Traveling-dfp
Reporter’s Guide to Device and Personal Security in the Field
Staying vigilant and using a combination of modern technology with traditional practices can significantly enhance personal and device security while reporting in high-risk areas. Always adapt to local conditions and remain aware of the evolving tactics used for tracking and surveillance.
General Observations: 1. Underground Connectivity: - There is Wi-Fi signal in underground areas which can facilitate tracking even when not connected to Wi-Fi directly.
- Extensive Tunnels:
- Extensive underground tunnels exist in Kyiv and Russia, historically used for disappearing.
- Tracking and Mapping:
- Personal tracking on apps like Strava can show location without interruptions even when underground.
- Devices can be tracked through various networks, revealing movements and locations.
- Device Handling:
- Prefer physical SIM cards over eSIMs for ease of removal.
- Use local SIM cards and avoid associating multiple devices to avoid pattern detection.
- Devices should be kept isolated and never used near each other to prevent association.
- Faraday Bags:
- Effective for blocking signals. Multiple bags are needed for multiple devices.
- Always test Faraday bags by attempting to send messages and checking for signal blockage.
- Device Security Practices:
- Changing personal phones frequently and upgrading regularly can help in avoiding tracking.
- Monitor for odd behaviors around you, which could indicate tracking or targeting.
- Martial Law and Curfew:
- Breaking curfew can sometimes be a tactic to avoid being followed as fewer people are out at night.
- Interaction with Local Authorities:
- Awareness of local law enforcement and their methods can help in navigating safety.
- Travel Tips:
- When traveling to sensitive areas (e.g., Lebanon, Syria), maintain heightened security measures.
- Be cautious with minders or followers, recognizing shifts and patterns.
Personal Security Tactics: 1. Behavioral Awareness: - Recognize and respond to unusual behavior from individuals around you. - Be mindful of cultural differences in expressions and behaviors.
- Direct Confrontation:
- In certain situations, directly confronting a potential threat can be effective.
- Emergency Situations:
- Have tactics ready for dealing with potentially dangerous situations (e.g., engaging a suspicious cab driver).
- Tool Selection:
- Opt for non-lethal tools for self-defense, such as knives for practical purposes.
- Carrying a gun might increase the risk of being targeted or mistaken for a spy.
Device and Contact Management: 1. Signal and Network Tracking: - Bluetooth and other signals can be used for tracking; avoid using Bluetooth devices like earpods. - Use secure messaging apps like Signal for contact management.
- Organizational Practices:
- Keep contacts disorganized to make it harder for unauthorized access.
- Prefer paper for sensitive information, avoiding digital storage.
- Password Management:
- Use password managers for securing information while maintaining ease of access.
- Memory and Local Knowledge:
- Develop a network with local reporters and rely on memory for critical contacts and information.
Media Training and Collaboration: 1. Lack of Device Security Training: - Recognize the gap in media training regarding device security. - Advocacy for collaboration between media organizations and national security agencies to enhance security measures.
- Utilizing Old School Methods:
- Implement traditional methods like using rolodexes for contact management.
- Build a personal memory system for critical information exchange.