SMS Privacy Tips for Election Monitoring And More

I was recently asked to contribute my thoughts on how election monitors using simple mobile phones could improve their safety and security when working in hostile environments. More specifically, the goal was to find techniques by which their use of SMS messaging to report back to a centralized service or team could be done in a more secure, private manner, that would make it more difficult for an adversary working against them to stop, block or track. All of this must be done without software or special hardware, instead just relying on easily teachable techniques.

Here’s the collection of tips and ideas I came up with on short notice. It is by no means complete, but I felt it would be useful to publish these to a wider audience here on my blog. Finally, before you say “well couldn’t criminals and terrorists use these techniques too?”, I will refer you to an excellent Abuse FAQ page from the Tor Project which covers this very topic (“Criminals can already do bad things. Since they’re willing to break laws, they already have lots of options available that provide better privacy than Tor provides”).

Now, on to the topic at hand…

Changing Your SIM Card
Often the first thing that comes to mind when people think about reducing tracking of their mobile phone is to change their SIM card. Unfortunately, changing SIM cards isn’t a reliable solution to stop centralized tracking because each phone also has an IMEI (http://en.wikipedia.org/wiki/International_Mobile_Equipment_Identity) that uniquely identifies the underlying phone hardware itself. This means that even if you change your SIM card, the phone’s unique identifier can still be tracked. Still a new SIM card would change the phone number that is displayed or logged on the receivers phone, which could buy someone time or throw off a lazy investigator.

You can check your IMEI by typing in: *#06# or something similar depending upon carrier or phone. There are a number of cheap Chinese phones on the market in some countries that have an IMEI of 000000000000, which can come in handy if they are those types of things available. It is illegal in most countries to change the IMEI or to use a phone with an invalid IMEI.

Airplane Mode Ain’t Just for Airplanes
If their phone has “Airplane Mode” or a way to disconnect from a network or manually choose a network, that usually works as well as taking the battery out. This is useful if they still want to take pictures, notes, record message, queue up SMS messages to be sent once they reconnect in a different location from where the data was captured.

To step back a bit, it is important to understand, that mobile phones are always in constant contact with the cellular towers in the area. As you move about, your phone is in constant negotiation with different towers to connect to the best single, check for incoming calls, SMS message and so on. In addition, the server provider is checking your identifiers to make sure your phone is valid to work on the network, that you have an activated account, that your hardware isn’t blacklisted (aka stolen, etc), and so on. In summary, even if you aren’t using your phone, your phone is being tracked for operational and billing purposes, not necessarily malicious. However, it must be understand that this same data can be used by authorities for whatever purpose they like and is legal in the current country or context.

In theory, if you put your phone into “Airplane Mode” all signals emanating from your phone are stopped.

Complicating Monitoring by Turning Text into Pictures
If picture messages or MMS is available, write a message/code on paper and take a picture of it instead of sending it as text. Harder to automatically filter/monitor, and that the small resolution on the screen harder to read… if they can get the message on a PC on the receiving end, it can be zoomed up, but if the sender is stopped by local authorities, they may not see it.

In addition, picture messages of colors can also be a code:

  • Blue Sky = “okay”
  • Red Sign = “problem”
  • Brown Dirt = “Ballot Stuffing”

Your Very Own Secret Code
Come with a very basic text code that say involves ten digits, with each different representing 0-9 of possible states.

  • 0-9: how long is the wait (in hours)
  • 0-9: how bad is intimidation from militia (scale)
  • 0-9: how good is the turnout (scale)
  • 0-9: general code (0 = no problems, 1 = polling place closed, 2 = armed men outside, 3 = riot, 4 = no ballots available)

could then result in a code:

  • 2190 <— this would be a pretty good polling place
  • 9912 <—- this would be a report of trouble

You could easily write this on piece of paper and take a picture of it as well.

Again, this type of code would just look like gibberish at the local level, and perhaps buy some time at a state surveillance level until they got their own copy of the code. At the least you would be making them work some more to figure it out, and make them less able to filter by keywords.

Mobile Pyramid Scheme aka Improved Autonomy
Local groups can send to one local person, and then that person can forward each message to another level up the tree and so on. This would enable a bit more protection than all field election monitors texting to a centralized number. It introduces some other issues around reliability of the data and complexity of the process, but in exchange you help foster autonomy and decentralization, two great tools to improve safety and privacy in your overall network.

Managing What Gets Logged
By default, phones tend to log and track everything you do, in the name of convenience. This includes all the text messages you send. The problem is that if a person is detained, it can be difficult to quickly delete those messages before the detainers take away the phone to see what they can learn from it.

Most phones offer a way to NOT save outgoing SMS messages and also to potentially delete inbound after they are read. This feature should be utilized. In addition, numbers should be memorized and manually entered, instead of stored in an address book.

More Ideas?
If you are reading this post and have your own thoughts or firsthand experience to contribute to the discussion, please add them using the comment section below. I will make sure the right people see this information. Your insight and creativity can make a difference!

19 comments

  1. A few suggestions:

    1) How about making use of one or more SMS gateways ?

    http://en.wikipedia.org/wiki/SMS_gateway

    These are akin to internet proxy servers.

    They are normally set up for commercial convenience e.g. for mobile workers who want to advertise a landline office phone number, but actually pick up and send calls via their mobile phones.

    Others are set up to exploit small differences in voice or SMS tarrifs between different mobile phone network providers.

    Others, especially in combination with Voice over IP, offer potential savings on international phone calls. Effectively these are a sort of dialback system so that calls are made to originate from countiries like the USA to say India, which is much cheaper than the same call between two numbers from India to the USA.

    From an SMS privacy point of view, the operators of such services are often too small to be required by law to keep logfiles of their interconnects between different networks. Very often the equipment they use is physically incapable of such logging, even if they wanted to.

    You could set up your own SMS Gateway with a couple of mobile phones connected to a PC. You could make things even more difficult to track by using two PCs, at different location or even different countries, connected to each other by an encrypted Virtual Private Network connection

    2) Do not rely on one single mobile phone network for SMS communications, unless there is only a local monopoly.

    3) Pay real money for any web based SMS text sending or recieving service. Do not be cheapskates like the activists in New York, during the Republican Party congress when George W. Bush was re-elected, who moaned about “police censorship” and time delays delays of SMS text messages during fast moving demonstrations and protests, but who had simply overloaded the low bandwidth “free” service they were relying on.

    4) Make use of Twitter and other web accessible social media systems such as mobile phone blogging services, which allow you to send updates via mobile phone SMS and / or WAP or other “real” internert email.

    6) Set the on power and keyboard lock PIN codes on your mobile phone handset. This will not prevent it (or the centrally held mobile phone Call Detail records and other Communications Traffic Data, including Location Based Services data and “friendship trees” of who called who, when and for how long) from being examined by the police etc. if they arrest you etc. but it will probably deter them from illegal or just “nosey” snooping whilst you are being searched for “security” reasons.

    7) Memorise or write down on paper or a business card, the contact details of your lawyers or legal advisors (with 24/7 contact phone numbers etc. This information is of little use to you if it is only in your mobile phone handset's address book, since if you are arrested, you will almost certainly no longer have access to the handset.

    8) Do not neglect basic physical and computer and mobile phone security issues in all the planning meetings , emails and phone calls in the run to the actual election.

    See:

    Technical Hints and Tips for protecting the anonymity of sources for Whistleblowers, Investigative Journalists, Campaign Activists and Political Bloggers etc.

    http://ht4w.co.uk

  2. Most elections are very long days and the counts can go late into the night.

    Make sure that you have enough spare batteries and / or mobile phone chargers to last the whole time that you are on election monitoring duty.

  3. Thanks for the awesome addition to this post. Great thoughts… Beeping is such a fun hack. I think it is an idea that needs to spread.

    You also reminded me re: PIN lock, about SIM card PIN locking, which is a feature few people take advantage of (I do however!):

    http://www.timeatlas.com/cell_phones/general/un

    Protecting SIM Data with a PIN Lock

    Most GSM phones provide the option for people to save contact information to the phone or to the SIM card. Saving your addresses to the card has advantages. The first is that if you stay with the same carrier, you don't have to re-key your contact phone numbers. Even if you change carriers, you can get a SIM card reader and software that allows you to manage the data.

    Another advantage to saving contact information to the SIM card is you can protect your data using a PIN lock. Many phones have a setting for a phone lock. A phone lock simply protects someone from using the phone. But, if your phone was lost or stolen, someone could remove the SIM card and use it unless it is locked. This is an added layer of protection.

    Each SIM card comes with a default PIN that is set by the carrier or manufacturer. Sometimes the default PIN is in the documentation or is set during the activation process. If you have enabled the SIM Lock feature and don't know the PIN, don't guess. Most cards allow three mistakes and then require you to enter a PUK code. Until you enter the PUK (personal unblocking key) code, the phone is inoperable. Your carrier can tell you the correct PUK code to unlock your card after they've verified you're the account holder.

  4. Most cellphones have a code that can be used to do a “factory reset”. Codes can look like “#2645* and press call” and if you are in an unsafe area, this can be good to do. Whether you get kidnapped by police or by random crooks, having no numbers in your phone might help you get a fairer treatment.

  5. I think most of the people don't know about this thing…
    This is really an informative post for sharing..

  6. Gret post. I have been working with elections in several countries and election monitoring is a big issue. I suggest you, if possible, to talk with National Democratic Institute (NDI) and with The International Foundation for Electoral Systems (IFES).

  7. You’ve
    met them. You probably even have a few in your family that you see at
    barbecues every summer. It’s the 65 year old uncle that has the memory of an
    elephant and can recall small details from events in the 1950’s. Perhaps you
    have a relative that can quote specific dates from their childhood, or even
    experiences they had overseas in another “life.” If you are like me, you wish
    that you had a magic formula to improve your memory power to have the same
    abilities as these impressive individuals. Well, I’m here to tell you that
    with the tips I’m going to give you in this article, you’ll have the
    information to improve your memory, and you can get started right

    [url=http://www.rmt-iroiro.jp/rmtbuy/TERA.htm]TERA RMT[/url]

    [url=http://www.rmt-iroiro.jp/rmtbuy/c9.htm]C9 RMT[/url]

    [url=http://www.rmt-iroiro.jp/rmtbuy/GE-GranadoEspada.htm]GE
    RMT[/url]

    [url=http://www.rmt-iroiro.jp/rmtbuy/Forsaken-World.htm]FW RMT[/url]

    [url=http://www.rmt-iroiro.jp/rmtbuy/dragonnest.htm]ドラゴンネスト RMT[/url]

    [url=http://tera-rmt-vip.blogspot.com/]tera rmt[/url]

    [url=http://terarmtban.exblog.jp/]tera RMT ban[/url]

    [url=http://teraban.exblog.jp]tera RMT アカウント[/url]

    [url=http://teraest.exblog.jp]tera RMT est[/url]

    [url=http://terasonic1.exblog.jp]tera RMT sonic[/url]

    [url=http://rmtsonicgame.blogspot.com/]SONIC RMT[/url]

    [url=http://mugenrmt-sonic.blogspot.com/]アラド戦記 RMT[/url]

    [url=http://rmt-dream.blogspot.com/]アラド rmt[/url]

    [url=http://www.rmt-iroiro.jp/rmtbuy/Arad.htm]アラド戦記 RMT[/url]

    [url=http://www.rmt-iroiro.jp/rmtbuy/Arad.htm]戦記 RMT[/url]

    [url=http://www.rmt-iroiro.jp/rmtbuy/Arad.htm]アラド RMT[/url]

    [url=http://www.rmt-iroiro.jp/rmtbuy/Arad.htm]arad RMT[/url]

    [url=http://www.rmt-iroiro.jp/rmtbuy/Arad.htm]arado RMT[/url]

    [url=http://rmtsonic.exblog.jp]tera RMT sonic[/url]

    [url=http://sonicrmt.exblog.jp]tera RMT sonic[/url]

    [url=http://terarmtfast.269g.net/ ]Tera rmt テラ [/url]

     

  8. tera RMT アカウント  tera RMT
    est   tera RMT sonic   SONIC
    RMT   アラド戦記 RMT  アラド rmt   アラド戦記 RMT   戦記 RMT   アラド RMT  arad RMT   arado RMT  tera RMT
    sonic  tera RMT sonic  Tera rmt テラ    

Leave a comment