Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:00,510 --> 00:00:06,450
This section is more for political dissidents freedom fighters journalists whistleblowers and those
2
00:00:06,450 --> 00:00:10,270
that seriously need non-attribute into their real identity.
3
00:00:10,290 --> 00:00:17,040
The first step in establishing effective OPSEC for maximum anonymity is to set up your environment and
4
00:00:17,040 --> 00:00:18,240
identities.
5
00:00:18,240 --> 00:00:23,400
The more serious your adversary and the consequences the more serious you take OPSEC.
6
00:00:23,430 --> 00:00:27,990
You will need separate security domains per identity.
7
00:00:27,990 --> 00:00:33,360
If you don't know what that means go to the section on security domains and understand that separate
8
00:00:33,360 --> 00:00:38,660
security domain Pyrrha identity even the configuration of your browser.
9
00:00:38,950 --> 00:00:46,020
The browser fingerprint can tie identities together so you need to have separate browsers and you achieve
10
00:00:46,020 --> 00:00:47,500
this through isolation.
11
00:00:47,580 --> 00:00:53,480
In the section on isolation on compartmentalisation we talk more about how to achieve this.
12
00:00:53,610 --> 00:00:58,280
So remember your identities need isolation and compartmentalization.
13
00:00:58,290 --> 00:01:04,620
They need their own separate security domain so that everything technically is separate and it relates
14
00:01:04,620 --> 00:01:05,550
to them.
15
00:01:05,550 --> 00:01:08,760
The browser is different maybe the operating system is different.
16
00:01:08,790 --> 00:01:10,280
The cookies are different.
17
00:01:10,300 --> 00:01:16,890
Conses security controls as we go through the course as to which is appropriate for each identity.
18
00:01:16,890 --> 00:01:24,660
After you have security anonymity services and compartmentalisation setto which you will understand
19
00:01:24,660 --> 00:01:31,860
through going through the course you then need to establish a cover a cover is a character or identity
20
00:01:32,040 --> 00:01:35,210
who will appear to be responsible for your actions.
21
00:01:35,220 --> 00:01:39,210
This person takes the heat when the walls start closing in.
22
00:01:39,210 --> 00:01:41,110
You need your own Keyser Soze.
23
00:01:41,190 --> 00:01:46,440
And if you don't understand that reference then your home for today is watching the movie The Usual
24
00:01:46,440 --> 00:01:49,890
Suspects and understand who Keyser Soze is.
25
00:01:49,920 --> 00:01:51,570
You need your Keyser Soze.
26
00:01:51,990 --> 00:01:58,440
Using anonymizing services like we discuss in Section anonymizing services Nesta VPN and Joan Dunham
27
00:01:58,470 --> 00:02:04,710
tall etc. and the security control detail throughout the course to stay anonymous you need to establish
28
00:02:04,710 --> 00:02:11,730
the account you need establish fake Twitter Facebook G-mail for McCown's whatever accounts you need
29
00:02:12,080 --> 00:02:17,850
for your private anonymous activity relating to the new alias you are establishing.
30
00:02:18,120 --> 00:02:19,980
Even fake photos are great.
31
00:02:19,980 --> 00:02:27,180
Create supporting evidence to your alias for inspiration you can have a look at this site here.
32
00:02:27,210 --> 00:02:28,560
Fake Name Generator.
33
00:02:28,590 --> 00:02:36,840
If you log in via a fake Google account you can view full Social Security numbers say profiles for later
34
00:02:36,850 --> 00:02:36,890
.
35
00:02:36,930 --> 00:02:44,640
You should use a secure method like last pass or other secure identity manage to store the information
36
00:02:44,700 --> 00:02:46,750
on each alias profile.
37
00:02:46,790 --> 00:02:56,070
And if you look here you can select the agenda select the name sir isko it Dortch Wales and select the
38
00:02:56,070 --> 00:02:59,480
country in the United Kingdom.
39
00:02:59,540 --> 00:03:08,340
Generate and they should give you inspiration and an idea at the sort of information you need for a
40
00:03:08,340 --> 00:03:10,950
real Aliase is not just a name
41
00:03:15,050 --> 00:03:22,200
that you put in on a bit of y as foreign as just your alias and note carefully what your alias is used
42
00:03:22,200 --> 00:03:24,690
for and how you access it.
43
00:03:24,690 --> 00:03:29,020
Do you access it via VPN X using Virtual Machine y.
44
00:03:29,190 --> 00:03:32,660
You must always use those to access that alias.
45
00:03:32,880 --> 00:03:38,430
Let's dig a little deeper if you wish to always stay anonymous against a serious adversary to create
46
00:03:38,490 --> 00:03:39,930
an entire person.
47
00:03:40,020 --> 00:03:41,310
You can embody a.
48
00:03:41,550 --> 00:03:46,450
So you never make the mistake of referencing something personal to yourself.
49
00:03:46,470 --> 00:03:48,230
Establish the alias's gender.
50
00:03:48,270 --> 00:03:53,330
Like I've shown you location job hair color height weight.
51
00:03:53,370 --> 00:03:59,760
Even if they have tattoos or piercings everything you must inhabit this character so you never provide
52
00:03:59,760 --> 00:04:06,380
profiling information just talking about the weather in your location is enough to locate you when you
53
00:04:06,380 --> 00:04:08,010
are in character.
54
00:04:08,010 --> 00:04:09,430
Become the character.
55
00:04:09,480 --> 00:04:11,120
Never fall out of character.
56
00:04:11,280 --> 00:04:16,160
Which means they have to be someone that you can pull off and is believable.
57
00:04:16,260 --> 00:04:20,670
If you alias's Japanese and you don't speak Japanese and you need to.
58
00:04:20,820 --> 00:04:21,970
That's not going to work.
59
00:04:22,020 --> 00:04:28,200
So research your character research their location the city the profile so you understand enough to
60
00:04:28,200 --> 00:04:29,650
become that alias.
61
00:04:29,700 --> 00:04:35,910
You have to become the alias because when the alias needs to communicate with the world you can slip
62
00:04:35,910 --> 00:04:37,760
up if you're not in character.
63
00:04:37,800 --> 00:04:43,770
You can reveal accidentally information so that's why you have to embody the character you become the
64
00:04:43,770 --> 00:04:47,910
character creator by defining their history background.
65
00:04:47,940 --> 00:04:49,230
What teams do they support.
66
00:04:49,230 --> 00:04:51,680
Did they get a university which won.
67
00:04:51,840 --> 00:04:53,040
Are they religious.
68
00:04:53,040 --> 00:04:55,200
Do they have political affiliations.
69
00:04:55,200 --> 00:05:00,170
What is their sexual orientation is possible to create are called silv aliases.
70
00:05:00,210 --> 00:05:03,280
So for example let's imagine you are political dissident.
71
00:05:03,330 --> 00:05:10,050
You might register on a forum on your own username that doesn't relate to your alias but is connected
72
00:05:10,050 --> 00:05:11,780
to your alias by the email.
73
00:05:11,820 --> 00:05:17,980
So if this forum identities investigated it leads only to your alias and not you.
74
00:05:18,000 --> 00:05:24,650
So it's a alias within an alias so the alias you could create a network of aliases to support each other
75
00:05:24,650 --> 00:05:25,860
is legitimacy.
76
00:05:25,860 --> 00:05:31,770
If they're investigated and the only lead to fake aliases it will take a few days to set up a basic
77
00:05:31,770 --> 00:05:35,310
alias and a few months to really bad one in.
78
00:05:35,310 --> 00:05:39,480
But it is worth it if your adversary is serious and the consequences are high.
79
00:05:39,510 --> 00:05:42,910
If your adversary is good you are upset needs to be better.
80
00:05:42,990 --> 00:05:50,010
Unfortunately setting up aliases backgrounds so aliases this can all be a little bit boring but it is
81
00:05:50,070 --> 00:05:56,060
essential for good OPSEC proper planning and practice prevents piss poor performance.
82
00:05:56,070 --> 00:06:01,540
One mistake in timing implementation configuration can be enough.
83
00:06:01,560 --> 00:06:08,460
You can only make one mistake and because of that I recommend practice if that's possible in your situation
84
00:06:08,460 --> 00:06:08,490
.
85
00:06:08,490 --> 00:06:10,400
Create some fake aliases.
86
00:06:10,560 --> 00:06:18,090
Security domains Culver's then use them full of jetsam it uses for a few months and evaluate your performance
87
00:06:18,090 --> 00:06:18,390
.
88
00:06:18,390 --> 00:06:19,740
How well did you do.
89
00:06:19,740 --> 00:06:26,070
Was there any contamination when you can establish professional level cover without contamination is
90
00:06:26,070 --> 00:06:31,680
when you are ready to move when an alias has had a significant amount of interactions and has become
91
00:06:31,680 --> 00:06:35,990
effective in its purpose is time to consider retiring it.
92
00:06:36,090 --> 00:06:42,540
If it's possible in your situation the more interaction the alias has the more risk is associated with
93
00:06:42,540 --> 00:06:43,120
it.
94
00:06:43,270 --> 00:06:50,100
Even set up monitoring for your identities to notify you of anything relating to your identities including
95
00:06:50,100 --> 00:06:51,930
your real identity.
96
00:06:51,940 --> 00:06:54,920
Always remember the alert should be sent to the right alias.
97
00:06:54,990 --> 00:06:56,840
There should be no cross contamination.
98
00:06:56,910 --> 00:06:59,220
You can use google alerts to do that.
99
00:06:59,370 --> 00:07:03,280
Let's take a step back from the Internet now and think about the real world.
100
00:07:03,330 --> 00:07:09,500
If the anniversary that concerns you has significant means motive and opportunity.
101
00:07:09,540 --> 00:07:15,030
Such is a nation state and has targeted you for whatever reason may be targeted because of the sites
102
00:07:15,030 --> 00:07:21,400
you visit or your targeted specifically and total privacy and an unlimited online requires that you
103
00:07:21,400 --> 00:07:23,160
were anonymous in the real world.
104
00:07:23,570 --> 00:07:28,680
There is no compromise on that unfortunately because of the nature of the Internet and the supporting
105
00:07:28,680 --> 00:07:33,080
technology which is not designed for privacy or security.
106
00:07:33,090 --> 00:07:42,270
You cannot guarantee total anonymity online even when using encryption Tor or gateways VPN Virtual machines
107
00:07:42,290 --> 00:07:47,550
and all the security controls recommended in this course unless you are anonymous in the real world
108
00:07:47,660 --> 00:07:54,240
that an adversary with large enough resources who is after you will track you down in time.
109
00:07:54,240 --> 00:08:01,020
If you dont have real world security controls this is where we start to talk about fake offline identities
110
00:08:01,080 --> 00:08:05,350
Cova aliases backstories and to be constantly on the move.
111
00:08:05,430 --> 00:08:12,930
Most people won't be in the situation thankfully but if this is you then a good resource to start with
112
00:08:13,110 --> 00:08:19,830
is to have a look at this book The Baby harvest how virtual babies became the future of terrorist financing
113
00:08:19,860 --> 00:08:25,670
and money laundering because births and deaths registration is now moving online.
114
00:08:25,680 --> 00:08:34,440
It's possible to digitally or online establish a new and real identity in various countries and this
115
00:08:34,440 --> 00:08:39,800
book talks about how that is done and what the research Chris Rock found out when he tried to create
116
00:08:39,810 --> 00:08:42,310
new fake but real identities.
117
00:08:42,390 --> 00:08:48,610
There's also a video here presentation that is Chris Rock which is kind of a summary of his book.
118
00:08:48,690 --> 00:08:52,380
If you're interested in fake real identities it's a good place to start.
119
00:08:52,380 --> 00:08:57,370
Also search the web for fake IDs and setting up fake real life aliases.
120
00:08:57,390 --> 00:09:03,240
If you need to escape your nation consider going to countries that don't have extradition treaties which
121
00:09:03,240 --> 00:09:05,480
I think is pretty obvious.
122
00:09:05,520 --> 00:09:10,350
This information is intended for political dissidents freedom fighters journalists are whistleblowers
123
00:09:10,410 --> 00:09:11,130
and those in need.
124
00:09:11,130 --> 00:09:12,030
I'm non-attribution
13440
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.