Protected Voices: Virtual Private Networks
The FBI’s Protected Voices initiative provides cybersecurity recommendations to political campaigns on multiple topics, including virtual private networks (VPNs), to help mitigate the risk of cyber influence operations targeting U.S. elections
How can you protect your data while it’s in transit?
Hello, I’m Don, a staff operations specialist with the FBI.
It’s easy and convenient to use public Wi-Fi to access the Internet. However, this is risky, because you can’t control the security standards of a public Wi-Fi network.
There’s a great solution to this problem: Use a virtual private network, or VPN, to shield your sensitive data.
A VPN creates a secure tunnel for your data to transit the Internet, using a network of private servers. When you use a VPN, your data is encrypted, or hidden, as it moves from your device to the VPN and then continues onto the Internet through what’s called an exit node. A VPN creates the appearance that your data is coming from the VPN server, not from your device. Therefore, it’s harder for an attacker to identify you as the source of the data. Even if attackers can intercept your data, the encryption means the attackers can’t understand your data or use it to their advantage.
A VPN is a simple way to keep your campaign staff members’ communications and Internet usage more secure, even when they use public Wi-Fi networks at hotels, airports, or other places where the campaign can’t control the security of those networks.
You have many options in choosing a VPN service. Keep in mind that all of your sensitive data will travel through the VPN provider’s servers, which means you must ensure that the provider is trustworthy and enjoys a solid reputation. Consider the answers to questions like these:
What’s the cost of the VPN service? Some options are free, some are free up to a certain amount of data usage, some are paid services.
What encryption and tunneling protocols are used? Some protocols offer increased levels of protection.
What logs does the VPN keep?
Where is the VPN hosted?
How many devices can you use per account?
How many exit nodes does the VPN provider maintain, and where are they located.
What happens if the VPN service goes down?
Make sure you read the entire end-user license agreement to identify which VPN provider may be the best fit. And corroborate the VPN provider’s capabilities with some of your own research to verify that you’re choosing a reputable, trustworthy provider.
Finally, implementing a VPN is usually simple: You’ll sign up for a service and then download and install an application.
Using a VPN is a great way for your campaign to keep its communications and Internet activities more private, especially when using public Wi-Fi or other points of access not under your direct control.
Remember, your voice matters, so protect it.
- 09.17.2020 — New Charges, Plea Deals in SF City Hall Corruption Investigation
- 09.17.2020 — Director Wray Voices Support for Police During House Testimony
- 09.16.2020 — Director Wray Addresses CISA Cybersecurity Summit
- 08.26.2020 — FBI Portland Issues Statement on Unrest and Requests Public Tips
- 08.21.2020 — Seeking Information in Pharmaceutical Robberies in Maryland and Pennsylvania
- 08.21.2020 — FBI Kansas City - 100th Anniversary
- 08.21.2020 — Seeking Missing 21-Year-Old Mother; $10,000 Reward for Information
- 08.20.2020 — FBI Statement on the Charging of Former Uber CSO for Covering Up 2016 Hack
- 08.20.2020 — Seeking Information in Kansas City Mobile Phone Store Robberies
- 08.14.2020 — FBI Cincinnati Remembers Special Agent Nelson B. Klein
- 08.14.2020 — FBI San Francisco Announces Arrest of Alleged Murder Suspect
- 08.12.2020 — Central Records Complex Opens to House FBI Files
- 08.06.2020 — FBI Boston: Vandalism and Arson of a Providence Police Department Cruiser
- 08.05.2020 — FBI Cleveland: CVS Robbery Surveillance Footage
- 07.31.2020 — FBI San Francisco Remarks on Twitter Security Incident Investigation
- 07.22.2020 — Underwater Post-Blast: Examining Evidence
- 07.22.2020 — Underwater Post-Blast: Student on Boat
- 07.22.2020 — Post-Blast Training Boat Wake Loop
- 07.22.2020 — Underwater Post-Blast: Diver Enters Water
- 07.22.2020 — Underwater Post-Blast: In the Classroom