The Problem: Rigorous, independent investigations into digital threats and influence operations on social media platforms are vital for exposure, accountability and effective mitigation. However, over the years our investigations are being challenged by social media data paywalls, threat actor obfuscation tactics, and capacity constraints.
We are building comprehensive investigative capabilities focused on regional digital threats. Our open-source and threat intelligence gathering leverages innovative methods for evidence collection and verification. Investigation findings fuel our solutions and advocacy programs while building a public record.
We’re working on several open source investigations around topics of geolocation of human rights abuses, attribution to threat actors behind targeted disinformation of journalists and activists in the global south.
Get the inside scoop for new developments
Signal
For discreet messaging, we recommend using Signal – a free, open-source app that provides end-to-end encryption and self-destructing messages, ensuring your conversations remain private and leave no trace.
Signal Account: +1 240 383 9371
Public Key
GPG Key:E29024C73E482577079D6270FADBEB7540DA0B26
Our global team operates across Nairobi, Kampala, Copenhagen, and Washington D.C.
Alternatively, you can reach us via ProtonMail, a secure email service that prioritizes privacy and anonymity. Create a free account using the TOR browser for maximum anonymity, and send us encrypted emails at thraets@protonmail.com. You can also encrypt email content using our PGP key for added security.
We use cookies to improve your experience by accessing device information. Consenting allows us to process data such as browsing behavior, while not consenting may affect certain site features and functions.