HOW TO POST ANYWHERE WITHOUT BEING TRACED BY COPS
WARNING: DC Direct Action News is hosted free on a commercial server. They will surely give the cops IP logs, etc if they are ever asked.
We cannot protect you from this without the funds to host this site somewhere hostile to the US and the FBI, so if you are posting about anything “heavy,” you need to protect yourself. ONLY those activist sites hosted on activist controlled and programmed servers can be relied upon not to log IP addresses and not to attempt to log machine, operating system, and browser data.
This site is hosted on WordPress, which should be presumed cooperative with law enforcement. When you post a comment here concerning militant direct action or anything else you don’t want the cops to be able to prove is your work, there are several ways to do so.
If you can get Tor working(be SURE to test it first and make SURE it is hiding your IP address), it will keep the Enemy from tracing your postings back to the source. Do not, however, rely on Tor to protect your home Internet service from being found! They could be sniffing packets and simply comparing to what turns up at the other end if they already suspect you, and this site is not encrypted (yet…).
Torbutton update: According to the Electronic Freedom Foundation, Torbutton “standardizes” a lot of browser data, greatly weakening browser fingerprinting. This MIGHT make a common piece of hardware like a popular netbook impossible to prove is yours, but don’t rely on this to keep you out of jail until more is known. Instead, use it as one part of a layered defense.
Tor used on the road greatly impedes cops finding the wireless access point you used for something heavy!
2: Free public wireless access points.
Offered at some coffee shops, libraries, and even some fast food restaurants. A post from these cannot be traced past the wireless access point.
If you are posting anything “arrestable” do not open your email or log into anything, as the wireless server might be hostile and might be copying everything you do. Those logs must contain nothing but the post, and you should clear the scene immediately if it concerns anything that could be construed as a felony.
If you can find a place outdoors that is visually concealed from cameras owned by the target wireless access point, yet within range of a good quality wireless card, use it!
It’s possible a camera inside could capture your face, so if you are doing something heavy don’t use a credit card, debit card, checks, etc for ANYTHING while inside, and be sure to go somewhere the local cops won’t recognize you.
Always use a USB or other plug-in wireless card, as the “mac address” will still be logged on most wireless access points. This can’t tell the cops who you are, but if you are found by other means it is evidence against you. There are also ways to change the mac address-essential if you have ever had MS Windoze activated on your computer under your own name and are using an internal wireless card.
Find a prepaid provider that does not require ID to buy the hardware or set up the account. Become familiar with setting up their accounts, perhaps by setting up a “practice” account for someone wanting cellular Internet access. You must be able to activate your device without calling tech support. You will probably have to fill in a name at activation online, give a fake one. Presume the cell provider logs everything by GPS, make sure this information is useless! Don’t use T-mobile if you need to use a site that might be censored by “web guard” which you can’t turn off without ID.
Now that you have a device you already know how to activate, find a private place free of security cameras, like a spot in the woods within range of cell towers, to set it up. Activate, and remove the battery unless you are going to do your secure work immediately.
Treat this device like a cell phone, keep the battery out when not in use due to the presence of GPS and tracking software. If you want to use it for a “burn connection” never use it or turn it on at home, or the GPS makes it the same as using your cable Internet connection. Keep the battery out, do not trust the electronic switch. Use it and get rid of it.
You can cache the device in a really good hiding place (like a sealed PVC pipe buried on public land) if you are running a press office for an underground organization and all your posts are tied together anyway. Otherwise, remember: Each post made with the device should be presumed tied to all other Internet content originating in the same device by a standard good enough for a courtroom!
For really important shit, remember: You bought a $100 device and $50 worth of minutes at most. It is cheaper to smash it with a hammer and throw it in the trash than it is to pay $500 for the first hour of a lawyer’s time.
4: Public access computers:
Bring any content in by flash drive, destroy the flash drive afterwards as these machines all use MS Windows. If you can, turn off history and clear cookies afterwards. Make SURE you do nothing else on the chosen machine and all others on the same network within 6 months of so before or after. In particular don’t check email or any other postings-do you secure task, do only that task, clean up, wipe your fingerprints and leave!
There are still a few public access computers left that do not require logging in with identity information. Never use one in a lcation you have to present ID to enter, someone was once convicted of an ALF/ELF action baed on having swiped a university ID to enter a library from with a claim of responsability originated. This was logged and the information presented to the cops and the courts.
Instead, go where local cops won’t recognize your face on grainy, low-quality security camera footage, post your work, wipe your fingerprints, leave immediately. A Kinkos card bought with cash, used once, and then destroyed will leave no records other than any local copies of your work (on the machine) or security camera footage. Interestingly, all Kinko’s outlets in DC shut these machines down, going credit-card only, for one day on Sep 11, 2002.
WARNING: Never, ever use library computers you log onto with a library card or any computer on which you buy time with credit or debit cards in your own name for anything you could not do from your home computer the day after a police raid! Those are worse than your home computer, and watched far more closely.
Note concerning public computers for Youtube posting: Youtube/Google may refuse to make an account for you from the library’s network, as more than 5 accounts will surely have already been made from it. They will demand “sms verification,” meaning they demand a phone number and replying to a text message to activate the account. It is better to refuse this and not do business with Google, but if you must use Youtube, you will need a “burn phone,” which is a prepaid phone bought with cash, no discount cards, no credit cards, no ID, and no personal information. You can make up to 5 Youtube/Google accounts with the phone number,activate them with the text messages from Google, then wipe your prints from the phone and sell it in the street or destroy it. Needless to say, each account is linked to all the others by a standard usable in court. Be sure to never, ever leave the battery in the phone when not in a place you can afford to have the phone tracked to! Google probably figures a spammer needing 1,000 Youtube accounts can’t afford to buy 200 burn phones…