A Foundation of Evidence. An Engine for Justice.

An independent organization built on forensic rigour, financial stability and a commitment to absolute protection.

Their Freedom’s Mandate

Their Freedom operates on a foundational endowment from the estate of the late K.A. Jamil, established to create an independent shield for people facing abuse in the Gulf region. This private funding structure is intentional, removing dependence on public fundraising or government grants and allowing our work to be guided solely by risk, evidence and impact. The legacy functions quietly in the background, providing stability while the focus of the organization remains on those whose rights have been violated.

Operational Stewardship

The organization is run by a small, specialized team responsible for turning individual testimonies into secure, verifiable case files that can withstand legal and journalistic scrutiny. Legal researchers analyse national laws and court records, investigators corroborate survivor accounts with open-source and documentary evidence and archivists maintain an encrypted repository that separates identifying information from public-facing material. Digital security specialists oversee secure communication channels, jurisdictional separation of data and strict access controls so that staff in different locations never hold more information than they need to protect a source. Strategic decisions are supervised by the estate’s executors to ensure governance and compliance, while operational priorities are set internally in consultation with trusted pro bono lawyers, partner NGOs and investigative journalists, ensuring that every resource is directed toward documentation that can meaningfully shift risk for survivors.

The Principles That Guide Us

We dismantle the machinery of abuse in the Gulf by documenting the truth that regimes seek to erase. Through forensic investigation and institutional advocacy, we are building the irrefutable case for Their Freedom.

Forensic Rigour

We do not publish until we can prove. Our standard of evidence is designed to withstand legal and international scrutiny.

Victim-Centric Security

The safety of our sources is paramount. We employ advanced digital security protocols to ensure that speaking the truth does not cost a life.

Systemic Focus:

We are looking beyond individual incidents to map the laws, supply chains and policies that enable abuse to function at an industrial scale.

Methodology

Evidence That Holds

Their Freedom operates according to forensic standards of documentation. Every case we will publish is verified through multiple independent sources. Testimony will be cross-referenced with legal documents, employment contracts, medical records and digital evidence. We will not publish allegations; we publish facts that can withstand legal scrutiny.

Our reports are being structured to meet the evidentiary thresholds required by international courts, UN mechanisms and criminal investigations. This means each violation we document includes verifiable dates, locations, perpetrators and corroborating evidence. We are currently curating secure archives of all source material, ensuring that evidence remains accessible for future legal proceedings even if original documents are destroyed or suppressed.

When we engage with victims, we use encrypted communication channels and trauma-informed interview protocols. Their safety is non-negotiable. Testimony is anonymized unless the individual explicitly consents to identification, and all digital metadata is stripped before publication to prevent tracing.

Principles

Independence, Accuracy, Protection

Their Freedom accepts no funding from governments, corporations or entities with commercial interests in the Gulf region. Our independence is the foundation of our credibility. We will document violations regardless of political convenience or diplomatic pressure.

Accuracy governs every decision we make. If we cannot verify a claim through multiple sources, we will not publish it. If new evidence contradicts our findings, we will issue corrections immediately. Our reputation depends on being right, not being first.

Protection of sources is absolute. We operate under the assumption that every communication is monitored, and every contact is at risk. This means rigorous operational security, compartmentalized information sharing and zero tolerance for careless handling of sensitive data. The people who trust us with their stories have already lost everything. We will not be the reason they lose their freedom.