Environmental activists and climate researchers face surveillance from corporations with interests in fossil fuels, agricultural businesses, mining operations, and other industries they investigate or oppose. Corporate intelligence operations targeting environmental groups have been documented - including surveillance of communications, infiltration of organizing meetings, and tracking of activists' research into corporate wrongdoing. Government surveillance of environmental groups has also been documented in multiple countries. For environmental advocates, digital security is not paranoia - it is a professional necessity that protects both individual activists and the effectiveness of advocacy campaigns. Tor provides network-level protection that complements other digital security practices.
Need this done for your project?
We implement, you ship. Async, documented, done in days.
Environmental organizations face documented surveillance threats. Corporate intelligence: companies extracting resources (oil, gas, mining) have hired private intelligence firms to monitor activist communications, identify legal strategies, and track internal planning. The Standing Rock surveillance case documented extensive surveillance of water protectors. European cases have documented similar corporate monitoring of anti-pipeline and anti-mining campaigns. Government surveillance: some governments classify environmental activism under counterterrorism or public order frameworks, directing intelligence resources toward activist monitoring. FBI 'Eco-terrorism' designations in the US have resulted in activist monitoring programs. Corporate security infiltration: there are documented cases of undercover individuals joining environmental organizations to provide intelligence to corporate opponents. Digital communication interception is cheaper and lower-risk than human infiltration for corporations.
Secure Research for Environmental Documentation
Environmental activists document corporate wrongdoing: pollution, illegal dumping, deforestation, and violations of environmental permits. Researching corporate operations creates evidence trails that corporations' lawyers can discover through litigation: subpoenas of environmental organizations' records can reveal research sources, methods, and internal strategy. Protecting research: conduct sensitive research from Tor Browser to prevent ISP-level traffic records from revealing what corporate databases, permit registries, or government records you are consulting. Research conducted through Tor creates no ISP-level record linking your real IP to the research topic. Use OnionShare for internal document sharing when collaboration on sensitive documents requires avoiding cloud-based storage visible to corporate lawyers in discovery.
Coalition Coordination and Campaign Planning
Environmental campaigns involve coordination across organizations: legal teams, field researchers, media partners, funders, and allied organizations. Campaign strategy is sensitive: the details of planned actions, legal strategies, and media timing are valuable intelligence for corporate opponents preparing legal and PR countermeasures. Secure coordination infrastructure: use a Matrix homeserver (self-hosted, accessible as a .onion) for coalition communication. Separate from clearnet email and Slack, which are subpoenable. Use Signal for individual communications (E2EE, minimal metadata). Document storage: use Nextcloud self-hosted rather than Google Drive (corporate and government subpoena risk is higher for major cloud providers). For the most sensitive strategy documents: OnionShare for point-to-point transfer rather than persistent cloud storage.
Protecting Informants and Whistleblowers
Environmental organizations often receive information from inside corporations or government agencies - workers who witness violations, engineers who have concerns about environmental compliance, or insiders who want to expose wrongdoing without risking their employment or safety. Protecting these sources is both ethical and legally important (retaliation against environmental whistleblowers is a documented pattern). Set up a SecureDrop instance for your organization: it provides an .onion-only submission channel where sources can submit documents and maintain ongoing communication with your legal team without exposing their identity. SecureDrop is used by major environmental journalism organizations for exactly this purpose. Instruct potential sources to use Tor Browser from a public WiFi location (not their home or work network) for maximum source protection.
Legal Proceedings and Digital Evidence
Environmental cases often involve litigation against corporations or governments: permit challenges, tort cases, and regulatory proceedings. Discovery rules may require environmental organizations to produce communications, research, and strategy documents. The legal team should advise on: what communications create discoverable records, how to handle litigation hold requirements, and what protections apply to attorney-client and work-product privileged communications. Digital security practices that reduce the creation of unnecessary records (using Tor for research creates no ISP records, using E2EE for attorney communications limits records) support better legal hygiene. Consult with legal counsel before implementing practices specifically designed to minimize record creation - the line between legal hygiene and evidence spoliation requires legal judgment.