Digital Survival - security https://survival.tacticaltech.org/taxonomy/term/74 en Mobile phone security & privacy https://survival.tacticaltech.org/mobile/security <div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"><p><img style="float: right; border: 0;" src="/sites/survival.tacticaltech.org/files/public/digitalsecurity/CH3_img9.jpg" alt="" width="220" height="314" />Mobile phones carry a vast amount of data; not just your contacts but also logs of calls made and received, and of SMS messages sent and received. They can reveal a lot about you; for example, the list of all your contacts in your mobile phone shows exactly who you are working with. If you are working on a politically sensitive issue this can put you and everyone you work with at risk. There are obvious security concerns for people who use mobile phones to record video or take photos in sensitive situations. If a phone is confiscated or found with footage in it that incriminates others, those people could be put at risk as well as the phone's owner. Great caution should be exercised at all times. Special care needs to be taken if and when this content is transmitted over the mobile network as mobile phone service providers can be pressured to hand over records of activity on particular phones. Networks also automatically track the location of each and every active mobile phone – this is done for the purposes of routing calls and messages. This means that members of the public (or at least their phones) can be pinpointed to a specific location at a specific time. The only way to ensure your location cannot be identified is to turn your phone off and remove its battery. Mobile phone cameras also routinely store the location where an image was taken, along with details of date, time and the type of camera or phone used. This information, or metadata, is stored as part of the JPEG standard which is the file format most commonly used for digital images. This information could be useful to you in some circumstances – to prove that you were in a particular place at a particular time to witness an event – but it could also get you into trouble, depending on the situation. Tools are available which enable this ‘hidden’ information to be viewed, and (in most cases) removed, before the image is forwarded to others. You can download a free tool called JPEG Stripper (<a href="http://www.steelbytes.com/?mid=30">http://www.steelbytes.com/?mid=30</a>) which will help you remove metadata from your images.</p> </div></div></div><div class="field field-name-field-tags field-type-taxonomy-term-reference field-label-above"><div class="field-label">Tags:&nbsp;</div><div class="field-items"><div class="field-item even"><a href="/taxonomy/term/91" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">mobile phone</a></div><div class="field-item odd"><a href="/taxonomy/term/74" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">security</a></div></div></div> Thu, 03 Feb 2011 12:00:37 +0000 katie 56 at https://survival.tacticaltech.org https://survival.tacticaltech.org/mobile/security#comments Mobile phone security checklist https://survival.tacticaltech.org/mobile/security/checklist <div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"><ul><li>When using your phone, remain aware of your surroundings and do not use it in crowded areas or where you feel unsafe. </li> <li>Avoid displaying your phone in public. Keep it with you at all times and do not leave it unattended. </li> <li>Always use a PIN code to unlock your phone's keypad and functions. See the phone's security settings to set this. Use invisible ink to mark the phone and battery with your postcode and street number or the first two letters of your house name. This can be helpful in recovering your phone if it is lost or stolen.</li> <li>The 15-digit serial or IMEI number helps to identify your phone. This can be accessed by looking behind the battery of your phone – it should be visible as a 15 digit number. Make a note of this number and keep it separate from your phone, as this number could help the police to trace ownership quickly if it is stolen. </li> </ul><p>For more information, visit the Security section of the Mobiles in-a-box toolkit (<a href="http://mobiles.tacticaltech.org/security">http://mobiles.tacticaltech.org/security</a>)</p> </div></div></div><div class="field field-name-field-tags field-type-taxonomy-term-reference field-label-above"><div class="field-label">Tags:&nbsp;</div><div class="field-items"><div class="field-item even"><a href="/taxonomy/term/91" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">mobile phone</a></div><div class="field-item odd"><a href="/taxonomy/term/74" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">security</a></div></div></div> Thu, 03 Feb 2011 11:58:29 +0000 katie 55 at https://survival.tacticaltech.org https://survival.tacticaltech.org/mobile/security/checklist#comments Instant Messaging Security https://survival.tacticaltech.org/internet/messaging/security <div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"><p><img style="float: right;" src="http://survival.tacticaltech.org/sites/survival.tacticaltech.org/files/public/digitalsecurity/CH1_img10.jpg" alt="" width="75" height="108" />With IM, it may seem as though you are having a 'private chat' with someone, but because it's transmitted via the internet this may not be the case. Unfortunately IM programmes don't offer good security so you need to use other programmes to do this. You are more secure if both you and your instant messaging contacts use the same software and take the same security precautions.</p> </div></div></div><div class="field field-name-field-tags field-type-taxonomy-term-reference field-label-above"><div class="field-label">Tags:&nbsp;</div><div class="field-items"><div class="field-item even"><a href="/taxonomy/term/111" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">Instant Messaging (IM)</a></div><div class="field-item odd"><a href="/taxonomy/term/74" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">security</a></div></div></div> Wed, 02 Feb 2011 17:25:43 +0000 katie 42 at https://survival.tacticaltech.org https://survival.tacticaltech.org/internet/messaging/security#comments Email tips https://survival.tacticaltech.org/internet/email/tips <div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"><ul><li>Don't open email attachments that you are not expecting, or which have come from someone you do not know. When you open such an email, make sure that your anti-virus software is up-to-date and pay close attention to any warnings from your browser or email program. </li> <li>You can use anonymity software which can help you hide your chosen email service from anyone who might be monitoring your internet connection. A good, free software programme to do this is Tor. You can find out more about this in chapter 8 of Security in-a-box at <a href="http://security.ngoinabox.org/chapter-8">http://security.ngoinabox.org/chapter-8</a>. If you don't want to give away information about your identity through your email, do not register a username or 'Full Name' that is related to your personal or professional life. </li> <li>You can avoid getting spam (unwanted or junk email) by guarding your email address and distributing it sparingly. Also, never open or reply to any emails you consider to be spam, because spammers will take this as a proof of the legitimacy of the address and will just send you more spam. Consider using a spam filter, but remember that it needs to be monitored as it may mistake a genuine email for spam. </li> <li>You should try to avoid your emails being mistaken for spam by the recipients. Spam filters will block messages with certain words in the subject heading. It is worth scanning your spam folder for subject lines that are getting blocked. A list of sample words blocked by spam filters can be found at <a href="http://www.mequoda.com/articles/subject-line-spam-trigger-words/">http://www.mequoda.com/articles/subject-line-spam-trigger-words/</a> </li> <li>Beware of email scams. Many scam emails pretend to come from a bank, Ebay, Paypal, or other online shops. If you get an email telling you that your account is in danger of being shut down, or that you need to take immediate action by updating your account information, be very suspicious: these messages are usually scams. Another frequent scam has you receiving an email from someone you know which says that they have had an emergency and asks you to send them money. This person's email account is likely to have been compromised by a scammer. </li> <li>Pay close attention if your browser suddenly gives you messages about invalid security certificates when you attempt to access a secure webmail account. It could mean that someone is tampering with the communication between your computer and the server in order to intercept your messages.</li> </ul></div></div></div><div class="field field-name-field-tags field-type-taxonomy-term-reference field-label-above"><div class="field-label">Tags:&nbsp;</div><div class="field-items"><div class="field-item even"><a href="/taxonomy/term/105" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">email</a></div><div class="field-item odd"><a href="/taxonomy/term/110" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">spam</a></div><div class="field-item even"><a href="/taxonomy/term/74" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">security</a></div></div></div> Wed, 02 Feb 2011 17:16:22 +0000 katie 40 at https://survival.tacticaltech.org https://survival.tacticaltech.org/internet/email/tips#comments Email Security https://survival.tacticaltech.org/internet/email/security <div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"><p style="text-align: right;"><img style="vertical-align: top;" src="http://survival.tacticaltech.org/sites/survival.tacticaltech.org/files/public/digitalsecurity/CH1_img10.jpg" alt="" width="75" height="108" /></p> <p><img style="float: right;" src="/sites/survival.tacticaltech.org/files/public/digitalsecurity/CH2_img10.jpg" alt="" width="220" height="314" />Few of the webmail providers available offer SSL access to your email. Some of them give you a secure login to protect your password but the messages you send and receive are not secure. Some even insert the IP address of the computer you are using into all of the messages you send. Two providers which are worth considering are Gmail and Riseup.</p> <ul><li><strong>GMAIL</strong>: can be used entirely through a secure connection, as long as you login to your account from <a href="https://mail.google.com">https://mail.google.com</a> (with the HTTPS), rather than <a href="http://mail.google.com">http://mail.google.com</a>. To ensure ultimate security, you also need to set a preference that tells Gmail always to use SSL in sending and receiving mail. However, we don't recommend relying entirely on Google for the confidentiality of your sensitive email communication. Google scans and records the content of its users' messages for a wide variety of purposes and has, in the past, conceded to the demands of governments that restrict digital freedom. </li> </ul><ul><li><strong>RISEUP</strong>: If you don't have an email account yet, or wouldn't mind switching, the best we can recommend is Riseup <a href="https://mail.riseup.net">https://mail.riseup.net</a>. RiseUp offers free email to activists around the world and takes great care to protect the information stored on their servers. They have long been a trusted resource for those in need of secure email solutions. Unlike Google, they have very strict policies regarding their users' privacy, and no commercial interests that might conflict with those policies. In order to create a new RiseUp account, however, you will need two 'invite codes' which can be given out by anyone who already has a RiseUp account.</li> </ul><p>Regardless of what secure email tools you decide to use, keep in mind that every message has a sender and one or more recipients. Even if you are accessing your email account securely, your recipients may not be using a secure email account when reading and replying to your messages. To ensure private communication, you and your contacts should all use secure email services. If you want to be certain that messages are not intercepted between your email server and a contact's email server, you might all choose to use accounts from the same provider. In this case, RiseUp is a good one to choose.  </p> <p>If you suspect that someone is monitoring your email, you should read 'Tips on responding to suspected email surveillance' at <a href="http://security.ngoinabox.org/en/chapter_7_2">http://security.ngoinabox.org/en/chapter_7_2</a></p> </div></div></div><div class="field field-name-field-tags field-type-taxonomy-term-reference field-label-above"><div class="field-label">Tags:&nbsp;</div><div class="field-items"><div class="field-item even"><a href="/taxonomy/term/108" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">Gmail</a></div><div class="field-item odd"><a href="/taxonomy/term/109" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">Riseup</a></div><div class="field-item even"><a href="/taxonomy/term/74" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">security</a></div><div class="field-item odd"><a href="/taxonomy/term/93" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">Secure Socket Layer (SSL)</a></div></div></div> Wed, 02 Feb 2011 17:10:24 +0000 katie 39 at https://survival.tacticaltech.org https://survival.tacticaltech.org/internet/email/security#comments Social networking security https://survival.tacticaltech.org/internet/communities/security <div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"><p><img style="float: right;" src="http://survival.tacticaltech.org/sites/survival.tacticaltech.org/files/public/digitalsecurity/CH1_img10.jpg" alt="" width="75" height="108" />You should maintain your security awareness on these sites just as you would on any other. Beware of clicking on unknown links posted by other users, and of suspicious messages to your account. Also, remember that the information you put into a social networking site may not be private and many different people may look at it, including people that are not trusted friends. You can usually tune your privacy settings in your account options and control who can see your profile, but you might also consider signing up under a pseudonym to avoid divulging too much private information.</p> </div></div></div><div class="field field-name-field-tags field-type-taxonomy-term-reference field-label-above"><div class="field-label">Tags:&nbsp;</div><div class="field-items"><div class="field-item even"><a href="/taxonomy/term/101" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">social network sites</a></div><div class="field-item odd"><a href="/taxonomy/term/74" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">security</a></div></div></div> Wed, 02 Feb 2011 16:52:14 +0000 katie 35 at https://survival.tacticaltech.org https://survival.tacticaltech.org/internet/communities/security#comments Search engine security https://survival.tacticaltech.org/internet/web-pages/security <div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"><p><img style="float: right;" src="http://survival.tacticaltech.org/sites/survival.tacticaltech.org/files/public/digitalsecurity/CH1_img10.jpg" alt="" width="75" height="108" />If you are concerned about someone monitoring your search keywords, you can use an SSL connection with Google. Just type in <a href="https://www.google.com">https://www.google.com</a>. This doesn't prevent Google from logging your search requests, but it does ensure that your search is not being monitored by a third party on the internet. If you are also concerned about Google logging your search requests, you can use a search engine like Scroogle <a href="http://scroogle.org">http://scroogle.org</a>), which uses Google's search database but doesn't log your keywords.</p> </div></div></div><div class="field field-name-field-tags field-type-taxonomy-term-reference field-label-above"><div class="field-label">Tags:&nbsp;</div><div class="field-items"><div class="field-item even"><a href="/taxonomy/term/85" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">internet</a></div><div class="field-item odd"><a href="/taxonomy/term/99" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">search engines</a></div><div class="field-item even"><a href="/taxonomy/term/95" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">web-browsing</a></div><div class="field-item odd"><a href="/taxonomy/term/74" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">security</a></div><div class="field-item even"><a href="/taxonomy/term/93" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">Secure Socket Layer (SSL)</a></div></div></div> Wed, 02 Feb 2011 16:27:58 +0000 katie 32 at https://survival.tacticaltech.org https://survival.tacticaltech.org/internet/web-pages/security#comments Web-browsing security https://survival.tacticaltech.org/internet/browsing/security <div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"><p><img style="float: right;" src="http://survival.tacticaltech.org/sites/survival.tacticaltech.org/files/public/digitalsecurity/CH1_img10.jpg" alt="" width="75" height="108" />Many countries have installed software to prevent people from accessing certain websites and internet services. Companies, schools and public libraries often use similar software to prevent employees, students and patrons from accessing material that they consider distracting or harmful. Some filters block sites based on their IP addresses, while others blacklist certain domain names, or search through all unencrypted internet communication, looking for specific keywords. If you suspect that the page you are looking for is being censored, you may want to consider using an anonymity tool like Tor (<a href="http://www.torproject.org">www.torproject.org</a>). You can learn more about bypassing censorship in Security in a Box (<a href="http://security.ngoinabox.org/en/chapter-8">http://security.ngoinabox.org/en/chapter-8</a>)</p> </div></div></div><div class="field field-name-field-tags field-type-taxonomy-term-reference field-label-above"><div class="field-label">Tags:&nbsp;</div><div class="field-items"><div class="field-item even"><a href="/taxonomy/term/85" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">internet</a></div><div class="field-item odd"><a href="/taxonomy/term/95" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">web-browsing</a></div><div class="field-item even"><a href="/taxonomy/term/74" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">security</a></div></div></div> Wed, 02 Feb 2011 16:09:15 +0000 katie 29 at https://survival.tacticaltech.org https://survival.tacticaltech.org/internet/browsing/security#comments Internet security https://survival.tacticaltech.org/internet/security <div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"><p><img style="float: right;" src="/sites/survival.tacticaltech.org/files/public/digitalsecurity/CH1_img10.jpg" alt="" width="75" height="108" />All data travels through the internet in a readable format unless it is encrypted. SSL stands for Secure Socket Layer; this is the technology which allows your computer to communicate over the internet privately. SSL turns the information into a code (encrypts it) so that it cannot be read by unauthorised people. You may have seen SSL on banking websites where you are required to enter private financial information. You will know when you are on an SSL-supported website because you will see a little padlock sign on the lower frame of the browser window, and the internet address of the site will begin with HTTPS rather than HTTP. It is a good idea to use SSL for your email too, if possible. It will encrypt your login details (so that no one can get hold of your password) and your outgoing email so that it cannot be intercepted on the way to the recipient. If you are using email software (where your email messages are downloaded straight to your computer) such as Thunderbird or Microsoft Outlook, it should be set to use SSL – this needs to be agreed with your server. For webmail accounts, such as Gmail and Yahoo, you will probably also have to enable SSL, either as a preference in your account settings or by typing in the HTTPS manually (by logging in to <a href="https://gmail.com">https://gmail.com</a> instead of <a href="http://gmail.com">http://gmail.com</a>). You should always make sure that your connection is secure before logging in, reading your email, or sending a message.</p> </div></div></div><div class="field field-name-field-tags field-type-taxonomy-term-reference field-label-above"><div class="field-label">Tags:&nbsp;</div><div class="field-items"><div class="field-item even"><a href="/taxonomy/term/85" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">internet</a></div><div class="field-item odd"><a href="/taxonomy/term/74" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">security</a></div><div class="field-item even"><a href="/taxonomy/term/93" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">Secure Socket Layer (SSL)</a></div></div></div> Wed, 02 Feb 2011 15:44:33 +0000 katie 26 at https://survival.tacticaltech.org https://survival.tacticaltech.org/internet/security#comments Internet café security checklist https://survival.tacticaltech.org/computer/security/cafes <div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"><p><img style="float: right;" src="/sites/survival.tacticaltech.org/files/public/digitalsecurity/CH1_img12.jpg" alt="" width="220" height="314" />Internet cafés can be very useful for people who do not have their own computers or internet connections. You pay to use the computer by the minute or the hour, and you don't have to deal with any day-to-day computer maintenance, as you would with your own machine. However, internet cafés present security risks of their own. There are many users coming in and out every day, which means a greater chance of virus infection and even the possibility of others spying on your activities. Nevertheless, internet cafés can be useful for avoiding internet surveillance but you have to know what steps to take to ensure that you remain anonymous and do not leave any trace of your activities behind when you leave. Your aim should always be to leave the computer in the state you found it – as if you've never even been there. </p> <ul><li> Make informed choices; make sure the internet café you use is well-known and recommended. Look to see if lots of people are using it, and consider asking for recommendations from friends or locals in the area. </li> <li>Check if the computers have anti-virus software running. Also note whether users are allowed to plug their own devices into the computers; for example, digital cameras. The more interaction between the computers and other devices, the higher the risk of coming into contact with viruses. </li> <li>Use Firefox rather than Internet Explorer: at the moment there are fewer viruses made for Firefox because it is newer software than Internet Explorer. Take a look at GetFirefox.com and see what it looks like so that you can recognise it in an internet café. If the computers do not have Firefox installed, consider using it as a portable application. </li> <li>Check for malware: to start your session securely, you need to check that the computer you are using is not already infected. It's a good idea to run the Avast portable application from your USB drive. Otherwise, use an online malware tool to check the computer for malware. A good tool for this purpose is Housecall which is free and only requires a small download (<a href="http://housecall.trendmicro.com/">http://housecall.trendmicro.com/</a>) </li> <li>Leave No Trace </li> <li>Protect your personal details: when logging in to your various internet accounts, make sure that you don’t select the option to save your details. When you have finished, click the 'log out' option; if you just close the browser window of Gmail, for example, the next person who tries to access Gmail will be taken straight in to your email account. Make sure that any information you fill in on any internet forms is not saved. To do this, go to: Tools &gt; Internet Options &gt; Content &gt; Autocomplete &gt; Clear Forms and Clear Passwords &gt; Ok. </li> <li>Delete your internet history. When you've finished your session, clear your cookies (small text files saved on the computer that can identify you and what you did) as well as the internet history which lists the sites you visited. In Internet Explorer, go to: Tools &gt; Internet Options &gt; Delete Cookies and Clear History &gt; Ok. Deleting the files may take a few minutes so make sure you leave time for this at the end of your internet session. </li> <li>In Firefox versions 3.5 or later there is an option for 'Private Browsing', where none of your history or information will be retained, or there is an option to 'Clear Recent History'. You'll find both of these options under Tools. </li> <li>Delete any saved documents: if you have saved anything to the computer, make sure that you delete your files, both from the folder you saved them in and from the recycle bin of the computer.</li> </ul></div></div></div><div class="field field-name-field-tags field-type-taxonomy-term-reference field-label-above"><div class="field-label">Tags:&nbsp;</div><div class="field-items"><div class="field-item even"><a href="/taxonomy/term/82" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">malware</a></div><div class="field-item odd"><a href="/taxonomy/term/70" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">Firefox</a></div><div class="field-item even"><a href="/taxonomy/term/84" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">Private Browsing</a></div><div class="field-item odd"><a href="/taxonomy/term/64" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">internet cafe</a></div><div class="field-item even"><a href="/taxonomy/term/69" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">Internet Explorer</a></div><div class="field-item odd"><a href="/taxonomy/term/74" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">security</a></div><div class="field-item even"><a href="/taxonomy/term/83" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">cookies</a></div></div></div> Wed, 02 Feb 2011 14:58:52 +0000 katie 22 at https://survival.tacticaltech.org https://survival.tacticaltech.org/computer/security/cafes#comments