Jump to content

Security Quick Reference Card

From Archive

Security Quick Reference Card - Print this. Laminate it. Keep it in your bag.

Emergency Contacts

\! Organization \!\! Contact \!\! Use For
Freedom of the Press Foundation Digital Security Team Technical help, training, SecureDrop
Committee to Protect Journalists Emergency Response Threats, detention, legal emergencies
Reporters Committee (RCFP) 1-800-336-4243 Legal hotline (24/7 for urgent)
EFF Legal Assistance Digital rights, subpoena defense
Your Lawyer (add your contact) First call if detained

If Device Is Seized/Stolen

First 5 minutes:

  1. Do NOT try to remote wipe yet (may alert adversary)
  2. Get to a clean device (friend's phone, library computer)
  3. Assess: Was device locked? Encrypted? What was on it?

Next 15 minutes (from clean device):

  1. Change email password FIRST (it's the recovery for everything)
  2. Change passwords: Signal, cloud storage, banking
  3. Enable lockout/logout all sessions on critical accounts
  4. THEN remote wipe if available (Find My, Google, etc.)

Source protection:

  1. If source names/contacts were on device → warn them via backup channel
  2. Assume all unencrypted content is compromised
  3. Activate pre-arranged emergency protocols with sources

Burn It All Checklist

If you need to nuke everything fast:

\! Priority \!\! Action \!\! How
1 Revoke all sessions Google/Apple account → Security → Sign out all devices
2 Change master passwords Email, password manager, cloud storage
3 Revoke app passwords Check Google/Apple for "App passwords" and OAuth grants
4 Rotate API keys GitHub, cloud providers, any dev credentials
5 Remote wipe devices Find My iPhone, Google Find My Device
6 Notify critical contacts Editor, lawyer, trusted colleagues

Signal Safety Numbers

Always verify safety numbers with sources:

  1. Open Signal conversation
  2. Tap contact name → "View Safety Number"
  3. Compare numbers in person or via separate channel
  4. If numbers change unexpectedly → DO NOT COMMUNICATE until verified

Quick Signal hardening:

  • Settings → Privacy → Screen Lock ON
  • Settings → Privacy → Disappearing Messages → Set default
  • Settings → Privacy → Screen Security ON (blocks screenshots)
  • Settings → Chats → Backups → OFF (or encrypted only)

Device Seized at Border

Your rights (US):

  • You can refuse to unlock (5th Amendment) but device may be seized
  • Citizens cannot be denied entry for refusing
  • Non-citizens: more complex, consult lawyer before travel

Preparation:

  • Travel with clean/burner device when possible
  • Cloud-only workflow: nothing sensitive stored locally
  • Log out of all accounts before crossing
  • Know your lawyer's number by heart

If they take your device:

  1. Get a property receipt
  2. Note officer names/badge numbers
  3. Do not consent to searches (but don't physically resist)
  4. Contact lawyer immediately after

Encryption Reminders

\! What \!\! Check
Phone Settings → Face ID/Touch ID → Data Protection enabled
Mac System Preferences → Security → FileVault ON
External drives Must be separately encrypted (VeraCrypt, APFS encrypted)
Cloud Assume NOT encrypted for law enforcement (they can subpoena)

Remember: Encryption only works if device is OFF. Locked ≠ encrypted.

Quick Threat Assessment

Before starting sensitive work, ask:

  1. What am I protecting? (sources, story, location, etc.)
  2. Who wants it? (subject of story, government, competitor)
  3. What can they do? (subpoena, hack, surveil, threaten)
  4. What's proportionate? (match protection to actual threat)

Muscle Memory Habits

Practice until automatic:

  • Lock device when leaving it (even for 30 seconds)
  • Verify links before clicking (hover, check domain)
  • Pause before posting (does this reveal patterns/location?)
  • Signal for sources (never SMS, never regular calls)
  • Disappearing messages (default on for sensitive contacts)

See Also

References


Security & Opsec
Crypto PGP · PGP Communication Guide · Key Management
Incident Security Incident Runbook · Threat Modeling · Account Recovery
Hardware Flipper Zero · HackRF · Yubikey
Culture Hacker Culture · Operational Security