Tactic Template page

mobilise people
download this tactic card


watch the video

THIS TACTIC IS GOOD TO USE WHEN YOU WANT TO SUPPORT PEOPLE TO COME TOGETHER, ONLINE AND IN PERSON, AROUND A CAUSE


EXAMPLES FROM THE VIDEO

video volunteers photograph
VIDEO VOLUNTEERS

Video Volunteers Demand Land Rights
Citizen journalists in India
After a community-made video on land rights in Gujarat, India, was screened in 25 nearby villages, 700 people rallied and filed complaints with the local government to have land fairly distributed to them.

TOOLS USED : Digital video cameras, editing software, YouTube, widescreen projectors, VCD/DVDs for video screenings in villages and to community networks.

LINKS TO LEARN MORE:
Video Volunteers

 


The Targuist Sniper
Anonymous advocate
An advocate took video of police officers in Morocco repeatedly demanding bribes from motorists and published them on YouTube, where they were viewed hundreds of thousands of times. Not only did the government take action against the police officers, but it used the same technique as the “Targuist Sniper” by installing video cameras to catch police in the future.

TOOLS USED : Video camera, video editing software, YouTube, blogs

LINkS TO LEARN MORE:
Videos: http://bit.ly/H8rlj (youtube.com)
Blog story: http://bit.ly/1uOFyB (menassat.com)

Video Volunteers photograph
VIDEO VOLUNTEERS

Video Volunteers Demand Land Rights
Citizen journalists in India
After a community-made video on land rights in Gujarat, India, was screened in 25 nearby villages, 700 people rallied and filed complaints with the local government to have land fairly distributed to them.

TOOLS USED : Digital video cameras, editing software, YouTube, widescreen projectors, VCD/DVDs for video screenings in villages and to community networks.

LINKS TO LEARN MORE:
Video Volunteers


Tactic1 Template_2

mobilise people

download this tactic card



Plan your action

  • In Burma, bloggers and rights advocates faced significant risks in coming forward with their testimonies and evidence. How will you protect yourself and others involved in and supporting your campaign? Consider the digital trail you may leave: your IP address, email accounts, passwords, lists of friends you have on social network sites, the names that your mobile phones and SIM cards were purchased under, and the names and organisations that websites’ domain names have been registered to.
  • In Burma, bloggers and rights advocates faced significant risks in coming forward with their testimonies and evidence. How will you protect yourself and others involved in and supporting your campaign?
  • In Burma, bloggers and rights advocates faced significant risks in coming forward with their testimonies and evidence. How will you protect yourself and others involved in and supporting your campaign? Consider the digital trail you may leave: your IP address, email accounts, passwords, lists of friends you have on social network sites, the names that your mobile phones and SIM cards were purchased under, and the names and organisations that websites’ domain names have been registered to.
  • In Burma, bloggers and rights advocates faced significant risks in coming forward with their testimonies and evidence. How will you protect yourself and others involved in and supporting your campaign? Consider the digital trail you may leave: your IP address, email accounts, passwords, lists of friends you have on social network sites, the names that your mobile phones and SIM cards were purchased under, and the names and organisations that websites’ domain names have been registered to.

Do it yourself

  • In Burma, bloggers and rights advocates faced significant risks in coming forward with their testimonies and evidence. How will you protect yourself and others involved in and supporting your campaign? Consider the digital trail you may leave: your IP address, email accounts, passwords, lists of friends you have on social network sites, the names that your mobile phones and SIM cards were purchased under, and the names and organisations that websites’ domain names have been registered to.
  • In Burma, bloggers and rights advocates faced significant risks in coming forward with their testimonies and evidence. How will you protect yourself and others involved in and supporting your campaign?
  • In Burma, bloggers and rights advocates faced significant risks in coming forward with their testimonies and evidence. How will you protect yourself and others involved in and supporting your campaign? Consider the digital trail you may leave: your IP address, email accounts, passwords, lists of friends you have on social network sites, the names that your mobile phones and SIM cards were purchased under, and the names and organisations that websites’ domain names have been registered to.
  • In Burma, bloggers and rights advocates faced significant risks in coming forward with their testimonies and evidence. How will you protect yourself and others involved in and supporting your campaign? Consider the digital trail you may leave: your IP address, email accounts, passwords, lists of friends you have on social network sites, the names that your mobile phones and SIM cards were purchased under, and the names and organisations that websites’ domain names have been registered to.

 


 

FEATURED TOOL

WITNESS, an NGO for video advocacy, hosts its own video sharing website.
WITNESS, an NGO for video advocacy, hosts its own video sharing website, The Hub (http:// http://hub.witness.org/), where anyone can upload videos related to human rights. On The Hub, a community of advocates receptive to rights issues are already gathered, and WITNESS has a history of protecting advocates’ right to free expression. One drawback is that The Hub does not have the massive, diverse audience that other very popular video sites have;
so you may want to use it as well as popular sites like YouTube if your aim is to get as big an audience as possible.

TIPS

VIOLETA KRASNIC, FROM WITNESS, ON CONCEALING IDENTITY: “Filming concealed identity interviews is a matter of trust, in people and in technology. Our consent process conveys the purpose of the video and its intended use in the video advocacy campaign and is built on an un- derstanding of the security implications of the interview.”

AUNG, BURMESE RIGHTS ADVOCATE, ON GETTING INFORMATION OUT: “The Saffron Revolution clearly indicated how citizen journalists are powerful for our country. Sometimes we bring information across the border using recording devices, and sometimes we use email or FTP – these are the sorts of methods we are using so far. Even though the regime has tried to shut down everything, bloggers and citizen jour- nalists have been able to bring information to the outside media.”

 

Tactic 1 Template_3

mobilise people 
download this tactic card


Case Study

TITLE:               Remembering Neda 
WHO:                Advocates in Iran
WHERE:             Tehran
WEBSITE:           http://bit.ly/Kpcsu (wikipedia.org)

DESCRIPTION
Two short videos showing the death of Neda Agha-Soltan during Iran’s post- election protests attained worldwide attention in June 2009. One video (http://bit.ly/10FpwN) was shot by an anonymous man, and was then emailed to supporters and spread quickly to Facebook. The decision to email the video, rather than directly upload it, was made to protect the man who shot it, and also to circumvent the Iranian government’s censorship of the internet after the election. In addition, a second eyewitness video of Neda’s death (http://bit.ly/yyvoM) appeared on CNN within hours of being uploaded to YouTube. Because the videos were posted and spread so quickly, there was little time to consider the implications of such a rapid spread of unedited, first-hand footage. Writing at WITNESS, Priscila Néri asks “As concerned citizens, activists, and fellow human beings, how do we balance the need to ‘spread the word’ of what’s unfolding in Iran with the need to respect Neda’s dignity as she dies, as well as the grief of her family faced with such tragedy?” As people’s ability to capture eye-witness reports and live events with mobile phones and digital cameras increases, the video footage of Neda challenges us to decide how to sensitively and strategically publicise these accounts, especially in volatile and high-pressure moments. It also illustrates the danger people can be put in when they post and re-post footage online: advocates and protesters have since been detained by the government in Iran, and Twitter and Facebook were named in trials against them.

 TOOLS USED: Mobile phone cameras, email, YouTube, Twitter, Facebook, blogs
REACH: Hundreds of thousands to millions of people worldwide.
RESOURCES: Access to data network on mobile phones and internet.
TIME: A few hours, from the footage being shot to when it was uploaded. A few more hours before it was broadcast on international media.

LEVEL Of dIffICULTY: 2 out of 5

COST: N/A

LINkS TO LEARN MORE: New York Times blog: http://bit.ly/TqGnG
Global Voices: http://bit.ly/FK51f, http://bit.ly/LLAbx
WITNESS: http://bit.ly/gtyPz