The convenience, cost-effectiveness and flexibility of email and instant messaging make them extremely valuable for individuals and organizations with even the most limited access to the Internet. For those with faster and more reliable connections, software such as Jitsi, Skype and other Voice-over-IPVoIP tools also share these characteristics. Unfortunately, these digital alternatives to traditional means of communication can not always be relied upon to keep sensitive information private. Of course, this is nothing new. Postal mail, telephone calls and text messages are all vulnerable as well, particularly when used by those who may have been targeted for surveillance by the authorities.
What you can learn from this guide:
Why most webmail and instant messaging services are not secure
How to create a new and more secure email account
How to improve the security in your current email account
How to use a secure instant messaging service
What to do if you think someone might be accessing your email
How to verify the identity of an email correspondent
One important difference between digital, Internet-based communication techniques and more traditional methods, is that the former often allow you to determine your own level of security. If you send emails, instant messages and VoIP conversations using insecure methods, they are almost certainly less private than letters or telephone calls. In part, this is because a few powerful computers can automatically search through a large amount of digital information to identify senders, recipients and specific key words. Greater resources are required to carry out the same level of surveillance on traditional communication channels. However, if you take certain precautions, the opposite can be true. The flexibility of Internet communication tools and the strength of modern encryption can now provide a level of privacy that was once available only to national military and intelligence organizations.
By following the guidelines and exploring the software discussed in this guide, you can greatly improve your communication security. The RiseUp email service, the Off the Record OTR plugin for the Pidgin instant messaging program, Mozilla Firefox and the Enigmail add-on for the Mozilla Thunderbird email client are all excellent tools. While using them, however, you should keep in mind that the privacy of a given conversation is never one hundred percent guaranteed. There is always some threat that you did not consider, be it a keylogger on your computer, a person listening at the door, a careless email correspondent or something else entirely. The goal of this guide is to help you reduce even the threats that do not occur to you, while avoiding the extreme position, favoured by some, that you should not send anything over the Internet
that you are not willing to make public.
We're in the digital age and that's the most important means of communication. The postal services aren't even safe! But we call, we send emails, we send messages and that's how we communicate. If you can't protect that, you can't protect yourself, so it's best you're aware, informed, trained to be able to use these tools for your own benefit to protect yourself and protect your family. You're not only protecting yourself, you're protecting those you love. — Anonymous Human rights Defender
The Internet is an open network through which information typically travels in a readable format. If a normal email message is intercepted on the way to a recipient, its contents can be read quite easily. And, because the Internet is just one large, worldwide network that relies on intermediary computers to direct traffic, many different people may have the opportunity to intercept a message in this way. Your Internet Service Provider is the first recipient of an email message as it begins its journey to the recipient. Similarly, the recipient's ISP is the last stop for your message before it is delivered. Unless you take certain precautions, your messages can be read or tampered with at either of these points, or anywhere in between.
Using GPG totally changed me. It is not just the feeling that I use the same tool that was used by someone so brave as to expose the NSA surveillance, but also knowing that someone could be annoyed just because they can't read my mails, or just making it harder for someone who can eventually decrypt them, apart from making me feel more secure, well it gives me great pleasure. — Anonymous Human rights Defender
It has long been possible to secure the Internet connection between your computer and the websites that you visit. You often encounter this level of security when entering passwords or credit card information into websites. The technology that makes it possible is called Secure Sockets Layer SSLencryption . You can tell whether or not you are using SSL by looking closely at your Web browser's address bar.
All Web addresses normally begin with the letters HTTP, as can be seen in the example below:
When you are visiting a secure website, its address will begin with HTTPS.
The extra S on the end signifies that your computer has opened a secure connection to the website. You may also notice a 'lock' symbol, either in the address bar or in the status bar at the bottom of your browser window. These are clues to let you know that anyone who might be monitoring your Internet connection will no longer be able to eavesdrop on your communication with that particular website.
In addition to protecting passwords and financial transactions, this type of encryption is perfect for securing your webmail. However, many webmail providers do not offer secure access, and others require that you enable it explicitly, either by setting a preference or by typing in the HTTPS manually. You should always make sure that your connection is secure before logging in, reading your email, or sending a message.
You should also pay close attention if your browser suddenly begins to complain about invalid security certificates when attempting to access a secure webmail account. It could mean that someone is tampering with the communication between your computer and the server in order to intercept your messages. Finally, if you rely on webmail to exchange sensitive information, it is important that your browser be as reliable as possible. Consider installing Mozilla Firefox and its security-related add-ons.
I love that encryption! I love it! The idea that you can relate with someone without a third party knowing what is happening, you can code your languages, your communication, wow! [...] I came to find that when we communicate with each other there is a Big Brother somewhere who somehow [can get] this information. Jitsi enables the coding of this information so even that Big Brother cannot decode it. It's useful because it makes your communication private, so it's just between you and the person you're addressing. — Anonymous Human rights Defender
Few webmail providers offer SSL access to your email. Yahoo and Hotmail, for instance, provide a secure connection only while you log in, to protect your password, but your messages themselves are sent and received insecurely. In addition, Yahoo, Hotmail and some other free webmail providers insert the IP address of the computer you are using into all of the messages you send.
If possible, you should create a new RiseUp email account by visiting https://mail.riseup.net.RiseUp offers free email to activists around the world and takes great care to protect the information stored on their servers. They have long been a trusted resource for those in need of secure email solutions. And, unlike Google, they have very strict policies regarding their users' privacy and no commercial interests that might some day conflict with those policies. In order to create a new RiseUp account, however, you will need two 'invite codes.' These codes can be given out by anyone who already has a RiseUp account. If you have a bound copy of this booklet, you should have received your 'invite codes' along with it. Otherwise, you will need to find two RiseUp users and ask them each to send you a code.
Both Gmail and RiseUp are more than just webmail providers. They can also be used with an email client, such as Mozilla Thunderbird , that supports the techniques described under Advanced email security . Ensuring that your email client makes an encrypted connection to your provider is just as important as accessing your webmail through HTTPS. If you use an email client, see the Thunderbird Guide for additional details. A the very least, however, you should be sure to enable SSL or encryption for both your incoming and outgoing mail servers.
Regardless of what secure email tools you decide to use, keep in mind that every message has a sender and one or more recipients. You yourself are only part of the picture. Even if you access your email account securely, consider what precautions your contacts may or may not take when sending, reading and replying to messages. Try to learn where your contacts' email providers are located, as well. Naturally, some countries are more aggressive than others when it comes to email surveillance. To ensure private communication, you and your contacts should all use secure email services hosted in relatively safe countries. And, if you want to be certain that messsages are not intercepted between your email server and a contact's email server, you might all choose to use accounts from the same provider. RiseUp is one good choice.
Always use caution when opening email attachments that you are not expecting, that come from someone you do not know or that contain suspicious subject lines. When opening emails like this, you should ensure that your anti-virus software is up-to-date and pay close attention to any warnings displayed by your browser or email program.
When creating an account that you intend to use while remaining anonymous from your own email recipients, or from public forums to which you might post messages by email, you must be careful not to register a username or 'Full Name' that is related to your personal or professional life. In such cases, it is also important that you avoid using Hotmail, Yahoo, or any other webmail provider that includes yourIP address in the messages you send.
Depending on who might have physical access to your computer, clearing email-related traces from your temporary files might be just as important as protecting your messages as they travel across the Internet. See our guide How to destroy sensitive information and the CCleaner Guide for details.
You may consider using several different, anonymous email accounts for communicating with different groups of people to protect of your contact network. You may also use different email accounts for signing up to Internet services which require email accounts.
After all above precautions it is still very important to beware of what you write in the messages and what impact would it have if it fell into the wrong hands. One way of increasing the security of information exchange is to develop a code system for sensitive information exchange, so you would not use real names of the people, real addresses of places, etc.
Tips on responding to suspected email hacking and surveillance
If you suspect your email account has been hacked or compromised, you can take steps to reduce the damage done. While it is difficult to be certain, there may be clues such as:
you notice any changes to your email account content or settings that you didn't make;
your email contacts notify you that they have received an email that you didn't send;
you cannot login to your email account, though you are sure your password and other settings are correct;
you are regularly not receiving some email messages from your colleagues that they insist that they sent to you;
some private information that was sent or received exclusively by email was made known to a third party, though neither you nor your correspondent shared it with anyone else;
if on your account activity log (if your email provider offers one) you see that your account was accessed at time that you do not remember or from a place (or IP address) that you did not go to.
In such situations you may want to take some cautionary action:
Stop using this email account for sensitive information exchange, at least until you understand the situation better.
Change your password as soon as possible. See our guide Know how to create and maintain secure passwords. In order to be able to change the password for your account (or for other accounts) you need to become familiar with how you do this on your email system, so that when you need to, you can do so quickly. Change password for all other accounts with the same or similar passwords as they may also be compromised. Use different and strong passwords for each account. You may also want to change passwords for all other accounts that you have. Consider using KeePassX to store and manage all your passwords. Change your security question answers (if you use them) for all accounts, so they are impossible to guess, or find the answer through researching information about you. This is a precaution in the case your computer was infected with spyware which would then put your other accounts at risk.
Enable two-factor authentication, if your email provider supports it, as a way to prevent anyone who may have obtained your password from accessing your account. Have a look at the Two Factor Auth website to see if your provider offers this feature. When signing in with two-factor authentication, you will be asked to present a single use code in addition to your username and password. Typically, this code will be sent to you (by SMS text message, for example) or generated using a separate application on a mobile device or computer. It will be different each time you attempt to sign in. You will not be able to access your account without it, but neither will anyone else. Google, Facebook and Twitter all provide helpful guides on how to enable two-factor authentication for their respective services.
If you are not able to log in to your account to change the passwords, consider getting in contact with your email provider to try to reclaim your account. Some email providers have special procedures in place to help users in such situation. It is helpful to know these procedures ahead of time.
Mitigate information loss and impact to your community. It is important to make a response plan. Knowing what sensitive kinds of information you had in your account and determining the persons with whom you exchange information via that account, decide whom you should alert and what other accounts you will have to revisit or close. Determine what services (web, financial, etc.) you need to revisit or cancel. It is important that you check the folders of your account (if you can) to research on what could have been sent from your account and to act accordingly. To inform your contacts you will need to keep a separate backup of your address book. Also review your account settings to see possible changes that has been made. Check accounts signature option for links and malware, forwarding options that would allow to copy emails that you receive to third account, away message, display name, etc.
Research how your account was compromised. Was it because of having a weak password, or due to malware infection, etc. The more you will establish about this, the better you will be able to respond to the situation and better you will be able to protect your contacts.
Consider avoiding storing read emails on the email server in your email account. Instead download them to your secured computer. Analyse security of the way you access your account and devices that you use for this.
It is important that you act quickly and precisely in the situation like this. Having prepared and rehearsed plan may help you.
If you suspect that someone is already monitoring your email, you may want to create a new account and keep the old one as a decoy. Remember, though, that any account with which you have exchanged email in the past may now be under surveillance as well. As a result, you should observe some additional precautions:
Both you and your recent email contacts should create new accounts and connect to them only from locations, such as Internet cafes, that you have never used before. We recommend this strategy in order to prevent connections from your usual computer, which may be monitored, from giving away the location of your new account. As an alternative, if you must login to your new account from your normal location, you can use one of the tools described in our guide How to remain anonymous and bypass censorship on the Internet, to hide these connections.
Exchange information about these new email addresses only through secure channels, such as a face-to-face meetings, secure instant messages or encrypted VoIP conversations.
Keep the traffic on your old account mostly unchanged, at least for a while. It should appear to the eavesdropper as if you are still using that account for sensitive communication. Presumably, you will want to avoid revealing critical information, but you should try not to make it obvious that you are doing so. As you can imagine, this may be somewhat challenging.
Make it difficult to link your actual identity to your new account. Do not send email between the new account and your old accounts (or the accounts of any contacts whom you think may also be monitored).
Be aware of what you write when using your new account. It is best to avoid using real names and addresses or phrases like 'human rights' or 'torture.' Develop an informal code system with your email contacts and change it periodically.
Remember, email security is not just about having strong technical defences. It is about paying attention to how you and your email contacts communicate with each other, and about remaining disciplined in your non-technical security habits.
Instant messaging, also called 'chat,' is not normally secure, and can be just as vulnerable to surveillance as email. Luckily, there are programs that can help secure the privacy of your chat sessions. Just like with email, though, a secure communications channel requires that both you and your instant messaging contacts use the same software and take the same security precautions.
There is a chat program called Pidgin that supports many existing instant messaging protocols, which means that you can easily begin using it without having to change your account name or recreate your list of contacts. In order to have private, encrypted conversations through Pidgin , you will need to install and activate the Off-the-Record OTR plug-in. Fortunately, this is a fairly simple process.
VoIP calls to other VoIP users are generally free of charge. Some programs allow you to make inexpensive calls to phones as well, including international numbers. Needless to say, these features can be extremely useful. Some of today's more popular VoIP programs include Skype (see below), Jitsi, Google Hangouts, and Yahoo! Voice.
Normally, voice communication over the Internet is no more secure than unprotected email and instant messaging. When using voice communication to exchange sensitive information it is important to choose a tool that encrypts the call all the way from your computer to the recipient's computer. It also best to use Free and Open-Source Software, preferably those reviewed, tested, and recommended by a trusted community. Taking above criteria we would recommend that you try Jitsi as your choice for VoIP.
Skype is a very common instant messaging and VoIP tool that also supports calls to landlines and mobile phones. Despite its popularity, several issues make this software not a secure choice. Some of these issues are described below.
While according to Skype, it encrypts both messages and voice calls, this would only happen when both communicating sides are using Skype programs. Skype does not encrypt calls to phone or text sent as SMS messages.
If both communicating sides are using (a genuine) Skype program, its encryption may make the call nominally more secure than an ordinary call over phone. But because Skype is a closed-source program, making an independent audit and evaluation of its proclamations about encryption impossible, it is thus impossible to verify how well Skype is protecting the users and their information and communication. Our guide How to protect your computer from malware and hackers addresses the virtues of Free and Open-Source SoftwareFOSS in the Keeping your software up-to-date section.
As mentioned, while we can't recommend Skype as a secure communication tool, it is very important to take some precautions if one still decides to use Skype as a tool for their sensitive communication:
Download and install Skype only from its official website www.skype.com to avoid a Skype program infected with spyware. It is important to always double-check the URL to make sure you are connecting to the official site. In some countries the Skype website is blocked, and/or several fake sites claiming to be Skype's official site are in operation. In many such cases, the version of Skype available is likely infected with malware designed to spy on any communication. Use circumvention tools described in our guide on Anonymity and bypassing censorship to connect to the Skype website and download a genuine version of Skype program whenever you want to install or upgrade to newest version of the software.
It is very important to change your Skype password regularly. Skype allows for multiple logins from different locations and does not inform you about the number of simultaneous sessions. This poses a big risk that if your password is compromised, anyone with that password can also be logged in. All logged sessions receive all the text communication and have access to calls history. Changing the password is the only way to disable such rogue sessions (by forcing a re-login).
It is also advisable to set the privacy settings on Skype so that it does not keep a history of chats.
It is recommended to disable the Skype setting which automatically accepts incoming files, as this has occasionally been used to introduce malware/spyware onto computers.
Always independently verify the identity of the person with whom you are communicating. It is easier to do this when voice chatting, especially if you know the person you want to talk to.
Decide if your Skype username should identify your or have any relationship to your real name, or the name of you organisation.
Always have alternative ways for communicating - Skype can become unavailable at any moment.
Be careful of what you say - develop a code system to discuss sensitive topics without using specific terminology.
Despite Skype's popularity, the above concerns make it questionable for a secure experience, and we recommend you start using tools like Jitsi for VoIP and Pidgin with the OTR plugin for secure instant messaging.
It is possible to achieve a greater level of email privacy, even with an unsecured email account. In order to do this, you will need to learn about public key encryption. This technique allows you to encode individual messages, making them unreadable to anyone but the intended recipients. The ingenious aspect of public key encryption is that you do not have to exchange any secret information with your contacts about how you are going to encode messages in the future.
This technique can be used with any email service, even one that lacks a secure communication channel, because individual messages are encrypted before they leave your computer.
Remember that by using encryption, you could attract attention to yourself. The type of encryption used when you access a secure website, including a webmail account, is often viewed with less suspicion than the type of public key encryption being discussed here. In some circumstances, if an email containing this sort of encrypted data is intercepted or posted on a public forum, it could incriminate the person who sent it, regardless of the content of the message. You might sometimes have to choose between the privacy of your message and the need to remain inconspicuous.
Public key encryption may seem complicated at first, but it is quite straightforward once you understand the basics, and the tools are not difficult to use. Simple, user-friendly and portable, the gpg4usb program can encrypt email messages and files even when you are not connected to the Internet.
The authenticity of your email is another important aspect of communication security. Anyone with Internet access and the right tools can impersonate you by sending messages from a fake email address that is identical to your own. The danger here is more apparent when considered from the perspective of the recipient. Imagine, for example, the threat posed by an email that appears to be from a trusted contact but is actually from someone whose goal is to disrupt your activities or learn sensitive information about your organisation.
In addition to the Riseup and Thunderbird Hands-on Guides, there are a number of websites that explain how to use your email program with various popular email providers while leaving a copy of your messages on the mail server: