Logo

Search in DATA AFFAIRS

TaskExercise 5

Exercise 5

This exercise relates to the interview with Max Kramer on the secure handling of research data, which you can read again if needed.

Transcript of the Interview Excerpt

Birgitt Röttger-Rössler: Given the political sensitivity of your research, particularly as Muslim minority groups frequently face hostilities from Hindu nationalists – as you mentioned – how do you handle this challenge? You’ve already touched on it, but could you elaborate on how you ensure the safety of your interview partners? And to what extent does this affect – or rather, influence – your approach to managing your research data?

Max Kramer: Yes, in all kinds of ways. For instance, when communicating in the field, we don’t use WhatsApp but Signal. While in the field, I set Signal to automatically delete messages after 30 minutes. I ensure that everything I record as raw data is securely captured, stored, and processed.

To record videos, photos, and audio files, I use a separate phone that has no SIM card and runs GrapheneOS, a secure operating system. On this phone, I also use encryption software, which I use every evening to encrypt all the files I recorded during the day. The phone has two separate user accounts, and it’s quite difficult to discover that a second account even exists. This means that if someone were to take my phone, they likely wouldn’t even find the second account, where most of my research data is securely encrypted. Even if someone did find it, decrypting a VeraCrypt file would be extremely difficult.

I also use a dedicated research laptop – an Ubuntu system – where I install only software that I fully understand and trust. I’ve blocked online access for most installed software in the system settings, preventing any background uploads to cloud storage. When I transcribe my interviews, I do so entirely offline, using a USB stick. Before transcription, I decrypt the files, transcribe them, and then re-encrypt them before storing or transferring anything online.

All of this concerns the collection, transportation, storage, and processing of my research data – especially transcription, which is the most sensitive part. My interviewees grant me access to operational knowledge that, while based on visible micro-level interactions, contains insights that must remain confidential. It’s crucial that this knowledge never falls into the wrong hands.

Task:
Sketch the measures Max Kramer applies in the field for secure communication, recording, processing, and storage of research data.

  • Communication:
    • Secure messenger
    • Automatic deletion of messages after 30 minutes
  • Recording:
    • Secondary phone without a SIM card, secure operating system, two accounts, and encryption software
    • Encryption of daily data every evening
  • Processing:
    • Secure research laptop with blocked access to online services and platforms, mainly offline
    • Transcription always offline and from a USB stick
    • Decryption only before transcription and immediate re-encryption afterward
  • Storage:
    • Only encrypted data is stored
    • No storage on cloud services