Keeping Your Devices and Physical Space Safe
Don’t Let Anyone Into Your Device
Your Device Can Track or ID You
Don’t Let Bad Apps Crash Your Party
Enable ‘Find My Phone’
This section will primarily address mobile devices, given their status as primary tools for communication, particularly for defenders on the move. However, the practices covered in this training are equally applicable to laptops/PCs.
Don't Let Anyone Into Your Device
Don’t give anyone easy access to your device. Doing so would provide them unfettered access to all personal and work-related information stored on your device, including contacts, emails, documents, photo gallery, communication history, and more.
Suggestion:
|
Your Device Can Track or ID You
Your Device Can ID You
When you purchase a SIM card, your SIM provider will collect your personal information for registration. Each time you make a call, the cell tower retains a record of your International Mobile Equipment Identity (IMEI) and International Mobile Subscriber Identity (IMSI), which can be utilized for identification purposes in the future.
What is IMSI?
IMSI stands for International Mobile Subscriber Identity, a unique identification number linked to a cell phone user. It is stored in the SIM card and contains the user's specific details.
* Users will have to contact their service provider to know that IMSI number. IMSI number may also be found on the SIM card package users get at time of subscription.
What is IMEI?
IMEI stands for International Mobile Equipment Identity, a unique identification number assigned to mobile phones and certain satellite phones.
Suggestion:
OR
|
How are IMSI and IMEI related?
Once you register your SIM and start using it, both IMSI (International Mobile Subscriber Identity) and IMEI (International Mobile Equipment Identity) numbers become interconnected and registered together with a cellular tower. Therefore, if you ever feel compromised, simply changing your SIM card or phone won't suffice. It's advisable to change both your SIM card and your phone for added security.
Your Device Can Track You
Mobile Service Providers can locate you through Cell Tower Triangulation. The combination of your identity recorded by the cell tower using your IMEI and IMSI, and Cell Tower Triangulation, service providers can tell where you are.
What is Cell Tower Triangulation?
Cell Tower Triangulation is a widely used technique to determine the location of a phone or device. When a cell phone signal is detected by three or more cell towers, triangulation can be employed. By pinpointing the overlap of signals from these towers, it becomes possible to estimate the location of a cell phone based on its distance from each of the three towers.
Suggestions: (Depending on time available for the training)
OR
OR
OR
|
Absolutely Gotta!
|
Don’t Let Bad Apps Crash Your Party
The first topic we discussed, "Don’t Let Anyone Into Your Device," focused on preventing external entities from accessing your device. Now, we'll delve into how to prevent entities already within your device from accessing various data and features.
Suggestion: Here, we can ask whether participants review app permissions when installing a new app or checking permissions of apps already in use. Depending on their response, you can then prompt them to elaborate on their reasons for doing so or not doing so. |
Most people don’t have the habit of reviewing app permissions when installing or using an app. Often, apps only request permissions to access features and data that could enhance the functionality. However, there are many apps that can be sneaky. Here are few considerations before installing an app:
Ask yourself, 'do I really need this app?'
Having numerous apps on your device consumes storage space and can slow down your device.
It also implies that more apps have access to your data on the device.
Choose your apps wisely
Mobile phones carry our lives in it. We have our family and friends, our work contacts, all our communications, memories, banking, finance, everything on them. We must choose apps with a good track record and a good user privacy policy.
Know who owns the app.
Opting for an app with a server in your country may pose potential risks, particularly if there are laws mandating app service providers to share data with the government.
Similarly, selecting an app with its owner closely associated with the regime you are resisting may also pose a potential risk.
Moreover, if the app service provider has a track record of handing over information of users, especially from civil society, to the government, there may be potential risks as well.
Is the app requesting excessive information?
App permissions dictate what your app can do and access. Not all apps are secure, so it's crucial to review their permissions rather than granting blanket access to device features and data like the camera, microphone, location, calendar, email, contacts, etc. The real risk of app permissions lies in their potential misuse.
When installing an app, always scrutinize the permissions it requests. If an app seeks permissions such as device administration, access to Wi-Fi information, or personal data it doesn't need to function, refrain from installing it.
For example, a flashlight app's primary function is to provide light, so it makes sense for it to require access to the camera since it utilizes the camera flash for illumination. However, if the flashlight app demands access to your contacts, call logs, or photo gallery, it raises suspicion. Many of these apps behave similarly to malicious software, prioritizing access to our data.
Enable ‘Find My Phone’
Reminder: This feature only works when you phone is connected to WiFi or data |
This feature is typically utilized for locating your device if it's lost or misplaced. However, certain features in Find My Phone can be valuable for defenders, especially when your device is confiscated or falls into the hands of adversaries.
Here's how you can enable Find My Phone:
When your device is confiscated or in the possession of adversaries, consider the following actions based on your situation:
Log in to android.com/find or icloud.com/find depending on what device you are using.
Remotely set up a device PIN number if you haven't already done so. This can delay others' access to your device.
Remotely erase data on your device if you have any information that could compromise your safety and the safety of your network.
Last updated