> [!danger] CRITICAL NOTICE These protocols are mandatory for all ARI communications and research activities. Violations may result in immediate access revocation. ## Communication Security ### Encrypted Communications - **Primary:** ProtonMail for all sensitive correspondence - **Secondary:** Signal for urgent communications - **Tertiary:** PGP-encrypted email for large data transfers ### Digital Security Measures 1. **Two-Factor Authentication (2FA)** - Required for all ARI systems access - Hardware keys preferred over SMS - Backup codes must be stored securely 2. **VPN Requirements** - Always active during research activities - No logging providers only - Regular IP rotation 3. **Device Security** - Full disk encryption mandatory - Regular security updates - No shared devices - [[Clean Device Protocol]] ## Data Handling > [!warning] Classification Levels All data must be properly classified and handled according to sensitivity: > > - Level 1️⃣: Public Information > - Level 2️⃣: Protected Research > - Level 3️⃣: Sensitive Data > - Level 4️⃣: Critical Intelligence ### Storage Protocol 1. **Digital Storage** - Encrypted containers only - Multiple backup locations - Secure deletion methods - [[Data Retention Policy]] 2. **Physical Documentation** - Secure storage required - No unauthorized copies - Destruction protocols - Chain of custody logging ## Operational Security (OPSEC) ### Field Operations 1. **Location Services** - Disabled by default - Spoofing when necessary - Metadata scrubbing - [[Geographic Security Measures]] 2. **Equipment Security** - Regular sweeps for tampering - No unauthorized modifications - Secured when not in use - [[Equipment Security Protocol]] ### Social Media Guidelines - No real-time posting - Location data stripped - No identifying information - Delayed posting schedule - [[Social Media Policy]] ## Incident Response ### Security Breaches 1. **Immediate Actions** - Isolate affected systems - Document incident details - Notify security team - Implement countermeasures 2. **Report Requirements** - Time and date - Systems affected - Data compromised - Action taken - [[Incident Response Protocol]] ## Verification Methods ### Source Verification 1. **Document Authentication** - Digital signature verification - Metadata analysis - Source credibility check - Cross-reference validation 2. **Witness Protection** - Anonymous reporting systems - Secure communication channels - Identity protection measures - [[Witness Protection Protocol]] > [!example] Security Checklist > > - ☐ Encryption active > - ☐ VPN connected > - ☐ 2FA enabled > - ☐ Secure storage confirmed > - ☐ Metadata cleaned > - ☐ Location services checked > - ☐ Equipment secured > [!info] Updates These protocols are regularly reviewed and updated. Check [[Security Bulletin]] for latest amendments.