Important Security Notice

Digital security is highly contextual. Tools and practices that work in one environment may be inappropriate or dangerous in another. These resources provide general guidance, but we strongly recommend consulting with security experts familiar with your specific threat landscape. Contact our crisis team for personalized guidance.

Foundations

Essential Digital Security

Foundational knowledge and practices for protecting yourself and your community in hostile digital environments.

Understanding Your Threat Model

Before implementing any security measures, you need to understand who might target you, why, and what capabilities they have. This framework helps you:

  • Identify potential adversaries and their motivations
  • Assess the sophistication of threats you face
  • Determine what assets need protection
  • Make informed decisions about appropriate security measures

Secure Communication Fundamentals

Essential practices for maintaining confidential communication in high-risk environments:

  • End-to-end encryption: what it is and why it matters
  • Evaluating messaging apps for security and metadata protection
  • Understanding the limits of encrypted communication
  • Setting up secure communication channels for teams
  • Emergency communication protocols when primary channels fail

Device Security & Data Protection

Your devices are often your most vulnerable point. Learn to protect them:

  • Strong authentication: passwords, PINs, and biometrics
  • Full-disk encryption for laptops and phones
  • Secure data deletion when disposing of devices
  • Protecting against physical device seizure
  • Safe backup strategies for sensitive information

Working under pressure

Operational Security

Advanced practices for journalists, activists, and human rights defenders working in hostile environments.

Surveillance Awareness & Countermeasures

Understanding and mitigating digital surveillance risks:

  • Types of surveillance: network monitoring, device compromise, physical tracking
  • Recognizing signs of surveillance
  • Using VPNs and Tor effectively (and understanding their limitations)
  • Avoiding metadata leakage
  • Compartmentalization: separating sensitive work from daily life

Source Protection for Journalists

Critical practices for protecting confidential sources:

  • Establishing secure first contact with sources
  • Anonymous communication channels
  • Protecting source identity in notes and materials
  • Legal considerations and journalist shield laws
  • What to do if devices are seized

Secure Collaboration & File Sharing

Working with teams while maintaining security:

  • End-to-end encrypted cloud storage options
  • Secure file transfer methods
  • Collaborative document editing with encryption
  • Managing shared credentials securely
  • Vetting new team members and establishing trust

When crisis hits

Crisis Response Protocols

Emergency procedures for when situations escalate and immediate action is required.

Emergency Communication Plans

Maintaining contact when primary channels are compromised:

  • Establishing backup communication methods before crisis hits
  • Code words and signals for emergency situations
  • Offline communication strategies
  • Coordinating with international support networks
  • When and how to go dark completely

Rapid Data Sanitization

Quick procedures for protecting data in emergency situations:

  • Emergency data deletion protocols
  • Remote device wipe capabilities
  • What to delete and what to protect
  • Secure destruction of physical media
  • Recovery after data sanitization

Post-Compromise Recovery

Steps to take if you believe your security has been breached:

  • Immediate damage control measures
  • Assessing the scope of compromise
  • Safely re-establishing secure communications
  • Protecting contacts and sources
  • Learning from security incidents

Need Personalized Guidance?

Our security team can provide customized training and resources tailored to your specific context and threat environment. We work directly with journalists, activists, human rights defenders, and humanitarian organizations worldwide.

Contact us at crisis@muhammedx.org to discuss your security needs.