Cover Image for Guide to Protecting Yourself from Government Surveillance
Tue Nov 12 2024

Guide to Protecting Yourself from Government Surveillance

Donald Trump has promised to deport millions of people and imprison his opponents. To implement this plan, his administration will utilize the extensive digital surveillance network in the United States. Below are some strategies that can be employed to evade such surveillance.

Donald Trump, the next president of the United States, has promised to deport millions of undocumented immigrants and threatened to imprison his political opponents and journalists. Additionally, under a Republican-controlled government, it is expected that rights related to abortion and transgender individuals will be further restricted. Influential conservatives have called for a crackdown on leftist activist groups, reigniting Trump’s tough stance against protesters during his first administration.

To carry out these threats, the Trump administration and Republicans in Congress could resort to and potentially expand the extensive surveillance system of the U.S. government, being in a position to utilize it more than any other administration in recent history. This suggests that individuals in vulnerable groups, as well as those who associate with them or wish to protect their privacy, should consider how to improve their data security and resilience to surveillance before a second Trump administration begins.

Digital security experts warn that groups such as undocumented immigrants, Muslims, journalists, and anyone who does not support Trump should reconsider their privacy measures. Runa Sandvik, a former digital security collaborator at a major newspaper and founder of a security firm focused on protecting civil society members, advises the use of platforms that safeguard the privacy of communications.

The key to securing digital privacy begins with the use of encrypted communications. Applications like Signal, WhatsApp, and iMessage are designed to encrypt messages and calls in such a way that only the recipient can access them. This protection contrasts with services that offer "encryption" in their default settings, which may allow third parties to access the data once it arrives at their servers.

In addition to securing communications, it is essential to encrypt devices. Many current smartphones have full disk encryption enabled by default. Switching to longer alphanumeric passwords can enhance security. Experts also suggest disabling biometric features when necessary, especially in protest situations or at border crossings.

Cloud storage offers convenience but carries risks, as many companies can access stored data and comply with government requests. However, more and more companies are offering encrypted cloud storage, allowing for better protection of information from unauthorized access.

Users should also consider their online anonymity while browsing the internet, utilizing tools like Tor or virtual private networks (VPNs) that offer an additional level of privacy. However, it is important to choose a VPN wisely, as some do log user activity.

Another important aspect is the protection of location data. Limiting access to location data on devices is crucial for maintaining privacy. Using a phone only when necessary, putting it in airplane mode, or using Faraday bags that block signals are some options for protecting this information.

Finally, financial surveillance is another vulnerable area, so using cash can be an alternative for those who wish to avoid having their transactions tracked. Although cryptocurrencies are seen as a more anonymous option, many are actually traceable.

Creating a secure digital environment requires a combination of good practices, the use of appropriate tools, and a constant review of how data and communications are managed. As a new term for Trump approaches, it is vital that at-risk groups, as well as those wishing to protect their privacy, adopt proper measures.