Real results from communities we serve
Scale of work
Field evidence
These stories represent the real-world impact of our work. Details have been changed to protect the identities and security of those involved.
A team of independent journalists investigating government corruption faced escalating digital surveillance and targeted harassment. After implementing our security protocols and encrypted communication systems, they successfully published a series of investigative reports exposing major corruption schemes.
The security measures we provided protected not just the journalists, but their sources — individuals who took enormous personal risks to expose wrongdoing. Six months after initial deployment, the investigation had led to multiple arrests and policy changes, while all sources remain protected.
When conflict escalated in a major city, authorities shut down internet and cellular networks to prevent coordination. This also cut off humanitarian organizations from their field teams and international support networks.
We deployed satellite communication equipment within 8 hours, establishing secure channels that allowed 12 humanitarian organizations to maintain coordination. Over three weeks of network blackout, these channels facilitated 47 medical evacuations and delivery of essential supplies to 8,000 affected civilians.
A network of human rights defenders documenting abuses faced sophisticated digital attacks aimed at compromising their devices and identifying protected witnesses. Standard security tools were insufficient against state-level adversaries.
We provided advanced operational security training and deployed hardened communication systems. Over 18 months, the network has documented hundreds of violations and submitted evidence to international courts while successfully protecting the identities of witnesses.
Civil society organizations in a restrictive environment faced increased digital surveillance and intimidation. Most members lacked basic digital security knowledge, making them vulnerable to surveillance.
We conducted comprehensive security workshops for 85 activists and community organizers. Three months post-training, participants reported 91% adoption of core security practices. The community established peer support networks for ongoing security guidance.