Top 14 tips for secure mobile communications
May 8, 2013 3 Comments
Mobile networks in even the most benign democracies are required by law to build monitoring systems into their infrastructure. The powers that be can then use this data in a number of ways, ranging from disclosure, where historical records are released under a government request, to real time interception of location, numbers called and when you called them.
The risk of being tracked through your mobile phone usage is clearly heightened in less stable states. There are a number of practical solutions which can be used to minimise your footprint on a network.
[The tips in this article were taken from a meeting that took place at the Frontline Club on 7 May, 2013. Please be advised there may have been developments in the technology and methods mentioned.]
1. Don’t turn on a phone until you are away from an airport or point of entry. Border control is where your phone and number can be most easily attributed to you and flagged for interception. Some border posts may also use an IMSI-Catcher which forces all mobile phones passing through to authenticate to a false network, which then attaches the mobile number in use to your identity.
2. Use a local SIM, or a SIM which is prevalent in the country in which you are operating in. A +44 SIM clearly stands out in a country where, for example, a +963 or +90 dialling code is standard.
3. Switching different SIM cards in and out of the same phone is ineffective, and merely associates both numbers together as being held by the same person, or in a worst case scenario attaches them both to your identity.
4. Many countries, including the UK, now require all pre paid SIM cards to be registered to an individual person at the point of sale. Try and avoid this, or use a false identity. Getting other people who may not arouse as much suspicion as you to purchase a SIM may put them in danger.
5. Do not have family and friends phone numbers stored on the SIM card, or in the phone memory itself. These can then be easily used to place threats in a situation such as a kidnap. Ideally, have no numbers stored in your phone at all.
6. Once considered to offer a safe Voice over Internet Protocol (VoIP) option, recently doubts have been raised about the security of Skype. [Updated on 24 October, 2013]
7. Set up an auto forwarding phone in a nearby country and forward all calls to your home or office through this. As with point number two, regular calls to a +44 dialling codes for example are easily noticeable.
8. Use a service such as MSN, or set up a VPN (Virtual Private Network). These can be more secure than using a regular mobile network.
10. In a congested network, such as near the scene of a mass protest or incident, using SMS instead of a voice call is your greatest chance of success as voice and text are sent over different channels.
11. Use satellite phones with extreme caution, or not at all. Signals are easy to intercept and track down in real time due to their low prevalence in even the most technologically advanced regions. Most satellite phones also send the current GPS coordinates up to the satellite itself, and with the ease of interception these can then be used for near ‘real time targeting’.
12. Take out your phone battery when not in use.
13. Remember that ‘the cloud’ is physically located on the ground across the world, and local laws apply to each separate data centre.
14. Always bear corruption in mind, whether it is within the local network itself or the local enforcement agency.