Premise comms, as defined here, are typically voice radio communications that have a limited signal strength. Limited signal is key as you don’t want whatever you are saying “over the air” to be broadcasted 10 miles away. Therefore, low-power (low-wattage), radios are the best choice.
Probably the most commonly recommended communications are FRS (Family Radio Service), GMRS (General Mobile Radio Service), and MURS (Multi-Use Radio Service). If you are new to these terms, I would highly recommended checking out the links provided. One big problem with both these systems is that anyone with the right radio scanner can pick up your communications. Additionally, GMRS requires a license, but since you can buy these radios off the shelf, the licensing is most certainly ignored by most.
Of course, I should not fail to mention HAM radios as a form of premise communications. But, like GMRS, HAM licensing is much more enforced by the FCC. HAM bands are equally vulnerable to eavesdropping like FRS, GMRS, and MURS. The eavesdropping is due to the simple fact that the majority of these radios are analog in nature (meaning if you find the frequency, you can just tune in and listen like you listen to a FM radio).
However, very short range communications can be maintained with relative security, and on a tight budget, using phones with “Direct Connect” functionality. In particular, phones with iDEN Direct Connect are what you want to look for. See here for specific iDEN phone information for the Motorola i355.
What is great about this “Direct Connect” feature is that it permits communication from phone to phone without using the cell tower, much like a FRS radio. Since Sprint has stopped offering certain kinds of these phones on the US market and they can be picked up very cheaply on eBay. If you shop around, you may be able to pick up 10 working phones for about $100.
The reason these make a great option…
- Most have moved on to the newer versions of the phones, so they aren’t nearly as common as just picking up a FRS or GPRS radio. The obscurity aspect adds a little security.
- They use digital communication, so just using a basic radio scanner will do an eavesdropper no good. If an eavesdropper found the frequency, he would only hear a very short digital burst.
- Not only are they digital, they change channel about 10 times a second during communications. I have personally observed the frequency change, so I know this is true. Also, since they are digital as well, someone would need to convert the digital signal and track all the channels that can be used, then assemble all of the converted signal for every single transmissions. This sounds like an awful lot of work.
- Range is good for premise comms, up to a mile or so with line of sight.
- The Motorola i335, in particular, has a bunch of accessory options, like headsets, belt clips, etc, making them great for premise comms. Also, they have great battery life since you are only using the “Direct Connect” and not the cell towers.
- They are cheap.
If you decide to go with these units, you should try to get them all at once, so you can program them all at the same time. You will choose a “channel” and a “code” for that channel. From my own experience, it took about 30 minutes to sit down and program 10 phones all at the same time.
:::: Securing Your Internet Connection ::::
If you read the “Securing Your Premise Communications” section, you realize that you need to be careful of eavesdroppers. The same is true with your internet connection. You may not believe it, but it is super easy to eavesdrop (or “sniff”) internet traffic.
When I first started doing IT work, we were having lots of issues with some old hardware. The school was on a tight budget and I was tasked with figuring out what the issues were and how to fix them. I was new to networking, but I did some research, set up a computer to watch internet traffic, and began looking for the collisions and other bad traffic. The program I used, “Sniffit,” was freely available at the time.
What “Sniffit” reported blew my mind. I was seeing usernames, passwords, and other information being transmitted in the open and in real-time. One could easily use a device like this for nefarious purposes. One could see chats, websites visited, email traffic, everything… and all in real-time. Of course, this was at a time when SSL and other methods of encryption were not being readily used by websites.
Since that time, I have learned much more about networking. Most good switches have the capability to perform something called “port mirroring.” What this does is use a port on a switch to replicate all the traffic on another port or series of ports. A device like an intrusion detection system and/or a virus detection systems would use this feature often so that monitoring centers can be immediately alerted in real-time of attacks against a system or server.
Why does this matter to you? A couple years ago I was talking with a phone technician. He was hired by the government, along with many numerous other technicians, to go into the CO boxes in his area (CO, or Central Office box, refers to those Verizon, Fairpoint, AT&T, etc, locations where phone/data hookups are created). What he was hired to do was install a black box. He wasn’t told to hook it up, just install the box. He didn’t know what the box did (or does), just place it where it needed to go. But, this technician believed that these were boxes probably to be hooked up for NSA data gathering. He believed that a mirror-port, or similar, would be used to record and relay voice and data information back to a central location.
Wouldn’t it be great if there was a way to mask your location? Perhaps if someone could somehow encrypt all their network traffic and send it through a bunch of different locations, they could protect their personal and private information. This can be done using Tails OS.
The first step is to prepare a computer to communicate from. You don’t have to use it as your daily PC/Mac, but you can at least have it set up so that you can start browsing the web with security.
What you need to get started is:
- A USB Flash drive or a computer with a DVD drive.
- A verified Tails OS ISO file (freely downloadable from tails.boum.org)
- A PC/Mac that has the capability of booting from the USB or DVD drive with the capability of getting online.
Purchase a USB flash drive (don’t get PNY or Sandisk as they sometimes have issues). Silicon Power flash drives seem to work really well. You can get a 16GB waterproof metal drive for under $15. You can get a 4GB drive for $5 to $6. Go to tails.boum.org to get started. Getting started can be somewhat technical if you want to “verify” the file that you have to download, but once you create a Tails OS USB drive, it is really easy to update and replicate more drives.
Some flash drives that I have tested and are known to work are linked below:
|Choose which size drive|
8GB TailsOS USB Drive $19.99 USD
16GB TailsOS USB Drive $29.99 USD
Along with a USB drive, you will also need an old laptop, netbook, or desktop. I know from personal experience that Tails OS works great from a 13” MacBook Pro as well as from a Lenovo Thinkpad T400. I also know that a majority of netbooks will work. If the computer supports booting from USB, it will likely work.
To boot, you simply turn off the computer, insert the USB flash drive with Tails OS and boot up the computer. Many times, you need to set the BIOS on the computer to boot from USB. Most machines have a boot option that allows booting from USB (like hitting F12 when the computer starts up, or holding the option key on a MacBook).
As stated prior, you may also burn the ISO to a DVD and boot from that. For some, this may be easier than using a USB. If you need to find out how to burn the ISO you downloaded to a DVD, see this for Mac:
Once you are in Tails OS, the boot will ask if you want to use extra options… like “persistence.” You would use persistence if you want to save files to the flash drive when you are using Tails (like bookmarks, documents, etc). When you do this, Tails OS encrypts part of the flash drive to protect your files. You don’t need to use persistence, but it is helpful if you want to create documents, etc.
When Tails is completely booted, you will need to connect it to your wireless network (or plug it in via an ethernet cable). There is a wireless icon on the top right of the screen. Once it is connected to the network, it will start up something called TOR, which is an encrypted method of connecting to the internet.
There are advantages and disadvantages of using TOR. The advantages are anonymous and encrypted web browsing that even the NSA likely has problems tracking. You are using a network of “nodes” (or other TOR routed devices) that protect your identity and connect to various networks all over the globe to protect you.
The disadvantage is speed. It is definitely slower. You wouldn’t want to try to watch a youtube video or download a large file while using TOR.
You will know that TOR is ready to use on your computer when a green onion icon appears on your toolbar at the top of the screen. Of course, TOR cannot start until you connect to your wireless network, so you need to this first.
Once the green onion icon appears, you can open the browser (another icon on the left side of the toolbar at the top of the screen). It works like a normal web browser, but you need to be careful. Two great browsers to use are duckduckgo.com and startpage.com, neither of which track you online.
To be careful online, here are a few tips:
- Don’t use your real name while you are on TOR
- Don’t log into your normal, everyday, email account… set up a new one (see below)
- Don’t search for names or things that identify you
- Don’t fill out web forms with your real address or other information that identifies you
- Do turn off your computer when you are done using Tails OS
- Do keep your USB and/or DVD disk you created in a safe place
Here is a YouTube video of Tails OS running using the option that makes it look like a Windows PC:
Here is a YouTube video for installation of Tails and an overview:
TO UPDATE YOUR TAILS USB DRIVE: When you boot from Tails, once online it will check automatically for updates. If an update is available, you should immediately download and install the update!
!! NOTICE !! 01/17/2015 – Safe-mail.net is not creating free accounts at this time. I would recommend checking the site often or getting on the blog email list to be notified if/when accounts become available again.
!! NOTICE !! 01/24/2015 – Safe-mail.net is once again creating free accounts.
A list of potential email providers includes:
- https://safe-mail.net – Location: Israel. Not currently creating free accounts.
- https://vfemail.net – Location: Virginia. Free account available.
- https://ruggedinbox.com – Location: Australia. (use https://ruggedinbox.com/rc to check email using email address and password after setup). Free account available.
- https://ethicmail.com – Location: Switzerland. Two email accounts at $11.90/month USD.
- https://mykolab.com – Location: Switzerland. One email account w/2GB storage at $10.50/month USD.
- https://protonmail.ch – Location: Switzerland. In beta at time of posting. Free sign up for notification of free account.
- https://runbox.com – Location: Norway. Plans from $19.95/year to $79.95/year, free trial is available.
- Person… who is communicating (could be an alias name)
- Position/time… where you are at and the current time
- Problems… report any issues or give the “all good”
- Plans… what your plans are before your next communication
Tips for Email Security:
- Only connect to your secure email service when on Tails OS
- Share your secure email address only with those you trust
- Never share your secure email address via phone, email, SMS text. Best to use good old pen and paper and a stamp to give your new address, or better yet… in person, but you also want to encourage others to adhere to similar methods of secure communication.
- Advocate with your family and friends good secure email practices, like not sharing your real name or other information that gives away your location or who you are.
- Ting does not require your SSN, so it isn’t tied to a credit report.
- Ting is a Sprint MVNO (mobile virtual network operator) and is not required to update your personal information with Sprint, though they are obligated by law to comply with information requests (as are all cellular providers)
- Ting is inexpensive, you pay only for what you use
- You own the phone and have no contract
- There are tons of cheap Sprint phones on eBay that work with Ting, so getting started is cheap as well.
INSECURE VERSION: (The steps recommended if you want to try Ting as your everyday cellular provider.)
- Get a Sprint phone that will work with Ting and check it with Ting’s database (www.ting.com/byod). If you want to just get a phone from Ting, just skip to step 2.
- Obtain your $25 service discount or get $25 off of a Ting device by going to: http://ting.7eer.net/c/73747/87564/2020
- Activate your device according to Ting’s instructions.
SECURE VERSION: What you need to get started with Ting as a secure backup phone.
- A non-Android and non-iOS Ting-compatible phone. If you are not sure, just open the back of the phone and go to www.ting.com/byod and check it.
- A Prepaid Credit Card.
- A clean email address (your new safe-mail.net or Proton Mail address, or other email account that isn’t tied to you)
- Pick an address. Find a location that is within Ting’s service area (http://ting.com/coverage).
- Set up your account and get your discount by going to: http://ting.7eer.net/c/73747/87564/2020
- Follow the on-screen activation instructions away from your current home address.
- Motorola V3M – Link to find this phone on eBay
- Kyocera DuraXT – Link to find this phone on eBay
- Samsung M240 – Link to find this phone on eBay
- Samsung M330 – Link to find this phone on eBay
- Samsung M520 – Link to find this phone on eBay
- You can check other phones with Ting’s BYOD page (BYOD – bring your own device)
If you need access on the go, what I recommend is getting a device like the Netgear Zing. You can get the device on Ting Cellular and at a $25 discount by going to http://ting.7eer.net/c/73747/87564/2020 and clicking the “shop” link at the top of the page. Data on Ting’s network is pretty cheap, but you do need to look at the coverage map and make sure the locations you frequent will be in range. If you pick up a device like this it will only cost $6/month while you have the device registered and data costs are listed here on Ting’s “rates” page. Using 1GB/month would cost you $19 in addition to the $6/month fee. But, if you were only using it for occasional checking of email and light surfing, you may get by with $12 (1/2 Gig). You can also just use 100Megs for $3.
As with all of Ting’s plans, you only pay for what you use, so you don’t have to worry about changing plans. Also, there are never any contracts with Ting. You own the device and don’t end up paying more to subsidize the device through the cellular carrier. You can also remove the device (like the Netgear Zing) if you don’t expect to be using it for a while.
When you connect to the Netgear Zing, you will want to make sure you are using your Tails OS USB flash drive to keep the connection secure.