In today’s rapidly evolving digital landscape, African civil society organizations (CSOs), journalists, human rights defenders (HRDs), and democracy activists face mounting threats - ranging from cyberattacks, disinformation campaigns, state surveillance, and digital authoritarianism.
We provide data-driven insights, cyber resilience training, and strategic interventions to protect human rights defenders, journalists, and civil society actors from these digital/ online threats.
Digital security
Strengthening cyber resilience for vulnerable groups targeted by cyber threats, surveillance, and online harassment.
Data-Driven Analysis
Leveraging data science, network mapping, and investigative research to uncover extremist narratives, and influence operations.
OSINT Research
Applying Open Source Intelligence (OSINT) techniques to track online threats, coordinated networks, and digital authoritarian tactics.
Programs
Cyber Resilience
African CSOs, investigative journalists, and human rights defenders are regularly targeted by online attacks, malware, online harassment, and digital surveillance. Many lack the necessary cyber hygiene training, secure communication tools, or incident response skills to protect themselves.
African CSOs, investigative journalists, and human rights defenders are regularly targeted by online attacks, malware, online harassment, and digital surveillance. Many lack the necessary cyber hygiene training, secure communication tools, or incident response skills to protect themselves.
Researching Online VE
Violent extremist groups increasingly exploit social media, encrypted messaging apps to radicalize, recruit, and mobilize individuals across Africa. Their strategies involve propaganda dissemination, coordinated online campaigns, and use of encrypted communication networks, making it challenging for civil society and policymakers to counter their influence effectively.
Violent extremist groups increasingly exploit social media, encrypted messaging apps to radicalize, recruit, and mobilize individuals across Africa. Their strategies involve propaganda dissemination, coordinated online campaigns, and use of encrypted communication networks, making it challenging for civil society and policymakers to counter their influence effectively.
Open Source Intelligence Techniques
The rise of covert influence campaigns, cyber threats, and organized crime networks requires advanced digital investigative methods. Many CSOs and journalists lack the skills and tools to track networks, financial crimes, and online threats using publicly available data.
The rise of covert influence campaigns, cyber threats, and organized crime networks requires advanced digital investigative methods. Many CSOs and journalists lack the skills and tools to track networks, financial crimes, and online threats using publicly available data.
Environmental Crime Research
Environmental crimes such as illegal wildlife trade, deforestation, and resource exploitation are often linked to organized crime and corruption. Many of these activities are coordinated through online platforms, encrypted messaging services, and social media networks, making them difficult to track and investigate.
Environmental crimes such as illegal wildlife trade, deforestation, and resource exploitation are often linked to organized crime and corruption. Many of these activities are coordinated through online platforms, encrypted messaging services, and social media networks, making them difficult to track and investigate.
Climate Change Research
Big Oil organisations are manipulating public perception, delaying policy action, and protecting corporate interests at the expense of environmental sustainability. Inaccurate information about climate science, energy policies, and carbon markets is spreading online, weakening Africa’s climate justice movement.
Big Oil organisations are manipulating public perception, delaying policy action, and protecting corporate interests at the expense of environmental sustainability. Inaccurate information about climate science, energy policies, and carbon markets is spreading online, weakening Africa’s climate justice movement.
Internet & Platform Governance
Many African governments are implementing restrictive digital policies, including surveillance laws, vague cybersecurity regulations, and weak AI governance frameworks, which threaten free expression, privacy, and digital rights. Tech platforms fail to prioritize local context in their content moderation and misinformation policies, allowing digital harms to persist.
Many African governments are implementing restrictive digital policies, including surveillance laws, vague cybersecurity regulations, and weak AI governance frameworks, which threaten free expression, privacy, and digital rights. Tech platforms fail to prioritize local context in their content moderation and misinformation policies, allowing digital harms to persist.
Are you interested in any of the above focus areas? Or do you need any Support?
Insights
Read our views on the things that matter to you.
In July 2024, during its 45th Ordinary Session in Accra, Ghana, the African Union (AU)...
Overview The European External Action Service (EEAS) has released its third annual FIMI Threats Report,...
Graphika’s latest report, “Global Hacktivist Threats,” offers a deep dive into the evolving landscape of...
A recent investigation by HumAngle, authored by Aliyu Dahiru, has revealed how Ansaru, a Nigerian...
Government Crackdown: Digital Spying as a Tool of Repression In a troubling revelation, Amnesty International’s...
Human rights organizations have raised concerns about increasing threats to digital freedoms in Kenya, citing...