UCS -- For Experts Engaging in Public Discourse...
Security and Safety Resources for Experts Engaging in Public Discourse
Public engagement by scientists is essential for advancing knowledge, informing policy, and
strengthening democratic decision-making. At the same time, scientists increasingly face risks in
the court for their work, including digital threats, harassment, reputational attacks, and legal
challenges. Preparing for these risks allows experts to continue contributing while reducing risks
to themselves, their colleagues, professional networks, and family members. Preparedness
creates the conditions that allow science to thrive in the public sphere. These resources help
experts participate safely, securely, and effectively.
Key Considerations
1. Know your risks and assess your exposure
Different types of engagement, like submitting a regulatory comment, speaking at a rally, serving
as an expert witness, or publishing an op-ed, carry different levels of risk. Before engaging, assess
the legal, digital, and reputational risks relevant, and ask yourself:
• Public records: How exposed are my work and communications? Could my emails, drafts,
or notes be subject to federal Freedom of Information Act (FOIA) or state open records
requests? Do I communicate with anyone who could be subject to open records requests,
either directly or via a listserv? Similarly, who else might be targeted or harassed based on
disclosures of my communications?
• Institutional role: When I participate in public discussions, am I being clear about whether
I am speaking in a personal capacity or on behalf of my institution? Could my statements
and/or participation be misinterpreted as representing my institution without
authorization?
• Personal exposure: What personal details (address, phone, family, photos) can be found
with an online search? How could past posts, comments, or online activity be taken out of
context or misused? What steps can I take to limit or remove that information (e.g., privacy
settings, data removal services, minimizing public sharing)?
• Digital hygiene: Do I practice good habits online? Have I considered how past posts,
comments, or online activity might be taken out of context or misused? What settings or
retention policies can I update to minimize my exposure?
• Institutional support: If I am targeted, does my institution have resources (legal counsel,
ombuds office, insurance, communications staff) and the political will to support me?
Could my interests conflict with the interests of the institution? What other support might I
need? How do I build those relationships ahead of exposure to ensure I am protected and
prepared to respond promptly?
• Credibility: Do I have clear documentation and citations to back up my key claims if
challenged? Could any of my past publications, statements, or affiliations be taken out of
context to challenge my expertise?
• Harassment preparedness: What is my plan for handling hostile emails, online attacks, or
misrepresentation in the press? Have I identified trusted colleagues, allies, and resources I
can turn to quickly if harassment escalates? How does my identity multiply risk factors?
UCS’s Science and Democracy Under Siege report provides an overview of recent attacks on
science and gives some context for why protecting scientific integrity matters.
2. Protect your digital footprint
Digital security is foundational. Good practices not only reduce the risk of hacking or harassment,
but also help prevent sensitive research materials or personal communications from being taken
out of context.
• If you work for a government agency or public university, always assume that your emails,
drafts, and data can be made public.
• Know your institution’s records retention policies and follow them. These may dictate how
long emails or documents are kept, either by the institution or by individuals, and when
they must be archived or deleted. If your institution doesn’t have a records retention policy,
advocate for one to be implemented.
• Use strong passwords and two-factor authentication. Encrypt devices and keep software
updated to reduce vulnerabilities.
• Limit the personal information that appears online. Consider removing home addresses,
personal phone numbers, and family details from websites or directories. Subscription
services like delete.me, Kanary, or OneRep monitor and remove your personal information
for an annual or monthly fee.
• Periodically review your online presence as if you were an adversary searching for
weaknesses.
Climate Science Legal Defense Fund (CSLDF’s) Safeguarding Online Communications provides
detailed best practices for email, devices, and social media.
3. Understand public records laws, institutional policies and resources
Scientists at government agencies and public universities should assume their emails, drafts, and
data may become public under federal FOIA or state-level public records laws. For scientists
employed at private entities, correspondence with those at public institutions may be subject to
similar laws. Protections vary widely across states; some exclude or exempt research records,
while others provide little protection. Here are some practical steps:
• Familiarize yourself with your state’s specific laws. CSLDF maintains a state-by-state guide
of open records laws and research protections.
• Always write emails using careful and professional language, with the assumption they
could be disclosed. In contrast, conversations that create no records – such as in-person
discussions, phone calls, or Zoom meetings (without transcript or recording) – will
therefore be the most likely to stay private.
• Build relationships with institutional staff like legal counsel, ombuds offices, union
representatives, or compliance staff. These existing relationships will be critical when
asking for support in handling requests.
• Always seek advice before complying with a request for records, which may include trusted
third-party opinions.
• When engaging in a public forum as a public citizen, maintain a clear distinction between
your personal and professional roles, including by using disclaimers such as “affiliation for
identification purposes only”.
4. Plan for potential harassment and intimidation
Harassment and intimidation can disrupt both personal and professional life, but preparing in
advance can reduce their impact. Many of these strategies enhance general professional safety,
but are particularly critical when facing targeted harassment. Maintaining a clear plan not only
provides protection, but also strengthens overall resilience.
• Limit exposure: Remove personal details from online directories and review what is visible
on social media.
• Set a response protocol: Identify who to contact within your institution (e.g., department
chair, ombudsperson, HR, or security office) if harassment occurs. Identify others in your
network (research collaborators, funders, etc.) who should be notified.
• Keep records: Save harassing emails, messages, or voicemails; take screenshots where
useful. Documentation is critical if escalation occurs.
• Anticipate media pressure: Controversial topics sometimes attract hostile press attention.
Media training can help you communicate clearly and avoid being misquoted. Set up a
google alert to track if you are named in any blogs or media.
• Build external support: Professional societies, advocacy groups, and legal aid
organizations can provide assistance and communities of support if harassment
intensifies.
CSLDF’s Handling Political Harassment and Intimidation outlines best practices for responding
safely.
5. Engage professionally in legal and policy processes
Participation in policymaking and litigation is one of the most powerful ways scientists can apply
their expertise. Robust science, clear boundaries, solid preparation, and reliable support ensure
protection for you and your circle of colleagues, collaborators, supporters, and loved ones.
• Provide evidence-based input. Always cite peer-reviewed studies, link to published data,
and explain methods clearly. Avoid ascribing intent or motivation.
• Keep a record of what you submit or testify to; comments and testimony often become part
of the public record.
• Expect scrutiny of your qualifications, past publications, statements, and affiliations--
review them for consistency in advance.
• Disclose potential conflicts of interest; transparency builds credibility.
• Clarify with retaining counsel which documents are confidential or privileged before
reviewing or sharing materials.
• Prepare for cross-examination or hostile questioning by practicing how to explain your
science in plain language.
Additional Resources and Readings
Union of Concerned Scientists (UCS)
• Science and Democracy Under Siege – Overview of recent attacks on science and why
protecting scientific integrity matters.
• Science in an Age of Scrutiny – Guide on responding to criticism and personal attacks.
• Science Advocacy Training Series – UCS resources on effective advocacy and
communication for scientists.
• Protecting Scientists Engaging in Advocacy: Resources and Next Steps (PDF) – Practical
tools and contacts for scientists facing threats from UCS Science Network webinar.
• Resources for Federal Scientists – Guidance for scientists working within or alongside
federal agencies, with many more broadly relevant tools as well.
• Toolkit for Independent Scientists – Support for scientists participating in advisory roles
outside government.
Legal Support
• The Climate Science Legal Defense Fund (CSLDF) is a nonprofit that provides legal
support, resources, and guidance to help scientists and experts navigate attacks,
harassment, and misuse of the legal system.
• Scientists’ Stories – Climate Science Legal Defense Fund – Real-world accounts of
scientists navigating legal and public challenges.
• Defending Defenders – ELAW – International legal support for environmental defenders.
Research Security
• Chronicle of Higher Education: Research Issue – Coverage of current challenges to
academic research freedom.
• Security Threats Model – Framework for assessing risks to researchers.
• Researcher Support Resources – Practical tools for protecting researchers at risk.
Digital Security
• Personal Security Assessment – Step-by-step guide to evaluating personal security risks.
• Digital Security Handbook – Practical advice on protecting data, devices, and online
presence.
• Digital Security Zine – Accessible, creative guide to digital safety for activists and experts.
• Data removal services like delete.me, Kanary, or OneRep can help monitor and scrub your
personal information on the internet.
Speaking Up
• Know Your Risks (National Lawyers Guild) – Tips on recognizing risks and protecting
yourself while speaking out.
• Climate Whistleblowers – Support network for individuals exposing climate-related
misconduct.
• Expert Witness Workshop Materials – Articles and tools for expert witnesses and public
advocates.
• Climate Advocacy in a Time of Illiberalism – Climate Advocacy Lab – Strategies for
advancing advocacy under restrictive conditions.
Reading & Analysis
• BMJ Article on Research Integrity – Peer-reviewed piece on protecting independence in
research.
• Southeastern Sidelines – Scientist Perspectives – A case study on scientists sidelined in
climate debates.
• Mutual Academic Defense Compact – Proposal for universities to support each other in
defending academic freedom.

Comments
Post a Comment