12/05/2017

Ali Abdullah Saleh, Strongman Who Helped Unite Yemen, and Divide It, Dies at 75

President of Yemen for 34 years whose refusal to leave the political stage plunged his country into further turmoil






 Ali Abdullah Saleh at a press conference in Sana’a, the capital of Yemen, in 2011. He likened his survival technique to ‘dancing on the heads of snakes’. Photograph: Khaled Abdullah/Reuters

Ali Abdullah Saleh, who has been killed aged 75, held power in Yemen for almost 34 years – an extraordinary feat in one of the world’s most fractious countries. He likened his survival technique to “dancing on the heads of snakes” and his political career ended much as it had begun, in turmoil.


Between 1974 and 1978, the Yemen Arab Republic had three presidents in quick succession. Two were assassinated and the third fled after less than a month in office. A four-man presidential council then took over, in which Saleh soon emerged as leader. In July 1978, the People’s Assembly elected him president of the republic and commander of the armed forces, but there were few who expected him to last very long.


Coming from a lesser branch of the Hashid tribal grouping, he was born in the village of Beit al-Ahmar, near the capital Sana’a. With minimal education, he had risen through the military but had little in the way of a political base – a problem that he set about correcting during his first few years in office. What he lacked in education he made up for with his shrewd handling of people, gradually building a consensus which, besides the military, embraced businessmen and technocrats along with tribal and religious leaders. He had no particular ideology beyond republicanism and nationalism.
The high point of his presidency came in 1990 when, after years of on-off negotiations, Saleh’s Yemen Arab Republic united with the People’s Democratic Republic of Yemen – the southern part of the country that had been ruled by Marxists since the British withdrawal from Aden in 1967. This initially resulted in a power-sharing agreement for the unified state – a coalition in which the ruling party from each side shared power and a presidential council chaired by Saleh with Ali Salem al-Beidh, the southern leader, as his deputy.
At the same time, Yemen opened up its political system; new newspapers and magazines proliferated and more than 20 parties competed in the 1993 parliamentary elections – the first to be held in the Arabian peninsula under universal suffrage. Promising as this seemed at the time, it was something of a mirage. The former regimes of north and south had unresolved differences which were allowed to persist under the guise of democratic differences rather than using democracy as a means to resolve them. Most important of these differences was the failure to properly merge the armies of the former northern and southern states, which led to them coming to blows during a brief war in 1994 that was won by Saleh’s forces.
///





With his southern rivals out of the way and the whole army under his command, Saleh had an opportunity to consolidate Yemen’s national unity but instead he allowed grievances in the south to simmer, leading to a revival of separatist activism. From 2004, at the opposite end of the country, Saleh also fought an intermittent war against Zaidi rebels known as the Houthis, as well as militants linked to al-Qaida in various parts of the country. Saleh’s relationship with the jihadists was always somewhat ambivalent. They had helped him defeat the southern forces in 1994, and though he always claimed al-Qaida was an enemy, he had an interest in not eradicating it. Without the threat from al-Qaida, western countries would have been far less interested in giving him aid.
For years, Saleh was reputedly a regular chewer of qat – Yemen’s national drug – and, since it causes wakefulness, would often follow it up with tipples of whisky in order to sleep. It was at the whisky stage that Saleh got most of his worst ideas, according to one former prime minister who used to unplug his phone at 10pm to avoid presidential calls.
Saleh was also happy to play the democratic game so long as he kept on winning. In 1999 he submitted his own presidency to the electorate for the first time – and won easily, though it undoubtedly helped to have an opponent from his own party (whose campaign expenses Saleh had promised to pay). In 2005, he announced that he was stepping down. “Let’s transfer power peacefully,” he said. “People are fed up with us, and we are fed up with power.” Naturally, his party pleaded with him to stay and Saleh, feigning reluctance, remained in his palace.
Had he left office at that point, he would have done so with a fair record of achievements. He had unified the two halves of the country, had overseen the introduction of a multiparty system and had finally settled Yemen’s borders with Saudi Arabia and Oman, as well as the maritime border with Eritrea.
Like Hosni Mubarak in Egypt, Saleh was widely thought to be grooming his son, Ahmad, to succeed him in the presidency. Legally, he was due to retire in 2013, though he had been making moves to change the constitution and continue for longer. His rule had also become increasingly repressive, with the local media in particular under almost constant attack. Then came the Arab spring.
At the start of 2011, popular uprisings broke out in Tunisia and Egypt, giving Yemenis ideas about political change, too. It soon became clear that the northern rebels and southern separatists were not the only malcontents; in fact almost the entire country had turned against Saleh’s rule.
While claiming that he was willing to leave office if allowed do so “with dignity” his behaviour suggested otherwise. Despite being abandoned by many within his own ranks, he clung on regardless while his power evaporated all around him.
There was a narrow escape in June 2011 when a bomb exploded in the private mosque of his presidential palace. Several of the worshippers were killed and Saleh, seriously injured, was flown to Saudi Arabia for treatment.
Protest demonstrations in Yemen continued and it was not until February 2012 that Saleh was finally cajoled into leaving office. Under a deal brokered by the Gulf Cooperation Council, he was replaced by his deputy, Abd-Rabbu Mansour Hadi, but the deal also allowed Saleh to stay in Yemen and granted him immunity from prosecution.
This proved disastrous because it allowed Saleh to make mischief from the sidelines. He still had a considerable support network and used it relentlessly to undermine his successor.
In pursuit of that goal he also formed a surprising alliance with his former enemies, the Houthi rebels. It was only because of Saleh’s support that the Houthis were able to seize control of the capital, Sana’a, in 2014, causing Hadi to flee. This later resulted in a Saudi-led military intervention aimed at restoring Hadi’s government – and a continuing humanitarian catastrophe.
Last week, in what seems to have been a planned move, Saleh turned on his Houthi allies and attempted to wrest control of the capital from them. He had clearly lost none of his political ambition but, for once, his snake-dancing skills failed him and Yemen’s wiliest politician came to a brutal and humiliating end.
He is survived by several children, including Ahmad, a former military commander.
 Ali Abdullah Saleh, politician, born 21 March 1942; died 4 December 2017

11/24/2017

Black Friday in Egypt mosque attack leaves at least 235 dead in Sinai

Egypt mosque attack leaves at least 235 dead in Sinai Peninsula


At least 235 people were killed when gunmen opened fire and bombed a mosque in Egypt's volatile Sinai Peninsula on Friday. Government officials said 109 more had been injured in the attack — among the deadliest in Egypt's history.


Police sources told The Associated Press that men in four off-road vehicles opened fire on worshippers in the al-Rawdah mosque in the town of Al Rawdah. NBC News could not immediately independently verify that account.
Two eyewitnesses and a security source told Reuters that the suspected militants targeted supporters of the security forces attending prayers. Citing official sources, the state-run MENA news agency reported that the mosque is largely attended by Sufi Muslims — a form of Islam considered heretical by some conservatives and extremists like the Islamic State group.
Egyptians walk past bodies following a gun and bombing attack at the Rawda mosque, roughly 40 kilometres west of the North Sinai capital of El-Arish, on November 24, 2017.


A picture taken with a mobile phone shows an injured man, identified as Reda, who survived Sinai mosque attack, receiving treatment at a hospital in Cairo,


11/21/2017

When food is used as a weapon In Yemen

When food is used as a weapon IN Yemen.

WHAT HAPPEN IN YEMEN WILL NOT STAY IN YEMEN  
FOR EVER

 

  
This month Saudi Arabia tightened a stranglehold on the neighboring country of Yemen and 7 million people face starvation. The Saudi blockade is an escalation in Yemen's civil war. The United Nations says the war has now become a "man-made catastrophe." You've seen very little of this because the Saudis prevent reporters from reaching the war zone. Recently, we were ordered off a ship headed to Yemen. Days later the Saudis gave us permission to fly there but, after our equipment was loaded and our boarding passes issued, the Saudis closed the airspace so the plane couldn't take off. Even so, we have managed to get pictures out of Yemen to show you what the Saudi government does not want you to see. This will be hard to watch, but 27 million people in Yemen pray you will not turn away.


yemen-child-3.jpg
A child in Yemen
Hungry children cry. But there are no tears at the limits of starvation. Wasting bodies cannot afford them. This is the Al Sabeen Hospital in the Yemeni city of Sana'a. Ibtisam is two and a half. She weighs 15 pounds. Haifa is seven. She weighs 11 pounds. The images, and stories from the hospital, were sent to us by people that we hired inside Yemen. One child dies every ten minutes in the country according to the U.N..
David Beasley runs the World Food Programme, the U.N.'s emergency first responder to prevent famine.
David Beasley: It's just desperation and death. It is as bad as it gets. I don't know if I've ever seen a movie this bad.
Scott Pelley: We were headed into Yemen with the World Food Programme, the Saudis gave us permission to come, and then when we arrived they wouldn't let us into the country. What do you think they didn't want us to see?
David Beasley: I don't understand why they won't allow the world to see what's taking place. Because I think if the world sees the tragedy of this human sufferin', number one, the world will step up and provide the support financially for innocent children to eat. But when you get on the ground and see what I see, you see is chaos, is starvation, is hunger, and it's unnecessary conflict strictly man-made. All parties involved in this conflict have their hands guilty, the hands are dirty. All parties.



"We're on the brink of famine. If we don't receive the monies that we need in the next few months, I would say 125,000 little girls and boys will die."

In essence, the fight is between the two main branches of Islam. The Shia branch occupies much of the West, the Sunnis most of the South and East. Saudi Arabia, leader of the Sunni world, began airstrikes against Shia rebels, more than two years ago. The rebels, who are known as Houthis, are supported by Saudi Arabia's arch enemy, Iran, the leader of the Shia world.
Houthi rebels have plenty of blood on their hands, including the deaths of 1,000 civilians. But the U.N. says the Saudi coalition has killed more than 3,000 civilians; bombing schools, hospitals and Al Kubra hall, scene of a funeral last year. 132 Civilians were killed, nearly 700 wounded. Still, the deadliest weapon in Yemen is a blockade holding up food, fuel and medical aid.
David Beasley: We can't get our ships in. They get blocked
Scott Pelley: Who blocks the ports?
David Beasley: The Saudi coalition.
David Beasley told us the Saudis bombed the cranes that unload ships. The U.S. sent replacement cranes. But the Saudis won't let them in.
David Beasley: We ask any, any parties engaged in this conflict to respect humanitarian law, respect the rights of innocent people and give us the access that we need to provide the help that's needed.
Scott Pelley: It sounds like the Saudis are using starvation as a weapon.
David Beasley: I don't think there's any question the Saudi-led coalition, along with the Houthis and all of those involved, are using food as a weapon of war. And it's disgraceful.

yemen-child-1.jpg
A child in Yemen
The U.N. World Food Programmer is the largest humanitarian aid agency. The U.S. is its biggest donor, so the director is most often an American. Beasley was once governor of South Carolina.
David Beasley: We're on the brink of famine. If we don't receive the monies that we need in the next few months, I would say 125,000 little girls and boys will die. We've been able to avert famine, but we know three things that are happenin'. We know that people are dying. We know that people are wasting. And we know that children are stunting. We have a stunting rate in Yemen now at almost 50 percent. That means they're smaller, the brains are smaller, the body's smaller because they're not getting the food or the nutrition they need.
The World Food Programme's Stephen Anderson is trying to move millions of pounds of food to Yemen from an African port in Djibouti.
Stephen Anderson: The World Food Programme is mobilizing food for seven million people. Now what that looks like is a 110-pound bag of wheat flour. We're aiming to provide two million of those every month to the people of Yemen.
Scott Pelley: How long can you keep that up?
Stephen Anderson: Well, we're desperately praying for peace. Because that's the only sustainable way of really rebuilding the situation our stated objective is to try to prevent a famine from occurring.

stephen-anderson-in-yemen-food-distribution.jpg
Stephen Anderson distributes food
CBS News
While facing imminent famine, the people of Yemen are also suffering one of the biggest cholera epidemics in history. Nearly a million have been infected with the bacteria which inflicts diarrhea, dehydration and sometimes death. The disease thrives in dirty water. And water treatment and sanitation have collapsed in Yemen's cities.
Nevio Zagaria heads the World Health Organization's emergency response.
Scott Pelley: What do you have to have to stop the epidemic?
Nevio Zagaria: We should have peace. This is what we need to stop this epidemic. So we cannot solve the problem of cholera if we do not have a proper safe water supply, if we do not have proper sanitation. If we do not have the sewage treatment plant in the main town functioning and stop because it runs out of fuel as it happened at the beginning of this epidemic in the north of Sana'a for three or four months.
Scott Pelley: The main sewage plant in Sana'a ran out of fuel and didn't run for three or four months?
Nevio Zagaria: Yes. So 3 million people, huh?
About two million Yemenis have been forced from their homes by the war and there's been a big exodus of refugees that the world doesn't know very much about. Many of them have come 25 miles across the Red Sea to a refugee camp in the African nation of Djibouti. It is a testament to how bad things are in Yemen that the refugees believe that this place is so much better.
We've seen a few refugee camps in our time but this may be the most desolate with a drought of life and flood of sun. One worker told us we were smart to come in fall when it cooled off to 110.

Scott Pelley: How long have you been here?
Ali Shafick: Unfortunately 28 months.
Ali Shafick was once an architect in the Yemeni capital. His home was destroyed. He's alone here. And his despair was almost like madness.
Ali Shafick: To be jobless in this camp is very sad. The time is going slowly, very slowly.
Scott Pelley: The heat must be unbearable.
Ali Shafick: Heat? Yes, boiling. Starting from June, July and August. Three months. You cannot live, you cannot live here, three months. It's impossible to live.
Scott Pelley: And yet you do.
Ali Shafick: I have to be patient. I have to be patient.

djibouti-refugee-camp.jpg
Djibouti refugee camp
CBS News
This mother, Ameena Saleh, told us her family left after Saudi led airstrikes killed more than 70 people in her town.
The planes would fly above us and fire rockets and missiles she told us. At night there was no sleep, they were holding the young ones. She said that her older son was saying 'we are going to die.' She told us we saw people die right in front of us.
Scott Pelley: A little while ago we heard a rumble from the direction of Yemen. That's the bombing, isn't it?
Yes, her husband said, it's near.
Scott Pelley: What do you think when you hear that?
Strong fear, she said. She said the terror is still inside us from the rockets, missiles and planes.
Ayman Gharaibeh runs Yemeni refugee relief for the U.N..
Scott Pelley: What lies ahead for these people, given where we are today?
Ayman Gharaibeh: Remember, the conflict is going into a third year, some people has been displaced for literally three years or going into their third year.  I honestly do not see any silver lining anywhere on the horizon that this is gonna end soon. And I'm afraid the humanitarian situation will continue to deteriorate. And we would go from a displacement to a famine, as happened, to cholera, and God knows what's next.

"All the children are gonna be dead. It's terrible."

The Saudi intervention in Yemen began with the rise of 32-year-old Crown Prince Mohammed bin Salman, he's the son of the king and he's the defense minister. Salman is quickly reforming the kingdom's fundamentalist society. Recently, he lifted the ban on women drivers. This month, he arrested 200 Saudis including princes and media owners. He says it's a crackdown on corruption. His critics believe he's silencing his rivals. Salman's campaign in Yemen has now landed Saudi Arabia, for the first time, on the U.N.'s blacklist of nations that disregard the safety of children in war.
The Saudis have pledged $8 billion in humanitarian aid for Yemen, but they've delivered very little of that. The head of the Saudi humanitarian agency says that its aid to Yemen is, quote, "way beyond any damage caused by any attacks."

Scott Pelley: You met with some government officials involved in all of this, what kind of dialogue did you have with them?
David Beasley: Well we met with officials on all sides. They said all the right things. And we come back, everything that they agreed to on visas and access, so that we can get the equipment we need in, so we can deliver the food where we need to deliver it, and the technology and the health product -- you know -- terrible. The conditions are deteriorating in an unprecedented way and none of the commitments that were made, by any and all sides, have been fulfilled.
Scott Pelley: What future do you see for Yemen?
David Beasley: I don't see a light at the end of this tunnel. There's gotta be a big change. As the World Food Program, I've got my mandate to feed people. But also as a U.N. leader, I call upon the leaders of the world to bring the pressure to bear whatever's necessary to get the Saudi-led coalition, the Houthis and all involved to the table and end this thing. You keep goin' like you're goin', there's not gonna be anybody left. All the children are gonna be dead. It's terrible.
Produced by Nicole Young and Katie Kerbstat

60 Minutes, barred from Yemen,still got the footage





https://www.cbsnews.com/news/60-minutes-barred-from-yemen-still-got-the-footage/ 

11/20/2017

Ben Tzion blogger who posted pictures From HOLY Medin in NEW Saudi Arabia

WELCOME TO OUR JEWISH ZIONISTS COUSINS TO YOUR OLD LAND SAUDI ARABIA 
🔯




Ben Tzion blogger who posted pictures from Medina.

saying it's proof of normalization between Israel and Saudi

blogger who posted pictures from Medina, saying it's proof of normalization between Israel and Saudi

WELCOME TO OUR JEWISH COUSINS TO YOUR OLD LAND SAUDI ARABIA 
 http://blogs.timesofisrael.com/author/ben-tzion

https://www.facebook.com/tzionben

http://www.jewishpress.com/author/ben-tzionspitz/
https://www.trendsmap.com/analytics?q=%23%D8%B5%D9%87%D9%8A%D9%88%D9%86%D9%8A_%D8%A8%D8%A7%D9%84%D8%AD%D8%B1%D9%85_%D8%A7%D9%84%D9%86%D8%A8%D9%88%D9%8A%20&hours=24&bb=-31.354,-57.656,33.870,97.207

https://arabic.rt.com/middle_east/911098-%D9%85%D8%AF%D9%88%D9%86-%D8%A5%D8%B3%D8%B1%D8%A7%D8%A6%D9%8A%D9%84%D9%8A-%D9%85%D8%B4%D9%87%D9%88%D8%B1-%D9%8A%D9%86%D8%B4%D8%B1-%D8%B5%D9%88%D8%B1%D8%A7-%D9%84%D8%B2%D9%8A%D8%A7%D8%B1%D8%AA%D9%87-%D8%A7%D9%84%D8%AD%D8%B1%D9%85-%D8%A7%D9%84%D9%86%D8%A8%D9%88%D9%8A/

UPDATE 11/29/1017
-----------------------------------









------------




A post shared by Ben Tzion (@ben.tzion) on






Form FB PIC
--------------------------------




11/18/2017

UK judge bans mother from taking daughter to Egypt ... because FGM



UK judge bans mother from taking daughter to Egypt ... because FGM

The father viewed FGM as part of "Egyptian culture and tradition."
 

 
Source: YouTube

A British-Muslim mother was recently banned from traveling to Egypt with her baby daughter, over fears that her one-year-old child might be subjected to female genital mutilation.



The mother converted to Islam after meeting her husband, an Egyptian national, in his native country. She planned to take her newborn baby to the North African country to see her father and his family.
However, UK Judge Justice Allison Russell issued a Female Genital Mutilation Protection Order, effectively banning the mother from traveling outside the UK with her daughter until 2032. She ordered that the child's passport be retained by the court till then.
Russell said the father viewed FGM as part of "Egyptian culture and tradition," according to The Daily Mail. Despite the fact that he also believes the procedure should be legalized, the father said that he does not intend to subject his daughter to the procedure.
"It is not intended that the girl should not be able to see her father or members of the paternal family and the court would encourage the father and his family to visit her in England," Russell added.

Egypt Female Genital Mutilation Worse Than Ever Despite Ban

 

 

FGM is a criminal offense in the UK, however it is a common practice in Egypt

FGM, which is defined as a "partial or total removal of external genitalia or other injury to the female genital organs for non-medical reasons" by the World Health Organization (WHO), is extremely common in Egypt.
According to a 2014 survey, 92 percent of Egyptian women aged between 15 and 49 have been circumcised.
This can lead to worrisome side effects, including severe physical pain, bleeding, and the risk of wound infections.
The practice has also been revealed to cause a delay in women's sexual response cycle.
Earlier this year, the spokesperson of Egypt's primary Forensic Medicine Department, Dr. Hesham Abdel Hamid, revealed that 70 to 80 percent of all Egyptian women cannot orgasm due to the practice.

Guide to Not Getting Hacked


One of the questions we are asked most often at Motherboard is “how can I prevent myself from getting hacked?”
Because living in modern society necessitates putting an uncomfortably large amount of trust in third parties, the answer is often “not a whole lot.” Take, for example, the massive Equifax hack that affected roughly half of the American population: Few people voluntarily signed up for the service, and yet their information was stolen anyway.


Hackers steal hundreds of millions of passwords in one swoop and occasionally cause large-scale blackouts. The future is probably not going to get better, with real-life disasters caused by internet-connected knick-knacks, smart home robots that could kill you, flying hacker laptops, and the dangers of hackers getting your genetic data. Meanwhile, an ever-growing and increasingly passive surveillance apparatus that has trickled down to state and local police is an ever-present threat to our digital privacy.
That doesn’t mean it’s hopeless out there. There are lots of things you can do to make it much more difficult for hackers or would-be surveillers to access your devices and accounts, and the aim of this guide is to give you clear, easy-to-follow steps to improve your digital security. There are, broadly speaking, two types of hacks: Those that are unpreventable by users, and those you can generally prevent. We want to help you mitigate the damage of the first and prevent the second from happening.
You, as an individual user, can’t do anything to prevent your email provider, or the company that holds your financial details, from getting hacked. But you can avoid phishing attacks that will let a hacker get into your individual email account, and you can also prevent a password obtained in a larger hack from being reused on another, separate account you have.
This guide isn’t comprehensive and it’s not personalized; there is no such thing as “perfect security” and there are no one-size-fits all solutions. Instead, we hope this will be a jumping-off point for people looking to batten down the hatches on their digital lives.



That’s why we’ve tried to keep this guide as accessible as possible, but if you run into any lingo you don’t know, there’s a glossary at the end of this guide to help out.
This guide is the work of many people on Motherboard staff both past and present, and has been vetted by several of our sources, who we owe a great debt to. Large sections of it were written by Lorenzo Franceschi-Bicchierai, Joseph Cox, Sarah Jeong, and Jason Koebler, but the tips within it have grown out of years of writing and research on digital security by dozens of reporters and infosec professionals. Consider it a forever-ongoing work-in-progress that will receive at least one big annual refresh, as well as smaller updates when major new vulnerabilities are exposed. Special thanks to Matt Mitchell of Crypto Harlem, and Eva Galperin, of the Electronic Frontier Foundation for reviewing parts of this guide.
Anyways, enough. This is the Motherboard Guide to Not Getting Hacked.


THREAT MODELING

Everything in this guide starts with “threat modeling,” which is hacker lingo for assessing how likely it is you are going to get hacked or surveilled. When thinking about how to protect your digital communications, it is imperative that you first think about what you’re protecting and who you’re protecting it from. “Depends on your threat model” is a thing infosec pros say when asked questions about whether, say, Signal is the best messaging app or Tor is the most secure browser. The answer to any question about the “best” security is, essentially: “it depends.”


No one security plan is identical to any other. What sort of protections you take all depend on who may try to get into your accounts, or to read your messages. The bad news is that there are no silver bullets (sorry!), but the good news is that most people have threat models in which they probably don’t have to live like a paranoid recluse to be reasonably safe online.
So before doing anything else, you should consider your threat model. Basically, what are you trying to protect, and who are you trying to protect it from?
The Electronic Frontier Foundation recommends asking yourself these five questions when threat modeling:
  • What do you want to protect?
  • Who do you want to protect it from?
  • How likely is it that you will need to protect it?
  • How bad are the consequences if you fail?
  • How much trouble are you willing to go through in order to try to prevent those?
Is your threat an ex who might want to go through your Facebook account? Then making sure they don't know your password is a good place to start. (Don't share critical passwords with people, no matter who they are; if we're talking Netflix, make sure you never reuse that password elsewhere.) Are you trying to keep opportunistic doxers from pulling together your personal information—such as your birthday—which in turn can be used to find other details? Well, keeping an eye on what sort of stuff you publish on social media would be a good idea. And two-factor authentication (more on that below) would go a long way to thwarting more serious criminals. If you are an activist, a journalist, or otherwise have reason to fear government, state, or law enforcement actors want to hack or surveil you, the steps you must take to protect yourself are significantly different than if you’re trying to keep plans for a surprise party secret from your best friend.
Advertisement
Overestimating your threat can be a problem too: if you start using obscure custom operating systems, virtual machines, or anything else technical when it's really not necessary (or you don't know how to use it), you’re probably wasting your time and might be putting yourself at risk. At best, even the most simple tasks might take a while longer; in a worst-case scenario, you might be lulling yourself into a false sense of security with services and hardware that you don’t need, while overlooking what actually matters to you and the actual threats you might be facing.
In certain places, this guide will offer specific steps to take if you have a threat model that includes sophisticated actors. But, in general, it’s designed for people who want to know the basics of how to strengthen their digital security. If your threat model includes NSA hackers or other state-sponsored groups like Fancy Bear, we recommend that you speak to a trained professional about your specific situation.

KEEP YOUR APPS UP TO DATE

Probably the most important and basic thing you can do to protect yourself is to update the software you use to its newest version. That means using an updated version of whatever operating system you're using, and updating all your apps and software. It also means updating the firmware on your router, connected devices, and any other gadgets you use that can connect to the internet.
Bear in mind that, on your computer, you don't necessarily have to use the latest iteration of an operating system. In some cases, even slightly older versions of operating systems get security updates. (Unfortunately, this is no longer the case with Windows XP—stop using it!) What's most important is that your OS is still receiving security updates, and that you're applying them.
Advertisement
So if you come away with one lesson from this guide is: update, update, update, or patch, patch, patch.
Many common cyberattacks take advantage of flaws in outdated software such as old web browsers, PDF readers, or spreadsheet and word-processing tools. By keeping everything up to date, you have a way lower chance of becoming a victim of malware, because responsible manufacturers and software developers quickly patch their products after new hacks are seen in the wild.
Hacking is often a path of least resistance: you go after the easy, soft, targets first. For example, the hackers behind the destructive ransomware outbreak known as WannaCry hit victims who had not applied a security update that had been available for weeks. In other words, they knew they were going to get in because the victims had not changed the lock to their door even though their keys had already been made available to everyone.

PASSWORDS

We all have too many passwords to remember, which is why some people just reuse the same ones over and over. Reusing passwords is bad because if, for example, a hacker gets control of your Netflix or Spotify password, they can then use it to get into your ridesharing or bank account to drain your credit card. Even though our brains aren't actually that bad at remembering passwords, it's almost impossible to remember dozens of unique, strong passwords.
The good news is that the solution to these problems is already out there: password managers. These are apps or browser extensions that keep track of passwords for you, automatically help you create good passwords, and simplify your online life. If you use a manger, all you have to remember is one password, the one that unlocks the vault of your other passwords.
Advertisement
That one password better be good though. Forget about capital letters, symbols, and numbers. The easiest way to make a secure master password is to make a passphrase: several random but pronounceable—and thus easier to memorize—words. For example: floodlit siesta kirk barrel amputee dice (don’t use this one though, we just burned it.)
Once you have that you can use unique passwords made of a lot of characters for everything else, as long as you create them with a password manager and never reuse them. The master password is better as a passphrase because it's easier to memorize, and the other passwords don't need to be memorized because the manager will remember them.
Intuitively, you might think it's unwise to store your passwords on your computer or with a third party password manager. What if a hacker gets in? Surely it's better that I'm keeping them all in my head? Well, not really: The risk of a crook reusing a shared password that has been stolen from somewhere else is far greater than some sophisticated hacker independently targeting your database of passwords. For example, if you used the same password across different websites, and that password was stolen in the massive Yahoo! hacks (which included 3 billion people), it could easily be reused on your Gmail, Uber, Facebook, and other websites. Some password managers store your passwords encrypted in the cloud, so even if the company gets hacked, your passwords will be safe. For example, the password manager LastPass has been hacked at least twice, but no actual passwords were stolen because the company stored them securely. LastPass remains a recommended password manager despite those incidents. Again, it's all about understanding your own threat model.
Advertisement
So, please, use one of the many password managers out there, such as 1Password, LastPass, or KeePass. there's no reason not to do it. It will make you—and the rest of us!—safer, and it'll even make your life easier.
And if your employer asks you to change passwords periodically in the name of security, please tell them that's a terrible idea. If you use a password manager, two-factor authentication (see below), and have unique strong passwords for every account there's no need to change them all the time—unless there’s a breach on the backend or your password is stolen somehow.

TWO-FACTOR AUTHENTICATION

Having unique, strong passwords is a great first step, but even those can be stolen. So for your most important accounts (think your email, your Facebook, Twitter accounts, your banking or financial accounts) you should add an extra layer of protection known as two-factor (or two-step or 2FA) authentication. A lot of services these days offer two-factor, so it doesn’t hurt to turn it on in as many places as you can. See all the services that offer 2FA at twofactorauth.org.
By enabling two-factor you'll need something more than just your password to log into those accounts. Usually, it's a numerical code sent to your cellphone via text messages, or it can be a code created by a specialized app (which is great if your cellphone doesn't have coverage at the time you're logging in), or a small, physical token like a USB key (sometimes called a U2F security key or YubiKey, named after the most popular brand).
Advertisement
There's been a lot of discussion in the last year about whether text messages can be considered a safe “second factor.” Activist Deray McKesson's phone number was hijacked, meaning hackers could then have the extra security codes protecting accounts sent straight to them. And the National Institute of Standards and Technology (NIST), a part of the US government that writes guidelines on rules and measurements, including security, recently discouraged the use of SMS-based 2FA.
The attack on Deray was made possible by “social engineering.” In this case, a customer service rep was tricked by a criminal into making Deray vulnerable. The attack involved getting his phone company to issue a new SIM card to the attackers, allowing them to take over his phone number. That means when they used his first factor (the password) to login to his account, the second factor code was sent directly to them. This is an increasingly common hack.
It's hard to defend against an attack like that, and it’s a sad truth that there is no form of perfect security. But there are steps you can take to make these attacks harder, and we detail them below, in the mobile security section.
SMS-based two-factor can be gamed, and it’s also possible to leverage vulnerabilities in the telecommunications infrastructure that carries our conversations or to use what’s known as an IMSI-catcher, otherwise known as a Stingray, to sweep up your cellphone communications, including your verification texts. We don’t write this to scare you, it’s just worth noting that while all forms of two-factor authentication are better than nothing, you should use an authentication app or better yet a physical key if at all possible.
Advertisement
You should, if the website allows it, use another 2FA option that isn't SMS-based, such as an authentication app on your smartphone (for example, Google Authenticator, DUO Mobile, or Authy), or a physical token. If that option is available to you, it's great idea to use it.
Don't use Flash: Flash is historically one of the most insecure pieces of software that's ever been on your computer. Hackers love Flash because it's had more holes than Swiss cheese. The good news is that a lot of the web has moved away from Flash so you don't really need it anymore to still enjoy a fully-featured and rich browsing experience. So consider purging it from your computer, or at least change the settings on your browser so you have to click to run Flash each time.
Do use antivirus: Yes, you've heard this before. But it's still (generally) true. Antiviruses are actually, and ironically, full of security holes, but if you're not a person who's at risk of getting targeted by nation-state hackers or pretty advanced criminals, having antivirus is still a good idea. Still, antivirus software is far from a panacea, and in 2017 you need more than that to be secure. Also, be aware that antivirus software, by definition, is incredibly invasive: it needs to reach deep into your computer to be able to scan and stop malware. This reach can be abused. For example, the US government accuses Kaspersky Lab, one of the most well-known antivirus software in the world, of having passed sensitive documents from one of its customers to the Russian government.
Advertisement
Do use some simple security plugins: Sometimes, all a hacker needs to pwn you is to get you to the right website—one laden with malware. That's why it's worth using some simple, install-and-forget-about-it plugins such as adblockers, which protect you from malware embedded in advertising presented by the shadier sites you may wander across on the web, and sometimes even legitimate sites. (We'd naturally prefer if you whitelisted Motherboard since web ads help keep our lights on.)
Another useful plugin is HTTPS Everywhere, which forces your connection to be encrypted (when the site supports it). This won't save you if the website you're going to has malware on it, but in some cases, it helps prevent hackers from redirecting you to fake versions of that site (if there's an encrypted one available), and will generally protect against attackers trying to tamper with your connection to the legitimate one.
Do use a VPN: Virtual Private Networks are a secure channel between your computer and the internet. If you use a VPN, you first connect to the VPN, and then to the whole internet, adding a layer of security and privacy. If you're using the internet in a public space, be it a Starbucks, an airport, or even an Airbnb apartment, you are sharing it with people you don't know. And if some hacker is on your same network, they can mess up with your connection and potentially your computer. It’s worth doing some research on VPNs before getting one, because some are much better than others (most of the free ones don’t do a great job of protecting your privacy). We recommend Freedome, Private Internet Access, or, if you’re a technical user, Algo.
Advertisement
Do disable macros: Hackers can use Microsoft Office macros inside documents to spread malware to your computer. It's an old trick, but it's back in vogue to spread ransomware. Disable them!
Do back up files: We're not breaking any news here, but if you're worried about hackers destroying or locking your files (such as with ransomware), then you need to back them up. Ideally, do it while you're disconnected from the network to an external hard drive so that even if you get ransomware, the backup won't get infected.
Don't overexpose yourself for no reason: People love to share pretty much everything about their lives on social media. But please, we beg you, don't tweet a picture of your credit card or flight’s boarding pass, for example. More generally, it's a good mindset to realize that a post on social media is often a post to anyone on the internet who can be bothered to check your profile, even if it's guessing your home address through your running routes on a site like Strava, a social network for runners and cyclists.
Personal information such as your home address or high school (and the school’s mascot, which is a Google away) can then be used to find more information via social engineering schemes. The more personal information an attacker has, the more likely they are to gain access to one of your accounts. With that in mind, maybe consider increasing the privacy settings on some of your accounts too.
Advertisement
Don't open attachments without precautions: For decades, cybercriminals have hidden malware inside attachments such as Word docs or PDFs. Antiviruses sometimes stop those threats, but it's better to just use commons sense: don't open attachments (or click on links) from people you don't know, or that you weren't expecting. And if you really want to do that, use precautions, like opening the attachments within Chrome (without downloading the files). Even better, save the file to Google Drive, and then open it within Drive, which is even safer because then the file is being opened by Google and not your computer.
We now live in a world where smartphones have become our primary computing devices. Not only we use cellphones more than desktop computers, but we keep them with us pretty much all the time . It goes without saying then, that hackers are targeting mobile phones more and more every day.
The good news is there are some basic steps and some precautions you can take to minimize the risks, and we’re going to tell you what they are.

MOBILE THREAT MODELING

Most people use passcodes, passwords, or patterns to “lock” their phones. If you don’t do this, you absolutely should! (Patterns are far easier to guess or “shoulder surf” than pins or passcodes, however, according to a recent study.)
One of the biggest mobile threats is someone who has physical access to your phone and can unlock it. This means your security is only as good as your passcode: If at all possible, avoid giving out your code or password, and avoid using easily guessed passcodes such as your birthday or address. Even simple passcodes and passwords are great to stop pickpockets or street thieves, but not so great if what you’re worried about is an abusive partner who knows your PIN, for example.
Advertisement
With that in mind, here's a few basic things you can do to prevent other common threats to your cellphone.

GET AN iPHONE

Pretty much everyone in the world of cybersecurity—except perhaps the engineers working on Android—believes that iPhones are the most secure cellphone you can get. There are a few reasons why, but the main ones are that iOS, Apple’s mobile operating system, is extremely locked down. Apps go through extensive checks before getting on the App Store, and there are extensive security measures in place, such as the fact that only code approved and digitally signed by Apple (a measure known as code-signing) and the fact that apps are limited from reaching into other apps (sandboxing). These features make it really hard for hackers to attack the most sensitive parts of the operating system. Because Apple controls the iOS infrastructure, iPhones get immediate, regular security updates and patches from Apple; critical security updates for many Android devices can take weeks or months to be pushed to users. Even the iPhone 5s, which was launched in 2013, is still supported.
So if you are paranoid, the iPhone is the most secure cellphone out of the box. But unless you have a really good reason for it, do NOT jailbreak it. While the jailbreaking movement and the hackers behind it have contributed to make the iPhone more secure, jailbreaking an iPhone at this point doesn’t really provide you any feature that’s worth the increased risks. In the past, hackers have been able to target at scale only jailbroken iPhones.
Advertisement
Nothing is unhackable though. We know some governments are armed with million-dollar hacking tools to hack iPhones, and perhaps some sophisticated criminals might have those too. Still, get an iPhone, install the updates, and don’t jailbreak it and you’ll probably be fine.

BUT I LOVE ANDROID! FINE...

Android has become the most popular operating system in the world thanks to its decentralized, open-source nature and the fact that many handsets are available at prices much lower than iPhones. In some ways, this open-sourced nature was Android’s original sin: Google traded control, and thus security, for market share. This way, critical security updates depend on carriers and device manufacturers, who have historically been lackadaisical about pushing them out.
The good news is that in the last two years this has improved a lot. Google has been pushing partners to give users monthly updates, and Google’s own flagship devices have almost the same kind of regular support that Apple provides to iPhones, as well as some of the same security features.
So your best bet is to stick to Pixels or Nexus phones, whose security doesn’t depend on anyone but Google. If you really don’t want a Google phone, these cellphones have a good track record of pushing security updates, according to Google itself.
Whatever Android phone you own, be careful what apps you install. Hackers have traditionally been very successful at sneaking malicious apps on the Play Store so think twice before installing a little-known app, or double check that the app you’re installing really is the one you want. Earlier this fall, a fake version of WhatsApp was installed by more than a million Android users. Also, stick to the Play Store and avoid downloading and installing apps from third-party stores, which may very well be malicious. On most Android phones, installing third-party apps is not enabled by default, leave it that way.
Advertisement
To protect the data on your Android phone, make sure full disk encryption is enabled. Open your Settings app, go to “Security” and click on “Encrypt Phone” if it’s not enabled already. (If this doesn’t work on your device, Google for instructions on your specific handset).
Finally, while not mandatory, it might be a good idea to install a mobile antivirus such as Lookout or Zips. While these can be effective against criminal’s malware, they probably won’t stop government hackers.

LOCK-UP THAT SIM CARD

Recently we revealed that hackers had been exploiting a nasty bug on a T-Mobile website to pull the personal data of customers in an attempt to gather data that they could then use to impersonate the victims and socially engineer T-Mobile support technicians into issuing new SIM cards. These kind of attacks, known as “SIM swapping” or “SIM hijacking,” allow hackers to take over your cellphone number, and in turn anything that’s connected to it. SIM hijacking is what makes two-factor authentication via SMS so dangerous.
Your phone number is likely the gateway to multiple other, perhaps more sensitive, parts of your digital life: your email, your bank account, your iCloud backups.
As a consumer, you can’t control the bugs that your carrier leave open for hackers. But you can make it a bit harder for hackers to impersonate you with gullible tech support employees. The solution is easy, although not that many people know about it: a secondary password or passcode that you need to provide when you call your cellphone provider. Most US carriers now offer this option.
Advertisement
Call your provider and ask them to set this up for you. Motherboard confirmed that Sprint, T-Mobile, Verizon and U.S. Cellular all give customers this option. Verizon and U.S. Cellular have made this mandatory, according to their spokespeople. Of course, make sure you remember this phone password, or better yet, write it down in your password manager.
Image: Koji Yamamoto & Seth Laupus
In the wake of September 11th, the United States built out a massive surveillance apparatus, undermined constitutional protections, and limited possible recourse to the legal system.
Given the extraordinary capabilities of state surveillance in the US—as well as the capabilities of governments around the world—you might be feeling a little paranoid! It’s not just the NSA—the FBI and even local cops have more tools at their disposal to snoop on people than ever before. And there is a terrifying breadth of passive and unexpected surveillance to worry about: Your social media accounts can be subpoenaed, your emails or calls can be scooped up in bulk collection efforts, and your cell phone metadata can be captured by Stingrays and IMSI catchers meant to target someone else.
Remember, anti-surveillance is not the cure, it’s just one thing you can do to protect yourself and others. You probably aren’t the most at-risk person, but that doesn’t mean you shouldn’t practice better security. Surveillance is a complicated thing: You can practice the best security in the world, but if you’re sending messages to someone who doesn’t, you can still be spied on through their device or through their communications with other people (if they discuss the information you told them, for instance).
Advertisement
That’s why it’s important that we normalize good security practices: If you don’t have that much to be afraid of, it’s all the more important for you to pick up some of these tools, because doing that will normalize the actions of your friends who are, say, undocumented immigrants, or engaged in activism. Trump’s CIA Director thinks that using encryption “may itself be a red flag.” If you have “nothing to hide,” your use of encryption can actually help people at risk by obfuscating that red flag. By following this guide, you are making someone else safer. Think of it as herd immunity. The more people practice good security, the safer everyone else is.
The security tips provided earlier in this guide still apply: If you can protect yourself from getting hacked, you will have a better shot at preventing yourself from being surveilled (when it comes to surveilling iPhones, for instance governments often have few options besides hacking the devices). But tech tools don’t solve all problems. Governments have a weapon in their hands that criminal hackers do not: the power of the law. Many of the tips in this section of the guide will help you not only against legal requests and government hacking, but also against anyone else who may be trying to spy on you. You don’t have to turn yourself into a security expert. Just start thinking about your risks, and don’t be intimidated by the technology. Security is an ongoing process of learning. Both the threats and the tools developed to address them are constantly changing, which is one of the reasons why privacy and security advice can often seem fickle and contradictory. But the tips below are a good starting point.
Advertisement

THREAT MODELING (privacy and surveillance edition)

Keep in mind that different tools address different problems. Without threat modelling, it’s easy to feel overwhelmed by how many tools are out there. Threat modeling for surveillance is similar to threat modelling for hacking, but there are of course some nuances that vary in every situation.
It’s easy for some people to say “use Signal, use Tor,” and be done with it, but that doesn’t work for everyone. For example, a friend used to message people about her abusive ex-partner using the built-in Words With Friends messenger, because she knew that he read her text messages and Gchats. Words With Friends does not have a particularly secure messaging system, but in this case it was a better option than Signal or Hangouts because he didn’t think to read her messages on the game.
When it comes to state actors, it might be helpful to think of surveillance in two different forms: surveillance of metadata (who you are, who you’re talking to, when you’re talking) and surveillance of content (what you are saying). As with all things, when you dig a little deeper, it’s not as simple as that. But if you’re thinking about this for the first time, it’s a good start.
Surveillance law is complicated, but long story short, both the law and current technological infrastructure make it easier to grab metadata than content. Metadata isn’t necessarily less important or revealing than content. Say Planned Parenthood called you. Then you call your partner. Then you call your insurance. Then you call the abortion clinic. That information is going to be on your phone bill, and your telephone provider can easily give it up to the government. Your cell provider might not be recording those calls—the content is still private. But at that point, the content doesn’t matter—it would be easy for someone with the metadata alone to have a reasonable idea of what your calls were about.
Advertisement
Start thinking about what is open and exposed, and what you can protect. Sometimes, you have to accept that there’s very little you can do about a particular channel of communication. If circumstances are dire, you’re going to just have to work around it.

SIGNAL

Signal is an encrypted messaging service for smartphones and desktop computers. It is, for many—but not all—people, a good option for avoiding surveillance. Because the government has the capability to intercept electronic messages while they’re being transmitted, you want to use end-to-end encryption for as many of your communications as possible.
Using Signal is easy. You can find it and install it from your phone’s app store. (In the iOS App Store and the Google Play Store, it’s called “Signal Private Messenger,” and it’s made by Open Whisper Systems.)
If you have the other person’s phone number in your contacts list, you can see them in Signal, and message them or call them. As long as the other person also has Signal, the messages automatically encrypt—all the work is invisible.
It even has a desktop app, so you can use it the way that iOS/Mac OS people use iMessage on both their phones and computers. Go to the Signal.org website and download the app for your preferred operating system. Just follow the instructions—trust us, they’re easy.
Signal also lets you set a timer for messages to automatically expire, thus deleting them from all devices. You can set the timer for all kinds of lengths, including very short ones. This is a great feature for journalists who are concerned about protecting their sources or their conversations with editors.
Advertisement
These are great features, and they’re part of the reason why we recommend Signal over many other end-to-end messaging apps. iMessage and WhatsApp also use end-to-end encryption, but they both have drawbacks.
We do not recommend WhatsApp, because WhatsApp is owned by Facebook, and has been sharing user information with its parent company. While this is only metadata, it is ultimately a rollback of a privacy promise made when WhatsApp was acquired by Facebook. We think this says something negative about the overall trustworthiness of the company in coming days.
It is a very good thing that Apple encrypts iMessages end-to-end. But iMessage also backs up messages to iCloud by default, which is why you can message from all your Apple devices. This is a great and fun feature, but if you’re concerned about government surveillance, remember that Apple complies with lawful government demands for data in your iCloud: “iMessage and SMS messages are backed up on iCloud for your convenience,” Apple’s privacy page states. You can turn this feature off, but in theory Apple could be forced to access the iMessages you’ve sent people who still have the feature enabled.
Signal keeps very little information. We know this, because Open Whisper Systems was subpoenaed by the government last year, and was forced to hand over information. But the information it had—by design—was pretty minimal. Signal retains phone number, account creation date, and the time of the user’s last connection to Signal servers. Yes, that’s still something, but as you can see, it’s not very much.
Advertisement
There are worse products to use than iMessage and WhatsApp. For example, you absolutely should avoid using Telegram for sensitive communications. And Google can read your GChats unless you take additional steps to encrypt them end-to-end. There are several other products on the market that are decent alternatives (for example, Wire), but like WhatsApp and iMessage, they’re created and maintained by for-profit companies, and we don’t know how they’re planning to monetize in the future. Signal is an open source, nonprofit project. That has its own drawbacks (for example, Signal is not as slick as iMessage, nor does it have the luxury of having a large security team behind it), so maybe donate money when you download it?
One thing that’s worth mentioning about Signal is that it requires you to associate the device with a phone number. This means that you need to trust the people you’re messaging to have your phone number (or need to jump through hoops to use Signal with a dummy phone number); there are many reasons why you might want to message people without giving them your phone number, which is one of the potential drawbacks of Signal. If this is a concern for you, consider another option.
Another thing to remember is that just because a communication is end-to-end encrypted doesn’t mean it’s invisible to the government. It just means the contents are encrypted between endpoints. You can see the message, your recipient can see the message. If it’s intercepted in transit, it’s completely garbled, and the content of your message is protected from spying eyes.
Advertisement
But if an “endpoint” is compromised—in other words, if your own phone is hacked or physically seized by the government, or your texting partner is screencapping your conversation—it’s game over.
Encryption doesn’t make it impossible for the government to snoop, it just makes it way more challenging. The point is that introducing friction into the equation does provide privacy.

SOCIAL MEDIA

If you post publicly on social media, know that local police (and likely federal agencies as well) keep tabs on activists online. For example, Facebook, Instagram, and Twitter have all fed data to social media monitoring products that police departments used to track Black Lives Matter activists.
Even if you keep your privacy settings on lockdown, social media companies are subject to subpoenas, court orders, and data requests for your information. And often times, they’ll fork over the information without ever notifying the user that it’s happening. For the purposes of social media, assume that everything you post is public. This doesn’t mean you should stop using social media, it just means you have to be mindful of how you use it.
If you’re an activist, consider using a pseudonym for your activism. If you post online at all, take others’ safety and privacy into consideration as well.
Who are you tagging into your posts? Are you adding location information? Who are you taking a picture of, and why? Be particularly careful with photos or posts about protests, rallies, or meetings. Facial recognition technology is fairly sophisticated now, so even if you leave people untagged, theoretically an algorithm could scan for and identify activists in a photograph of a rally. You can already see this at work in Facebook’s tag suggestions.
Advertisement
When you take a picture of someone at a protest, make sure that they consent, and that they know the implications of having a photo of themselves out there.

DEVICE CAMERAS AND MICROPHONES

Do you live around any cameras? If you use internet-connected security cameras inside your home, or have a webcam running, don’t leave these things unsecured. Make sure that you’ve changed any passwords from the default that they shipped with, and cover them when you’re not using them.
If you have a laptop or a smartphone, use a sticker to cover the front-facing camera. You don’t have to stop Facetiming and taking selfies, you just want to cover things up so no one’s looking at you when you don’t want them to. The Electronic Frontier Foundation sells removable laptop cover stickers (five for $5) that won’t leave a residue on your camera, so you can take it on and off whenever you need it. Consider buying several and giving them to friends who might be shorter on cash.
Finally, there is absolutely no way to make sure your microphone is not recording. If you’re concerned about being wiretapped, consider turning off your phone and putting it in the microwave ( temporarily, with the microwave off), or leaving your phone in the other room. Turning your phone off alone does not necessarily protect you! And consider leaving all your devices outside of the bedroom when you have sex with your partner.
In 2012, Khadija Ismayilova, an Azeri journalist, was blackmailed with a surreptitiously filmed sex tape. The blackmailer told Ismayilova to stop publishing articles critical of the government, or else have her tape released. (Ismayilova went public, and the tape was posted on the internet.) In 2015, the Azerbaijan government sentenced her to seven and a half years in prison on tax evasion charges. She is currently out on probation.
Advertisement
Governments at home and abroad have used sex to blackmail dissenters. Be aware of that, and protect your privacy.

LOCK SCREEN

Put a password/passcode on your phone and your computer. Don’t rely on your thumbprint alone. The police are more likely to be able to legally compel you to use your fingerprint to open up your phone. You may have a stronger constitutional right not to speak your password.

USE OTR FOR CHATTING (if you have to)

It’s best to use Signal for desktop when chatting with people. But here’s another option that’s particularly useful for journalists.
Close your Gmail window and use OTR (Off The Record) instead to chat. Keep in mind that you can only use OTR if the other person is also using OTR. Mac users can install Adium, PC (and Linux) users will have to install Pidgin and the OTR plugin.
You can use your Gmail account as your chat ID. So what’s going on is that you’re engaging in Gchat, but with a layer of encryption on top. Open up a chat window and click the lock icon to begin encryption. And make sure you tweak your settings so that you’re not retaining chat logs during encrypted conversations.
Again, end-to-end only goes so far. If the other person is logging your conversations, it might not matter that you went this far. If you’re concerned, ask your friend to stop logging.

THE TOR BROWSER

Tor—which takes its name from an acronym for “The Onion Router”—scrambles your internet traffic by routing it through several layers of computers. This way, when you access a website, it can’t tell where you’re connecting from. The easiest way to use Tor is just to install the Tor Browser. It’s just like Firefox or Chrome or Internet Explorer, just a lot slower because of the privacy it provides.
Advertisement
Using Tor for everything will give you a big privacy boost, but it’s a bit unwieldy. Don’t, for instance, try to stream Netflix over Tor.
Evaluate your needs and figure out how much Tor you need in your life. Always remember that your IP address (which can give away where you are, and therefore, who you might be) is laid bare if you aren’t using it.
There are four reasons why you might want to use Tor.
  • You’re trying to keep your identity hidden.
  • You use a lot of public WiFi.
  • You’re trying to get around government censorship.
  • You are protecting the other people who use Tor.
If you’re an activist who is trying to hide their identity, you need Tor to mask your IP address. This is a limited use case scenario. For example, it’s self-defeating for me to open up Tor, log into my public Twitter account, and tweet, “What up, everyone, I’m tweeting from the Vice Media offices in New York City.” I am giving away all the information that Tor is masking for me—because when it comes down to it, in that use case scenario, I was never planning on keeping it private.
If you connect to a lot of public Wi-Fi (think Starbucks, a hotel, or the airport), though, you should use Tor. It provides similar benefits as VPNs , but without many of the drawbacks of a VPN (see the next section for a discussion of that).
If the United States begins to censor parts of the web, as many other governments do, Tor might be able to help you get around that. Tor certainly helps people connecting to the internet from other countries that practice internet censorship.
Finally, the thing about Tor is that the more people use it, the less trackable everyone else is. When a lot of random, unaffiliated people from all over the world use it, it becomes stronger and stronger. If you take the time to use Tor every day, you are helping people who really do need it.
Advertisement
A couple caveats, here: Tor is not bulletproof. The government has been known to hack groups of users on Tor, just like it’s been known to hack VPN users en masse. Tor, by itself, does not make it more unlikely for you to get hacked. Tor is for privacy, not security. And Tor is designed to make it hard to log your traffic, not impossible, so there’s always a risk that you aren’t being hidden.
The computers that make up the Tor network—the ones that your traffic bounces through—are run by volunteers, institutions, and organizations all over the world, some of whom face legal risks for doing so. They are not supposed to log the traffic that goes through them, but because it’s a volunteer network, some might. The risk is mitigated by the fact that each node only sees a snapshot of the traffic running through it, and nobody has access to both the user’s IP and their unencrypted traffic. A bad actor would have to run a very large number of Tor nodes to start logging meaningful traffic—which would be difficult—and the Tor project monitors for behavior that suggests anybody might be doing that.
Ultimately, for the purposes of state surveillance, Tor is better than a VPN, and a VPN is better than nothing.
It’s not clear whether Tor will continue to exist into the future. Tor is run partly through grants from the government. (Like many cutting edge technologies, Tor was originally developed by the US military.) It’s possible Tor will lose most of its funding in the very near-term. Consider donating to the Tor Project.
Advertisement

VIRTUAL PRIVATE NETWORKS

When it comes to state surveillance, VPNs won’t help much. A VPN will obscure your IP address, but when it comes to state surveillance, VPNs can be subpoenaed for user information that may ultimately identify you. For example, many VPN companies keep logs on what IP addresses log on when and what sites are accessed—which can end up pinpointing you, especially if you used your credit card to pay for a VPN subscription.
Some VPN companies claim not to log user information. You need to evaluate how much you trust these companies, and make that decision for yourself. If what you’re concerned about is government surveillance, our recommendation is that you stick with Tor.

PGP (probably isn’t worth the trouble)

The only reliable way to encrypt your email is PGP—also known as Pretty Good Privacy. However, PGP is incredibly obnoxious to use. Even PGP’s creator Phil Zimmermann has stopped using it, since he can’t use it on his phone. The problem isn’t just that you have to figure out PGP, everyone you talk to also has to figure it out. Telling someone to download Signal is a lot easier than walking them through public/private key encryption. This is where your threat model comes in handy, to help figure out if PGP is actually worth it to you.
If you absolutely must use encrypted email, this guide to PGP might be helpful. It’s tricky, so you might want to go to a crypto party and have an activist or technologist help you set it up.
Advertisement

PRIVATE EMAIL SERVERS (don't do it)

If 2016 did anything, it convinced everyone not to run their own private email server.
It’s true that Google and other companies have to comply with court orders for your information, including your emails. But on the other hand, Google knows how to run email servers way better than you do. Email servers are hard! Just ask Hillary Clinton.
If you are encrypting email, Google can only hand over the metadata (who’s sending to whom and subject headers). Since encrypting email is a huge pain, try to keep all your sensitive stuff away from email, and in end-to-end encrypted channels instead. Don’t abandon your third-party email account, just be aware that the government can get at what’s inside.

ENCRYPT YOUR HARD DRIVE

Good news: this isn’t as hard as it used to be!
Full-disk encryption means that once your device is locked (when it’s off, or when it’s on but showing a lock screen), the contents of your hard drive can’t be accessed without your password/key.
A lot of smartphones come with full disk encryption built in. If you own an iPhone with a recently updated operating system (like, in the last three years, really), just slap a passcode on that sucker and you’re golden.
If you own an Android phone, it might already be encrypted by default (Google Pixel is). But chances are, it’s not. There isn’t an up-to-date guide on turning on encryption on all Android devices, so you’re going to have to poke around yourself, or ask a friend. And if you own a Windows phone, god help you, because we can’t.
Advertisement
As for computers, things are again, much easier than they used to be. Use your operating system’s full disk encryption option instead. For MacBooks running Lion or newer, just turn on FileVault.
Windows, on the other hand, is a lot more complicated. First off, some users have encryption by default. Some more users can turn it on, but it’s kind of a pain. And if you’re using Microsoft’s Bitlocker, you’re going to have to fiddle with some additional settings to make it more secure. Apple doesn’t retain the capability of unlocking your devices. Famously, if the government goes to Apple, Apple can’t just decrypt your phone for the feds, not without coming up with a hack that will affect every iPhone in the world. But Microsoft isn’t doing quite the same thing—in some cases they use what’s known as “key escrow,” meaning they can decrypt your machine—so you have to take additional steps (outlined in this article) to get that same level of protection.
You may need to resort to using VeraCrypt. A lot of older guides will say to use TrueCrypt, regardless of operating system. This is now outdated advice. VeraCrypt used to be TrueCrypt, and the story of why it's not any more is a convoluted crypto soap opera with plot holes the size of Mars, and it is frankly outside the scope of this guide. Long story short, there’s nothing wrong with VeraCrypt as far as the experts can tell, but if you have the option, use the full disk encryption that your operating system already provided.
Advertisement
If you use Linux, your distro probably supports encryption out of the box. Follow the instructions while installing.

CREDIT CARDS

Know that credit card companies never stand up to the government. If you pay for anything using your credit card, know that the government can get that information pretty easily. And remember that once your identity touches something, there’s a chain that the government can follow all the way back.
For example, if you get a prepaid Visa gift card using your personal credit card, and pay a VPN company with that, the government can just go backwards through the chain and find your personal credit card, and then you. If you pay a VPN company with Bitcoin, but you bought the Bitcoin through a Bitcoin exchange using your personal credit card, that’s traceable as well.
This applies to anything else you use money for, like buying domains or cheap, pay-as-you-go phones, known as burners. Practically speaking, there’s not a lot you can do about this. It’s one of the reasons why we recommend Tor instead of a VPN service.
It’s also one of the reasons why it’s so hard to get a burner phone that’s really a burner. (How are you going to pay for continuing phone service without linking your name to it?) There is no easy answer here. We’re not going to pretend to be able to give good advice in this instance. If you find yourself in a situation where your life depends on staying anonymous, you’re going to need a lot more help than any internet guide.
Advertisement
One more thing: For now, organizations like the ACLU and NAACP have a constitutional right to resist giving up the names of donors. But your credit card or PayPal might betray you anyways. This doesn’t mean you shouldn’t donate to organizations that resist oppression and fight for civil rights and civil liberties. Rather, it makes it all the more important that you do. The more ordinary people do so, the more that individual donors are protected from scrutiny and suspicion.

SPECIAL NOTES FOR JOURNALISTS

Want to protect your sources? Your notes, your Slack chats, your Gchats, your Google Drive, your Dropbox, your recorded interviews, your transcripts, and your texts can all end up in court. Depending on what kind of court case it is, it might not matter that it’s encrypted.
Don’t wait until a lawsuit is imminent to delete all your stuff. That might be illegal, and you might be risking going to jail. Every situation is different: your notes might be necessary to get you out of trouble. So if you’re the type to hoard notes, know the risk, talk to a lawyer, and act responsibly.

THE FUTURE (?)

Which brings us to our next point: we don’t know what the future holds. This guide was written with the current technical and legal capabilities of the United States government in mind. But that might all change in the future. Strong encryption might become illegal. The United States might begin to practice internet censorship the way that China and other countries do. The government might institute a National ID policy for getting online, making it near-impossible to post anonymously.
Advertisement
These things are harder to enforce and implement, so they’re not likely to happen quickly.
It’s also not infeasible that the government pressures app stores to take down Signal and other end-to-end encryption applications. This guide might be only be so good for so long. That’s all the more reason to become proactive against surveillance now, and to keep adapting to changing circumstances.

LOG OFF

Many public places have cameras, some spots are wired with microphones. And there’s always the possibility that you are being individually targeted for surveillance. But ultimately, it’s a lot harder to surveil someone in person than to collect the electronic communications of many people at the same time.
Take a break from the wired world and meet people in person. If you stay out of earshot, you won’t be overheard, and your words will melt into the air, unsurveilled and unrecorded.
And besides, if you’re reading this guide, chances are that you really need a hug right now.
So meet up with your friends, verify your Signal keys, and give each other a big hug. Because you’re probably both scared, and you need each other more than you need any of this technology.

GO OUT THERE AND BE SAFE

That is all for now. Again, this is just meant to be a basic guide for average computer users. So if you're a human rights activist working in a dangerous country or a war zone, or an organization building IT infrastructure on the fly, this is certainly not enough, and you'll need more precautions.
Advertisement
But these are common sense essential tips that everyone should know about.
Of course, some readers will leap at the chance to point out everything that may have been missing from this guide, and we'd like to hear your feedback. Security is a constantly changing world, and what's good advice today might not be good advice tomorrow, so our goal is to keep this guide updated somewhat regularly, so, please, do reach out if you think we have something wrong or missing something.
And remember, always be vigilant!

motherboard