Tech Tools for Activism

Hiding & Deleting Things on your PC

During the controversy over the Iran-contra affair, in 1986, Lieutenant Colonel Oliver North attempted to erase all the relevant e-mail messages on his computer; he repeatedly pressed the DELETE button, thinking that he was thereby expunging the messages.  "Wow, were we wrong!" he later observed 

After reading this chapter you will have the knowledge to;

  • delete files and data securely so that no-one will recover them
  • encrypt information on your computer
  • give you an introduction to the encryption software TrueCrypt

Deleting Files Securely

With a harddisk even if you erased every piece of data, it is sometimes possible with (very) specialized hardware to recover pieces of the data. If the data is very confidential and must be erased with the greatest care, you can use software to "overwrite" all pieces of data with random data. When this is done multiple times, this will make the data untraceable.

Securely delete data under Windows: For Windows there is a good open source tool called "File Shredder". This tool can be downloaded from fileshredder.org

Securely delete data under MacOSX There are basically to build-in steps to make to securely delete your data on Mac OSX. You can find out how to do this here - ttfa.net/delete

Securely delete data under Ubuntu/Linux Unfortunately currently there is no graphical user interface available for Ubuntu to delete files secure. There are two command-line programs available though - shredwipe.

Shred is installed in Ubuntu by default and can delete single files. Wipe is not installed by default but can easily be installed with using Ubuntu Software Center or if you understand the command line you can install it with apt-get install wipe. Wipe is a little more secure and has nicer options. It is possible make access to these program's easy by adding it as an extra menu option. There is more information on this here - ttfa.net/wipe

Hiding Files

There are three basic solutions for hiding files - physical hiding, encryption and misdirection. Physical hiding would mean using a portable medium such a USB key and keeping it in a secure location, only to be brought out for editing. Encryption is another solution which does not require any physical movement of media. Encrypted data cannot be read directly and must go through some kind of unlocking in order to be useful. Misdirection, hiding in a place on a device (i.e. a hard disk), a filesystem, or within another file or container, where nobody would think to look..

Using True Crypt

The tool TrueCrypt, which is is available for Window, Mac and Llinux, uses both encryption and misdirection. TrueCrypt will protect your data from being accessed by locking it with a password that you will create. If you forget that password, you will lose access to your data! TrueCrypt uses a process called encryption to protect your files. Rather than encrypting specific files, TrueCrypt creates a protected area, called a volume, on your computer. You can safely store your files inside this encrypted volume. There is help online for installing, encrypting and using hidden volumes using True Crypt as part of the Basic Internet Security book.

UPDATE: The developers of True Crypt have stopped working on the the project. While many are looking for an alternative in the long term, a software audit by @OpenCryptoAudit is that version 7.1a is safe to use. It can be downloaded here.

More Tips

Encrypting in Ubuntu: Ubuntu and offers the user the chance to encrypt the home directory and your entire drive during the installation process. The installation wizard will ask you to choose the partitioning method where we need to choose the ‘Guided – use entire disk and set up encrypted LVM’ option to encrypt our entire hard disk.

Virtual Memory: On all modern operating systems (e.g. Linux, Windows or OS X), there exists a feature called virtual memory.  If you are not encrypting your entire hard drive you must also encrypt the pagefile or swap space to prevent people from reading the virtual memory.

When encryption doesn't work: If your computer/laptop has been bugged or compromised in some way and your keystrokes are being recorded, it doesn't matter how good your cryptography is. Using a secure operating system which prevents keylogger installation (such as Linux), is a useful first step towards enhanced security.

What Next?

  • Try out some of the software and techniques listed here.
  • Spread the word about how to securely delete files.
  • Try running a workshop on how to securely delete files
  • Install TrueCrypt and try encrypting drive and creating hidden volumes
  • Try encrypting your drives when you next install Ubuntu