Act detail 04

4.4 Protests: Protect Your Identity and Information

Many human rights defenders and activists depend heavily on computers and mobile phones for organising and coordinating peaceful protests. However, this makes confiscation, theft and surveillance of our devices and communication a priority for our adversaries attempting to limit free speech and assembly.

While transparency and open engagement with States and society are useful tools for security in many contexts, in others it may important to protect the identity and sensitive information of those involved in a protest, at least for some of the time.

If you're planning or coordinating a protest over the internet or using mobile phones, you should consider ways of protecting your identity and that of your network. Sometimes authorities or others will put social movements under surveillance in order to predict, prevent or disrupt protests. Governments and private companies use tactics like observation, infiltration and automated search engines to identify usernames in social networks using specific words or images.

Therefore, it can be dangerous to rely on social media to organise a protest as is is often heavily surveilled. You may want to avoid using your real name on social networks when organising or participating in an action, avoid associating yourself with groups that are likely to be under surveillance on social media sites, and avoid accepting 'friend requests' and other connections with protesters who you previously didn't know. Consider using a VPN or the Tor Browser to hide your IP address and browsing activities from site administrators and your internet service provider respectively.

At the protest itself, adversaries might use photography, video or other techniques to try to identify participants and later take action against them. In some cases, you can use face painting or masks to obscure your identity (e.g. the "V-for-Vendetta" masks used during the Occupy Movement and the symbolic balaclavas used by groups like Pussy Riot in Russia and the Zapatista movement in Mexico). Masks can also be used to create a symbolic identity for the group, or to represent those who can not protest. However, be careful: in many countries, obscuring your face during a protest is illegal and could be a pretext for an arrest. Be sure to check the legal situation in your country or region before deciding on this.

Regarding the threat of confiscation, loss or theft of a device, there are other measures we can take. Many smartphones now offer ways to protect our data, below are some examples of these.

Smartphones with the Android operating system after version 4.0 usually allow for encryption of the data stored on the device. If so, you can find the option to encrypt the phone in the security settings on the phone. Encrypting the phone means that if your phone is switched off or if the power dies, there is no way for someone to access your data unless they are able to break your passphrase. It's recommended that you encrypt the device at least a day before the protest so that you have enough time to back-up your data first and carry out the procedure (which may take around an hour). Be aware that the Micro-SD on the phone may not be encrypted by this option, only the built in storage.

On an iPhone or iPad, enter the privacy settings in order to enable a passphrase to lock the screen, and ensure it says 'Data protection is enabled' once the passphrase is set. Some iPhones also include the option to erase the data on the phone after 10 incorrect passphrase attempts. You can also use this option as a means to quickly delete sensitive data from your phone in an emergency.

More in-depth guides on securing your information can be found on Security in-a-Box.