Traveling-dfp

From Irregularpedia
Jump to navigation Jump to search

Reporter’s Guide to Device and Personal Security in the Field

Staying vigilant and using a combination of modern technology with traditional practices can significantly enhance personal and device security while reporting in high-risk areas. Always adapt to local conditions and remain aware of the evolving tactics used for tracking and surveillance.

General Observations: 1. Underground Connectivity: - There is Wi-Fi signal in underground areas which can facilitate tracking even when not connected to Wi-Fi directly.

  1. Extensive Tunnels:
    • Extensive underground tunnels exist in Kyiv and Russia, historically used for disappearing.
  2. Tracking and Mapping:
    • Personal tracking on apps like Strava can show location without interruptions even when underground.
    • Devices can be tracked through various networks, revealing movements and locations.
  3. Device Handling:
    • Prefer physical SIM cards over eSIMs for ease of removal.
    • Use local SIM cards and avoid associating multiple devices to avoid pattern detection.
    • Devices should be kept isolated and never used near each other to prevent association.
  4. Faraday Bags:
    • Effective for blocking signals. Multiple bags are needed for multiple devices.
    • Always test Faraday bags by attempting to send messages and checking for signal blockage.
  5. Device Security Practices:
    • Changing personal phones frequently and upgrading regularly can help in avoiding tracking.
    • Monitor for odd behaviors around you, which could indicate tracking or targeting.
  6. Martial Law and Curfew:
    • Breaking curfew can sometimes be a tactic to avoid being followed as fewer people are out at night.
  7. Interaction with Local Authorities:
    • Awareness of local law enforcement and their methods can help in navigating safety.
  8. Travel Tips:
    • When traveling to sensitive areas (e.g., Lebanon, Syria), maintain heightened security measures.
    • Be cautious with minders or followers, recognizing shifts and patterns.

Personal Security Tactics: 1. Behavioral Awareness: - Recognize and respond to unusual behavior from individuals around you. - Be mindful of cultural differences in expressions and behaviors.

  1. Direct Confrontation:
    • In certain situations, directly confronting a potential threat can be effective.
  2. Emergency Situations:
    • Have tactics ready for dealing with potentially dangerous situations (e.g., engaging a suspicious cab driver).
  3. Tool Selection:
    • Opt for non-lethal tools for self-defense, such as knives for practical purposes.
    • Carrying a gun might increase the risk of being targeted or mistaken for a spy.

Device and Contact Management: 1. Signal and Network Tracking: - Bluetooth and other signals can be used for tracking; avoid using Bluetooth devices like earpods. - Use secure messaging apps like Signal for contact management.

  1. Organizational Practices:
    • Keep contacts disorganized to make it harder for unauthorized access.
    • Prefer paper for sensitive information, avoiding digital storage.
  2. Password Management:
    • Use password managers for securing information while maintaining ease of access.
  3. Memory and Local Knowledge:
    • Develop a network with local reporters and rely on memory for critical contacts and information.

Media Training and Collaboration: 1. Lack of Device Security Training: - Recognize the gap in media training regarding device security. - Advocacy for collaboration between media organizations and national security agencies to enhance security measures.

  1. Utilizing Old School Methods:
    • Implement traditional methods like using rolodexes for contact management.
    • Build a personal memory system for critical information exchange.