Cell Phone Opsec

Post Reply
User avatar
Pigeon
Posts: 18055
Joined: Thu Mar 31, 2011 3:00 pm

Cell Phone Opsec

Post by Pigeon » Wed Apr 08, 2015 11:03 pm

With his latest project, "Proposition For An On Demand Clandestine Communication Network," (PropCom) Wallen doubles down on this anti-surveillance modus operandi. Step-by-step, Wallen instructs people in the laborious—and damned near impossible—art of ducking cell phone surveillance.

His step-by-step instructions for making a clandestine phone call are as follows:

Analyze your daily movements, paying special attention to anchor points (basis of operation like home or work) and dormant periods in schedules (8-12 p.m. or when cell phones aren't changing locations)
  1. Leave your daily cell phone behind during dormant periods and purchase a prepaid no-contract cell phone ("burner phone")
  2. After storing burner phone in a Faraday bag, activate it using a clean computer connected to a public Wi-Fi network
  3. Encrypt the cell phone number using a onetime pad (OTP) system and rename an image file with the encrypted code. Using Tor to hide your web traffic, post the image to an agreed upon anonymous Twitter account, which signals a communications request to your partner
  4. Leave cell phone behind, avoid anchor points, and receive phone call from partner on burner phone at 9:30 p.m.­ -- or another pre-arranged "dormant" time­ -- on the following day
  5. Wipe down and destroy handset
Note that it actually makes sense to use a one-time pad in this instance. The message is a ten-digit number, and a one-time pad is easier, faster, and cleaner than using any computer encryption program.

Source Link

Link to original Source


Post Reply