9.13 – How To Communicate Securely in Repressive Environment (III of III)

This is Ethiopian Review Policy Research Center’s series on From Dictatorship to Democracy extracted/quoted from books and articles published by Albert Einstein Institution and similar sources.

Leaders that try to restrict the flow of information condemn their nation to underdeeloped status. PFDrucker

DiIGITAL SECURITY TECHNOLOGIES

When combine with the tactics described in (PART I of III) and (PART II of III) series, the following technologies can help you stay safe and keep your data relatively more secure.

  • Blogs and social networking sites
    • When signing up for a blog account where you will be publishing sensitive content, do not use you personal email address or information.
    • In your blog posts and profile page, do not post pictures of yourself or your friends, do not use your real name, and do not give personal details that could help identify you (town, school, employer, etc.).
    • Blog platforms like wordpress allow uses to automatically publish a post on a designated date and time. Use this functionality to auto-publish on a different day when you are away from the computer.
    • On social networks, create one account for activism under a false but real-sounding name (so your account won’t be deleted) but don’t tell your friends about it. The last thing you want is a friend writing on your wall or tagging you in a photo and giving away your identity.
    • Even if you delete your account on a social networking site, your data will remain, so be very careful about taking part in political actions (i.e., joining sensitive groups) online.
    • Never join a sensitive group with your real account. Use your fake account to join activism groups. (The fake account should not be linked to your fake email).
    • Don’t use paid services. Your credit card can be linked back to you.
  • File sharing
    • Use a shared Gmail account with a common passphrase and simply save emails instead of sending. Change passphrase monthly.
    • For sharing offline, do not label storage devices (CDs, flash drives) with the true content. If you burn a CD with an illegal video or piece of software on it, write an album label on it.
    • Don’t leave storage devices in places where they would be easily found if your office or home were searched (i.e., on a table, in a desk drawer).
    • Keep copies of your data on two flash drives and keep them hidden in separate locations.
    • When thinking of safe locations, consider who else has access. Heavily-traveled locations are less safe.
    • Don’t travel with sensitive data on you unless absolutely necessary. If you need to, make sure to hide it on your person or “camouflage” it (label a data CD as a pop music CD). See Sneakernet.
  • Internet Cafes
    • Assume you are being watched.
    • Assume computers at cyber cafes are tracking key strokes and capturing screenshots.
    • Avoid cyber cafes without an easy exit and have a contingency plan if you need to leave rapidly.

Digital Security Technologies

When combine with the tactics described above, the following technologies can help you stay safe and keep your data relatively more secure.

  • Mobile phones
    • Use CryptoSMS, SMS 007 or Kryptext to text securely (this requires java-based phones).
    • Use Android Guardian as soon as it becomes available.
    • Access mobile versions of websites as they are usually not blocked. In addition, connecting to mobile websites provides for faster connections.
  • Digital cameras
    • Use scrubbing software such as: JPEG stripper to remove the metadata (Exif data) from your pictures before you upload/email.
    • Have a safe Secure Digital Card (SD) that you can swap in. Preferably, use a mini SD card with a mini SD-SD converter. Then place the mini SD into a compatible phone for safekeeping.
  • Computers/Laptops
    • Use a different file type to hide your sensitive files. For example, the .mov file extension will make a large file look like a movie.
    • Mac users can use Little Snitch to track all the data that goes into and out of your computer.
    • From a technical perspective, there’s no such thing as the delete function. Your deleted data is eventually written over with new data. There are two common ways to wipe sensitive data from your hard drive or storage device. You can wipe a single file or you can wipe all of the ‘unallocated’ space on the drive. Eraser is a free and open-source secure deletion tool that is extremely easy to use.
  • Flash disks
  • Email communication
    • Use https when using Gmail.
    • Use encrypted email platforms such as Hushmail and RiseUp.
  • Browsers and websites
    • Use Firefox and get certain plugins to follow website tracking such as ghostery and adblock, adart to remove ads/trackers.
    • User Tor software or Psiphon to browse privately and securely.
    • I shan’t list access points for secure browsers, Proxy servers and VPNs here. Please email me for a list.
    • Always use https in “Settings/General/Browser Connection.”
  • VoIP
    • Use Skype but not TOM Skype (Chinese version). Note that Skype is not necessarily 100% secure since no one has access to the source code to verify.
    • Off The Record (OTR) is a good encryption plugin. For example, use Pidgin with OTR (you need to add the plug-in yourself).
    • Gizmo offer encryption for voice conversations, and then only if you are calling another VoIP user, as opposed to a mobile or landline telephone. However, because neither application is open-source, independent experts have been unable to test them fully and ensure that they are secure.
    • Adium is a free IM application for Macs with built-in OTR encryption that integrates most other IM applications.
  • Blogs and social networking platforms
    • There are no safe social networks. The best way to be safe on a social network is fake account and a proxy server.
    • The anonymous blogging platform Invisiblog no longer exists, so the best bet now is WordPress + Proxy (preferably Tor) + anonymity of content.
    • Log out of facebook.com when not using the site.
  • File sharing
    • Use Drop.io to create a private, secure media sharing site.
    • Use BasecampHQ with secure/SSL option to create more specific usernames and passwords for each user or remote site.
  • Internet Cafe
    • Tor can be installed on flash disk and used at Internet cafe and also used from LiveCDs if flash drives are not allowed.

Click the following Template to viw: DIVISION OF RESPONSIBILITIES FOR SELF-LIBERATION

TO THE MANY WAYS TO PROTECT YOUR HEAD IN A FIGHT WITH STONES – YouTube CLICK