Date: 30 October 2025
Speakers: Professor Martin Innes and Diyana Dobreva
OpSec is much more than a process – it is a mindset: ‘Have you got your OpSec on?
Practical OpSec Tips
- Security should be led by your institution and tailored to your adversaries
- Create Alias Accounts
- Use non-attributable email, verification, and media items
- Check your aliases are not traceable to your real identity – search with Bing, DuckDuckGo, Grok (Google search is not effective)
- Use a VPN
- A VPN will mask your real IP address
- Not all university networks are VPNs
- A University VPN can flag your activity as legitimate research, but external trusted services are preferred for high-risk anonymity e.g., Nord, PIA, Proton
- Use a Virtual Machine (VM) or an isolated operating system for research
- A VM will Isolate any malware and maintain a separate digital fingerprint
- Imagine a secure house (personal computer) with a temporary disposable research lab in a garage (VM for research)
- Provide information to Ethics Committees on a ‘need to know basis’
- Balance research transparency & accountability with researcher safety
- Seek support if you are subject to interference
- There are resources to help manage pressures and personal toll e.g., institutional security officers, psychological first aid courses
- Reach out to networks e.g., ESRC postgraduate or institutional networks
- Consider ways to protect your family
- If you have social media, ensure family accounts are not linked to you (in case of compromise.)
- Plan for unintentional discoveries of illegal material
- Report CSAM to Internet Watch Foundation
- Use institutional reporting channels to security services, hotlines etc.
Publishing Research
- Go beyond descriptive accounts of data to conceptualise patterns – use social science theories
- Research should be immaculate to avoid ‘own goals’ e.g., don’t conflate invidious information with misinformation or disinformation, don’t publish information that helps hostile actors
- Remember influence doesn’t just happen through publication, use resources such as NABS+ to network with policymakers
Hostile Actors
- War in Europe has changed the context for research
- State actors have greater capabilities for hostile action against researchers but are more predictable in terms of who, why, and how.
- Non-state actors have fewer capabilities but are less predictable.
Key Takeaway
Defend forward – think at the outset ‘have you got your OpSec on?’ How can I manage all the different risks for my particular kinds of research? Be aware that risks might materialise in the field or downstream
Read More
- Van Maanen, J. (2011). Tales of the Field : On Writing Ethnography (2nd ed.). University of Chicago Press
- NPSA guidance for High-Risk Individuals
- Internet Watch Foundation
