Reporting Elections, Safety and Security of Journalists

People often carry mobile phones that contain sensitive
information. Communications history, text and voice
messages, address books, calendar, photos and many
other useful phone functions can become highly
compromising if the phone or the data is lost or stolen. It
is vital to be aware of the information that is stored, both
actively and passively, on your mobile phone. Information
stored on a phone could implicate the person using the
phone as well as everyone in their address book, message
inbox, photo album, etc.
Mobile phones that connect to the internet are also
subject to the risks and vulnerabilities associated with
the internet and computers, as discussed in our other
tactics guides regarding information security, anonymity,
information retrieval, loss, theft and interception.
In order to reduce some of these security risks, users
should be aware of their phone’s potential for insecurity,
as well as its set-up options. Once you know what the
possible problems may be, you can put safeguards into
place and take preventative measures.
Physical security for your mobile phone
As is the case with other devices, the first line of defense
for the safety of the information on your mobile phone
is to physically protect the phone and its SIM card from
being taken or tampered with.
•

Keep your phone with you at all times. Never leave it

35

Select target paragraph3