Digital Security Basics
Learn the foundations of secure communication and digital safety in the ICE Tea Network.
π Digital Security Basics
Digital security isnβt a nice-to-have β itβs the frontline of community safety. From the moment a report is made to the time a responder takes action, our data can be targeted.
This module gives you the tools and habits needed to protect yourself, your team, and the people we show up for.
Warning
If we arenβt thinking about security, weβre making someone else vulnerable.
Core Practices
At a minimum, everyone participating in ICE Tea field or digital roles should be using:
- π± Signal for all messaging
- π§ Proton Mail for secure email
- π· Metadata removal from all shared photos or videos
- π VPNs or local-only tools like Tailscale for coordination
If any of these are new to you β donβt stress. Start where you are. Level up together.
Why Signal?
Signal is:
- End-to-end encrypted (even Signal canβt read your messages)
- Open-source and vetted by privacy orgs
- Used by everyone from journalists to dissidents to ICE Tea teams
Use Signal for:
- Dispatch alerts
- Role assignment
- Internal check-ins
- Sharing sensitive observations
Rabbit Hole
π¬ Want to learn how Signal works? β Search: βSignal protocol explained EFFβ
Why Proton?
Proton Mail is a secure email service based in Switzerland (outside U.S. jurisdiction) that offers:
- End-to-end encrypted inboxes
- No ads, tracking, or metadata harvesting
- Calendar + Drive options for future collaboration
Only use Proton accounts for any ICE Teaβrelated messages, photos, or docs. Keep Gmail out of it.
Stripping Metadata from Media
Every photo you take includes hidden data like:
- Location (GPS)
- Timestamp
- Device info
That data can expose people β or places theyβre protecting.
Easy Ways to Remove Metadata:
- Use built-in βExport Asβ or βSave for Webβ on mobile
- Use apps like ScrambledExif (Android) or Metapho (iOS)
- If needed: send via Signal, which strips metadata automatically
Hint
Before sharing a photo or video, ask:
βCould this expose someoneβs location, face, or phone info?β
What Not to Do
- β Donβt share screenshots of chat logs
- β Donβt upload videos to public Google Drives or YouTube
- β Donβt use unencrypted texting for field logistics
Even βprivateβ groups can be subpoenaed or leaked. Assume nothing is safe unless itβs encrypted.
Security Habits for the Field
- β Lock your device with a passcode (not fingerprint or face unlock)
- β Turn off auto cloud backups for Signal and Proton
- β Use encrypted storage for notes or observations (Standard Notes, Proton Drive)
- β Practice offline mode in case of no signal
Rabbit Hole
π§ Want to go deeper? β Check out the full βEncryption 101β or βSecure Opsβ certification track (coming soon)
Success
You donβt need to be a hacker to protect your team. Just start with Signal, Proton, and awareness.
π Knowledge Check
Which app should you use for all dispatch-related messaging in ICE Tea?
Photos taken on your phone include GPS and device info by default.
Which of the following are good digital security habits?
What is the best way to send a photo that removes metadata automatically?
π« You must register and log in to mark this lesson as qualified. Registering helps us track progress, verify training, and build trust across our network.
You can use your Dispatch login here if you already created an account there. Likewise, creating an account here will let you use the same credentials on Dispatch.
Complete and pass the quiz above to unlock this button. Youβll need at least 80% correct.