Skip to content

Missing Resource

This zine was taken down in the recent internet archive attack. If you have a copy, please forward to [email protected].

Summary

A zine about digital security for individuals facing law enforcement investigation or repression in the United States. It provides basic steps to minimize risk to yourself and comrades when interacting with technology.

Key Takeaways

  1. Turn phone OFF, especially if a law enforcement interaction or arrest is likely.
  2. Use long alphanumeric (14+ random characters) or diceware (7+ random words) passwords—NOT 4 digit pin.
  3. Use a password manager, with backups.
  4. Social media is hostile—delete your accounts.
  5. Stick to encrypted, open source, recently updated everything, as much as possible.
  6. Use a VPN, Tor browser, and Orbot for phones.
  7. If your device is returned after a serious felony arrest, especially after a long period of holding by law enforcement, trash it.

Additional Resources

  1. Confidence, Courage, Connection, Trust: A zine about developing a security culture based on trust and connection.
  2. Counter-Surveillance Resource Center: A database of surveillance techniques, their uses, and how to protect against them.
  3. Cover Your Tracks: A website from the EFF that shows you what information your browser and most websites can see about you and your device.
  4. Electronic Freedom Foundation (EFF): An organization dedicated to digital freedom and privacy for everyone.
  5. Faraday Bag: Blocks electromagnetic signals like cell service, WiFi, Bluetooth, and RFID.

Digital Security Culture

The zine emphasizes the importance of developing a security culture based on trust, connection, and courage. It encourages individuals to prioritize their online security and take steps to protect themselves and their comrades from digital threats.

Key Concepts

  1. Threat modeling: evaluating what threats exist, their likelihood, and potential consequences.
  2. Encryption: complicated math equations that turn data from useful info into scrambled nonsense (and the opposite, decryption).
  3. VPN (Virtual Private Network): gives you a new IP address and encrypts your internet traffic so your internet service provider can't see it.
  4. Tor (The Onion Router): a browser that anonymizes your internet traffic using three layers to hide your data: entrance node, relay, and exit node.

Conclusion

Digital security is an essential aspect of protecting oneself and others from digital threats. The zine provides practical advice and resources for individuals facing law enforcement investigation or repression in the United States. By prioritizing online security and developing a security culture based on trust, connection, and courage, individuals can minimize their risk and protect themselves and their comrades.

Signed, Daisy

Turn Off Your Phone