Security

September 2017

August 2017

Digital Security Action Items

By |2017-08-24T15:06:28-07:00August 24th, 2017|Categories: Security|

So our goal isn’t perfect digital security. That’s impossible what the woods are for!

But what is our goal? I say, let’s make it hard for nazis, cops, and mercenaries to get all internal movement comms and adorable puppy photos. Make it so they need Seth Green from Enemy of […]

How to Browse the Web Anonymously

By |2019-11-04T19:08:04-08:00August 16th, 2017|Categories: Articles, Security|Tags: , , , , , |

DreamHost, a web-host, has revealed that they are fighting the US government warrant requesting all information about every person who has visited the website www.disruptj20.org. Such information could include all subpages of disruptj20 that you surfed, how often you did so and the complete text of anything you might […]

What happens to deleted emails?

By |2017-08-07T17:32:54-07:00August 7th, 2017|Categories: Security|Tags: |

In response to a question to the Digital Security for Activists program:

How secure is it to delete email and other internet documents? Who owns the deletions– the email provider, the ISP, the owner of the server/hardware? The person/entity who wrote it? The person/entity who received it?

After deleting an email, you […]

January 2017

Security Recommendations

By |2023-07-10T09:37:46-07:00January 15th, 2017|Categories: Security|Tags: |

While there is no way to be completely immune from surveillance, following our advice below will keep you and your comrades much safer. We will be updating this page with more guidance on how to most effectively organize in an age of widespread electronic surveillance. Stay tuned!

Developing Good Digital Security Culture

By |2019-06-28T10:58:26-07:00January 1st, 2017|Categories: Security|Tags: |

Liberation-focused activists who intend to succeed in their work should expect active disruption from well-resourced State and corporate adversaries. Powerful digital organizing tools (instantaneous, global communications, social networking, GPS and digital cameras) can be readily turned against activists and systematically used to surveil and disrupt activist communities. Through our new Digital Security for Activists program, CLDC aims to provide advice and trainings to empower you to up your digital security game.

Title

Go to Top