Keep Your Sources Safe In The Age Of Surveillance

Keep Your Sources Safe In The Age Of Surveillance

23.2.2022 | 05:19

Surveillance is now so commonplace that it’s likely Russia was implicate in the conspiracy to influence election fraud. In the 2016 United States presidential election, and, at the very least. One of his officials heard working with them.

It’s not just politicians who who being monitor. Edward Snowden’s revelations in 2013 about the National Security Agency’s extensive surveillance have demonstrated. That today everyone must be considering privacy and security.

This includes academics, many of whom are conducting extremely sensitive, and even dangerous research. How do we conduct our research safely and ethically in this age of surveillance and hacking on the internet?

Making Use Of Surveillance Your Own Research

This issue is especially relevant for scholars working on peace and justice organizing Recent leaks show. That military (or or the police) could not just be studying your work but they may also be monitoring. Your online activities, observing your movements, and watching your conversations.

The files that have been expose by the IT security firm The Hacking Team confirm. That its software extensively use across the globe to monitor conversations. That are happening in a space with the use of a mobile phone even when it’s off. This exposes the ethically threatening possibility that your work could be use. To weaponize by people with guns to cause harm.

Geographers are especially at risk from this danger. In 2007 the American Anthropological Association denounced the US Army’s Human Terrain Systems. Which includes social scientists within military units located in Iraq and Afghanistan and is an unacceptable application of anthropological expertise. Since that time the US military’s efforts to understand and manage. The human terrain have changed to the field of geography.

Controversial Surveillance Phrase

Even the controversial phrase human terrain has been frequently replace with human geography. In the process, we have seen a growing trend of geoscientists receiving military funds to conduct research, usually through front organizations like the Department of Defense’s Minerva Research Initiative.

The new military preference for geographers was further boost by it was reveal that the American Association of Geographers (AAG) has been unable to investigate an army-related scandal. Researchers headed by Peter Herlihy at the University of Kansas who were conducting participatory mapping with indigenous communities located in Oaxaca, Mexico, failed to reveal the source of their US military support and the possibility of sharing their research findings with their sponsors.

This a good idea everywhere but it’s particularly a problem in Oaxaca The US military probably share specific GIS details about Zapoteco groups to the Mexican military who has for a long time repress the indigenous communities. In the beginning of April 2017 the AAG eventually agreed to create an study group to look into the relationship to their discipline with US, UK and NATO military forces.

Research Surveillance Hack

Even the case that you’re an academic who does not accept military funding the results of your research could be include in the vast databases of the military and you didn’t even know it (the research paper isn’t likely to found in Google Scholar). Google Scholar search).

Karen Morin of Bucknell University For instance, she found that her article on the interpretation of landscapes had been mentioned in an Marines operational manual. The subject of the chapter: understanding the landscape’s cultural significance correctly could help troops immediately manage an area upon arriving.

It’s very difficult to trace this type of infringement from your own work. However, it is possible to be aware of this when you publish. Consider who could be interested in this information? And could it be used for harm?

Academics must also be aware that research data could also be compromised. I discovered this by accident in the event that the email account for the Fellowship of Reconciliation, a group I was conducting research and regularly communicating with, was breached by Colombian intelligence, and their emails were used to prosecute an activist for human rights with fake allegations.

Be Safe For You

These steps will help you avoid your data from being similarly compromise and used for a petty crime. Include two-step verification in your email. For Gmail just select this option in the preferences section under security. Then, when you sign in on your new computer, it will prompt for a code to that text to your mobile. You can also download a list 10 backup codes that you can make use of when you’re not connect to cellular.

Make sure that your computer is encrypt. If you want to be more realistic you can encrypt a specific directory on it. This is where you’ll store your backup codes, as well as other important information. Be aware that encryption can slow older machines down. Also , make sure to encrypt your data each when you make a backup and enable two-step verification for backups.

Take your phone off the table. You can record long interviews with most phones. However, if you believe that the content of the interview might use in any way by anyone, but especially by actors who are arm, consider using the small digital recorder.

Break From Your Mobile

Take a break from your mobile. Turning off your mobile isn’t enough. Hackers can listen to conversations that are not record. The best option is to keep the phone out of your room. Remember to bring an additional timer if you typically depend on your mobile for this.

Dispose of the evidence. When you take field notes in hand then take a photograph of them. Then save the pictures behind encryption and then destroy your hard copy duplicate. Do I sound suspicious? Many researchers, in the end they aren’t undertaking James Bond-like adventures.

Consider what you like Recent revelations show that the governments of the globe have bought software that can listen to conversations happening in the room via your phone.

Community organisers as well as political activists, scientists who are rogue, environmentalists and indigenous rights activists whom we regularly discuss in the course of our research may become victims of government reprisals.

Due to the vast amount of surveillance as well as the increasing use of technology in research, we should be cautious. What constitutes ethical research has evolved, and this should be evident in our research practices and methods classes.

Comments are closed