background preloader

COUNTER-SURVEILLANCE

Facebook Twitter

Technical surveillance counter-measures - Wikipedia. TSCM (technical surveillance counter-measures) is the original United States Federal government abbreviation denoting the process of bug-sweeping or electronic countersurveillance. It is related to ELINT, SIGINT and electronic countermeasures (ECM). The United States Department of Defense defines a TSCM survey as a service provided by qualified personnel to detect the presence of technical surveillance devices and hazards and to identify technical security weaknesses that could aid in the conduct of a technical penetration of the surveyed facility. A TSCM survey will provide a professional evaluation of the facility's technical security posture and normally will consist of a thorough visual, electronic, and physical examination in and about the surveyed facility. This definition is however lacking some of the technical scope involved.

Methodology[edit] Radio frequencies[edit] Most bugs transmit information, whether data, video, or voice, through the air by using radio waves. See also[edit] Counter Surveillance Equipment | Bug Detectors | GPS Detector. Apps. It’s been said that the camera is the new gun. Well, a smartphone without a streaming app is akin to a firearm without ammo. Download a streaming app today to protect yourself and others. BambuserBroadcast low-latency live video and audio to the web using 3G or WiFi! View incoming chat messages, broadcast in public or in private, geotag your broadcasts and share to many social networks.Cost: freeMore: Call Recorder Record your phone calls. Cell 411 (recommended) With near-real-time alerts, support for gravatar images, fast GPS updates and instant access to issue alerts, Cell 411 is ideal for anyone in need.Cost: freeDownload: AndroidDownload: iOS Cop Block (recommended) Access the latest Cop Block articles and podcasts at the click of a button.

Cop Recorder 2Cop Recorder can secretly record audio and then upload it to the OpenWatch server along with location data.Cost: free Download: AndroidDownload: iOS GotYa! Wickr (recommended) Top-Secret Messenger. Open Whisper Systems >> Home. Brilliant New Device Lets Protesters Block Surveillance and StingraysBrilliant New Device Lets Protesters Block Surveillance and Stingrays - Filming Cops. WASHINGTON, DC — Reports about agents using a Stingray on protesters to unconstitutionally monitor their phones are circulating widely, and now protesters have a way to fight back. Earlier this week an anonymous leaked recording exposed the agents monitoring the protesters’ movements by tracking their phones. A Stingray mimics a cellular tower, letting agents pry into citizens’ cell phones and gather their data/location without a warrant. Stingrays were supposed to be used for “terrorists,” but now they’re being used against us locally — which is unconstitutional.

And that’s where a new product called Tunnel enters the scene. We’ve known that the NSA spies on us ever since Edward Snowden blew the whistle on them. NSA building in Utah. But have you ever wondered if it’s possible for somebody to spy back on them? The NSA has a special way of protecting itself against such a possibility. Well now we finally can. Other kinds of phone blocking cases have been around for a while online. Hushed Anonymous Phone Number. Obfuscation. “By mapping out obfuscation tools, practices, and goals, Brunton and Nissenbaum provide a valuable framework for understanding how people seek to achieve privacy and control in a data-soaked world. This important book is essential for anyone trying to understand why people resist and challenge tech norms, including policymakers, engineers, and users of technology”—danah boyd, author of It’s Complicated: The Social Lives of Networked Teens and founder of Data & Society “Obfuscation is an intelligently written handbook for subversives.

I found the historical examples fascinating and the ethical discussion thought-provoking.” —Lorrie Faith Cranor, Director, CyLab Usable Privacy and Security Laboratory, Carnegie Mellon University. Surveillance Countermeasures: Expressive Privacy via Obfuscation | a peer-reviewed journal about_ Daniel C. Howe, Ph.D., Assistant Professor, School of Creative Media, City University Hong Kong. [T]o radically automate and to automate radically as a careful ethical and aesthetic gesture. (Munster) The ubiquity of the web-browser as an interface to the web, and to digital content in general, has by now surpassed that of any other software entity. While obfuscation has a long history in both the analog and digital realms, its direct application to online datafication (the quantification and subsequent monetization of human activity) dates back at least to the 2006 release of the TrackMeNot browser plugin.[1] The specific problem that this project addresses is the collection and aggregation of sensitive personal data during search.

The artist Eduardo Navas may have recognized these larger dynamics at play when he selected TrackMeNot as the source for his own work Traceblog. Not all critics were as positive as Navas and Munster however. Fig. 1. Notes Works cited Drucker, Johanna. Surveillance Countermeasures: Expressive Privacy via Obfuscation | a peer-reviewed journal about_ Brilliant New Device Lets Protesters Block Surveillance and StingraysBrilliant New Device Lets Protesters Block Surveillance and Stingrays - Filming Cops. Qubes OS: A reasonably secure operating system. Rapid Responses For Compromised Phones.

Ono - The Game. Communicating with Others. Most email providers give you a way of accessing your email using a web browser , such as Firefox or Chrome. Of these providers, most of them provide support for HTTPS , or transport-layer encryption . If your email provider supports HTTPS, but does not do so by default, try replacing HTTP with HTTPS in the URL and refresh the page. Some webmail providers that use HTTPS by default include: GmailRiseupYahoo Some webmail providers that give you the option of choosing to use HTTPS by default by selecting it in your settings. What does transport-layer encryption do and why might you need it? HTTPS is the most basic level of encryption for your web browsing that we recommend for everybody. But there are some things that HTTPS does not do. If your threat model for your email communications. (or Pretty Good Privacy) is the standard for end-to-end encryption of your email. Attending Protests (United States)

Think carefully about what’s on your phone before bringing it to a protest. Your phone contains a wealth of private data, which can include your list of contacts, the people you have recently called, your text messages and email, photos and video, GPS location data, your web browsing history and passwords or active logins, and the contents of your email and social media accounts. Through stored passwords, access to the device can allow someone to obtain yet even more information on remote servers. The United States Supreme Court recently held that the police are required to get a warrant to obtain this information when someone is arrested, but the exact limits of that ruling are still being examined. In addition, sometimes law enforcement will seek to seize a phone because they believe it contains evidence of a crime (such as photos you may have taken of the protest), or as part of a vehicle search.

To protect your rights, you may want to harden your existing phone against searches. Surveillance Self-Defense | Tips, Tools and How-tos for Safer Online Communications. Privacy and security basics | Me and my Shadow. There's no such thing as 'perfect privacy' or 'perfect security', but there are a few simple things you can do to keep your content, communications and web browsing more private and more secure. Keep your devices clean and healthy It's important to keep your operating system, software and apps updated. When updates become available, they often include security fixes. Make sure you're also protecting yourself from viruses. For tips and tools on how to do this, see Tactical Tech's digital security toolkit, Security in-a-box. Use strong passwords Especially where your data is stored online, it is crucial to choose strong passwords, or even better, passphrases.

It's also important to use a different one for each account. Home | Me and my Shadow. Gpg4usb - email and file encryption | security in-a-box. Before you can begin encrypting and decrypting email, text messages, documents and files, you must take two preparatory steps: first you need to generate or import your encryption key pair and second you need to send your public key to your contacts and receive their public keys and import them to your key ring. We describe how to share public keys on the next page. gpg4usb assist you with generating your key pair on the first start of the program. Note that you can always come back to Getting Started window from the Help -> Open Wizard menu. Step 1.

To run the gpg4usb program for the first time , find and double click to open the gpg4usb folder and then double click . Step 2. Figure 2: Choose your Action Note the other options to import existing keys available on the First Start Wizard screen. Step 3. Figure 3: Create New Key Step 4. Figure 4: An example of a completed Generate Key form Important: Note: You do not need to use your real name and real email address when generating your key. Android - riseup.net.

Getting and Installing Bitmask There are two ways to obtain the Bitmask Android client, the first one is to download directly from the Bitmask website and the second is to download it through the Play Store. This first one means you will have to manually download any updates to the client. The second that you are letting Google live on your device.

We recommend for now to use the direct download method. Downloading and installing Bitmask for Android You can download the latest version of Bitmask for Android from the following url or read the following QR code from your device: To install you have mark the “Unknown sources” option in Android Settings -> Security -> “Unknown sources”. Getting Bitmask through the Play Store Search for Bitmask on the Play store, or visit the following url from your device Using Bitmask for the first time After that, open your just installed Bitmask app. Home - riseup.net. Mailvelope - OpenPGP for webmail | security in-a-box. Mailvelope comes preconfigured to work with several webmail services, including Gmail. You can check if Mailvelope is already configured to work with your webmail provider by loging into your email account and composing new message.

You should see a Mailvelope button in the upper, right-hand corner of the message area, as shown below: If you see this button, you can skip the remaining steps in this section. To make Mailvelope work with the Roundcube webmail interface used by Riseup and other providers, follow the steps below. Step 1. Step 2. Step 3. Step 4. Step 5. At the bottom of this list, you should see a new entry for mail.riseup.net. Step 6. Step 7. Step 8. Step 8. Your browser will once again display a screen containing a List of E-mail Providers.

Step 9. Step 10. You should see a Mailvelope button in the upper, right-hand corner of the message area, as shown below: Security in-a-box | tools and tactics for digital security. How Mesh Networking Empowers Mobile Activism. Mobile activism has proven to be a cornerstone of modern tactics used to hold governments and organizations accountable. Yet as we have seen multiple times across the globe in recent years, when large scale protests erupt, or governments feel threatened, the result is sometimes the shutdown of mobile networks. These events can have substantial impacts felt across the economy, services digital and physical, not to mention the obvious massive communication disruptions. Such events have even led groups to look into recognizing mobile network access as a fundamental human right. Where there is a will, there is a way, and clever protesters in China have found a way to get around mobile network shutdowns aimed at disrupting their ability to organize protests.

A Network In Your Pocket Aside from impeding communications efforts altogether, activists also live with the concern that their communications might be monitored by authorities. Mesh Networking on Mobile A Chain of Tiny Networks. MobileActive - News. Mobiles in-a-Box. Tactics | security in-a-box. How to defeat FBI or police 'stingray' surveillance. Earlier this week we learned something horrible, although totally predictable: In the vast majority of circumstances, the FBI does not obtain judicial warrants to deploy controversial stingray technology against the public. Amazingly, the government justifies this patently illegal position by asserting—once again—that cell phone users have no right to privacy in public spaces. (I assume the FBI would take a different position if police accountability activists deployed wifi sniffers or stingrays at the police, even if they did so in public parks.)

I’ve long assumed that the FBI and even state and local police use cell site simulators to keep track of protesters at political events. We know for a fact that police departments are using the powerful spy tools to find drug dealers, despite their promises to use the technology principally in serious terrorism cases. How can you protect yourself against these IMSI catchers? Nathan Freitas of the Guardian Project explains it to me in an email: Tunnel — Tunnel. Robin, one of your most loyal employees, downloaded a gaming app on his smartphone about a week ago. Despite the look and feel of a real game, the app was created as a “front” by malicious hackers.

Once downloaded, it gave them the ability to remotely activate the microphone and camera on Robin’s phone. Robin had his phone with him in the meeting that morning. They heard all the details about the code improvements and used the information to infiltrate your systems. Solution: No matter how many security precautions you’ve taken, just one employee’s phone is all it takes for an intruder to gain access. Consider adopting a company-wide policy according to which employees agree to Tunnel their phones during sensitive meetings.

Assign every new employee their own Tunnel, and keep an extra supply of Tunnels stored in the conference room for ease of access. Make conference rooms “Tunnel Required” spaces. Mobile hacking has reached record highs. You can also purchase your Tunnel using Bitcoin. Tunnel — Tunnel. Backslash: Anti-surveillance gadgets for protesters. When riot police descended on protesters in Ferguson, Missouri, last year sporting assault rifles and armored vehicles, the images sparked an awareness of the military technologies and tactics authorities have adopted over the past decade. Many of these tools have quietly become regular components of day-to-day policing. And just as with social networks and cell phone cameras during the Arab Spring and Occupy Wall Street, they've dramatically—and often invisibly—altered the dynamics of contemporary protest.

Examples are everywhere, from the controversial Long-Range Acoustic Device (LRAD) sound weapons used to disperse crowds to secretive mass surveillance devices, commonly known as stingrays originally developed for the US Navy, which police use to track cell phones, often without a warrant. Earlier this year, police in India began equipping aerial drones with pepper spray cannons to use on crowds of protesters. “There's no way to have a one-size-fits-all solution,” says Oliveira.