Skip to content

Commit

Permalink
border security
Browse files Browse the repository at this point in the history
  • Loading branch information
denten committed Feb 10, 2017
1 parent d766613 commit 15356c2
Show file tree
Hide file tree
Showing 3 changed files with 80 additions and 2 deletions.
13 changes: 11 additions & 2 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -18,11 +18,20 @@
- **[Version Control with Git][4]**
- **[Minimal Computing](https://github.com/dh-notes/dhnotes/blob/master/pages/minimal-computing.md)**


[1]: https://github.com/dh-notes/dhnotes/tree/master/tutorials/python
[2]: https://github.com/dh-notes/dhnotes/blob/master/tutorials/command-line/000-cli.md
[4]: https://github.com/xpmethod/dhnotes/blob/master/cheatsheets/githum.md
[3]: http://programminghistorian.org/lessons/sustainable-authorship-in-plain-text-using-pandoc-and-markdown
[4]: https://github.com/xpmethod/dhnotes/blob/master/cheatsheets/githum.md

> **Technologies of Dissent**
A series of workshops and teach-ins to address the needs of scholars and
activists at risk.

- **[Electronic Device Security at the Border][5]**
- **[Online Security Glossary][6]**

[5]: https://github.com/dh-notes/dhnotes/blob/master/pages/border-security.md
[6]: https://github.com/dh-notes/dhnotes/blob/master/pages/security-key-concepts.md

> **Tools**
Expand Down
69 changes: 69 additions & 0 deletions pages/border-security.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,69 @@
# Device Security at the Border

## Field Reports

February 10, 2017 | "[Canadian Muslim grilled about her faith and view on Trump at US border
stop][1]," *The Guardian*

> She said they also examined her phone and asked questions about Arabic
videos on the device. Alaoui told them they were videos of daily prayers she
had received from friends, to help her and her son as he went through chemo.
An agent later explained that the videos were why she was being blocked from
entry.

January 30, 2017 | "[Travelers Affected By Trump Ban Forced To Unlock Phones,
Computers][3]," *Vocativ*

> President Trump’s confusing, chaotic executive order against travelers
arriving from seven Muslim-majority countries has prompted federal agents to
demand travelers — some of them legal residents — hand over access to their
electronic devices and social media accounts to be searched, their lawyers
say.

September 9, 2013 | "[The Border Is a Back Door for U.S. Device Searches][2],"
*Thee New York Times*

> Newly released documents reveal how the government uses border crossings to
seize and examine travelers’ electronic devices instead of obtaining a search
warrant to gain access to the data.

[1]: https://web.archive.org/web/20170210172157/https://www.theguardian.com/us-news/2017/feb/10/canadian-muslim-us-border-questioning
[2]: https://web.archive.org/web/20170210172804/http://www.nytimes.com/2013/09/10/business/the-border-is-a-back-door-for-us-device-searches.html
[3]: https://web.archive.org/web/20170210172957/http://www.vocativ.com/397897/travelers-affected-by-trump-ban-forced-to-unlock-phones-computers/

## Tactics

1. Security on a scale. Parity of resources. Common breaches:

- State actors, with near unlimited resources.
- Sustained but temporary attention at places like the border.
- Opportunistic agents that target obvious “soft” spots.

2. Attack vectors, vulnerability analysis. Understand your vulnerabilities.
The importance of physical access. Virtual is real. Thinking about location.
Cloud vs. local vulnerabilities. Hardware, software, vs. social vectors.

3. Hardening. Common strategies. Two factor authentication. Encryption.

4. Obfuscation. Multiple accounts. Separating work from personal, by year, or place. Cheap disposable devices.

5. Operational security and hygiene. Security is a practice, not something to
be done once. Good habits:

- Using multiple accounts / platforms
- Logging out
- Two factor authentication
- Prevent password dependencies
- Limit use of social media

6. Canary. Buddy system. Currier drops. Backups.

7. Dry runs. Wipe and restore phone and laptop accounts. Institute a protocol.
Review it with a friend and/or expert. Practice before traveling, when not
under duress.

8. Limiting access. Travel devices.

## Further Reading & Resources


Empty file added pages/security-key-concepts.md
Empty file.

0 comments on commit 15356c2

Please sign in to comment.