Skip to content

Traveling-dfp

Reporter’s Guide to Device and Personal Security in the Field

Staying vigilant and using a combination of modern technology with traditional practices can significantly enhance personal and device security while reporting in high-risk areas. Always adapt to local conditions and remain aware of the evolving tactics used for tracking and surveillance.

General Observations: 1. Underground Connectivity: - There is Wi-Fi signal in underground areas which can facilitate tracking even when not connected to Wi-Fi directly.

  • Extensive Tunnels:

  • Extensive underground tunnels exist in Kyiv and Russia, historically used for disappearing.

  • Tracking and Mapping:

  • Personal tracking on apps like Strava can show location without interruptions even when underground.

  • Devices can be tracked through various networks, revealing movements and locations.

  • Device Handling:

  • Prefer physical SIM cards over eSIMs for ease of removal.

  • Use local SIM cards and avoid associating multiple devices to avoid pattern detection.

  • Devices should be kept isolated and never used near each other to prevent association.

  • Faraday Bags:

  • Effective for blocking signals. Multiple bags are needed for multiple devices.

  • Always test Faraday bags by attempting to send messages and checking for signal blockage.

  • Device Security Practices:

  • Changing personal phones frequently and upgrading regularly can help in avoiding tracking.

  • Monitor for odd behaviors around you, which could indicate tracking or targeting.

  • Martial Law and Curfew:

  • Breaking curfew can sometimes be a tactic to avoid being followed as fewer people are out at night.

  • Interaction with Local Authorities:

  • Awareness of local law enforcement and their methods can help in navigating safety.

  • Travel Tips:

  • When traveling to sensitive areas (e.g., Lebanon, Syria), maintain heightened security measures.

  • Be cautious with minders or followers, recognizing shifts and patterns.

Personal Security Tactics: 1. Behavioral Awareness: - Recognize and respond to unusual behavior from individuals around you. - Be mindful of cultural differences in expressions and behaviors.

  • Direct Confrontation:

  • In certain situations, directly confronting a potential threat can be effective.

  • Emergency Situations:

  • Have tactics ready for dealing with potentially dangerous situations (e.g., engaging a suspicious cab driver).

  • Tool Selection:

  • Opt for non-lethal tools for self-defense, such as knives for practical purposes.

  • Carrying a gun might increase the risk of being targeted or mistaken for a spy.

Device and Contact Management: 1. Signal and Network Tracking: - Bluetooth and other signals can be used for tracking; avoid using Bluetooth devices like earpods. - Use secure messaging apps like Signal for contact management.

  • Organizational Practices:

  • Keep contacts disorganized to make it harder for unauthorized access.

  • Prefer paper for sensitive information, avoiding digital storage.

  • Password Management:

  • Use password managers for securing information while maintaining ease of access.

  • Memory and Local Knowledge:

  • Develop a network with local reporters and rely on memory for critical contacts and information.

Media Training and Collaboration: 1. Lack of Device Security Training: - Recognize the gap in media training regarding device security. - Advocacy for collaboration between media organizations and national security agencies to enhance security measures.

  • Utilizing Old School Methods:

  • Implement traditional methods like using rolodexes for contact management.

  • Build a personal memory system for critical information exchange.

IrregularChat Community Wiki