Traveling-dfp
Traveling-dfp
Section titled “Traveling-dfp”Reporter’s Guide to Device and Personal Security in the Field
Section titled “Reporter’s Guide to Device and Personal Security in the Field”Staying vigilant and using a combination of modern technology with traditional practices can significantly enhance personal and device security while reporting in high-risk areas. Always adapt to local conditions and remain aware of the evolving tactics used for tracking and surveillance.
General Observations: 1. Underground Connectivity: - There is Wi-Fi signal in underground areas which can facilitate tracking even when not connected to Wi-Fi directly.
-
Extensive Tunnels:
-
Extensive underground tunnels exist in Kyiv and Russia, historically used for disappearing.
-
Tracking and Mapping:
-
Personal tracking on apps like Strava can show location without interruptions even when underground.
-
Devices can be tracked through various networks, revealing movements and locations.
-
Device Handling:
-
Prefer physical SIM cards over eSIMs for ease of removal.
-
Use local SIM cards and avoid associating multiple devices to avoid pattern detection.
-
Devices should be kept isolated and never used near each other to prevent association.
-
Faraday Bags:
-
Effective for blocking signals. Multiple bags are needed for multiple devices.
-
Always test Faraday bags by attempting to send messages and checking for signal blockage.
-
Device Security Practices:
-
Changing personal phones frequently and upgrading regularly can help in avoiding tracking.
-
Monitor for odd behaviors around you, which could indicate tracking or targeting.
-
Martial Law and Curfew:
-
Breaking curfew can sometimes be a tactic to avoid being followed as fewer people are out at night.
-
Interaction with Local Authorities:
-
Awareness of local law enforcement and their methods can help in navigating safety.
-
Travel Tips:
-
When traveling to sensitive areas (e.g., Lebanon, Syria), maintain heightened security measures.
-
Be cautious with minders or followers, recognizing shifts and patterns.
Personal Security Tactics: 1. Behavioral Awareness: - Recognize and respond to unusual behavior from individuals around you. - Be mindful of cultural differences in expressions and behaviors.
-
Direct Confrontation:
-
In certain situations, directly confronting a potential threat can be effective.
-
Emergency Situations:
-
Have tactics ready for dealing with potentially dangerous situations (e.g., engaging a suspicious cab driver).
-
Tool Selection:
-
Opt for non-lethal tools for self-defense, such as knives for practical purposes.
-
Carrying a gun might increase the risk of being targeted or mistaken for a spy.
Device and Contact Management: 1. Signal and Network Tracking: - Bluetooth and other signals can be used for tracking; avoid using Bluetooth devices like earpods. - Use secure messaging apps like Signal for contact management.
-
Organizational Practices:
-
Keep contacts disorganized to make it harder for unauthorized access.
-
Prefer paper for sensitive information, avoiding digital storage.
-
Password Management:
-
Use password managers for securing information while maintaining ease of access.
-
Memory and Local Knowledge:
-
Develop a network with local reporters and rely on memory for critical contacts and information.
Media Training and Collaboration: 1. Lack of Device Security Training: - Recognize the gap in media training regarding device security. - Advocacy for collaboration between media organizations and national security agencies to enhance security measures.
-
Utilizing Old School Methods:
-
Implement traditional methods like using rolodexes for contact management.
-
Build a personal memory system for critical information exchange.