Emergency Tech Support

ISIS Bans the Internet in al-Boukamal, Deir Ezzor

Written by: Zainah Alsamman ISIS has imposed a citywide internet blockade in the city of al-Boukamal in the Syrian governorate of Deir Ezzor. The internet ban extends to all communal halls, offices, shops, banks, petrol stations and homes.[1] “We are not allowed to use the internet...

Facebook Prison: Testimonies from Syria

***The original version of this account was published in Arabic on Rising for Freedom's website on October 4, 2015.*** Ahmad witnessed many horrors during his year in a Syrian regime prison.  Some of the worst were people being tortured for their Facebook and other online passwords....

ISIS Steps Up Information Control in Raqqa and Deir Ezzor

On 18 July 2015, Islamic State (ISIS) authorities issued strict limitations on the use of satellite internet in Raqqa, Syria. It signals yet another move in ISIS’ efforts to control its information space. Download Full Report > SalamaTech has tracked the digital war in Syria since 2012, including attempts by all parties to...

A “Kingdom of Silence” No more: Facebook & The Syrian Revolution

Facebook is a critical information resource in the Syrian revolution. It is also a frontline for battle. What does its evolution tell us about a post-Assad Syria? After forty years of complete political silence, Syrian citizens first found their voice in 2011 - on Facebook.  A "Kingdom...

How to Create a Secure Twitter Account

Since the beginning of the uprising, Twitter has been a central front in Syria’s cyber war. Groups like the Syrian Electronic Army regularly hack the accounts of various organizations to spread their pro-regime message. To protect your Twitter account, you need to take some basic...

How to Use Skype Securely from a Computer

Skype is a Voice Over IP (VOIP) tool for communicating through voice and chat. However, Skype conversations are vulnerable to external monitoring. Others may be listening in. To secure your conversation, you need to take some basic security steps. This guide tells you how to...

Secure Facebook Fan Page

Facebook Fan Pages are an essential communication tool for many organizations, but they are also a common target of attacks. To avoid having your Facebook page compromised, you and your organization should use Facebook safely and make the most of its security features. This guide...

How to use an Android Smartphone Securely

A smartphone is a mobile phone built on a mobile operating system, with more advanced computing capability and connectivity than simple mobile phones. Android-based phones are a common example of these devices. These phones are often used to access the internet and services like Facebook....

How to Browse the Internet Securely on a Window based Computer

Going on the internet without an encryption tool is unsafe. Internet service providers, government authorities, and hackers can track and monitor unencrypted web traffic given the proper tools and expertise. This guide provides the basic steps to help prevent monitoring of your internet browsing and...

How to Securely Delete Files from Your Computer Using CCleaner

Emptying your computer’s Recycling Bin or Trash bin does not actually delete files. Instead, the files meant for deletion are marked as available for being overwritten by new files. This means that the files can still be recovered by special programs. To fully and securely...