Version 1

Digital Security Basics

Learn the foundations of secure communication and digital safety in the ICE Tea Network.

7 min readΒ·Qualified Lesson

πŸ” Digital Security Basics

Tech & Comms Track
Logistics & Mutual Aid Operations

Digital security isn’t a nice-to-have β€” it’s the frontline of community safety. From the moment a report is made to the time a responder takes action, our data can be targeted.

This module gives you the tools and habits needed to protect yourself, your team, and the people we show up for.


Warning

If we aren’t thinking about security, we’re making someone else vulnerable.


Core Practices

At a minimum, everyone participating in ICE Tea field or digital roles should be using:

  • πŸ“± Signal for all messaging
  • πŸ“§ Proton Mail for secure email
  • πŸ“· Metadata removal from all shared photos or videos
  • πŸ›œ VPNs or local-only tools like Tailscale for coordination

If any of these are new to you β€” don’t stress. Start where you are. Level up together.


Why Signal?

Signal is:

  • End-to-end encrypted (even Signal can’t read your messages)
  • Open-source and vetted by privacy orgs
  • Used by everyone from journalists to dissidents to ICE Tea teams

Use Signal for:

  • Dispatch alerts
  • Role assignment
  • Internal check-ins
  • Sharing sensitive observations

Rabbit Hole

πŸ’¬ Want to learn how Signal works? β†’ Search: β€œSignal protocol explained EFF”


Why Proton?

Proton Mail is a secure email service based in Switzerland (outside U.S. jurisdiction) that offers:

  • End-to-end encrypted inboxes
  • No ads, tracking, or metadata harvesting
  • Calendar + Drive options for future collaboration

Only use Proton accounts for any ICE Tea–related messages, photos, or docs. Keep Gmail out of it.


Stripping Metadata from Media

Every photo you take includes hidden data like:

  • Location (GPS)
  • Timestamp
  • Device info

That data can expose people β€” or places they’re protecting.

Easy Ways to Remove Metadata:

  • Use built-in β€œExport As” or β€œSave for Web” on mobile
  • Use apps like ScrambledExif (Android) or Metapho (iOS)
  • If needed: send via Signal, which strips metadata automatically

Hint

Before sharing a photo or video, ask:
β€œCould this expose someone’s location, face, or phone info?”


What Not to Do

  • ❌ Don’t share screenshots of chat logs
  • ❌ Don’t upload videos to public Google Drives or YouTube
  • ❌ Don’t use unencrypted texting for field logistics

Even β€œprivate” groups can be subpoenaed or leaked. Assume nothing is safe unless it’s encrypted.


Security Habits for the Field

  • βœ… Lock your device with a passcode (not fingerprint or face unlock)
  • βœ… Turn off auto cloud backups for Signal and Proton
  • βœ… Use encrypted storage for notes or observations (Standard Notes, Proton Drive)
  • βœ… Practice offline mode in case of no signal

Rabbit Hole

🧠 Want to go deeper? β†’ Check out the full β€œEncryption 101” or β€œSecure Ops” certification track (coming soon)


Success

You don’t need to be a hacker to protect your team. Just start with Signal, Proton, and awareness.

πŸ“˜ Knowledge Check

Which app should you use for all dispatch-related messaging in ICE Tea?

Photos taken on your phone include GPS and device info by default.

Which of the following are good digital security habits?

What is the best way to send a photo that removes metadata automatically?


🚫 You must register and log in to mark this lesson as qualified. Registering helps us track progress, verify training, and build trust across our network.

You can use your Dispatch login here if you already created an account there. Likewise, creating an account here will let you use the same credentials on Dispatch.

Complete and pass the quiz above to unlock this button. You’ll need at least 80% correct.