All language subtitles for 011 Establishing Cover-en

af Afrikaans
ak Akan
sq Albanian
am Amharic
ar Arabic Download
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bem Bemba
bn Bengali
bh Bihari
bs Bosnian
br Breton
bg Bulgarian
km Cambodian
ca Catalan
ceb Cebuano
chr Cherokee
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
ee Ewe
fo Faroese
tl Filipino
fi Finnish
fr French
fy Frisian
gaa Ga
gl Galician
ka Georgian
de German
el Greek
gn Guarani
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ia Interlingua
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
rw Kinyarwanda
rn Kirundi
kg Kongo
ko Korean
kri Krio (Sierra Leone)
ku Kurdish
ckb Kurdish (Soranî)
ky Kyrgyz
lo Laothian
la Latin
lv Latvian
ln Lingala
lt Lithuanian
loz Lozi
lg Luganda
ach Luo
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mfe Mauritian Creole
mo Moldavian
mn Mongolian
my Myanmar (Burmese)
sr-ME Montenegrin
ne Nepali
pcm Nigerian Pidgin
nso Northern Sotho
no Norwegian
nn Norwegian (Nynorsk)
oc Occitan
or Oriya
om Oromo
ps Pashto
fa Persian
pl Polish
pt-BR Portuguese (Brazil)
pt Portuguese (Portugal)
pa Punjabi
qu Quechua
ro Romanian
rm Romansh
nyn Runyakitara
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
sh Serbo-Croatian
st Sesotho
tn Setswana
crs Seychellois Creole
sn Shona
sd Sindhi
si Sinhalese
sk Slovak
sl Slovenian
so Somali
es Spanish
es-419 Spanish (Latin American)
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
tt Tatar
te Telugu
th Thai
ti Tigrinya
to Tonga
lua Tshiluba
tum Tumbuka
tr Turkish
tk Turkmen
tw Twi
ug Uighur
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
wo Wolof
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:00,510 --> 00:00:06,450 This section is more for political dissidents freedom fighters journalists whistleblowers and those 2 00:00:06,450 --> 00:00:10,270 that seriously need non-attribute into their real identity. 3 00:00:10,290 --> 00:00:17,040 The first step in establishing effective OPSEC for maximum anonymity is to set up your environment and 4 00:00:17,040 --> 00:00:18,240 identities. 5 00:00:18,240 --> 00:00:23,400 The more serious your adversary and the consequences the more serious you take OPSEC. 6 00:00:23,430 --> 00:00:27,990 You will need separate security domains per identity. 7 00:00:27,990 --> 00:00:33,360 If you don't know what that means go to the section on security domains and understand that separate 8 00:00:33,360 --> 00:00:38,660 security domain Pyrrha identity even the configuration of your browser. 9 00:00:38,950 --> 00:00:46,020 The browser fingerprint can tie identities together so you need to have separate browsers and you achieve 10 00:00:46,020 --> 00:00:47,500 this through isolation. 11 00:00:47,580 --> 00:00:53,480 In the section on isolation on compartmentalisation we talk more about how to achieve this. 12 00:00:53,610 --> 00:00:58,280 So remember your identities need isolation and compartmentalization. 13 00:00:58,290 --> 00:01:04,620 They need their own separate security domain so that everything technically is separate and it relates 14 00:01:04,620 --> 00:01:05,550 to them. 15 00:01:05,550 --> 00:01:08,760 The browser is different maybe the operating system is different. 16 00:01:08,790 --> 00:01:10,280 The cookies are different. 17 00:01:10,300 --> 00:01:16,890 Conses security controls as we go through the course as to which is appropriate for each identity. 18 00:01:16,890 --> 00:01:24,660 After you have security anonymity services and compartmentalisation setto which you will understand 19 00:01:24,660 --> 00:01:31,860 through going through the course you then need to establish a cover a cover is a character or identity 20 00:01:32,040 --> 00:01:35,210 who will appear to be responsible for your actions. 21 00:01:35,220 --> 00:01:39,210 This person takes the heat when the walls start closing in. 22 00:01:39,210 --> 00:01:41,110 You need your own Keyser Soze. 23 00:01:41,190 --> 00:01:46,440 And if you don't understand that reference then your home for today is watching the movie The Usual 24 00:01:46,440 --> 00:01:49,890 Suspects and understand who Keyser Soze is. 25 00:01:49,920 --> 00:01:51,570 You need your Keyser Soze. 26 00:01:51,990 --> 00:01:58,440 Using anonymizing services like we discuss in Section anonymizing services Nesta VPN and Joan Dunham 27 00:01:58,470 --> 00:02:04,710 tall etc. and the security control detail throughout the course to stay anonymous you need to establish 28 00:02:04,710 --> 00:02:11,730 the account you need establish fake Twitter Facebook G-mail for McCown's whatever accounts you need 29 00:02:12,080 --> 00:02:17,850 for your private anonymous activity relating to the new alias you are establishing. 30 00:02:18,120 --> 00:02:19,980 Even fake photos are great. 31 00:02:19,980 --> 00:02:27,180 Create supporting evidence to your alias for inspiration you can have a look at this site here. 32 00:02:27,210 --> 00:02:28,560 Fake Name Generator. 33 00:02:28,590 --> 00:02:36,840 If you log in via a fake Google account you can view full Social Security numbers say profiles for later 34 00:02:36,850 --> 00:02:36,890 . 35 00:02:36,930 --> 00:02:44,640 You should use a secure method like last pass or other secure identity manage to store the information 36 00:02:44,700 --> 00:02:46,750 on each alias profile. 37 00:02:46,790 --> 00:02:56,070 And if you look here you can select the agenda select the name sir isko it Dortch Wales and select the 38 00:02:56,070 --> 00:02:59,480 country in the United Kingdom. 39 00:02:59,540 --> 00:03:08,340 Generate and they should give you inspiration and an idea at the sort of information you need for a 40 00:03:08,340 --> 00:03:10,950 real Aliase is not just a name 41 00:03:15,050 --> 00:03:22,200 that you put in on a bit of y as foreign as just your alias and note carefully what your alias is used 42 00:03:22,200 --> 00:03:24,690 for and how you access it. 43 00:03:24,690 --> 00:03:29,020 Do you access it via VPN X using Virtual Machine y. 44 00:03:29,190 --> 00:03:32,660 You must always use those to access that alias. 45 00:03:32,880 --> 00:03:38,430 Let's dig a little deeper if you wish to always stay anonymous against a serious adversary to create 46 00:03:38,490 --> 00:03:39,930 an entire person. 47 00:03:40,020 --> 00:03:41,310 You can embody a. 48 00:03:41,550 --> 00:03:46,450 So you never make the mistake of referencing something personal to yourself. 49 00:03:46,470 --> 00:03:48,230 Establish the alias's gender. 50 00:03:48,270 --> 00:03:53,330 Like I've shown you location job hair color height weight. 51 00:03:53,370 --> 00:03:59,760 Even if they have tattoos or piercings everything you must inhabit this character so you never provide 52 00:03:59,760 --> 00:04:06,380 profiling information just talking about the weather in your location is enough to locate you when you 53 00:04:06,380 --> 00:04:08,010 are in character. 54 00:04:08,010 --> 00:04:09,430 Become the character. 55 00:04:09,480 --> 00:04:11,120 Never fall out of character. 56 00:04:11,280 --> 00:04:16,160 Which means they have to be someone that you can pull off and is believable. 57 00:04:16,260 --> 00:04:20,670 If you alias's Japanese and you don't speak Japanese and you need to. 58 00:04:20,820 --> 00:04:21,970 That's not going to work. 59 00:04:22,020 --> 00:04:28,200 So research your character research their location the city the profile so you understand enough to 60 00:04:28,200 --> 00:04:29,650 become that alias. 61 00:04:29,700 --> 00:04:35,910 You have to become the alias because when the alias needs to communicate with the world you can slip 62 00:04:35,910 --> 00:04:37,760 up if you're not in character. 63 00:04:37,800 --> 00:04:43,770 You can reveal accidentally information so that's why you have to embody the character you become the 64 00:04:43,770 --> 00:04:47,910 character creator by defining their history background. 65 00:04:47,940 --> 00:04:49,230 What teams do they support. 66 00:04:49,230 --> 00:04:51,680 Did they get a university which won. 67 00:04:51,840 --> 00:04:53,040 Are they religious. 68 00:04:53,040 --> 00:04:55,200 Do they have political affiliations. 69 00:04:55,200 --> 00:05:00,170 What is their sexual orientation is possible to create are called silv aliases. 70 00:05:00,210 --> 00:05:03,280 So for example let's imagine you are political dissident. 71 00:05:03,330 --> 00:05:10,050 You might register on a forum on your own username that doesn't relate to your alias but is connected 72 00:05:10,050 --> 00:05:11,780 to your alias by the email. 73 00:05:11,820 --> 00:05:17,980 So if this forum identities investigated it leads only to your alias and not you. 74 00:05:18,000 --> 00:05:24,650 So it's a alias within an alias so the alias you could create a network of aliases to support each other 75 00:05:24,650 --> 00:05:25,860 is legitimacy. 76 00:05:25,860 --> 00:05:31,770 If they're investigated and the only lead to fake aliases it will take a few days to set up a basic 77 00:05:31,770 --> 00:05:35,310 alias and a few months to really bad one in. 78 00:05:35,310 --> 00:05:39,480 But it is worth it if your adversary is serious and the consequences are high. 79 00:05:39,510 --> 00:05:42,910 If your adversary is good you are upset needs to be better. 80 00:05:42,990 --> 00:05:50,010 Unfortunately setting up aliases backgrounds so aliases this can all be a little bit boring but it is 81 00:05:50,070 --> 00:05:56,060 essential for good OPSEC proper planning and practice prevents piss poor performance. 82 00:05:56,070 --> 00:06:01,540 One mistake in timing implementation configuration can be enough. 83 00:06:01,560 --> 00:06:08,460 You can only make one mistake and because of that I recommend practice if that's possible in your situation 84 00:06:08,460 --> 00:06:08,490 . 85 00:06:08,490 --> 00:06:10,400 Create some fake aliases. 86 00:06:10,560 --> 00:06:18,090 Security domains Culver's then use them full of jetsam it uses for a few months and evaluate your performance 87 00:06:18,090 --> 00:06:18,390 . 88 00:06:18,390 --> 00:06:19,740 How well did you do. 89 00:06:19,740 --> 00:06:26,070 Was there any contamination when you can establish professional level cover without contamination is 90 00:06:26,070 --> 00:06:31,680 when you are ready to move when an alias has had a significant amount of interactions and has become 91 00:06:31,680 --> 00:06:35,990 effective in its purpose is time to consider retiring it. 92 00:06:36,090 --> 00:06:42,540 If it's possible in your situation the more interaction the alias has the more risk is associated with 93 00:06:42,540 --> 00:06:43,120 it. 94 00:06:43,270 --> 00:06:50,100 Even set up monitoring for your identities to notify you of anything relating to your identities including 95 00:06:50,100 --> 00:06:51,930 your real identity. 96 00:06:51,940 --> 00:06:54,920 Always remember the alert should be sent to the right alias. 97 00:06:54,990 --> 00:06:56,840 There should be no cross contamination. 98 00:06:56,910 --> 00:06:59,220 You can use google alerts to do that. 99 00:06:59,370 --> 00:07:03,280 Let's take a step back from the Internet now and think about the real world. 100 00:07:03,330 --> 00:07:09,500 If the anniversary that concerns you has significant means motive and opportunity. 101 00:07:09,540 --> 00:07:15,030 Such is a nation state and has targeted you for whatever reason may be targeted because of the sites 102 00:07:15,030 --> 00:07:21,400 you visit or your targeted specifically and total privacy and an unlimited online requires that you 103 00:07:21,400 --> 00:07:23,160 were anonymous in the real world. 104 00:07:23,570 --> 00:07:28,680 There is no compromise on that unfortunately because of the nature of the Internet and the supporting 105 00:07:28,680 --> 00:07:33,080 technology which is not designed for privacy or security. 106 00:07:33,090 --> 00:07:42,270 You cannot guarantee total anonymity online even when using encryption Tor or gateways VPN Virtual machines 107 00:07:42,290 --> 00:07:47,550 and all the security controls recommended in this course unless you are anonymous in the real world 108 00:07:47,660 --> 00:07:54,240 that an adversary with large enough resources who is after you will track you down in time. 109 00:07:54,240 --> 00:08:01,020 If you dont have real world security controls this is where we start to talk about fake offline identities 110 00:08:01,080 --> 00:08:05,350 Cova aliases backstories and to be constantly on the move. 111 00:08:05,430 --> 00:08:12,930 Most people won't be in the situation thankfully but if this is you then a good resource to start with 112 00:08:13,110 --> 00:08:19,830 is to have a look at this book The Baby harvest how virtual babies became the future of terrorist financing 113 00:08:19,860 --> 00:08:25,670 and money laundering because births and deaths registration is now moving online. 114 00:08:25,680 --> 00:08:34,440 It's possible to digitally or online establish a new and real identity in various countries and this 115 00:08:34,440 --> 00:08:39,800 book talks about how that is done and what the research Chris Rock found out when he tried to create 116 00:08:39,810 --> 00:08:42,310 new fake but real identities. 117 00:08:42,390 --> 00:08:48,610 There's also a video here presentation that is Chris Rock which is kind of a summary of his book. 118 00:08:48,690 --> 00:08:52,380 If you're interested in fake real identities it's a good place to start. 119 00:08:52,380 --> 00:08:57,370 Also search the web for fake IDs and setting up fake real life aliases. 120 00:08:57,390 --> 00:09:03,240 If you need to escape your nation consider going to countries that don't have extradition treaties which 121 00:09:03,240 --> 00:09:05,480 I think is pretty obvious. 122 00:09:05,520 --> 00:09:10,350 This information is intended for political dissidents freedom fighters journalists are whistleblowers 123 00:09:10,410 --> 00:09:11,130 and those in need. 124 00:09:11,130 --> 00:09:12,030 I'm non-attribution 13440

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.