6 Tips for Protecting Your Communications From Prying Eyes

Posted: June 18, 2015 in SWIG
Tags:

OPSEC-for-Preppers

Some tactics are more difficult than others, but the good news is that not all of them require technical skills. The key is to figure out your communication strategy. First, decide if you are trying to hide WHO you are talking to (metadata) or WHAT you are talking about (content), or BOTH.

In each case, there are both high-tech and low-tech ways to evade surveillance.

If you are trying to mask WHO you are talking to, consider three tactics that I call ACE — which stands for “Add Noise, Cloak or Evade.”

  • Add noise means fuzzing the metadata by adding false connections or false content to the communications.

A high-tech way to add noise online is to use Tor Web browser which bounces your Internet traffic around to a bunch of locations so that the website you arrive at doesn’t know where you are coming from.

You could also add noise in a low-tech way. If, for instance, you are a journalist calling a source in the mayor’s office, you could also call everyone in the office, too. That protects the source from being the only one with a record of a call with you. (However, you should talk for a short time and set up another means of communications to avoid creating a data trail of a long conversation).

  • Cloak means using alternate identities.

Another way to mask who you are talking to is to set up new accounts – whether it is email, instant messaging or a cellphone – using alternate identities.

For these disposable online accounts, it’s best to use Tor when setting up a disposable email (instructions here) or instant messaging account (instructions here for Linux/BSD/Unix, Windows and Mac) so that your location is not revealed during the setup and use of the account.

For disposable cellphones, also known as burner phones, the best practice is to buy them in cash in a location not close to your usual work and home (because your location is a very distinctive giveaway). Give one to your correspondent and set up a time in which you will each go to a location that is not on your usual route in order to make the call.

Full Story @ [ProPublica]

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s