Tuesday, November 15, 2011

How survivors survive on the internet

EMAIL AND WORD PROCESSING
  • Set up a new email -- Set up a second account known only to you and the people who need to know; Google Gmail is the most secure email tool. Change your password often – the abuser can use services like Yourhackerz to crack your password.
  • Documents -- Stash all your documents in the new email address, as email attachments; then delete those documents from the computer itself and dump the Recycle Bin, and never store sensitive documents on the computer itself. Do word processing on the net, not the computer – use email.
  • Emails -- Forward all “problematic” emails to the new account and then delete them from the old account (dump both the Sent and the Trash); get rid of “dangerous” email addresses in your address book too.
  • Attachments -- Don’t open attachments from strangers – spyware gets in your computer that way.
  • The old email account -- Keep using your old account too, so the abuser doesn’t get suspicious.
  • Website addresses -- Save your sensitive websites (domestic violence center, lawyer, Greyhound, etc) by cutting the address from the little window up top, and emailing them to yourself in the new account. Then erase them from Favorites if they’re there.

SURFING THE NET
  • Don’t put any dangerous links in Favorites, like the link to the local women’s center – again, email those links to your secret account, and clean out Favorites.
  • Change all your screen names and passwords. Don't use anything related to you, especially pictures.
  • Stay off internet sites where he could see what you’re up to – don’t post personal information, and steer clear of sites he uses; generally, stay off the net as much as possible.
  • Be very careful with Facebook, and don’t put your email security answers there!
  • Firefox is the most secure browser – they make it easy for you to encrypt communications with companies that allow encryption, like Mastercard, Verizon, Greyhound.
  • Flush the internet browsing history, and use InPrivate Browsing or “Porn Mode” – it won’t record your internet activity. It’s usually listed under Tools in your browser. If you’re in Firefox, use the privacy tool [Tools / Options / Privacy] to prevent your browser history from being recorded (their version of “Porn Mode”), when you’re accessing sensitive sites. Or, use the line-item history-deletion tool [History / right-click / delete] when you’re accessing sensitive sites.

THE COMPUTER ITSELF
  • Always log out and never let the computer save your password.
  • Don’t use the Idle or Hibernate functions.
  • Have something shiny in front of you, so you can see if he’s reading over your shoulder.
  • Find other computers to use – get a new one and stash it, or go to the library, take a netbook to McDonalds, coffee shops like Starbucks, Panera Bread etc. If you type “My County My State Wifi” in the Google search engine, it will probably tell you more places you can access the net, if you have a laptop. At the library you don’t even need the laptop; same for internet cafes, or a pal’s house. If you share a computer with the abuser, consider the computer "enemy territory".
  • Don’t monitor his net activity – but if you notice that his activity involves shopping for weapons, surveillance, GPS, then maybe it’s time to go to DEFCON 1 and execute that safety plan.

HOW THE ABUSER WILL TRY TO SPY ON YOU
The abuser can put “spyware” on the computer and watch everything you do, to include trying to recover things you’ve thrown out, and even engineers can have trouble detecting the software. If you think there is spyware, there are things you can look for – program files with names that include “undelete” and “recover”, odd activity in Service and Applications, odd activity in the registry or port traffic, or you can even download software that looks for spyware. But remember that (a) such tools are not perfect, and (b) there may be trouble if the abuser notices you’re trying to sniff out spyware. The only foolproof way to beat spyware is to stash your important documents in cyberspace and then use a new computer which he can’t access (either buy a new little netbook and stash it somewhere safe, or borrow one at the library or a friend’s house).

Keep in mind that if you’re communicating with the internet through the air – a wireless router at home or somewhere like Starbucks – then a really obsessive abuser can hire a “wardriver”, a detective who can sit outside the building in his car with a laptop and an antenna, and try to intercept your communications. At the very least, don’t use your credit card to buy stuff on the net at Starbucks – the guy at the next table can use intercept software like Firesheep and read your credit card details. And if you have a wireless system at home, protect it with a password.

Disable the webcam – he can use software to watch you.

Now, a hint for after you leave home. A clever abuser can also try to track you through your computer. Each computer has an IP address – a code which is different for each computer – and out on the internet there are companies who can help the abuser to use the IP address to find where you are physically. Also, some websites you visit can be used to track your whereabouts, and there are other potential hazards, such as the identity and regional location of your internet service provider, the phone line you might be using to ping the ISP, and so forth. One handy tool is Tor, a website that gives away free software which routes your internet traffic all over the planet, disguising your IP in the process.

No comments: