ChatGPT Image Feb 13, 2026, 09_12_22 AM

The Caricature Trend and Its Impact on Digital Safety

By Noelyn Nassuuna

Across social media platforms, caricature portraits and AI-generated avatars have quickly become a popular way for people to express themselves online. From activists and professionals to young girls exploring identity in digital spaces, many users are embracing these stylized images as profile photos or storytelling tools. While the trend looks creative and empowering on the surface, it also raises important questions about digital safety, privacy, and online protection.

A New Layer of Digital Identity

Caricatures allow individuals to present a version of themselves that feels artistic and less exposed than a real photograph. For many women and young users, especially those navigating online harassment or public visibility, avatars can feel safer. They create a sense of distance between personal identity and public presence while still allowing creativity and confidence to shine.

However, digital safety experts caution that caricatures do not always guarantee anonymity. Even stylized images may reflect recognizable features such as hairstyles, skin tone, or cultural symbols. When combined with usernames, captions, or location tags, it becomes easier for someone to connect the avatar back to a real person. This can create a false sense of privacy, where users share more information than they normally would.

The Hidden Risk of Facial Data

Many caricature tools require users to upload several photos to generate their artwork. These images may be processed by artificial intelligence systems, and sometimes stored on external servers. If the platform’s privacy policies are unclear, users may unknowingly give away biometric information such as facial structure or expressions.

For digital rights advocates, this raises concerns about data ownership and consent. Young people and first-time users may not fully understand how their images are used beyond creating a cartoon portrait. Over time, repeated uploads to different apps can expand someone’s digital footprint and increase exposure to data collection practices.

Identity Misuse and Online Harassment

Another growing concern is the potential misuse of caricatures. Screenshots or downloaded avatars can be edited or reposted without permission, which may lead to impersonation or misleading content. In online spaces where women, journalists, or activists already face targeted harassment, even a stylized image can become a tool for unwanted attention.

Digital safety practitioners emphasize the importance of maintaining control over how images are shared. Simple actions such as using trusted platforms, adjusting privacy settings, and avoiding oversharing personal details can reduce risks.

A Positive Opportunity for Protection

Despite these challenges, caricatures can also support safer online engagement when used intentionally. Some advocates choose illustrated avatars instead of real photos to lower direct identification risks. Organizations working with young girls or community leaders have also used caricatures to represent participants without exposing their real faces publicly.

The key difference lies in awareness and informed choice. When users understand the digital implications behind the trend, caricatures can become a creative safety tool rather than a vulnerability.

Building a Culture of Digital Awareness

As the caricature trend continues to grow, conversations around digital safety must grow alongside it. Encouraging users to read app permissions, understand data privacy, and think critically about online identity can help create a safer digital environment.

Caricatures are more than just a social media trend, they are part of how people shape identity and community online. By balancing creativity with caution, individuals and organizations can enjoy the benefits of this artistic movement while protecting privacy, dignity, and security in digital spaces.

WhatsApp Image 2025-12-10 at 13.18.41

Supporting Safer Digital Participation at DataFest Africa 2025: Our Clinic and Masterclass in Action

In October 2025, our team had the honor of participating in DataFest Africa 2025, organised by Pollicy, one of the continent’s leading convenings on data, technology, and innovation. As part of this vibrant gathering of technologists, researchers, civil society actors, policymakers, and creatives, we hosted a Digital Security Clinic, offering on-site support, guidance, and practical tools to participants navigating today’s fast-evolving digital landscape.

Why the Clinic Mattered

As digital spaces continue to expand across Africa, so do the risks that come with them including data misuse, online harassment, cyberstalking, image-based abuse, misinformation, account takeovers, and digital surveillance. For many activists, journalists, developers, and young innovators attending DataFest, these threats are not abstract; they are lived realities that affect their work, mental well-being, and personal safety.

Our clinic was designed as a safe, confidential, and responsive support space where participants could:

  • Seek one-on-one guidance on digital security and privacy
  • Report or discuss technology-facilitated gender-based violence
  • Get support on securing devices, accounts, and data
  • Receive mental health referrals and psychosocial first support after online abuse
  • Learn practical safety strategies for their work and activism

What We Offered on the Ground

Throughout the festival, our team provided:

  • Personalized digital risk assessments
  • Guidance on strong passwords, two-factor authentication, and safe browsing
  • Support on responding to online harassment, doxxing, and impersonation
  • Advice on safe content creation and data protection
  • Offered updated and genuine software like antivirus, MS Office, MS Word
  • Referral to trusted psychosocial and legal response partners where needed

Participants included women in tech, youth innovators, journalists, human rights defenders, researchers, and community organizers, many of whom were encountering structured digital safety support for the first time.

Key Reflections from the Clinic

Several key themes emerged from our engagement:

  • Online harm is deeply connected to offline safety, livelihoods, and mental health.
  • Many participants had experienced harassment, impersonation, or extortion but had never received professional support.
  • There is a strong demand for localized, continuous digital safety clinics, not just one-off trainings.
  • Women and young people remain disproportionately impacted by online violence and data misuse.

Building Resilient Digital Communities

Our presence at DataFest Africa 2025 reaffirmed the urgent need to move beyond awareness-raising alone. Safety must be practical, accessible, survivor-centered, and embedded into innovation spaces. Digital rights, data protection, and online wellbeing are not optional add-ons; they are essential foundations for meaningful participation in the digital economy.

By hosting this clinic, we demonstrated that large tech and data convenings can and should integrate real-time protection and support mechanisms alongside conversations on innovation, AI, governance, and development.

Masterclass: Shaping Youth Futures Through Digital Ownership

In addition to the digital safety clinic, we hosted a featured masterclass titled “Shaping Youth Futures Through Digital Ownership” at the National ICT Innovation Hub, Nakawa. The session brought together young people, innovators, and ecosystem actors to explore how digital ownership can unlock opportunity, protection, and economic independence for African youth. Participants engaged deeply with what digital ownership truly means in today’s platform-dominated economy, emphasizing the importance of owning data, digital skills, content, and platforms as a foundation for sustainable digital participation.

The masterclass examined how young people can transition from being passive digital consumers to empowered digital creators and owners, while critically reflecting on the risks of digital exploitation, platform dependence, and unsafe monetization. It further highlighted the role of policy, infrastructure, and community networks in protecting young digital entrepreneurs. The session was co-led by Noelyn Nassuuna, Raymond Amumpaire, and Owilla Abiro Mercy, who collectively challenged participants to think beyond access toward control, agency, safety, and sustainability in the digital economy.

Looking Ahead

Following DataFest Africa 2025, we are strengthening our:

  • Mobile digital safety clinics
  • Survivor-centered referral pathways
  • Youth and women-focused digital resilience programming
  • Partnerships with tech platforms, mental health professionals, and legal responders

We remain committed to ensuring that no one has to choose between visibility and safety, innovation and wellbeing, or participation and protection in digital spaces.

WhatsApp Image 2025-11-26 at 11.36.49

LEDTAF POLICY: STRENGTHENING LAND & ENVIRONMENTAL GOVERNANCE IN UGANDA:

COMMUNITY-INFORMED PRIORITIES FOR THE NATIONAL LAND POLICY REVIEW (2025)

Executive Summary Uganda is undertaking a critical review of its 2013 National Land Policy (NLP), offering a rare opportunity to address deep-seated governance failures in land and environmental management. While the policy framework on paper is sound, its implementation remains weak, uneven, and exclusionary. Communities, especially those in ecologically sensitive or resource-rich areas, continue to experience illegal evictions, land grabbing, environmental degradation, and systemic exclusion from decision-making processes.

To inform this review, the Land and Environmental Defenders Taskforce (LEDTAF) conducted a nationwide consultation combining survey data and focus group discussions. The study captured perspectives from 68 respondents across multiple regions, with a particular focus on areas affected by infrastructure expansion, extractive projects, and forest encroachment. The results present issues of selective law enforcement, politically motivated land allocations, and increasing threats faced by land and environmental defenders, among others.

A key finding was the disconnect between Uganda’s legal frameworks and the lived realities of communities. Respondents reported weak institutional coordination, corruption in land administration, and a consistent failure to engage grassroots actors in policy implementation. Environment and land defenders face harassment, intimidation, and lack any meaningful protection under current law, with little consideration for women and youth, whose voices are often silenced by patriarchal and political barriers.

Nonetheless, communities are not passive victims. They have developed powerful, locally grounded solutions from using indigenous conservation methods and traditional dispute resolution systems to adopting digital tools for reporting violations. These community-led innovations offer practical entry points for policy reform that is both just and enforceable.

This brief translates these insights into ten targeted recommendations with concrete implementation plans. It is intended for lawmakers, policy institutions, and local government actors involved in the ongoing NLP review. Implementing these reforms will help align the national land policy with community priorities, improve institutional accountability, and create an enabling environment for inclusive, transparent, and sustainable land governance.

The Cyber Risk Traffic Light Game for CSOs

Introduction to the Cyber Risk Traffic Light Game: Digital Defense Freeze

Welcome to Digital Defense Freeze, an interactive Cyber Risk Traffic Light Game designed to sharpen rapid decision-making, strengthen teamwork, and build practical threat-analysis skills for CSOs, journalists, activists, and human rights defenders

In today’s rapidly evolving digital landscape, every online action carries some level of risk. This game helps participants practice identifying threats, debating complex scenarios, and choosing the safest path forward using the familiar Green, Amber, and Red traffic-light system.

Through realistic, high-pressure situations drawn from our civic space in Uganda, teams will think critically, argue their positions, and learn how to move from guesswork to informed security judgments.

Get ready to assess, debate, decide, and freeze when the risks spike!

WhatsApp Image 2026-01-22 at 11.36.37 (1)

Strengthening Digital Safety, Legal Awareness, and Mental Well-Being for Women Politicians and Journalists ahead of the Uganda 2026 elections

Women journalists and women politicians increasingly operate in hostile digital and political environments where online harassment, surveillance, legal intimidation, and psychological pressure are becoming routine. To respond to these risks, Defenders Protection Initiative (DPI), in partnership with Pollicy, with support from Urgent Action Fund, conducted two tailored two-day capacity-building trainings focused on digital safety, legal implications and compliance, and mental health.

The trainings were delivered separately for women journalists and women politicians, recognising the distinct risk landscapes they navigate while grounding both engagements in shared principles of safety, rights protection, and resilience.

Addressing Real and Escalating Digital Threats

Participants shared experiences of online harassment, coordinated smear campaigns, account takeovers, surveillance, doxxing, and threats that often translate into offline harm. These attacks undermine professional work, personal safety, and emotional well-being. The trainings were designed to be practical and grounded, equipping participants with tools and strategies they could immediately apply in their work and daily lives.

Key Focus Areas of the Trainings

Over the two days, the sessions combined technical learning, legal literacy, and psychosocial support through interactive and participant-centred approaches:

1. Digital Safety Tools and Practices
Participants were introduced to safe and trusted digital tools for secure communication, strong account protection, password management, and safe data handling. Hands-on exercises supported participants in assessing personal and organisational risk and adopting safer digital practices without fear or overwhelm.

2. Legal Implications and Compliance
The training unpacked relevant legal and regulatory frameworks affecting digital engagement, journalism, and political participation. Participants explored compliance obligations, responsible online conduct, and ways to protect themselves legally while continuing to exercise freedom of expression and civic participation.

3. Mental Health and Psychosocial Well-Being
Recognising the emotional toll of digital attacks, dedicated sessions focused on mental health, burnout, and collective care. Participants discussed coping mechanisms, peer support, and referral pathways for psychosocial and mental health support, reinforcing the importance of well-being as a core component of protection.

Creating Safe and Supportive Learning Spaces

DPI intentionally created safe, feminist, and survivor-centered spaces where women could share their experiences openly, learn collectively, and rebuild their confidence. The approach affirmed that digital safety is not only technical or legal, but it is also deeply linked to dignity, agency, and mental well-being.

Outcomes and the Way Forward

By the end of the training, participants reported increased confidence in:

  • Using secure digital tools and safer online practices
  • Understanding legal risks and compliance responsibilities
  • Responding to online harassment and intimidation
  • Prioritising mental health and seeking support when needed

Through collaboration with Pollicy and the support of the Urgent Action Fund, DPI delivered a holistic intervention that recognises digital safety, legal protection, and mental health as interconnected pillars for women’s participation in journalism and politics.

Defenders Protection Initiative remains committed to strengthening the safety, resilience, and leadership of women human rights defenders, journalists, and political actors, ensuring they can continue to engage in public life safely, confidently, and with dignity.

ChatGPT Image Jun 16, 2025, 12_24_36 PM

Travel Smart: Protecting Your Digital Privacy in East Africa’s Changing Political Landscape

By Helen Namyalo Kimbugwe and Noelyn Tracy Nassuuna

In today’s world, where our entire lives are condensed into handheld devices, the smartphone has become both an incredible tool and a significant vulnerability. For human rights defenders, journalists, and civil society actors in East Africa, the risks associated with carrying sensitive data are rapidly growing. With increasing surveillance, political repression, and data harvesting by authorities, especially across borders, your phone could expose you to threats you never imagined.

Recent developments in East Africa, particularly in Uganda, Kenya, Rwanda, and Tanzania, reflect an alarming pattern. Border officials are more frequently requesting travellers to unlock their phones. In some cases, they take the devices into another room, copy data, and return them 15 to 30 minutes later. This includes access to your photos, messages, apps, call logs, contacts, emails, and even deleted files. For many travelers, especially those involved in activism or advocacy, this kind of intrusion can lead to harassment, arrest, or worse.

Thankfully, there are digital privacy measures you can take to stay ahead. For example, if you’re using GrapheneOS on a Google Pixel device, there’s an advanced feature called “duress mode.” This allows you to set up a special PIN code that, when entered under pressure, instantly wipes your phone. On iPhones, while you don’t get the same feature, you can enable the “Erase Data” option after 10 failed attempts. It’s not as powerful, but it still adds a layer of defence.

A simple yet effective tip: Always use a six-digit passcode instead of four. If you’re worried about forgetting it, you can repeat your four-digit PIN twice—it’s still significantly more secure. Biometrics like fingerprints and face unlock should be avoided while traveling, as authorities can forcibly use them to unlock your device without your consent.

One of the most critical steps you can take is to carry a clean “travel phone.” This is a secondary device that contains only the most essential apps and information—no personal messages, photos, or documents that could be used against you or your networks. Log out of all your email, banking, and social media apps before reaching a border checkpoint. Better yet, delete them temporarily and reinstall later when safe. If you must travel with your primary phone, ensure that it is encrypted. While most modern smartphones are encrypted by default, verifying this in your device settings is important. Although disabling automatic cloud backups (e.g., Google Drive, iCloud, WhatsApp) can be inconvenient, it is a critical step for maintaining data security. Where feasible, back up your data in advance, securely wipe your device before departure, and only restore the information once you are in a trusted and secure environment.

Secure messaging apps like Signal or Briar are highly recommended. Signal offers end-to-end encrypted messages with disappearing message options. At the same time, Briar works without internet access, connecting devices over Bluetooth, a useful tool when networks are shut down or compromised. For browsing, Tor Browser and Brave can help mask your digital footprint, and VPNs like Proton VPN protect your IP and data from being intercepted.

Another lesser-known threat while travelling is using other people’s laptops, power banks, or public USB charging stations to charge your phone. A cybersecurity expert, @MG, recently shared on his X platform that it’s possible to embed malicious hardware in seemingly ordinary charging cables, allowing attackers to silently install spyware or steal data, all through a simple act of charging.

“Every time I travel, I let people charge their devices. Totally harmless. They never know who I am or what I normally do with USB cables, but maybe one day. This lady’s phone died a few minutes into a 5-hour flight. I just wanted her to enjoy her time.”

While this risk is more prevalent in high-surveillance environments or with targeted individuals, East Africa’s tightening political environment means these kinds of attacks are no longer theoretical. Always carry your own power bank and wall plug, and avoid plugging into unknown USB ports or borrowed devices.

In East Africa, it’s not just border crossings where your phone is vulnerable. Internal roadblocks, especially in Uganda, are notorious for phone checks and random inspections. Renaming your contacts with neutral identifiers (e.g., changing “Lawyer” to “Uncle Ben”) can reduce suspicion if your contact list is scrutinized. Documenting human rights violations or organizing protests should be done with tools like ObscuraCam, which can anonymize people in images and secure your data.

All of these precautions may seem extreme, but they reflect the reality of an increasingly hostile digital environment. In the wake of laws such as the Computer Misuse Act and during times of election unrest or crackdowns on civil society, having activist materials or politically sensitive content on your phone can lead to detention or deportation. Even if you’re not the direct target, your phone may contain information that puts others at risk.

This isn’t about paranoia, it’s about preparedness. Just as you wouldn’t hand your passport to a stranger, you shouldn’t let your phone become an open book to authorities or unknown devices. Your smartphone is a window into your work, identity, and community. In the wrong hands, it becomes a weapon.

As you plan your next cross-border trip, whether for a workshop, a conference, vacation, a protest, or a field visit, take these precautions seriously. Train your team, update your digital safety practices, and always assume your device may be searched.

In the end, digital security is not a luxury. It is survival. Protect your data like your passport. Because in East Africa’s shifting political terrain, your privacy may just be your best defense.

U.S. Ruling on NSO Sends Warning as Pegasus Targets Ugandan Journalists

By Noelyn Nassuuna | 8 May 2025

In a historic decision on May 6, 2025, a U.S. jury in California ordered NSO Group to pay $168 million in damages for deploying its Pegasus spyware to hack WhatsApp’s infrastructure. This unprecedented verdict—$447,719 in compensatory damages and over $167 million in punitive damages—marks the first time the notorious Israeli spyware company is held financially accountable in court for its hacking operations.

This ruling is a major victory for global digital rights defenders and a critical warning to companies enabling unlawful surveillance. For years, NSO Group’s Pegasus spyware has been linked to grave human rights violations, including the targeting of journalists, activists, and dissidents worldwide. Meta, the parent company of WhatsApp, pursued a six-year legal battle to expose these abuses and protect its users. The judgment follows a landmark January 2025 summary ruling that found NSO guilty of violating U.S. and California hacking laws and breaching WhatsApp’s Terms of Service.

“This verdict sends a clear message to spyware companies that targeting people through U.S.-based platforms will come with a high price,” said Michael De Dora, U.S. Policy and Advocacy Manager at Access Now.

But while the courtroom victory occurred in the United States, its impact reverberates far beyond. Just days before the judgment, Ugandan investigative journalist Canary Mugume took to X (formerly Twitter) to reveal that Pegasus spyware had attempted to infiltrate his device. His post sent shockwaves through Uganda’s media and civil society sectors, especially as the nation edges closer to its 2026 general elections.

This is not the first time Pegasus has been used to target journalists globally. In Uganda, such incidents signal a chilling escalation in the digital threats facing the press. The implications are grave: surveillance software like Pegasus doesn’t just spy on individuals—it compromises entire newsrooms, sources, and the right to information.

“Apple sent this notification to me indicating that I am being targeted by a mercenary spyware. Most of these are used by Governments to hack into phones of journalists, high-profile figures and activists. They last sent this in 2021, there’s a pattern – electoral season.”

In past years, several journalists and human rights defenders in Uganda have reported suspicious digital intrusions, but rarely with hard evidence pointing to a tool as sophisticated and invasive as Pegasus. The spyware is known for its ability to silently infiltrate phones, access messages, camera, microphone, and more—all without the user’s knowledge.

At Defenders Protection Initiative (DPI), we continue to raise alarm and awareness over the growing use of surveillance technologies to intimidate, silence, or endanger the work of journalists, activists, and civil society organizations. The risks are particularly heightened during politically sensitive periods such as elections, where access to reliable information and protection of press freedom are critical for democratic integrity.

The recent U.S. court ruling is a reminder: accountability is possible. It is also a call to action for governments, tech companies, and civil society in Uganda and across Africa to:

  • Strengthen digital security protocols for journalists and human rights defenders
  • Demand transparency and oversight over surveillance technologies
  • Challenge spyware vendors through legal, policy, and public channels

We stand in solidarity with journalists like Canary Mugume and urge all media professionals to report digital threats and seek expert support. DPI remains committed to supporting journalists and human rights defenders through digital security trainings, emergency response, and legal support.

As elections approach, the protection of digital rights is not just a tech issue—it is a human rights imperative.

Uganda’s Move to Procure Social Media Tracking Tool: A New Threat to Digital Rights and Freedoms

By Helen Namyalo Kimbugwe and Noelyn Nassuuna

The Government of Uganda is in the process of acquiring a social media tracking tool, a development first reported by The Daily Monitor on April 8, 2025. While officials may justify this move on grounds of national security, the lack of transparency and Uganda’s history of digital repression raise urgent concerns about privacy, freedom of expression, and the civic space—especially as the country nears the 2026 general elections.

This article examines the implications of this tool, the risks it poses to activists, journalists, and civil society, and what can be done to resist digital surveillance and safeguard fundamental rights.

Read the full article here:

card with security tips holder WEB (3).pdf

Introduction to Our Digital Security Tips Ring Cards

Staying safe online shouldn’t be complicated. That’s why we created the Digital Security Ring Cards, a compact, easy-to-use tool designed to help individuals and teams quickly access essential digital safety tips anytime, anywhere.

These ring cards simplify critical digital security practices into short, practical reminders you can flip through on the go. Whether you’re a human rights defender, journalist, student, activist, or part of a CSO, the ring cards offer daily guidance to help you protect your devices, accounts, data, and online presence.

Each card is intentionally crafted with clear language, actionable steps, and real-world relevance, making digital security approachable for beginners and useful even for experienced users. Perfect for trainings, workshops, office desks, fieldwork kits, and personal use, the ring cards act as your pocket-sized security companion.

Empower yourself with knowledge.
Carry digital safety with you, one card at a time.

WhatsApp Image 2025-11-20 at 13.13.36

A Mini Digital Security Handbook for CSOs

In today’s rapidly evolving digital landscape, Civil Society Organizations (CSOs) face increasing risks that threaten their work, safety, and credibility. From data breaches and online harassment to targeted cyber-attacks on human rights defenders, the need for practical, accessible, and context-relevant digital protection has never been greater.

To support CSOs in strengthening their resilience, Defenders Protection Initiative (DPI) has developed the Mini Digital Security Handbook for CSOs, a simplified, action-oriented guide designed to equip teams with essential knowledge and tools for safer digital engagement. Whether you are an advocacy group, community-based organization, media house, or grassroots movement, this handbook provides clear steps you can take today to safeguard your communications, devices, data, and online presence.

This resource breaks down complex digital security concepts into easy-to-understand practices tailored to the realities of organizations working in sensitive environments. It is perfect for beginners, trainers, and teams seeking a quick but reliable reference for digital safety.

Strengthen your organization’s digital resilience.
Start your journey with the Mini Digital Security Handbook today.