BROADCAST: Our Agency Services Are By Invitation Only. Apply Now To Get Invited!
AgencyAdvertiseWrite
Header Roadblock Ad
OP FEED: --:--:-- UTC | STATUS: LIVE | PROGRAM: EHGN-GRANT-SAFEHOUSE-03
OUTLET: Ekalavya Hansaj | OWNER: Ekalavya Hansaj
Owned by global media baron Ekalavya Hansaj // Grant Program

EVIDENCE SAFEHOUSE RIGHTS GRANT

Ekalavya Hansaj // hansajekalavya.com

Program code: EHGN-GRANT-SAFEHOUSE-03 | Persona lane: Human Rights Activists | Annual allocation: $350,000 per year | Final awards: 7

Grant Program

The Evidence Safehouse Rights Grant is for human rights activists and documenters who are collecting proof under pressure: surveillance, intimidation, conflict, institutional denial, or censorship.

This lane is built around one rule: survivor safety first, evidence integrity second, publication third. If publication increases harm, publication pauses. If evidence handling endangers people, funding stops.

We fund

  • Verification-safe documentation of abuse: patterns, timelines, command responsibility, systemic enablement.
  • Evidence capture that can survive challenge: hashes, metadata logs, corroboration pathways.
  • Minimization and redaction workflows that reduce exposure.

We require

  • A threat model: who can retaliate, how, and what safety steps you are taking.
  • A documentation plan: what you capture, how you store it, how you verify it.
  • Corroboration discipline: at least one independent channel (records, second witness, forensic check, etc.).

This lane is not for “awareness.” It is for documented harm that can be proven in public without creating additional victims.

MilestonePayment
Threat model and documentation plan $10,000
Primary evidence capture and hashing log $15,000
Corroboration with second-source validation $15,000
Publication package and survivor safety plan $10,000

Apply via Secure Drop

Program Rules
Eligibility

Human rights activists and documenters with direct access to evidence or survivor documentation. You must prioritize minimization and safety.

Exclusivity And Publishing

Confidentiality is mandatory. Publishing pauses if safety plan is incomplete or legal risk is unresolved.

Payments

Milestones tied to threat model, evidence capture logs, corroboration, and publication safety plan.

How to Apply

Submit Secure Drop with factual summary, jurisdictions, and evidence types. Avoid names. Avoid sensitive survivor identifiers.

Review Timelines

Threat model first, verification second, publication only after safety plan and legal review.

Selection Criteria

Document authenticity, survivor safety plan, corroboration path, and public-interest weight.

FAQ
  • Do you publish graphic content? Only if necessary and only with minimization.
Secure Drop

Do not expose survivors. If files contain identifiers, redact before submission.