt their digital security practices to prevent surveillance and attempts to neutralize their groups through hacking and information leaks.
Contents
- Disclaimer / request for your help 2
- Summary 2
- Who needs this? 2
- Impact/ Why do this? 2
- Important first step: Threat/risk level assessment 3
- Setup steps/ stages 4
- Tricky parts/ fixes 8
- Further resources 9
- Attribution 10
Download the pdf from the box below or see the latest Google doc version.