Important Security Notice
Digital security is highly contextual. Tools and practices that work in one environment may be inappropriate or dangerous in another. These resources provide general guidance, but we strongly recommend consulting with security experts familiar with your specific threat landscape. Contact our crisis team for personalized guidance.
Foundations
Essential Digital Security
Foundational knowledge and practices for protecting yourself and your community in hostile digital environments.
Understanding Your Threat Model
Before implementing any security measures, you need to understand who might target you, why, and what capabilities they have. This framework helps you:
- Identify potential adversaries and their motivations
- Assess the sophistication of threats you face
- Determine what assets need protection
- Make informed decisions about appropriate security measures
Secure Communication Fundamentals
Essential practices for maintaining confidential communication in high-risk environments:
- End-to-end encryption: what it is and why it matters
- Evaluating messaging apps for security and metadata protection
- Understanding the limits of encrypted communication
- Setting up secure communication channels for teams
- Emergency communication protocols when primary channels fail
Device Security & Data Protection
Your devices are often your most vulnerable point. Learn to protect them:
- Strong authentication: passwords, PINs, and biometrics
- Full-disk encryption for laptops and phones
- Secure data deletion when disposing of devices
- Protecting against physical device seizure
- Safe backup strategies for sensitive information
Working under pressure
Operational Security
Advanced practices for journalists, activists, and human rights defenders working in hostile environments.
Surveillance Awareness & Countermeasures
Understanding and mitigating digital surveillance risks:
- Types of surveillance: network monitoring, device compromise, physical tracking
- Recognizing signs of surveillance
- Using VPNs and Tor effectively (and understanding their limitations)
- Avoiding metadata leakage
- Compartmentalization: separating sensitive work from daily life
Source Protection for Journalists
Critical practices for protecting confidential sources:
- Establishing secure first contact with sources
- Anonymous communication channels
- Protecting source identity in notes and materials
- Legal considerations and journalist shield laws
- What to do if devices are seized
Secure Collaboration & File Sharing
Working with teams while maintaining security:
- End-to-end encrypted cloud storage options
- Secure file transfer methods
- Collaborative document editing with encryption
- Managing shared credentials securely
- Vetting new team members and establishing trust
When crisis hits
Crisis Response Protocols
Emergency procedures for when situations escalate and immediate action is required.
Emergency Communication Plans
Maintaining contact when primary channels are compromised:
- Establishing backup communication methods before crisis hits
- Code words and signals for emergency situations
- Offline communication strategies
- Coordinating with international support networks
- When and how to go dark completely
Rapid Data Sanitization
Quick procedures for protecting data in emergency situations:
- Emergency data deletion protocols
- Remote device wipe capabilities
- What to delete and what to protect
- Secure destruction of physical media
- Recovery after data sanitization
Post-Compromise Recovery
Steps to take if you believe your security has been breached:
- Immediate damage control measures
- Assessing the scope of compromise
- Safely re-establishing secure communications
- Protecting contacts and sources
- Learning from security incidents
Need Personalized Guidance?
Our security team can provide customized training and resources tailored to your specific context and threat environment. We work directly with journalists, activists, human rights defenders, and humanitarian organizations worldwide.
Contact us at crisis@muhammedx.org to discuss your security needs.