Join Us
Freelancers are core of Modern-Defence. We provide a safe and secure environment to our freelance researchers who are ready to put intense efforts in collecting organizing, and analyzing various forms of data and information for the purpose of finding solutions for various issues related to strategic and defence planning, nuclear threat perception, security of nuclear assets, engineering, trends, identifying geopolitical opportunities, and anticipating latest trend in technologies in defence sector.
At Modern-Defence we believe our strength depends on hiring the best and brightest talent in the freelance world to join our team. If you get excited about finding new solutions or analyzing through research on strategic, defence, technology and geopolitical affairs, you are at right place.
With the help of our robust freelancer team, we support the different entities media houses and think-tanks with a focus on development in defence sector, strategic maneuvering by various governments across the globe to ensure that concerned stakeholders get what they are looking for.
Freelance researchers and analysts are always welcome to message our team at admin@moddef.at
Signal is a secure messaging app that not only encrypts messages, but also minimizes the amount of metadata it collects about users. Our researcher and team members have individual Signal usernames. You can contact us to get connected to our team members.
Do not install Signal on your official/ work phone. Preferably, use a separate, dedicated phone just for communicating with us. At a minimum, use any other personal phone not connected to your work phone.
Make sure to enable disappearing messages, and don’t make calls or send messages while at work.
By contacting us, our team member will guide you in detail to follow the best practices.
You can learn more about Signal’s features and updates at Signal’s blog.
Email
Compared to an encrypted messaging app, email is not a secure method of communication. Our future communication through email is hosted by Proton Mail. If you email us from a Protonmail account, the message contained will be encrypted. But metadata — such as your email address and ours — is not encrypted and could be visible to others.
To securely use Protonmail, you need to make your own Protonmail account. Don’t do that on a work computer. And don’t google “how do I leak my damning information?” All of that can be traced. Be especially careful not to use a work device and keep things out of the cloud.
Don’t contact us from official phone/email. Most organizations (corporate and government networks) maintain log traffic. Even if you’re using Tor, being the only Tor user at work could make you stand out. It’s better if your email address is not on our list, and emails from us aren’t in your inbox.
Don’t email us, call us, or contact us on social media. From the standpoint of someone investigating a disclosure of information, who you communicate with, and when, is all it takes to make you a prime suspect. Consider carefully your decision to share information with our researchers or team members.
When you access documents at work, there is a good chance that this access is logged and associated with your account. If only a small number of people have access to the document you’re accessing, maintaining your anonymity may be harder. In our experience, cases where individuals were caught involved authorities gathering evidence from:
search logs and access logs from restricted databases
personal emails and Google search histories
metadata of text messages and phone calls
data from searches on personal computers and phones, including Signal and WhatsApp messages that weren’t deleted
Be aware of your habits. If you have had access to sensitive information that becomes public, your activities on the internet could come under scrutiny, including sites visited or shared on social media. Logs of activity on internal networks at your workplace may be examined. Tools like the Tor browser can help protect your browsing anonymity.
Always compartmentalize. Keep your information sharing activity as separate as possible from your regular activities. Don’t use pre-existing social media, email, or online accounts; instead, create new accounts for this purpose, and don’t log in from networks you normally connect to.
Make sure to clean up after yourself as best as you can. Avoid leaving traces related to information sharing on your personal or work computers or phones (like in documents, browser history, Signal messages not deleted, etc.). If you perform a Google search related to sensitive information while logged into your Google account, delete your search history. Consider using Tor or your browser’s incognito/private mode to avoid being logged in or recording history. Keep related files on an encrypted USB stick rather than on your computer, and only connect it when necessary.
Consider using a completely separate computer or operating system for all activity. Even if you’re using the Tor browser, if someone hacks into your device, they can spy on everything. Tails is an OS designed to leave no traces. It’s complex but worth the effort for high security.
It’s important to understand that no method is fully secure. We will do our best to protect your identity, but today’s surveillance techniques mean that your communications and searches should be carefully secured. Sharing sensitive information carries risks, but they can be minimized with caution—sometimes it’s necessary for the greater good.
If you have critical information to leak safely, we recommend using Protonmail for encrypted email and Signal for encrypted messaging. You can Contact Us directly.
At Modern-Defence we believe our strength depends on hiring the best and brightest talent in the freelance world to join our team. If you get excited about finding new solutions or analyzing through research on strategic, defence, technology and geopolitical affairs, you are at right place.
With the help of our robust freelancer team, we support the different entities media houses and think-tanks with a focus on development in defence sector, strategic maneuvering by various governments across the globe to ensure that concerned stakeholders get what they are looking for.
Freelance researchers and analysts are always welcome to message our team at admin@moddef.at
Things to take under consideration:
Signal
Signal is a secure messaging app that not only encrypts messages, but also minimizes the amount of metadata it collects about users. Our researcher and team members have individual Signal usernames. You can contact us to get connected to our team members.
Do not install Signal on your official/ work phone. Preferably, use a separate, dedicated phone just for communicating with us. At a minimum, use any other personal phone not connected to your work phone.
Make sure to enable disappearing messages, and don’t make calls or send messages while at work.
By contacting us, our team member will guide you in detail to follow the best practices.
You can learn more about Signal’s features and updates at Signal’s blog.
Compared to an encrypted messaging app, email is not a secure method of communication. Our future communication through email is hosted by Proton Mail. If you email us from a Protonmail account, the message contained will be encrypted. But metadata — such as your email address and ours — is not encrypted and could be visible to others.
To securely use Protonmail, you need to make your own Protonmail account. Don’t do that on a work computer. And don’t google “how do I leak my damning information?” All of that can be traced. Be especially careful not to use a work device and keep things out of the cloud.
What not to do if you want to remain anonymous:
Don’t contact us from official phone/email. Most organizations (corporate and government networks) maintain log traffic. Even if you’re using Tor, being the only Tor user at work could make you stand out. It’s better if your email address is not on our list, and emails from us aren’t in your inbox.
Don’t email us, call us, or contact us on social media. From the standpoint of someone investigating a disclosure of information, who you communicate with, and when, is all it takes to make you a prime suspect. Consider carefully your decision to share information with our researchers or team members.
Other things to take under consideration:
When you access documents at work, there is a good chance that this access is logged and associated with your account. If only a small number of people have access to the document you’re accessing, maintaining your anonymity may be harder. In our experience, cases where individuals were caught involved authorities gathering evidence from:
search logs and access logs from restricted databases
personal emails and Google search histories
metadata of text messages and phone calls
data from searches on personal computers and phones, including Signal and WhatsApp messages that weren’t deleted
Be aware of your habits. If you have had access to sensitive information that becomes public, your activities on the internet could come under scrutiny, including sites visited or shared on social media. Logs of activity on internal networks at your workplace may be examined. Tools like the Tor browser can help protect your browsing anonymity.
Always compartmentalize. Keep your information sharing activity as separate as possible from your regular activities. Don’t use pre-existing social media, email, or online accounts; instead, create new accounts for this purpose, and don’t log in from networks you normally connect to.
Sanitize
Make sure to clean up after yourself as best as you can. Avoid leaving traces related to information sharing on your personal or work computers or phones (like in documents, browser history, Signal messages not deleted, etc.). If you perform a Google search related to sensitive information while logged into your Google account, delete your search history. Consider using Tor or your browser’s incognito/private mode to avoid being logged in or recording history. Keep related files on an encrypted USB stick rather than on your computer, and only connect it when necessary.
Consider using a completely separate computer or operating system for all activity. Even if you’re using the Tor browser, if someone hacks into your device, they can spy on everything. Tails is an OS designed to leave no traces. It’s complex but worth the effort for high security.
It’s important to understand that no method is fully secure. We will do our best to protect your identity, but today’s surveillance techniques mean that your communications and searches should be carefully secured. Sharing sensitive information carries risks, but they can be minimized with caution—sometimes it’s necessary for the greater good.
If you have critical information to leak safely, we recommend using Protonmail for encrypted email and Signal for encrypted messaging. You can Contact Us directly.