Moar #Anonimity Stuff by #Anonymous http://anoncentral.tumblr.com/post/11733497886/moar-anonimity-stuff-by-anonymous Welcome to anonymous activities: This document is designed to give you a basic tool kit for protecting your identity while performing anonymous activities. It is not designed or intended for use as a toolkit for breaking the law, and any use in that fashion is condemned. It is designed to prevent foreign government or corporate hostiles [referred to here as hostiles] Further to this I will need some time to compile a basic set of useful tools and processes that will help you to remain anonymous, so please be patient. Any contributions both technical and social would be appreciated: Technical and social security in communications: If you need to make private calls do not use a contract mobile phone or landline. Even if you replace the SIM chip in a mobile it can still be tracked back to you. Inserting a new SIM chip will change the number of the phone, but not the MAC address. This is the underlying device ID on the frame relay network. If you need to talk to people regularly in a private environment then use external phones, [be aware that most phone boxes are tagged by the police in certain areas due to drug dealing, so might not be as anonymous as you think]. The only way to truly guarantee your identity remains secret is to use cheap [cheap enough to throw away] pay as you go mobile phones. Buy these with cash. When you buy them do not look up at any cameras and disguise your face. Surveillance cameras in shops are usually mounted above eye level, but to not assume that this will be the case. If you are buying something that you donât want to be traceable, wear something that disguises your features and breaks up the shape of your face. Face recognition software works by creating a map of your features as distances between selected points, i.e. the distance between your eyes, the width of your eyes, the distance from your brow to the tip of your nose, from your nose to you lips, etc. The more of this you can break up the better, but you also donât want to look so extreme that resemble a criminal robbing a bank, or indeed the shop itself. Also getting someone else to buy the phones for you, for instance a homeless person is another useful strategy if you can be sure that the buyer is not themselves a target of surveillance. Learn the signs of hard drug use as many homeless people will be hard drug users, and that will increase the likely hood that they are also drug runners, and make them less trustworthy. This is not prejudice, but based on experience. A drug runner acts as the middle man between the dealer and the buyer, and takes groups of drug users to predetermined place. Drug runners will often be identifiable as putting themselves forward to do you a favour. On the whole if you are approached by a homeless person they are either a stinger [someone selling empty or wraps, or counterfeit drugs] or a runner. Either way you will attract attention, and you will also probably lose your money. Learn to remember distinctive characteristics of the people you see on the streets. Homeless people will often ware the same cloths, hats, etc. from day to day. Do not go back to the same person, but instead stake out potentials. An easy way to do this is by simply giving a beggar, busker, or big issue vendor a small amount of money. This will allow you leeway to start a conversation and asses any risk. Understanding the mentality of a drug addict takes practice, they will either be eager to leave [because they have made their target amount of money, usually the cost of a snow ball], or they will keep you talking and spin out a bleeding heart story, often about needing to makes a certain amount of cash to get into a hostel, or buy food. This is most likely not true, all hostels in this country are free and there are a lot of food distribution centres. You can usually tell a genuine homeless person by the state of their hands, which will be dirty, although people in hostels might not wash or bath, itâs actually quite difficult to keep your hands really dirty, and rough. Also truly homeless people will more than likely have a bag of cloths and bedding [ Contrary to popular belief homeless people do not hide bedding as it is too valuable]. Also a lack of track marks on someoneâs arms is not an indicator that they do not use and traffic narcotics. A lot of homeless people hit up in the main vein in the groin precisely so that they can wear t-shirts during the summer. If you are going to use a homeless person you are better off choosing clean looking, slightly overweight, and possibly foreign man selling the big issue. They are less likely to be a runner, and therefore less likely to be under surveillance. Really heavy drinkers will also usually be barred from most shops anyway, or have ASBOâs against them for most major central commercial districts, they are likely to be stopped and will definitely point a finger in your direction to avoid arrest, this will draw attention to you. Also beware of homeless shoplifters as they are simply not to be trusted. If you are buying the phone off them directly it will probably be stolen and they are likely to be under surveillance for that very reason. This is information is presented as is, and is based upon personal experience in the UK, and for the basis of identifying reliable contacts that can be used in the UK homeless community. Mobile Apparatus: If you can, try to buy an activated phone with time on it. There are a number of ways that you can do this. On has been outlined above. Homeless big issue vendors will often have mobiles which they will be willing to sell [Make sure that there is actually air time on the phone]. Note that this apparatus will most likely have been used to contact drug dealers. Familiarise yourself with the main methods the means of evaluating the amount of air time available on the main networks for pay as you go networks for the country that you are operating in. This will most likely be a set of numbers, do not trust apps that count available minutes as these can be reset. Managing data communications: Using free wireless locations such as book stores, Starbucks, McDonaldâs directly should be avoided. It is the first place that people will look for you because the signal origination point will be tracked to that location, also they will have cameras. If you must use those services, do so from a spot that is within range, possibly from a parked vehicle, and only for short periods to send and receive mail. Small portable Wi-Fi devices are also useful for this if you can swap them out frequently. Try to get devices that use memory cards as this makes it easier to store data directly onto them for reasons explained in the next paragraph. If you need to swap out machines make sure that you clean the machine first, both physically, and eradicate the data, then dispose of it. The easiest way to do this is to minimise the amount of data that is stored on the machineâs drive. Use a memory dongle as a virtual drive for data, and use a login directory for all other services such as temporary internet files. Most modern operating systems will do this by default if you provide a user logon, which will allow you to clean the data by using drive wiping software to overwrite the data partition for that user. Do not simply delete the user directory. This will only remove the file descriptor, but not the data. Top make the data unrecoverable you need to use a utility to overwrite each disk sector used by the file and directory structure. Using windows have a lot of convenience for removability, but is inherently insecure. The following link will give you the software you need for that OS. Disk Wipe 5.1 is freeware, and does not need installing. You simply need to download it and execute it: http://www.bestfreewaredownload.com/freeware/t-free-disk-wipe-freeware-rdtawfxk. html If you are using Linux then Wipe is a good utility: http://sourceforge.net/projects/wipe/files/ Mac users can get a freeware utility from http://www.supershareware.com/disk-wipe-for-mac-free/ Try to use disposable dongles rather than Wi-Fi enabled laptops. The Wi-Fi can easily be disabled on a machine, and the dongle used in its place. This means that the MAC address layer will reside with the dongle, and not the machine, and will allow you to swap out connection devices rather than the whole machine which is costly and dangerous as it draws attention to you. Data Security: The best way to insure that any data that falls into the wrong hands canât be accessed is to use an encryption utility such as PGP [Pretty Good Privacy] which is available on most machines. It will most likely come as a compressed file like a .zip or .gz file, and you may need the relevant utility to open it. Latter versions of windows have ZIP compatibility built into the file browser [Windows Vista onwards] but an unzipped is easy to get hold of and free. http://www.pgpi.org/products/pgp/versions/freeware/ PGP is a public private key encryption utility that also comes with a file shredder, this does the same job as a disk wiper, but for a single file and is an easy way to create encrypted documents, and shred the originals. Information on how to use the software can be found at: http://www.pgpi.org/doc/ Microphones and communications: The following links give detailed information about how sensitive microphone technology works and are good links for other technical resources. http://www.wisegeek.com/what-is-a-directional-microphone.htm http://en.wikipedia.org/wiki/Microphone Outside communication is easy to pry on through directional sensitive microphones. There are several types, but three basically recognisable ones: Parabolic microphones: This type uses a reflective dish in the same way as a radio telescope to amplify the incoming noise and focus it into one place where the actual microphone capsule is placed. They are often controlled by a laptop computer, but are available as hand held highly portable devices. Shotgun: This type is an inherently directional and sensitive microphone, so named due to its length. They are usually hand held using and grip mounted and used with a sighting device. Laser Microphones: These fire a laser beam at a window [or other sound surface] and use the disrupted returning beam to record the sound. These require a site to site level deployment to work as physics dictates that a beam cannot be returned at an angle. Personal Microphones: These are devices that are usually placed in an object such as a pen or any object large enough to contain both the microphone capsule and the transmitter. Frequently these will be digital and scrambled so as to protect the output from covert hostiles working against both you and the people monitoring you conversations. Basic Anonymous communications protocols: Nothing can totally guarantee that what you are saying will remain private, but you can minimise the risk of monitoring by hostiles. Most forms of covert listening devices require a stationary target, or one that can be tracked through a space by a number of hostiles with listening devices coordination surveillance. This does not include personal microphones, which are planted on the target and generally have a rage of between 1.5 and 3 Km. The receiver does not have to be large for such a device, and could easily be something the sizes of a cigarette packet or an MP3 player. To prevent being listened to by external directional devices chose urban spaces, and randomly vary them, if someone knows where you are going to be [i.e. if you go to the same place to make a call] then they can easily set up a listening operation. An open space such as a park is actually easy to monitor because it provides a boundary where hostiles can deploy listening equipment. If you are involved in any operation where you will be performing activities that hostiles might wish to listen in on be careful with personal possessions. Limit the number of items that you carry, and be aware of the origin of those items, i.e. do not pick up pens from hotel rooms, or carry around gifts from people that you do not know and trust. If you are offered things like pens accept them, but get rid of them, or at the very least examine then carefully. Refusing a simple offer of a free pen by someone like a car rental clerk will simply arouse suspicion. Internet Browsing: When browsing the internet be aware that your activities are usually tracked by sites such as Facebook for marketing purposes, but as we have seen through âMetal Gearâ there is an effort on the part of security companies to obtain information on the use of social networking sites, and it is very probable that they are already acquiring Facebook data. If your using Google Chrome a plug in exists that will prevent Facebook from obtaining data about where you click through called âFacebook Disconnectâ which will do the job. Simply click the âSpannerâ icon in the far right corner->Tools->Extensions at the bottom of the screen is a link âGet more extensions »â Click on that, find the tool and press install. Protecting your friends and contacts list: Why do this: To avoid unfriendly or hostiles from gaining information about friends and contacts, although this wonât stop a determined hacker it will protect you from idle mischief makers getting their hands on your list of friends and using them to discredit you, harass then, or generally sent rude or abusive messages to people you know. Remember that Facebook is a social site and you probably have sensitive contacts about your family. In Facebook go to Account Settings->Privacy Settings On the âChoose your privacy settingsâ Page you will see a blue highlighted link Go to the âSee your friend listâ setting and set it to âonly meâ Another option is to create a new email account [Microsoft Live allows you to have multiple account connected to one main account] then use that account for Anonymous Activities. Again, though this is slightly more secure, a determined hacker can still get you real identity from your email address. Measures to prevent this will be covered in detail when I have more time, or when other people start posting information. Thank you ââââââââââââââââââââââââââââââââââââ- From now on any technical information that can be show to be valid [That can be replicated, or is accompanied by some form of proof via a link will automatically be included in this document. I cannot guarantee that everything will be 100% accurate as I do not have all platforms on which to test every surjection, but if another Anon says that it works, backs it up with evidence, thatâs good enough. I do this only in the hope that it is useful.