Technology Security For Activists - Final.2017.02.15
Technology Security For Activists - Final.2017.02.15
Technology Security For Activists - Final.2017.02.15
FOR ACTIVISTS
Security Checklist
o Perform threat modeling and action planning (Page 4)
o Review phone security guidelines (Page 5)
o Encrypt phone and computer hard drives (Page 6)
o Secure your passwords/passcodes (Page 8)
o Create update schedule (Page 10)
o Download and install Signal (Page 11)
o Secure your browsing (Page 12)
o Secure your email (Page 13)
o Research and purchase VPN (Page 14)
o Secure your home network (Page 14)
o General Security Habits (Page 15)
o TOP 3 THINGS (Page 15)
4
Threat Modeling
(Source: An Introduction to Threat Modeling - https://ssd.eff.org/en/module/introduction-threat-modeling)
Platform-Specific Information
iOS: On devices running iOS 8 or later, your personal data such as
photos, messages (including attachments), email, contacts, call
history, iTunes content, notes, and reminders is placed under the
protection of your passcode.
Android: Google introduced full-device encryption in
Android Gingerbread (2.3.x), but it has undergone some dramatic
changes since then. On some higher-end handsets running Lollipop
(5.x) and higher, its enabled out-of-the-box, while on some older
or lower-end devices, you have to turn it on yourself.
MacOS: FileVault 2 is available in OS X Lion or later. When FileVault
is turned on, your Mac always requires that you log in with your
account password.
You can turn on FileVault 2 in System Preferences Security &
Privacy
7
3rd party encryption: There are many third party applications that
can be used to encrypt your data. Some work with the operating
system to perform their encryption, and some use their own
methods. When possible, use reputable open source encryption
suites. Do not use TrueCrypt. It is outdated and has serious security
vulnerabilities that render it unsuitable for use.
All: Strong Passcode/Key, at least 8 characters - 11 if FBI might be
involved.
Password Security
Passwords are the key to your content, and are therefore one of
the most critical levels of defense. There is no sense in encrypting
a hard drive, for instance, without a strong password.
The strongest passwords can be generated by a password vault app
that auto-generates passwords for your individual logins, and
provides you with a master password which opens the vault.
KeePassX, LastPass, and Encryptr are all examples of password
vaults.
If you dont want to use a password vault, manually generated
passwords in the form of 7-word passphrases chosen from random
wordlists can create very secure passwords. One Random Wordlist
can be found here: https://www.eff.org/deeplinks/2016/07/new-wordlists-
random-passphrases
Staying Up To Date
As annoying as they can be, regularly updating your system is an
extremely important aspect of security in the modern age. Security
updates are released almost weekly, and the longer you wait the
more vulnerable you will be.
Create a schedule and stick to it. Most devices can be set
to automatically update at a set time, when it wont be
disruptive.
After updates, make sure to check that no security settings
have changed on your device. Sometimes updates reset
these to their defaults, which have a tendency to track your
information.
If your device cannot be updated any longer, it should be
considered unsecure and replaced. Many older phones and
computers do not fully support modern encryption
standards.
Remember that updates apply to more than just your
computers, tablet, and phone. Check regularly for updates
to all of your network enabled devices.
11
However, if you have a current email account that you want to continue
to use for your day-to-day communications, please keep the following
tips in mind.
Like with all other services, its important to protect your email
account with a secure password and two-factor authentication.
Be careful opening attachments and downloading files that are
unexpected or from unknown sources.
You can have all of the protection in the world on your account,
but if the person you are emailing, the networks you are emailing
over, or the email service provider you are using is not secure
you are also not secure.
Do not reply to spam email
Create a complex email address and dont share it
Keep track of, and when necessary delete, old email accounts
that youve opened.
Use the Bcc (blind carbon copy) line for large numbers of
recipients. This protects the email addresses of the recipients by
hiding them and makes your email easier to read.
Delete email and attachments when you no longer need them.
Use more than one email account:
o Use one as a general catch-all account that you use to
sign up for mailing lists.
o Use one for general conversations.
o Use one or more secure email accounts for more private
conversations, as well as a secure account for password
recovery.
14
When you connect to a VPN, you usually launch a VPN client on your computer
(or click a link on a special website), log in with your credentials, and your
computer exchanges trusted keys with a far away server. Once both computers
have verified each other as authentic, all of your internet communication is
encrypted and secured from eavesdropping.
The most important thing you need to know about a VPN: It secures your
computer's internet connection to guarantee that all of the data you're sending
and receiving is encrypted and secured from prying eyes. (source:
http://lifehacker.com/5940565/why-you-should-start-using-a-vpn-and-how-to-choose-
the-best-one-for-your-needs)
For comparative information about individual VPNs:
https://torrentfreak.com/which-vpn-providers-really-take-anonymity-
seriously-111007/