UCS -- For Experts Engaging in Public Discourse...

 Security and Safety Resources for Experts Engaging in Public Discourse

Public engagement by scientists is essential for advancing knowledge, informing policy, and

strengthening democratic decision-making. At the same time, scientists increasingly face risks in

the court for their work, including digital threats, harassment, reputational attacks, and legal

challenges. Preparing for these risks allows experts to continue contributing while reducing risks

to themselves, their colleagues, professional networks, and family members. Preparedness

creates the conditions that allow science to thrive in the public sphere. These resources help

experts participate safely, securely, and effectively.

Key Considerations

1. Know your risks and assess your exposure

Different types of engagement, like submitting a regulatory comment, speaking at a rally, serving

as an expert witness, or publishing an op-ed, carry different levels of risk. Before engaging, assess

the legal, digital, and reputational risks relevant, and ask yourself:

• Public records: How exposed are my work and communications? Could my emails, drafts,

or notes be subject to federal Freedom of Information Act (FOIA) or state open records

requests? Do I communicate with anyone who could be subject to open records requests,

either directly or via a listserv? Similarly, who else might be targeted or harassed based on

disclosures of my communications?

• Institutional role: When I participate in public discussions, am I being clear about whether

I am speaking in a personal capacity or on behalf of my institution? Could my statements

and/or participation be misinterpreted as representing my institution without

authorization?

• Personal exposure: What personal details (address, phone, family, photos) can be found

with an online search? How could past posts, comments, or online activity be taken out of

context or misused? What steps can I take to limit or remove that information (e.g., privacy

settings, data removal services, minimizing public sharing)?

• Digital hygiene: Do I practice good habits online? Have I considered how past posts,

comments, or online activity might be taken out of context or misused? What settings or

retention policies can I update to minimize my exposure?

• Institutional support: If I am targeted, does my institution have resources (legal counsel,

ombuds office, insurance, communications staff) and the political will to support me?

Could my interests conflict with the interests of the institution? What other support might I

need? How do I build those relationships ahead of exposure to ensure I am protected and

prepared to respond promptly?

• Credibility: Do I have clear documentation and citations to back up my key claims if

challenged? Could any of my past publications, statements, or affiliations be taken out of

context to challenge my expertise?

• Harassment preparedness: What is my plan for handling hostile emails, online attacks, or

misrepresentation in the press? Have I identified trusted colleagues, allies, and resources I

can turn to quickly if harassment escalates? How does my identity multiply risk factors?

UCS’s Science and Democracy Under Siege report provides an overview of recent attacks on

science and gives some context for why protecting scientific integrity matters.

2. Protect your digital footprint

Digital security is foundational. Good practices not only reduce the risk of hacking or harassment,

but also help prevent sensitive research materials or personal communications from being taken

out of context.

• If you work for a government agency or public university, always assume that your emails,

drafts, and data can be made public.

• Know your institution’s records retention policies and follow them. These may dictate how

long emails or documents are kept, either by the institution or by individuals, and when

they must be archived or deleted. If your institution doesn’t have a records retention policy,

advocate for one to be implemented.

• Use strong passwords and two-factor authentication. Encrypt devices and keep software

updated to reduce vulnerabilities.

• Limit the personal information that appears online. Consider removing home addresses,

personal phone numbers, and family details from websites or directories. Subscription

services like delete.me, Kanary, or OneRep monitor and remove your personal information

for an annual or monthly fee.

• Periodically review your online presence as if you were an adversary searching for

weaknesses.

Climate Science Legal Defense Fund (CSLDF’s) Safeguarding Online Communications provides

detailed best practices for email, devices, and social media.

3. Understand public records laws, institutional policies and resources

Scientists at government agencies and public universities should assume their emails, drafts, and

data may become public under federal FOIA or state-level public records laws. For scientists

employed at private entities, correspondence with those at public institutions may be subject to

similar laws. Protections vary widely across states; some exclude or exempt research records,

while others provide little protection. Here are some practical steps:

• Familiarize yourself with your state’s specific laws. CSLDF maintains a state-by-state guide

of open records laws and research protections.

• Always write emails using careful and professional language, with the assumption they

could be disclosed. In contrast, conversations that create no records – such as in-person

discussions, phone calls, or Zoom meetings (without transcript or recording) – will

therefore be the most likely to stay private.

• Build relationships with institutional staff like legal counsel, ombuds offices, union

representatives, or compliance staff. These existing relationships will be critical when

asking for support in handling requests.

• Always seek advice before complying with a request for records, which may include trusted

third-party opinions.

• When engaging in a public forum as a public citizen, maintain a clear distinction between

your personal and professional roles, including by using disclaimers such as “affiliation for

identification purposes only”.

4. Plan for potential harassment and intimidation

Harassment and intimidation can disrupt both personal and professional life, but preparing in

advance can reduce their impact. Many of these strategies enhance general professional safety,

but are particularly critical when facing targeted harassment. Maintaining a clear plan not only

provides protection, but also strengthens overall resilience.

• Limit exposure: Remove personal details from online directories and review what is visible

on social media.

• Set a response protocol: Identify who to contact within your institution (e.g., department

chair, ombudsperson, HR, or security office) if harassment occurs. Identify others in your

network (research collaborators, funders, etc.) who should be notified.

• Keep records: Save harassing emails, messages, or voicemails; take screenshots where

useful. Documentation is critical if escalation occurs.

• Anticipate media pressure: Controversial topics sometimes attract hostile press attention.

Media training can help you communicate clearly and avoid being misquoted. Set up a

google alert to track if you are named in any blogs or media.

• Build external support: Professional societies, advocacy groups, and legal aid

organizations can provide assistance and communities of support if harassment

intensifies.

CSLDF’s Handling Political Harassment and Intimidation outlines best practices for responding

safely.

5. Engage professionally in legal and policy processes

Participation in policymaking and litigation is one of the most powerful ways scientists can apply

their expertise. Robust science, clear boundaries, solid preparation, and reliable support ensure

protection for you and your circle of colleagues, collaborators, supporters, and loved ones.

• Provide evidence-based input. Always cite peer-reviewed studies, link to published data,

and explain methods clearly. Avoid ascribing intent or motivation.

• Keep a record of what you submit or testify to; comments and testimony often become part

of the public record.

• Expect scrutiny of your qualifications, past publications, statements, and affiliations--

review them for consistency in advance.

• Disclose potential conflicts of interest; transparency builds credibility.

• Clarify with retaining counsel which documents are confidential or privileged before

reviewing or sharing materials.

• Prepare for cross-examination or hostile questioning by practicing how to explain your

science in plain language.

Additional Resources and Readings

Union of Concerned Scientists (UCS)

• Science and Democracy Under Siege – Overview of recent attacks on science and why

protecting scientific integrity matters.

• Science in an Age of Scrutiny – Guide on responding to criticism and personal attacks.

• Science Advocacy Training Series – UCS resources on effective advocacy and

communication for scientists.

• Protecting Scientists Engaging in Advocacy: Resources and Next Steps (PDF) – Practical

tools and contacts for scientists facing threats from UCS Science Network webinar.

• Resources for Federal Scientists – Guidance for scientists working within or alongside

federal agencies, with many more broadly relevant tools as well.

• Toolkit for Independent Scientists – Support for scientists participating in advisory roles

outside government.

Legal Support

• The Climate Science Legal Defense Fund (CSLDF) is a nonprofit that provides legal

support, resources, and guidance to help scientists and experts navigate attacks,

harassment, and misuse of the legal system.

• Scientists’ Stories – Climate Science Legal Defense Fund – Real-world accounts of

scientists navigating legal and public challenges.

• Defending Defenders – ELAW – International legal support for environmental defenders.

Research Security

• Chronicle of Higher Education: Research Issue – Coverage of current challenges to

academic research freedom.

• Security Threats Model – Framework for assessing risks to researchers.

• Researcher Support Resources – Practical tools for protecting researchers at risk.

Digital Security

• Personal Security Assessment – Step-by-step guide to evaluating personal security risks.

• Digital Security Handbook – Practical advice on protecting data, devices, and online

presence.

• Digital Security Zine – Accessible, creative guide to digital safety for activists and experts.

• Data removal services like delete.me, Kanary, or OneRep can help monitor and scrub your

personal information on the internet.

Speaking Up

• Know Your Risks (National Lawyers Guild) – Tips on recognizing risks and protecting

yourself while speaking out.

• Climate Whistleblowers – Support network for individuals exposing climate-related

misconduct.

• Expert Witness Workshop Materials – Articles and tools for expert witnesses and public

advocates.

• Climate Advocacy in a Time of Illiberalism – Climate Advocacy Lab – Strategies for

advancing advocacy under restrictive conditions.

Reading & Analysis

• BMJ Article on Research Integrity – Peer-reviewed piece on protecting independence in

research.

• Southeastern Sidelines – Scientist Perspectives – A case study on scientists sidelined in

climate debates.

• Mutual Academic Defense Compact – Proposal for universities to support each other in

defending academic freedom.

Comments

Popular Posts