Tumblelog by Soup.io
Newer posts are loading.
You are at the newest post.
Click here to check if anything new just came in.

July 31 2011


Social networks make targeted attacks for criminals easier

eWeek :: The amount of personal and professional information posted on social networks means it's increasingly easier for criminals to create a detailed profile of their victims. Social networks provide spammers with plenty of opportunities to scam users in new and more effective ways, a security expert said.

An overview and analysis - continue to read Fahmida Y. Rashid, www.eweek.com

May 26 2011


UK: Twitter attempts to protect users' right in recent legal case brought by footballer

The Guardian :: Twitter will notify its users before handing their personal information to UK authorities seeking to prosecute them over alleged breaches of privacy injunctions, a senior executive at the company said on Thursday. What had happened? - A footballer launched a legal action against Twitter after its users named him in connection with an alleged affair with Imogen Thomas. Asked about the escalating dispute over gagging orders in Britain,

[Tony Wang, Twitter's general manager of European operations] Platforms should have responsibility not to defend the user, but to protect that user's right to defend him or herself.

Continue to read Josh Halliday, www.guardian.co.uk

May 18 2011


SaferMobile Helps Protect Your Cell Phone Data from Threats

Activists, rights defenders and journalists use mobile devices and communications for reporting, organizing, mobilizing and documenting. Mobile gadgets provide countless benefits -- relatively low cost, increased efficiencies, vast reach -- but they also present specific risks.


Mobile communication is inherently insecure and exposes you to risks that aren't easy to detect or overcome. SaferMobile is a project that aims to help people, including journalists and citizen reporters, assess and better protect themselves from mobile threats. The project launched with content and announced tools (currently in beta) in April, and development began in January. SaferMobile is a project of MobileActive.org.

Understand the risks

The first step toward better protection is to understand the vulnerabilities. While some risks may not apply to your work, the SaferMobile motto is: The more you know, the more you can make smart choices regarding your mobile communications.

Your mobile service is operated by your wireless network operator.  But did you know that as it manages your communication, it's also able to record certain types of messages you send, as well as information about your communication activities and your device?

Monitoring or eavesdropping can also occur with text messages, calls and mobile Internet use. As a reporter, this is something to keep in mind if you need to protect anonymous sources or sensitive content. The contents of your text messages are visible in plain text and stored in network records. Text messages (and emails if sent unencrypted) with certain keywords can be blocked and the sender singled out.

In addition, mobile phones can easily be lost, stolen or taken from you. If your phone's address book stores your contacts, anyone with access to the device can see them. With many phones, an attacker can gain unauthorized access remotely if he or she installs an application on the device. To do this, an attacker might trick you into downloading a file from the Internet or opening an infected MMS, or simply take advantage of having temporary physical access to the device.

The SaferMobile project assesses many other risks you may or may not be aware of. You can read more about them here.

Better Protect Yourself

The SaferMobile project also presents general tips on how to better protect yourself. For example:

  • As much as possible, avoid linking your identity to your phone number. Buy prepaid SIM cards; if at all possible avoid registering the SIM in your name. And buy a cheap, low-tech phone that you don't mind throwing out if necessary. More suggestions are in this guide.
  • Take your battery out of your phone during and when traveling to and from group meetings to avoid cell phone triangulation and location tracking.
  • Delete messages, photos/videos, and call records to deter an unsophisticated attacker, but remember that deleted data can sometimes be recovered from the phone. Don't use the phone contact list if you can keep numbers in a safe place without it. Don't store numbers and names together.

Check Back and Add your Comments

Check back often on the SaferMobile project. A unique SaferMobile site will be up this summer, and for now, updates and new content are posted on MobileActive.org and the SaferMobile wiki. We have more content coming down the line, including:

  • online and offline educational and tactical resources (risk evaluation tools, case studies, how-to guides, security tool reviews);
  • trainings and curricula;
  • and specific mobile security software focused on the needs of rights defenders, activists and journalists.

SaferMobile welcomes your comments to keep us on track and stay relevant to your needs. We're particularly interested in suggestions for additional content topics and tools. SaferMobile Tweets at @safermobile. You can also contact us via email at info@safermobile.org, or leave a comment below.

Older posts are this way If this message doesn't go away, click anywhere on the page to continue loading posts.
Could not load more posts
Maybe Soup is currently being updated? I'll try again automatically in a few seconds...
Just a second, loading more posts...
You've reached the end.

Don't be the product, buy the product!