Cyber-surveillance is a bigger threat than ever. New forms of censorship are emerging, implemented by troll armies paid by authoritarian regimes. They include double switch, in which a journalist’s online account is taken over in order to disseminate fake news, smear the journalist, and censor independently reported news and information.
In response to these new threats, RSF recommends additional vigilance. This includes adopting both simple tools and good habits. The following recommendations are not meant to be exhaustive or to offer tools that will completely eliminate the dangers of surveillance or of someone taking over your accounts. Technology evolves quickly and today’s advice may not be relevant tomorrow.
1 - Make mistrust your motto
- Avoid prying eyes
- Don’t work with your back to a window.
- When travelling by train or plane, put a privacy filter over your laptop screen to limit lateral vision.
- Avoid being separated from your equipment.
- Get a webcam cover.
- Don’t download any files or click on any links sent to you from unknown sources. Personalized phishing attacks are very common.
- Carefully check the email address or online presence of anyone who shares a link with you. If in doubt, verify the sender’s identity with other contacts or by using a search engine.
- Always research tools and the context in which they are used.
2 - Passwords: secure your connections
3 - Protect yourself from cyber-attack
- Online attacks, whether aimed at taking over an account or smearing a journalist’s reputation, have the same objective: to discredit the messenger in order to kill the message.
- Check social network confidentiality rules and clean up your profiles, keeping in mind that doxxing, the aggressive use of personal details found online – especially on social networks – is increasingly employed in harassment campaigns against journalists.
- Use an antivirus AND an anti-malware such as Malwarebytes.
- Activate your firewall.
- Keep your operating system (Windows, macOS, etc.) up to date.
- A media outlet should ideally have several administrators whose profiles are not directly linked with the media in order to maintain access to its website even when the profile of one of the administrators is blocked.
4 - Delete your digital tracks
- Use Namecheckr to check your online presence.
- Remember to disconnect after checking your email, Facebook account or Twitter account.
- Erase your browsing history.
- Never save a password in the browser of a public computer. If you have saved one by mistake, erase the browsing history when you finish working.
- Delete cookies. The way to delete this kind of data varies from browser to browser. A good way to avoid making any mistakes is to use the private browsing mode in Firefox or Chrome.
- at an advanced level, you can use Tails
5 - Encrypt your access to online services
- Use encrypted messaging apps such as Signal (while keeping up-to-date of any reports about vulnerabilities in these apps).
- FlowCrypt is a Chrome and Mozilla extension that enables end-to-end encryption of email.
- Privnote and ZeroBin are websites that allow you to send someone a link to an encrypted message that self-destructs after being read.
- To talk to your sources via the Internet use apps such as Jitsi Meet, a free and fully encrypted Skype equivalent.
6 - Secure your browsing
- Install a VPN in order to encrypt your Internet connections.
- Install the Tor Browser, which allows you to browse anonymously.
7 - In a hostile environment, don’t let your phone become your worst enemy
- Don’t put your contacts’ real names in your phone’s contacts list. Assign them numbers or pseudonyms so that others (the police, armed groups, and so on) cannot get the details of your network of contacts if they ever seize your phone or SIM card.
- Take spare SIM cards with you whenever you think your SIM card might be confiscated (at demonstrations, border crossings, checkpoints and the like). If you ever have to get rid of a SIM card, try to destroy it physically.
- Lock your phone with a password if it has this feature. Change the default PIN of your SIM cards and lock them with this code.
- Consider turning on your phone’s flight mode in situations in which the security forces might target people with mobile phones (at demonstrations, during an uprising, or whenever a crackdown is possible). The authorities could later demand the call or SMS records or phone data of any individual at a given location at a given time in order to carry out mass arrests.
- Turn off geolocation in your apps unless you need to use it. If you are using your mobile phone to stream video live, turn off the GPS and geolocation functions.
- If your phone uses the Android operating system, software for encrypting your browsing, chats, texts and voice messages is available from the Guardian Project and Signal. When using your phone to go online, use the HTTPS Everywhere extension.
For more information, consult the Safety Guide for Journalists released by RSF, in partnership with UNESCO, but also the surveillance and self-defence “tips, tools and how-tos” provided by the Electronic Frontier Foundation (EFF). If you are the victim of a cyber-attack, contact the Access Now digital security helpline.