Traveling-dfp
Reporter’s Guide to Device and Personal Security in the Field
Staying vigilant and using a combination of modern technology with traditional practices can significantly enhance personal and device security while reporting in high-risk areas. Always adapt to local conditions and remain aware of the evolving tactics used for tracking and surveillance.
General Observations: 1. Underground Connectivity: - There is Wi-Fi signal in underground areas which can facilitate tracking even when not connected to Wi-Fi directly.
Extensive Tunnels:
Extensive underground tunnels exist in Kyiv and Russia, historically used for disappearing.
Tracking and Mapping:
Personal tracking on apps like Strava can show location without interruptions even when underground.
Devices can be tracked through various networks, revealing movements and locations.
Device Handling:
Prefer physical SIM cards over eSIMs for ease of removal.
Use local SIM cards and avoid associating multiple devices to avoid pattern detection.
Devices should be kept isolated and never used near each other to prevent association.
Faraday Bags:
Effective for blocking signals. Multiple bags are needed for multiple devices.
Always test Faraday bags by attempting to send messages and checking for signal blockage.
Device Security Practices:
Changing personal phones frequently and upgrading regularly can help in avoiding tracking.
Monitor for odd behaviors around you, which could indicate tracking or targeting.
Martial Law and Curfew:
Breaking curfew can sometimes be a tactic to avoid being followed as fewer people are out at night.
Interaction with Local Authorities:
Awareness of local law enforcement and their methods can help in navigating safety.
Travel Tips:
When traveling to sensitive areas (e.g., Lebanon, Syria), maintain heightened security measures.
Be cautious with minders or followers, recognizing shifts and patterns.
Personal Security Tactics: 1. Behavioral Awareness: - Recognize and respond to unusual behavior from individuals around you. - Be mindful of cultural differences in expressions and behaviors.
Direct Confrontation:
In certain situations, directly confronting a potential threat can be effective.
Emergency Situations:
Have tactics ready for dealing with potentially dangerous situations (e.g., engaging a suspicious cab driver).
Tool Selection:
Opt for non-lethal tools for self-defense, such as knives for practical purposes.
Carrying a gun might increase the risk of being targeted or mistaken for a spy.
Device and Contact Management: 1. Signal and Network Tracking: - Bluetooth and other signals can be used for tracking; avoid using Bluetooth devices like earpods. - Use secure messaging apps like Signal for contact management.
Organizational Practices:
Keep contacts disorganized to make it harder for unauthorized access.
Prefer paper for sensitive information, avoiding digital storage.
Password Management:
Use password managers for securing information while maintaining ease of access.
Memory and Local Knowledge:
Develop a network with local reporters and rely on memory for critical contacts and information.
Media Training and Collaboration: 1. Lack of Device Security Training: - Recognize the gap in media training regarding device security. - Advocacy for collaboration between media organizations and national security agencies to enhance security measures.
Utilizing Old School Methods:
Implement traditional methods like using rolodexes for contact management.
Build a personal memory system for critical information exchange.
