Back it up! Lock it! Delete it!

About this learning activity

This activity will focus on three various scenarios, and mobile safety tactics and strategies for each kind of scenario.

  • Mobile safety when participating in protests
  • Mobile safety at border crossings
  • Mobile safety when there is threat of arrest and seizure

The main method for this learning activity is via discussion.

Small work groups will be formed for each scenario.

This activity has 3 stages:

  • Groups discussion on scenarios (30 - 45 mins)
  • Report back on strategies and tactics (5 mins per group = 15 mins)
  • Input (15 mins)

These stages will be followed up by hands-on exercises to operationalise the strategies and tactics discussed.

Learning objectives this activity responds to

  • an understanding of mobile communication safety from the perspective that mobile phones are our tools for both personal, private and public, movement communications;
  • an understanding of basic concepts of how mobile communications work in order to better understand the risks of mobile communications;
  • shared and practiced strategies and tactics for mobile safety to manage the impacts of our mobile communications on ourselves, our colleagues, our movements;

Who is this activity for?

This activity is for participants with varied levels of experience in using mobile phones.

Time required

This activity will require about 75 minutes (not including the hands-on).

Resources needed for this activity

  • flip chart paper + markers to document group discussion

Mechanics

This activity will focus on three various scenarios, and mobile safety tactics and strategies for each kind of scenario.

  • Mobile safety when participating in protests
  • Mobile safety at (unsafe) border crossings
  • Mobile safety when there is threat of arrest and seizure

SMALL GROUP SCENARIO WORK

Group the participants according to scenario. Give the groups their own discussion guides.

Mobile safety when participating in protests

You are about to attend a mass protest. You need to be able to keep the data in your phone safe and to keep yourself from being tracked in the protest, but also be able to use your phone to contact allies for emergency purposes. You are also thinking of using your phone to document the protest and any possible human rights violations that will happen there.

BEFORE: Think about what you will do to prepare your mobile phone for the protest.

  • What files will you delete from your phone? Why?
  • What applications will you install? Why?
  • Who will you inform about your plans in the protest?
  • What other strategies will you and your allies have in place to keep yourselves safe during the protest?

DURING: Think about how you will use your phone during the protest.

  • Power: How will you ensure that people’s mobile phones have charge?
  • Service: What will you do if people cannot use their mobile service, apps, or data? Is there an offline plan?
  • Who do you communicate with during the action? What do you communicate about? How do you communicate?
  • How will people be able to reach you during the protest?
  • Are you documenting the protest? If so, are you using any special app for it?

AFTER: Think about what you will do after the protest.

  • What will you do with the footage, pictures, audio and other media that you gathered from the protest?
  • What will you do with the communications you had during the protest?

Mobile safety at (unsafe) border crossings

You are in transit, and are about to cross a border into an unsafe location. You want to be able to use your phone to keep contact with your allies, but not as a personal tracking device.

Ask people what their strategies are when they know someone else may have access to their phone. Examples of situations might include border crossings, flight boarding, going to a street protest.

BEFORE: Think about preparing your phone for that unsafe crossing.

  • What files will you delete from your phone? Why?
  • What applications will you install? Why?
  • What applications will you uninstall? Why?
  • Who will you inform about your travel plans before you leave?
  • What secure communications set-up will you have with your allies before you leave for your trip?

DURING: Think about how you will use that phone during your travels.

  • Who will be able to contact you through your mobile phone?
  • Who will you be contacting through your mobile phone?

AFTER: Think about what you will do when you´re safe back home.

  • What will you do with the data that your phone has collected from your trip?
  • What will you do with the communication traces you have from your trip?

Mobile phone safety when there is threat of arrest or seizure

You have heard from a reliable contact that you are being targeted by the State for arrest and seizure of devices because of your activism.

BEFORE: Think about how you will prepare your phone, if you are arrested and / or it is seized.

  • What files will you delete from your phone? Why?
  • What applications will you install? Why?
  • What applications will you uninstall? Why?
  • Who will you inform about the threat?

AFTER: Think about what you will do with your phone after it is returned to you.

  • How will you know if you have a spy-ware free phone?
  • What will you do to regain the integrity and safety of your mobile phone?

Give the groups a minimum of 30 minutes to a maximum of 45 minutes to come up with plans, strategies and tactics.

At the end of the group discussion, ask the groups to talk about their plans, strategies and tactics.

Use the results of the report-back to plan your hands-on for mobile safety.

INPUT

Then do an input with the following talking points:

Before

  • Let people know you will be in a situation where you are concerned about yourself and your personal belongings. Make plans to check in with your trusted friend as you enter and exit this situation. Choose a frequency of checking in that fits the risks you are facing.
  • For a very high risk situation: We recommend planning to be in touch as frequently as every 10 minutes. For example, if you are going to be at a high-risk protest or doing a particularly risky border crossing. Plan to communicate every 10 minutes on your approach, while you wait (if possible), and upon crossing.
  • For less risky situations: For example you are in a town working with a group of sex workers. You are traveling to and from meetings throughout the day. Make a plan to check in with your trusted partner when you are on your way and when you arrive at each meeting. Check in when you are going to bed, a simple “going to bed” and when you wake up “starting the day.”
  • Clean it: What is on your device that you may want to keep private?
  • Log out: Log out of any services that you don't need to be logged into. Don't stay logged into services you don't have to be logged into.
  • Lock and encrypt: You can encrypt your phone, SD card, and SIM card, locking each with its own PIN will mean that if someone else has it, they won't be able to access the information on it or use it on the network without your PIN.

During

  • Remote wipe
  • Using ObscuraCam for documentation
  • PixelKnot for encrypted messaging
  • Firechat for protests and network shutdowns

After

  • Be quiet: turn off notification sounds and graphics, keep it on mute
  • Clean it or get a new device: Our best recommendation is to factory reinstall. If you can afford it, replace the device; do not reset your first device, instead send it to someone who can analyze it like Citizen Lab!
  • Your services: Reset passwords to all of your services.
  • Let people know: If your phone has been out of your control, let your contacts and people you had active communications with know and what the implications may be for them.

Additional Resources

EFF Surveillance Self Defense - Encrypt your iPhone - https://ssd.eff.org/en/module/how-encrypt-your-iphone
EFF Surveillance Self Defense - Using Signal on an iPhone - https://ssd.eff.org/en/module/how-use-signal-ios
EFF Surveillance Self Defense - Using Signal on an Android - https://ssd.eff.org/en/module/how-use-signal-android
EFF Surveillance Self Defense - Using Whatsapp on an iPhone - https://ssd.eff.org/en/module/how-use-whatsapp-ios
EFF Surveillance Self Defense - Using Whatsapp on an Android - https://ssd.eff.org/en/module/how-use-whatsapp-android

Documenting
Video For Change Network: https://www.v4c.org/
WITNESS - Filming in Teams: Protests, Demonstrations, Rallies - https://library.witness.org/product/filming-in-teams-protests-demonstrations-rallies/
WITNESS - Filming with a Mobile Phone - https://library.witness.org/product/filming-with-a-mobile-phone/

Unless otherwise stated, the content of this page is licensed under Creative Commons Attribution-ShareAlike 3.0 License