Você está na página 1de 31

Cyber

survival
kit
citizens
under
surveillance
In July 2018, FIDH, together with Cairo Institute (CIHRS),
the Human Rights League (LDH) and the Arms Transfers
Observatory (OBSARM), published an explosive report
on the sale of weapons and surveillance technologies by
France to Egypt. 

In all likelihood, this equipment was used by Egyptian


President Abdel Fattah al-Sisi’s regime to arrest, prosecute,
and repress political opponents, human rights defenders,
journalists, and writers.

Somewhat earlier, in January 2018, FIDH published another


report, through the Observatory for the Protection of Human
Rights Defenders, on the dire situation of women defenders in
Saudi Arabia. The report focused on the systematic tracking
by Saudi authorities of the positions taken by these brave
women on social networks.

It has become clear that digital activity exposes the defenders


in our Federation—as it exposes everyone throughout the
world—to real dangers and violations of their rights. While
awareness of this fact is now widespread, one question
remains unanswered: How do you protect yourself from such
insidious, yet discreet, intrusions? The purpose of this guide is
to provide information that can help answer this question.

The first step is to understand the dangers. However, this


guide goes further and also offers specific tools to protect
oneself online.  

There is no infallible and ultimate solution to shield our private


lives from invasion in cyberspace or to counter globalised
sales of our personal data. Nevertheless, we can collectively
heighten our level of vigilance. The target audience for this
guide is human rights defenders, but all citizens can also
benefit from the information provided. We all have a role in
ensuring our own digital security: Watch Out!

Here you will find links to all ressources mentioned in this


guide: bit.ly/cyber-survival-kit
1
Protecting
one’s
privacy
What are data and who
has access to them?

What does Definitions vary from one country

that mean?
to another, but personal data are
considered to be any information
relating to a physical person who has
Protecting one’s privacy means been or can be identified, directly
becoming aware that all your digital or indirectly, by reference to an
actions leave a trace that can be identification number or one or several
retrieved by others. There is no need elements specific to that person.
to hack your computer to access vast More generally, data are anything that
We are all affected! amounts of information related to contains a piece of information. That
your private life. Most personal data can be something very concrete: your
Mohamed Ramadan is an Egyptian lawyer, specializing in are made public by users themselves: name, your address, a photo of you
the protection of human rights.  you share them by publishing content on vacation, an appointment on your
On 10 December 2018, as he was stepping off a bus and on social networks or you offer calendar, people whom you follow on
returning home, he was arrested by three plainclothes of- them free of charge by accepting Instagram, etc. It can also be more
ficers from Egypt’s national security agency.  The reason the General Conditions of Use of a abstract: a Google search, a site that
for his arrest? Mohamed had shared a photo of himself on service or application. Collecting you have consulted several times, the
Facebook sporting a yellow vest and explained how to ob- personal data is such a common device you are using, the Wi-Fi network
tain one. He now stands accused of having «joined a ter- practice that it has given rise to an through which you are connected, your
rorist group and promoting its ideas.» Indeed, the sale of industry. Such data collection can geolocation, the different accounts
yellow vests, the symbol of a wave of protests in France, become very intrusive and be diverted (identifiers and passwords) memorised
has been prohibited in Egypt.  from its intended use. Because in your browser, etc. All these elements
His family and his lawyers did not learn his whereabouts people share photos, Facebook, for provide information on you: they
until his first hearing the following day on charges inclu- example, holds the largest database are your personal data, they refer to
ding “belonging to a banned group”, "spreading false in- of faces in the world and has you, and you cannot control them.
formation through social networks”, and ”inciting social developed the most sophisticated
unrest”. facial recognition software. Without realising it, you are
disseminating that information
It must also be borne in mind that at every stage of your digital life,
information, once shared on the and different actors retrieve it.
Internet, is very difficult to erase. Once
you have posted a photo or document — On your Web browser: It records
on social networks, for instance, you your browsing history, the cookies
can no longer control who copies or from sites visited, your downloads,
publishes it elsewhere; the information your searches from the address
is henceforth out of your control. bar, and even your location.
Before sharing information on the
Internet, even when you believe you — On the sites that you visit: Whether
are sharing it privately, it is wise to it be a social network, media site,
consider the damage that it could or online boutique, the websites
cause. There have been countless that you have consulted record
cases of people being fired for your clickstream, the pages viewed,
posting photos on Facebook or of the number of visits, time spent on
arbitrary arrests linked to publications a given page, etc. They also have
condemned by an authoritarian regime. access to data in any cookies that
they have put on your computer. different data are collated, others Systematically adjust you would like kept private, it is
can deduce many things about you. your privacy settings sometimes possible to contact the
— On your search engine: It records publication and request its deletion
the search history, but also how One example: For the past month, Privacy settings determine the directly on the site. Otherwise,
many times and when searches your telephone has located you every quantity of information that you make you can email or send a letter to
were conducted, as well as the Wednesday evening at café A. public (that is, accessible by anyone) the relevant service (in the site’s
results on which you clicked. You have also made several searches when you use a given service. These “Privacy Policy” or “Legal Notices»
on political history; you have become settings vary depending on the social sections). You can also request that
— On storage sites and cloud friends on a social network with three network or service, and are often search engines remove a site from
services: Your information stored in people who have indicated that they set by default when you register their index, so that it no longer
the cloud is not protected, and the like a given political party. on a site or application. You must appears in the results of a search.
site or service can keep track of the These same people go to café A at therefore change them yourself: in
people with whom you have shared the same time as you. By compiling most cases, you can choose to limit
content and when you shared it. these data, a system can automatically both visibility of your information and Avoid storing your data in the cloud
classify you as a political activist its transmission to others. That will
— On social networks: They record all and anticipate the date of your next not prevent the service or the social Avoid storing your personal files in
information that you publish, but also meeting, without requiring any human network from keeping and using an online service, especially delete
your behavioural data: what content action because an algorithm will your personal data itself, but it will automatically, as offered by many
you like, who your friends are, the have done this cross-referencing. make it possible to limit the degree services. For instance, when you
people with whom you interact most to which they are disseminated. save data from your smartphone in
often, what content they like, etc. the cloud (with a service like Google
Photos or iCloud), all the data are
— On mobile applications: Vary your identifiers, transmitted and kept in servers
By validating the GCU, you agree to pseudonyms and passwords that you do not control. Even if

How to protect
share certain data: location, telephone these data are not public, they can
identifier, and the account data Use of a pseudonym makes you be used, analysed (for example,

yourself
(without this always being justified by neither anonymous nor protected. It using facial recognition), or even
the intended use of the application). can even be dangerous if it is always hacked by ill-intentioned persons.
Lastly, everything that you the same one, as it becomes possible
willingly publish online and that Your digital survival starts with to retrace your presence on all the
is even remotely linked to your awareness of the information that you sites or the services that you use with Carefully choose the services
identity may be viewed by others are sharing, voluntarily or involuntarily, this identifier. It is recommended that and the software that you use
without your knowledge. through all of your actions on the you use a different pseudonym, email
Web. Generally speaking, if you do not address, and password (which can Opt for a search engine that pledges
use services entailing cryptographic also be used to track an individual) not to store your data. For example, the
techniques, such as those that on every site where you share French search engine Qwant does not
will be suggested in the following personal or sensitive information. save any cookies or information on its
chapters, you should consider that users. DuckDuckGo is a search engine

What are the


any information exchanged on the that does not use any user data and
Internet could potentially be accessible Monitor and moderate the personal offers results based on reference sites

risks for your


by others, including in the private information published about you such as Wikipedia, Bing, and Yahoo.
context of a messaging service. Open-source software is software

personal life?
Using tools such as Google Alert that whose source code is public, which
Nonetheless, you can limit access provide notification when specified gives greater assurance that it will not
to this information and minimise content is published on the Web, secretly transmit your data to others.
Taken individually, your data do your traces by taking a certain you can track information published
not necessarily provide a lot of number of precautions. by others about you. If another
information about you. Yet when the person publishes information that
Regularly erase traces
of your browsing

It is important to empty the cache


of your browser (browsing data kept
on your computer) and cookies
regularly. It is also recommended that
you use a browser respectful of your
data (Brave, Waterfox, Firefox, or Tor
Browser) and avoid the most widely
used browsers such as Google Chrome
and Safari, which keep personal data.
You can also use extensions that
help protect your privacy: on Firefox,
there is uBlock Origin (ad blocker);
Privacy Badger (which identifies
trackers); HTTPS Everywhere (which
guarantees that the sites visited use
the HTTPS protocol, ensuring a secure
connection); NoScript (which blocks
the Java and Flash scripts used by
hackers); Disconnect (which shows and
deletes traces left by browsing), etc.

There are several online resources to help you learn more about managing
the use of your data.

privacy.net/analyzer:
enables you to see all that a Website knows about you

webkay.robinlinus.com :
what your Web browser says about you

adssettings.google.com/authenticated :
what Google knows about your interests

google.com/maps/timeline :
all the locations that Google knows you have visited
2
Browsing
anony-
mously on
the Web
purposes, but it may also be
intercepted by a third party and used

What does
for malicious purposes.

that mean?
By browsing anonymously on the
Internet, you prevent such actors
from linking these data to your
It is essential to protect your personal computer and thus to your identity.
data on the Internet. However, Browsing anonymously also enables
occasionally taking precautions to you to hide your location and,
erase one’s traces on one’s computer therefore, circumvents certain types
is not enough. Browsing anonymously of censorship (many states demand
means ensuring that you do not leave that access providers block certain
any traces while browsing or thereafter. sites in their country; for example,
We are all affected! Browsing anonymously means YouTube and Netflix are inaccessible
ensuring that no outside person can from China). Browsing anonymously
In August 2016, the Egyptian Internet was disturbed by a link your online activity to your identity. consists of hiding your data and
series of anomalies, indicating that the security services It is an additional means of protecting making it undecryptable at each stage
were targeting the network’s infrastructure in order, ac- your privacy and your freedom. in the browsing process. Indeed, a
cording to technical experts, to install a system capable of single breach in the chain suffices to
massively intercepting online communication.  compromise all your efforts to remain
Many opposition activists, writers, and LGBTI persons discreet.
are under surveillance and constantly being intimidated.
According to the Egyptian Initiative for Personal Rights

What are
(EIPR), the Ministry of the Interior uses a snowball method
to find targets by creating a database with the names and

the risks
the identity card numbers of people who contact or visit

How to browse
individuals previously arrested for “debauchery.”

of browsing
There is mass surveillance of people’s online activity,

anonymously
which is immediately linked to their identity, making it

on the Web?
possible to target and categorise them according to their
searches, habits and social relations.
While there is no perfect solution, here
You must first understand how the Web are the most highly recommended
works in order to know what you are ones:
protecting yourself from.

When you access a website, your Use a VPN


query passes through different devices
(such as servers) before returning to A Virtual Private Network is an
your computer with the information intermediary that enables you
requested. Every time your query to anonymise and encrypt your
passes through a device, it leaves communication. It acts like a private
pieces of information behind. These tunnel, which encrypts your data,
are vulnerabilities that external actors thereby directing your Internet traffic
(hackers, states, etc.) can exploit. The to transit through a tunnel.
most common risk is that information
left behind will be used for advertising When you make a query from your
browser, all the data are encrypted and compromised or under surveillance, it
sent to a VPN server. The VPN server is possible to intercept data and trace
decrypts these data, makes the query it back to the Web user (for instance,
for you from the website, and then for a government agency).
sends you the data encrypted. That
way, if your data are intercepted, they The Tor Browser is available on the USB
are impossible to read. key provided with this kit or can be
downloaded at the following address:
This solution does have its limits: https://www.torproject.org/download/
VPNs are private services. While your
data are inaccessible to third parties,
they are accessible to the company
providing the VPN. So, you have to
know whom you can trust.

Use Tor

Tor (an acronym for “The Onion


Router”) is a global network of routers.
A user’s connection is relayed through
a worldwide network of thousands
of computers called relay nodes.
Connections between these relays are
encrypted and thus it becomes very
difficult to identify the Web user who
launched the initial query.

The Tor network is thus a way of


making you anonymous by “losing”
those attempting to track you. There
are several ways of connecting to it,
but they are not always user-friendly
for neophytes. The simplest is the To go even further:
Tor Browser. It is a browser, like
the one that you use to surf online Tails is an operating system that enables you to use your computer (such as
(Safari, Internet Explorer, Firefox, Windows, Mac OS or Linux). What sets Tails’ software apart is that it can be
Brave, Waterfox, etc.), except that launched on your computer from a USB key. Once started up, it is as though you
it automatically goes through the were using a machine inside your machine. Tails is a secure operating system
secured Tor network. because it does not leave any trace on your computer. Once you turn it off,
everything that has happened in your computer disappears. What’s more, all
Nonetheless, Tor also has its limits. First Internet connections automatically go through the Tor network.
of all, queries pass through a multitude
of relays and your connection may
become very slow, thus limiting
capacity with respect to watching Beware: In some countries, simply owning these tools or software may be
videos and downloading heavy files. grounds for arrest. Look into the security context in your country or in countries
Moreover, if one or several relays are where you travel before installing and using them.

Creating
and
managing
secured
passwords
Phishing

What does
Phishing is a fraudulent practice meant
to lure Web users into communicating

that mean?
their personal or professional data
(account information, password, etc)
by pretending to be a trusted third
Today, passwords are needed to party. It could be a fake message,
access most online services used on email address, SMS or telephone call
a daily basis. It is thus essential to claiming to be from a bank, social
use strong passwords and manage network, telephone operator, energy
them carefully to protect your data provider, e-commerce site, public
and your communication. There are service, etc.
many hacking methods, more or
less sophisticated, that identify your — How does it work?
password and access services you use,
as well as your personal information. In your inbox, you receive an email
We are all affected! from a sender, who is pretending to
be a trusted entity, urging you to read
In recent years, many prominent activists in Egypt have a message by clicking on a link. This
link leads you to a site that imitates the
been targets of phishing attacks seeking to access their
official site of that entity. This phishing
email messages and remotely control their computers
site asks you to enter your user name
by retrieving their passwords through malicious links
What are
and password on a login page, which
and then intercepting codes sent by SMS to their mobile resembles the login page of the official
phones. In March-April 2016, this hacking strategy was
the risks to
site. 
used to target well-known journalist and blogger Wael Ab-

my passwords?
bas, graphic artist and activist Mohamed Gaber, as well as — How to avoid phishing traps? 
lawyer and journalist Nora Younis.
1 • Never communicate sensitive
To be able to protect yourself, you must information through instant messaging
be aware of the risks and the different or telephone.
techniques that make it possible to
retrieve a password. 2 • Before clicking on a dubious link,
position the cursor of your mouse on
the link (without clicking) to show the
Brute force attack  real address of the sender in order to
check its credibility.
A brute force attack is a widespread
method that consists of trying all 3 • Check the address of the site that
possible combinations of characters appears in your browser. If it does not
until the right password is found. match perfectly the site concerned,
Such attacks are carried out by then it is most definitely a fake site.
computers with the capacity to test At times, only one character in the
from a few thousand to several million site’s address has been altered to
combinations per second. more easily fool the victim. Check
also that the site’s address begins not
with “http”, but with “https”, which
is a secured protocol that offers
a certain level of protection from

How to protect 3 methods to help you


hacking. If you have the slightest
doubt, do not provide any information

your passwords
and immediately close the page in
question.
— The first letter method
4 • Opt for your usual method of To prevent this type of attack
accessing the site (through your and protect your information and Example: Save money for traveling with my parents to
favourites, a search engine, or by communication, it is essential to create Germany: SM4twmp2G
typing the address of the site directly robust and safe passwords, that is,
into your browser) rather than clicking ones that are difficult to unpuzzle with
on the link received by email. the help of automated tools and to — A password card
guess by a third party.
This type of card (randomly generated on passwordcard.org)
Installing a keylogger The best practices to adopt when has a unique grid of random letters and digits on it. The rows
creating and managing your have different colors, and the columns different symbols. All
The keylogger method consists of passwords:  you have to do is remember a combination of a symbol and a
installing spyware on your computer color, and then read the letters and digits from there.
unbeknownst to you. It records 1 • Use a unique password for every
your keystrokes and sends them to service. That way, if one of your
a malicious third party. This type of passwords is stolen, only that service — A password manager
programme can make it possible will be vulnerable.
to steal your identifier and your A software that generate complex, unguessable passwords
password. Installing appropriate anti- 2 • The most important password is for your accounts, storing them all in an encrypted vault, and
virus software may sometimes enable the one for your email. Indeed, it often filling out login forms for you automatically. All you need to
you to detect this type of malware enables you to reset the password of remember one secure master password (best is to make it a
and block it when the software the different services that you use. passphrase) to unlock all your services.
includes a firewall. An alternative
method consists of manually 3 • Create complex passwords.
monitoring the activity of the network It is advisable to create a password
using software such as GlassWire on containing at least 12 characters,
Windows or Little Snitch on Mac that mixing uppercase and lowercase
makes it possible to identify spyware letters, numbers, and special
when it sends data. characters. Avoid creating passwords
that use personal information,
which is easy to find, such as your
children’s names or birth dates. Also 5 • Do not store passwords in a file on a accessible by using a single master
avoid simple logical sequences like single computer or on a piece of paper password. This solution thus allows
1234567, azerty and abcdef that are that is easily accessible; you to opt for the longest and most
among the most common and the first complex passwords for all of your
combinations tried in the case of brute 6 • Never send your own passwords by online services and applications,
force attacks.  personal messaging: if it is hacked, all without having to remember them
your passwords will be compromised. individually. You will enhance security
4 • Never give your passwords to other of each of your accounts. That
people. A password must remain 7 • Use a password manager. nevertheless means entrusting all of
secret.  A manager will enable you to centralise your passwords to another person in
all your codes in one database whom you have the utmost confidence.
Which password
manager should
you choose? 
Keepass is the open source password
management software of reference.
This software is free and enables you to
store passwords safely. You can keep
this tool on your desktop or integrate
it into your Web browser. This software
also provides a feature that generates
complex and random passwords. 
It is available on the USB key in this kit
or can be downloaded at the following
address: https://keepass.info/

For more information:

Install Keepass step by step: securityinabox.org/fr/guide/keepass

Factsheet on passwords at les-infostrateges.com

Do you really know how to recognise phishing?


Do the online test: phishingquiz.withgoogle.com

Has your information been compromised by a public breach?


Do the test with your email address at haveibeenpwned.com

Protecting
your files
on your
computer
information, unbeknownst to the user.

What does Some history...


4 • Trojan horses: A Trojan Horse,
or trojan, is an invisible programme

that mean?
hidden within an application that
appears legitimate. The programme Encryption dates back to the Babylonian civilisation
contained therein (or automatically approximately 300 years before the Common Era. Several
It is essential to secure your online downloaded subsequently) can include encryption methods have existed [Atbash used by Hebrew
data. Yet, even if you keep all your any type of parasite: virus, keylogger, people (-500), the scytale in Sparta (-400), the Polybius square
important files on your computer, there spyware... (-125)], and the most famous in history is the Caesar Cipher.
is no 100% guarantee that you are safe Caesar did not trust his messengers when he had to send
because it is connected to the Internet 5 • Keyloggers: Already mentioned in messages to his generals. He therefore decided to replace
and therefore vulnerable. the previous chapter, a keylogger is a the letter A in his messages with the letter D, and B with E, and
programme that records all keystrokes so on and so forth. That method is referred to as the «simple
on the infected computer and sends substitution cipher.» 
them to a hacker. Often, its goal is to
intercept identifiers and passwords. Example :

What are
Clear alphabet:
ABCDEFGHIJKLMNOPQRSTUVWXYZ

the risks? Scrambled alphabet:

How to protect
DEFGHIJKLMNOPQRSTUVWXYZABC
There are many types of attacks

your files
that retrieve data from computers. Cleartext: Errare humanum est, perseverare diabolicum
The most common attacks involve Encrypted text: Huuduh kxpdqxp hvw, shuvhyhuduh
malware whose purpose consists of glderolfxp
accessing devices (computers, tablets,
smartphones, or connected objects) The only effective way to provide NB: this primitive method of encryption is obsolete and no
and altering or retrieving files and digital protection for your data is to longer allows us to secure data communication.
personal data found on the devices. encrypt them. 
There are many types of programmes
that can access your device and its Encrypting data means depositing
contents: them into a locked and secured safe.
Only those who have the combination
1 • Viruses: A computer virus (an encrypting key or a passphrase) Most smartphones or recent and activate it when you define a code.
reproduces from one file to the next on can access the content. Encryption computers now offer encryption of the
one computer. That is the oldest and consists of transforming data that entire disk as an option: For computers:
most widespread type of malware. can be read by anyone (called “clear”)
into data that can only be read by — Android offers encryption of — Apple proposes a built-in disk
2 • Worms: A computer worm does its creator and its addressee (called the entire hard drive during initial encryption feature for the entire hard
not reproduce from one file to the next “encrypted” or a cryptogram). configuration of your telephone drive on Mac OS called FileVault in
but from one computer to another via a for recent devices, or at any time “System preferences.”
local network or Internet network. It is advisable to encrypt all your data subsequently in settings for “Security”
rather than just a few folders. If you of all devices. — The Linux versions usually offer
3 • Spyware: Spyware is installed have some particularly confidential encryption of the entire hard drive
on a computer or mobile device in files, it is also recommended that you — Apple devices such as the iPhone or during initial configuration of your
order to collect and transfer personal put them into a separate encrypted file. the iPad speak of “protection of data” system.
— Windows Vista and later versions
offer an encryption feature for the
entire hard drive called BitLocker.

There also exist specialised software


tools to encrypt your data.

VeraCrypt

VeraCrypt is a multiplatform freeware


(Windows, Mac, and Linux) that allows
you to encrypt your data, and those
of your hard drives or USB keys. It is
an enhanced version of the project
TrueCrypt. It is a tool that functions like
an electronic safe, in which you can
keep your files secure.

Veracrypt protects your files by


encoding them with the help of a
passphrase. It creates a secure space
on your computer or your external
storage device. However, if you forget
your secret passphrase, you lose
access to your data. There is no way
to recover a lost passphrase. Also bear
in mind that the use of encryption is
illegal in certain jurisdictions.

It is also recommended that you


regularly update software that is on
your computer, tablet, or smartphone,
because updates include security
patches. Updating software is crucial
if you want to protect your data from
attacks. 

Securing
your emails
email address that appears matches
the address with which you are

What are
familiar. Before sending any sensitive
information, verify by other means

the risks linked


of communication (for example, the
telephone or another messaging tool)

to email?
that you are exchanging with the right
interlocutor.

Email has become the means of Lastly, in the case of espionage or


communicating and sending files cyber surveillance by a state, your
that is used by most companies emails can be intercepted at all
and individuals. Moreover, email stages in the chain of transmission:
addresses are used as the identifier between your email service and the
for the creation of many accounts server, on the server itself, between
We are all affected! (social networks, online services, bank servers, and between the server and
accounts) and are often the target of the email service of your addressee.
Antonio Capalandanda is a human rights defender and attacks. What you must know is that It then becomes difficult to secure
journalist on the website Voz da América (Voice of Ameri- your emails are by default written in your emails, and impossible to know
ca) in Angola. He regularly investigates political violence, cleartext, i.e. unencrypted. That means whether others can read them.
human rights violations, and corruption.  that your email is like a postcard sent
In early January 2013, António Capalandanda was fol- by regular mail: if someone intercepts
lowed several times by unidentified men in a vehicle who it, that person will be able to read
parked near his residence and followed him as soon as he the text that you have written. That
would leave home to go to work. During the same period makes surveillance very easy. You

How can
his electronic mail was hacked and consulted by unknown do not have to be directly targeted;
persons, according to his email service provider. All the if your interlocutor is targeted, your

you protect
personal information contained in his email was com- information is also compromised.
promised. He and his family were harassed and received The primary cause of email account

yourself?
death threats. hacking is human error. More often
than not, you yourself give access to
your email account by revealing your
password to a hacker pretending to be With so many vulnerable spots,
a trusted interlocutor (this is phishing, it is almost impossible to prevent
as explained in Chapter 3). Be sure to interception of your emails: you
use a protected password and to avoid can secure the connection between
phishing traps by checking the identity your machine and the email server,
of the sender. but if your interlocutor has not done
likewise, your communication can be
Similarly, an attack may consist of intercepted and read.
fooling you as to the identity of your
real interlocutor. An ill-intentioned While it is virtually impossible to
person can easily change the display prevent interception of messages,
of their name as sender or create one solution is to prevent them from
an address that closely resembles being read by encrypting your email
the regular email address of your messages. Just as for encryption
interlocutor. In case of doubt, click on of a file, it’s a matter of making the
the sender’s name and check that the text completely illegible by all other
persons except those with the requisite vulnerable. Protecting your emails Nonetheless, there are several services with built-in encryption:
key to decrypt them. However, if one requires perfect security at all stages software programmes that enable if your interlocutor uses the same
of the interlocutors does not use a of transmission, by all interlocutors. you to encrypt your emails. The best service, the email content will be
solution for email encryption, either Thus, if securing an email sent to one known among them is GPG, an open- encrypted and thus illegible to others,
the email message will be illegible person is complex, securing email source software programme based without you having to do anything.
(because it will have been encrypted sent to 20 people is nearly impossible. on OpenPGP, one of the most widely
without the interlocutor being able That is why we do not recommend used encryption methods. However, Among existing solutions are two
to decrypt it), or it will be sent as communication by email, despite its this solutions requires technical open-source services provided on
cleartext (unencrypted). You can take popularity. As much as possible, opt for knowledge and thus is not easily the USB key in this kit: 
all precautions possible on your side, secured instant messaging tools whose accessible for untrained users.
but if your interlocutor does not do communication is encrypted by default — Protonmail
the same, your communication is for all users. For neophytes, there are email Directly accessible from a browser
(secure if possible), Protonmail allows
you to send encrypted emails to other
users of Protonmail or users of similar
services, as long as you import their
encryption, PGP or symmetrical key
(in this case, it requires a specific
configuration).

— Tutanota
Also accessible from a browser,
this software enables you to send
encrypted emails to other users. You
can also send messages encrypted
end-to-end to users of other electronic
messaging services with symmetrical
encryption as long as you share the
key by other means.

Tutanota does not have the OpenPGP


standard built in, but has the advantage
of also being available on mobile
devices with an iOS or Android
application.

Protect
your instant
conversa-
tions on
mobile
devices
the application. Unbeknownst to the
user, it allowed the installation of

What does
spyware on their telephone, even if
the user did not answer the “infected”

that mean?
call. According to the Financial Times,
this flaw was exploited to install
Pegasus spyware from the Israeli
Mobile telephones are an integral part company NSO Group, which supplies
of our daily conversations: calls, SMS/ software to the security forces of many
MMS, and instant messaging. In recent countries, regardless of whether they
years, there has been a net increase have democratic regimes or not. This
We are all affected! in the number of features included in programme makes it possible to collect
mobile phones. “Smartphones” have the geolocation of its target, read its
become portable mini-computers messages and emails, and trigger the
The human rights NGO Amnesty International reported that are constantly connected to microphone and the video camera
that one of its employees, while working on Saudi Arabia, the Internet and equipped with unbeknownst to the user.
was targeted by the software Pegasus of the Israeli group sophisticated locating features. Once
NSO when he was setting up a campaign for the release your telephone is connected to the WhatsApp, like all applications,
of women human rights defenders unfairly imprisoned in Internet, everything that you do on is therefore not infallible, and its
that country. In early June 2018, an Amnesty International it is as vulnerable as it would be on a popularity has made it a target
staff member received a suspicious WhatsApp message computer. for hackers. There are, however,
written in Arabic. The text contained detailed information specialized applications that can
about a supposed demonstration in front of the embassy secure your conversations by using
of Saudi Arabia in Washington and a link to a Website. The end-to-end encryption.
investigations conducted by Amnesty International com-
puter engineers showed that clicking on this link would

What are
have, as far as they knew, installed a «Pegasus,» which
would have infected the user’s smartphone, monitored his

the risks?
keystrokes, taken over control of the camera and micro-

How to protect
phone, and consulted the list of contacts.
A Saudi human rights defender based in London, Yahya

your instant
Assiri, director of the NGO ALQST, also received the Your communication, whether vocal
same message. He had often been in contact with Jamal or written, is almost never secure by

conversations
Khashoggi, the Saudi journalist from the Washington Post default, and can therefore be easily
who was killed inside the embassy of Saudi Arabia in Istan- intercepted, read, recorded, and
bul in October 2018. modified. Information that passes
through your instant messaging Use Signal to encrypt your calls
applications may compromise not and text messages
only your security but also that of the
people listed in your address book or in Signal is a free open-source application
different messaging applications that that enables you to encrypt, by default,
you use, as well as in files exchanged. communication that passes through
it, including both written and vocal
Among the different messaging communication. The service, which is
applications that exist, WhatsApp is commercial-free, also offers a self-
the number 1 worldwide, boasting destruction mode for messages, in
1.5 billion users. In May 2019, a other words, the possibility of making
security breach was detected on your written conversations ephemeral
(by erasing the data after a certain users can exchange an encryption Use Olvid, an application that rely on their structurally vulnerable
period of time). key directly. This chain of characters protects your data servers (centralised directories)for
End-to-end encryption is the way (or safety numbers, to use Signal’s security. Olvid has overcome that
to make a message secret. No one terminology) must be exchanged This new French instant messaging security risk. Olvid is mostly dedicated
other than the two correspondents secretly through another means of service attacks the root of the problem: to companies and operates on a
can decrypt the conversation, not communication. Though the procedure to protect your data, Olvid encrypts fee-based model in order not to be
even the provider of mobile access is optional, it is highly recommended them entirely (metadata included), dependent on any external entity.
or a “spy”. Signal’s only weakness is for all Signal users who share sensitive even on its own servers. This means This model of security, which for
that, by default, it relies on a “user information. that all information stored by the the time being has no known flaws,
directory”, distributing user A’s public messaging service is encrypted, and undoubtedly represents the future in
key to user B. The directory is operated The Electronic Frontier Foundation, that not even the service can access secure communication.
by a software developer, and it serves an American NGO specialising in the it. In the case of an attack on or
as a trusted third party between users, protection of freedom of expression breach of their servers, the data and
thereby allowing the server — or a on the Internet, gives Signal the best the conversations are impossible to
third party who would take control possible rating in terms of security, read. Olvid is thus the only messaging
of it — to decrypt communication and Edward Snowden, the American service that guarantees complete
between A and B. In order to protect whistleblower and former CIA and NSA security of user data. All other
their correspondence completely, both employee, uses it on a daily basis. messaging services, Signal included,

Protecting
yourself
from
espionage
via your
mobile
devices
make an official request to an operator
to recover data, or it can resort to

What does
backdoor access installed on servers.
Among these data is geolocation:

that mean?
when a mobile device is connected
to the network, it is automatically
located by relay antennae that are able
Our mobile devices contain data to triangulate the origin of the signal,
about everything in our lives and daily even if the “geolocation” option is
activities. Many accounts are linked deactivated in the devices settings.
to applications on our telephone: The data exchanged with operator’s
Gmail, Amazon, Paypal or AirBnb. servers, such as location, SMS, and
We are all affected! Furthermore, all smartphones, tablets, data, are all potentially accessible to
and laptops are equipped with video third parties via the operator’s servers.
In 2019, journalists brought to light the fact that Chinese cameras and microphones that can be Using the applications mentioned
customs officers on the border between Kyrgyzstan and easily transformed into surveillance in the previous chapters, you can
the Xinjiang Region install spyware on Android smart- tools. No, you’re not dreaming: exchange messages securely by
phones of tourists who are entering China. The verifica- advertising agencies already use ensuring that the operator can only
tion procedure of terminals is different for an Android mobile microphones to offer targeted access encrypted data, but that does
mobile than for an iPhone. In the case of an Android ope- advertising. As mobile usage develops, not protect you from the device itself
rating system, a spyware-type application is installed. For an increasing number of attacks being hacked.
iPhones, the smartphone is simply connected to a scanner. involve mobile devices. The most
The application used to scan the telephone is, in theory, common type of attack, addressed in
uninstalled, but it appears that the customs officers some- previous chapters, is phishing. Use of Hacking your mobile device
times forget the last procedure. The fact that the appli- a mobile device requires ramping up with spyware
cation would be withdrawn after the procedure suggests vigilance and keeping in mind that it
that its purpose is not to track each individual by GPS — remains a potential surveillance tool, Mobile devices, just like any computer,
even if some technical information about the mobile (MAC and that no truly reliable method exists function by means of an operating
address, N° IMEI, telephone number, etc.) is collected in to protect your device from hacking. system that can be infected by
passing. According to the investigation, the application malware, which may be used to
is mainly supposed to search for content with terrorist steal data contained in your device.
propaganda, but also passages of the Quran, documents Spyware is a specific type of malware
relating to the Dalai Lama, and even a Japanese heavy me- designed to spy on your activities.
tal band called Unholy Grave (due to a song called Taiwan: These applications can be found on the

What are
Another China), or anything that could compromise the Internet and do not require specialised
authority of the national government. technical knowledge: once spyware

the risks?
is installed, data are sent to a Web
platform, to which the spy can connect
anonymously.
Monitoring of data collected
by operators Spyware potentially gives access
to all data contained on the device
Governmental intelligence agencies and can even go so far as to develop
have long been able to access data sophisticated monitoring features:
collected by telephone operators listening to and recording telephone
depending on legal rules that vary conversations, real-time retrieval of
from one country to another. A police photos taken with the camera, and
service or intelligence agency can accessing messages, irrespective of
the application being used. It can also Using an IMSI-catcher to hack into Subscriber Identity, a unique number and unsecured Wi-Fi networks that
secretly activate the microphone and your mobile device  that identifies the SIM card used and can allow your data to be intercepted
the video camera, limit incoming calls its owner, and makes it possible to and even malware to be installed.
from predefined telephone numbers, or It is also possible to locate a mobile connect to the mobile device. The If you must connect to a public Wi-Fi
take a screenshot and record the words device and access its data directly IMSI-catcher must be placed close to network, use a VPN and do not send
typed on the keyboard, rendering even from the place where it is located using the target to function and can be used any confidential information. 
the secured applications ineffective to an IMSI-catcher, a monitoring device to monitor all data, install spyware, and
protect your data. used to locally intercept traffic of even simulate the origin of messages — Only activate your Bluetooth
mobile communication by simulating or calls, giving your telephone the when you are using it; it provides an
a fake relay antenna and inserting impression that the number calling you unsecured entry point on your device.
itself between the operator’s network or the message that you are receiving
and the targeted device. The acronym is from someone whom you know — Do not leave your applications and
“IMSI” refers to the International Mobile whereas in fact it is coming from a Web services that you use on your
computer nearby. mobile device in auto-login mode (the
mode that remembers your password
and connects automatically; often
there is a tick box). Once your device is
hacked, none of your accounts will be
secure any longer.

How should — If you should have to entrust your

you protect
telephone to a third party (authorities,
customs, etc.), always switch

yourself?
the device off completely. Some
telephones delete any encryption key
when the device switches off, and
— Never leave your devices require that you enter your PIN code
unattended: while there are many prior to any subsequent decryption.
ways to hack remotely, it takes just
a few seconds of your device being — Install anti-virus applications that
connected to infect it with malware. will be able to detect malicious
programmes, monitor browsing on the
— Update the operating system Internet, and save sensitive data. You
on your devices and your different can try CM Security and Avast! Mobile
applications. As many hackers Security & Antivirus (for Android),
capitalise on the vulnerabilities of older which have the capacity to lock
versions, updates enable you to reduce applications, or Lookout Antivirus &
the number of security breaches. Security (for Android and iOS), which
also has anti-theft features.
— Do not synchronise your mobile
devices with unknown or unprotected
computers. Protecting yourself from tracking and
monitoring via your mobile devices
— Only install known and “validated“
applications from official stores The simplest way to protect your
(Google Play Store, Apple Store, etc.). device from tracking and data from
  being hacked is to remove its battery.
— Avoid, as much as possible, public Then, the telephone is totally inactive;
it no longer records, receives, or To decrease the chances of this type of
sends any information. However, for hacking, it can be useful to deactivate
numerous mobile devices, this is not 2G and roaming on smartphones that
possible without a tool. Switching the have this feature so that the device
telephone off or activating airplane can only connect to the 3G or 4G
mode does not suffice to guarantee networks, which are better secured.
that the device cannot be located These measures allow you to avoid
and does not send data. An infected certain types of IMSI-catchers, but
device, for example, can display a by no means do they constitute real
screen that has been turned off while protection. The only effective way not
some functions continue being used. to be exposed to an IMSI-catcher is to
totally disconnect your telephone from
An alternative to removing the battery the network by removing the battery or
is air gapping: it consists of completely by putting it into a Faraday bag.
isolating the device from the network,
making remote hacking or locating it
impossible. To isolate a device, you
can use a Faraday bag, a case that
replicates the principle of the Faraday
cage, blocking the electromagnetic
field. 

Use of a Faraday bag guarantees that


the device can neither send nor receive
signals. By placing your mobile device
into the case of this kit, it becomes
impossible to locate it or hack the data.
Be careful, nonetheless; if the device
has been infected by spyware, it may
continue being used as a surveillance
mechanism due to its microphone,
which can record and transmit data
during reconnection to the network
after having been taken out of
the case.

Protecting yourself from hacking via


IMSI-catchers
For more information:
There is no reliable protection from
IMSI-catchers: as soon as your device Smartphone Surveillance And Tracking Techniques: Understanding Threats,
is connected to a network, it is possible Indices & Protection (medium.com)
to fool it with a fake relay antenna
and hack it. Some applications such ‘State of Surveillance’ with Edward Snowden and Shane Smith
as SnoopSnitch claim to be able to VICE on HBO: Season 4, Episode 13
detect the presence of fake relays,
but that detection remains imperfect. 12 ways to hack-proof your smartphone (The Guardian)

The limits
of
protection
Confidentiality of correspondence, and techniques that are by nature the service is protecting your data. and your real identity. You can also
a right protected in many countries, is imperfect, but to remain vigilant Data protection always represents apply this method to a mobile device
threatened by the very nature of digital and aware of the risks that you are a compromise between comfort of use that is dedicated to your confidential
communications. Complying with running. The only purpose of the and security. Do not sacrifice security conversations.
the best practices described in the methods described in the previous for comfort: many people use auto-
previous chapters and understanding chapters is to limit such risks; login features or entrust their browser — Encrypt your exchanges
the risks provide a starting point for the notion of absolute security is or devices with the management of information
survival in digital space and the best unrealistic in digital communication. of identifiers and passwords, which
possible protection for your data and facilitates hacking of their data. As soon as you are browsing on
exchanges. Here are three points to bear in mind in the Web or exchanging information
order to develop a vigilant attitude: — Compartmentalise your digital via digital devices, you are sharing
Nevertheless, it is important to bear identities data with multiple actors. Browsing
in mind that there is no infallible — Protect your personal data anonymously and communicating
security: electronic tools and All of your devices, logins/ via secured tools that encrypt data
machines were not designed to As soon as you begin using a site, pseudonyms, email addresses, IP allow you to reduce the risk of your
protect information exchanges. Once service, application, or software, addresses, etc., are unique identifiers information being used or monitored,
a device is connected to the Internet, you share some of your personal that can be linked to your identity. The although it is never an absolute
it is potentially vulnerable and can be information. Using an application or use of a single email address suffices guarantee. If, for instance, your
transformed into a monitoring tool; online service means agreeing to trust to link you to many activities and may machine has been compromised, all
as soon as you exchange information, it. Then, it becomes important to know make it possible to spy on you easily. your efforts to remain anonymous
it could potentially be intercepted what type of data that service will It is advisable to compartmentalise and secure will also be compromised.
and manipulated by a third party. keep and use, by reading the General data that identify you as much as Securing your exchanges of
Therefore, what’s important is not Conditions of Use, and by obtaining possible by using unique addresses information, in fact, requires constant
to rely entirely on protective tools assurance from reliable sources that and identifiers for every application. and joint effort on your part and that
For example, you can even separate of your interlocutors. End-to-end
your activities by using, on top of encryption software simply makes life
your main machine for routine tasks, difficult for potential spies without
a computer dedicated to all your ever completely eliminating the risk
confidential activities and exchanges. of being monitored.
It could be a simple second hand
laptop using a distinct IP and a
secured OS such as Tails, applying
all the practices described above.
The device must never be connected
to a Google or Facebook account, or
any other account that could allow
association between the machine

For more information:

101 Data Protection Tips: How to Keep Your Passwords, Financial & Personal
Information Safe in 2019 (digitalguardian.com)

The Verge guide to privacy and security (theverge.com)

A set of online guides to restore privacy (restoreprivacy.com)

Você também pode gostar