Skip to main content

Many organizations are facing a new reality that areas they operate in are now in high-risk or conflict zones. Ensuring personal security of personnel in any environment is paramount, but even more pertinent in precarious environments. A critical component of physical security is safeguarding each person’s digital footprint with respect to mobile connectivity, apps, and other connected services.

Drawing on decades of experience, Global Integrity understands electronic tradecraft and recommends organizations take a closer look at how they implement a secure mobile deployment strategy for remote personnel.

Drawing on the expertise of security professionals that have supported operations around the world, the following is a minimal checklist to ensure personnel have the communications tools and mindset needed to mitigate risk and encounters with bad actors.

  • Utilize a ‘clean’ used phone: Buy SIMS from a wholesale distributor, same with phones – cash only – no credit card or purchase order.
  • Setting up a ‘clean’ used phone:
    • The manufacturers’ standard apps (Google, Samsung, Apple – the others stand out)
    • A Secure Voice and Secure Messaging app – avoid apps that collect personal or device information – that meta data becomes a weapon
    • A banking app from the current location – does not need to be active, just installed.
    • Travel apps – local airlines, international airlines, currency converter, hotel apps, etc.
    • Social media apps – Instagram (not active) and tik-tok (not active)
    • 200-500 pictures (just download from the web – make sure not culturally insensitive to the area you are operating in)
    • Use a free VPN such as Proton VPN, freevpn.me, Windscribe (none are great, but they will work for the purpose) or create your own with amnezia!
    • Install DUCKDUCKGO – it automatically blocks trackers from most apps
    • Turn off location services
    • Try to avoid using Bluetooth. It can be intercepted, and it can be used to install malware.
    • Turn off the Wi-Fi when not being used. It is easier to track you than with GPS, and it can be used to install malware even when you are not using it
  • Be vigilant and aware of physical surroundings (not just people standing nearby but cameras and potential listening devices).

In addition to the aforementioned tools and techniques, developing a communication plan is imperative when operating in high-risk areas (which may be some city center or a battle area). Timely check-ins are important to stay connected. Also having trusted, local resources that are knowledgeable about local developments, geography, and any other important details to operate without friction.

Global Integrity has resources with tremendous expertise in electronic tradecraft that are available to assist. Contact us now at info@globalintegrity.com.