Preparing for Election Harassment and Violence
State legislators face persistent violence in and outside of legislatures. In the face of this, SiX stands as a steadfast ally for state legislators. SiX is dedicated to providing the support and resources necessary for our leaders to thrive, even in the most daunting circumstances. We offer a community where legislators can find solace, guidance, and the strength to continue their vital work.
Inside state legislatures work environments have reached new levels of toxicity, and women of color, LGBTQ+, young, and disabled legislators bear the brunt of racism, sexual harassment, and anti-trans and abelist rhetoric and harassment.
We know this from listening to state legislators like Colorado Representative Elisabeth Epps on her experience: “The Capitol is not a safe place for folks who prioritize following the law and telling the truth...It is a very racist place. It is a place that is very anti-Black, it is a place that is anti-immigrant, it is a place that is misogynistic."
Research from the Brennan Center for Justice further proves that Elisabeth is not alone.
According to their data, state and local officeholders report alarming, increasing levels of threats and other abuse. Forty-three percent of state legislators experienced threats; 38% of state legislators reported that the amount of abuse they experience has increased since first taking public office; and larger shares of women and people of color serving in local elected office experienced abuse related to their families — including their children — than did other officeholders.
Now more than ever, it is essential to lead with hope and resilience. By coming together, we can foster a political environment rooted in relationship with our communities.
In addition to resources like the ones listed below, SiX offers decompression and healing spaces for state legislators. These spaces are created to be a soft landing space of restoration and renewal after attacks in statehouses on legislators’ racial and cultural identities, their support of abortion access, LGBTQ+ liberation, and other marginalized communities. Join us in Atlanta on December 11-13 to participate in a healing space!
The following are readings and resources to support legislators:
Digital Defense Fund: Digital Security for Abortion & Pregnancy Privacy
The Digital Defense Fund was established in 2017 in response to the increased need for security and technology resources in the abortion rights movement after the 2016 election. Many of the resources below are adapted from this resource.
- Keep your browsing private with Tor or a no-logs Virtual Private Network (VPN), to the extent permissible under your state’s transparency laws. A virtual private network is a mechanism for creating a secure connection between a computing device and a computer network, or between two networks, using an insecure communication medium such as the public Internet. You can have a VPN on your laptop, desktops, and phone. Keep in mind that state open-records laws can have a bearing on the technology you use, although your state’s rules might impact only your email and not your browsing. Check with your state ethics officer and state house information technology staff.
- Tor is a secure, free browser that encrypts your internet traffic and routes your internet traffic through multiple different computers, which masks the origin of your traffic.
- VPNs route your internet traffic through their servers instead of your internet service providers. It’s important to choose a VPN that doesn’t keep track of what you’re doing - commonly called a no-logs VPN. Most no-logs VPNs cost a few dollars a month (such as Proton VPN), but there are two free options: ProtonVPN’s free tier, and Tunnelbear’s limited free tier.
- Limit Location Services on Phones and Devices
To turn off location sharing,- For IPhones:
- go to Settings > Privacy & Security > Location Services. You can choose when to share your location for each app.
- For Androids:
- Open Settings > Location > Turn Use location on or off.
- For IPhones:
- Subscribe to DeleteMe:
DeleteMe opts you out from sites that collect and sell your data using a combination of automation and direct human intervention. This includes information like your address, email, and phone numbers. It costs $129 annually for basic plans, with more advanced security subscriptions as well.
- Use a Password Manager and 2 Factor Authentication (2FA)
Password Managers such as 1Password, Bitwarden and Dashlane ensure your accounts are secure and less hackable or vulnerable to identity theft. Make sure to also enable 2FA, especially on any social media or other public facing accounts.
- Block harmful words on social media comments
Social media websites such as X, Facebook and Instagram have settings that allow you to block slurs, swear words, and other derogatory phrases. Consider blocking these words on your social media pages. Similar filters can also be set for most websites created on common platforms like Wix and WordPress. Consult with legislative ethics counsel to ensure your actions are consistent with the Supreme Court’s ruling in Lindke v. Freed, which addresses government officials’ ability to block people on social media.
- Create a physical safety plan
A physical safety plan can include: A security team (if your municipality/state provides one); familiarizing yourself with your buildings’ entry security, guest procedures, and policies; a safe place ready to go if you need to leave your home; a home security system; and support network of neighbors and friends. A safety plan can also include participating in an address confidentiality program (ACP).
The Surveillance Resistance Lab is focused on challenging technologies that fuel state and corporate power. You can view their resources here.
The Harnessing Our Power to End Political Violence Project is the culmination of many organizations and individuals from across the country who have joined forces to better understand the problem of political violence and strategize and mobilize together across many lines of difference. View their guide here.
Women’s Democracy Lab has trainings and programs that address elected Indigenous women, women and femmes of color, and those seeking to engage with or support them most pressing challenges, including fostering a sense of belonging, ensuring safety, securing a living wage, and delivering culturally responsive professional development.
The Violence Prevention & De-escalation Resources for State & Local Officials Guide outlines four steps for elected officials to mitigate violence through resources on how to (1) analyze risk; (2) understand state-specific laws and options for enforcing them; (3) build stakeholder engagement for high risk events; and (4) communicate insights and guidance. This resource was jointly compiled by Georgetown's Institute for Constitutional Advocacy and Protection, the Crime and Justice Institute, Over Zero, Institute for Strategic Dialogue, More in Common, the Center for Strategic and International Studies, Princeton's Bridging Divides Initiative, and the Anti-Defamation League.
Over Zero’s Guidance for Reporting on Extremist Groups and Threats resource outlines considerations and guidelines for responsible and de-escalatory reporting on extremist threats that clearly outlines the threat white supremacist groups pose without amplifying their message or enabling them to use you to shape their narrative. Over Zero is an organization that works to prevent and reduce violence based on identity.
End Tech Abuse across Generations (eTAG) created a Digital Evidence Collection Guide in English and Spanish to help folks collect digital evidence of cyber abuse that can be used in civil and criminal court cases, including protection orders. It is a good idea to document and store digital evidence even if you aren’t ready to pursue legal action in case you change your mind later.
Crash Override published a guide on what to do after you’ve been doxxed. They define doxxing as “the act of publishing someone’s personal information, of which there would be a reasonable expectation of privacy and dubious value to the conversation, in an environment that implies or encourages intimidation or threat.” Their guide provides a high level overview on the realities, consequences, and considerations of being doxed.