To many are returned

To many Saudi refugees gets returned. I have decided to use my nerdiness to attempt to create a handbook of advice. This is not a complete guide.

Defending identity

Fog of war (Is a term used in games, for what you can't see)

If nobody knows that you left, nobody is trying to stop you. Plan how to delay discovery as long as possible. Use all possible tools to maximize the time to discovery. Different tools: Fake visits, fake sick in bed, fake travel, leave in the night and any way you can justify not being in contact with those who would stop you.

The way most Saudis trying to escape are caught, is because they are tracked. This is why protecting your identity is the most important part of your escape. Protecting the identity is a way of extending the fog of war until you have escaped.



Saudi has the Internet under censorship wall. All Internet activity in Saudi is monitored. Because of the shear amount of information, it is impossible for them to read trough all. The tools they use to find activity they disprove of, is filters. Some ways of circumventing this is using code language, fake accounts or even better a VPN. A VPN is really the best way, but it is also illegal in Saudi. If you take some caution it is not a problem to avoid detection. Most VPN users are caught having it on their phone, during security checks. They usually don't look for things like this unless you are suspected. If some services are blocked for use outside Saudi, you can use a trusted proxy to gain access.

Your browser can be tracked, by using cookies, bookmarks etc. Use a stock version of the browser or a private mode where available. Or even better Tor browser. This browser sends traffic in loops and circles between you and the browser and also hides tracking information.

Cell phones

The trap to many Saudi refugees fall into is using their cell phones during the escape. They forget that cellphones can be tracked in these ways:

  • Hidden tracking app put on the phone.
  • Iphones come with anti theft hardware from which the on purchased have the access to. Available on other brands to varying degree.
  • Most phones has Geo-tagging activated, this tags all your messages images etc. with your location in the meta description of the file. This should always be turned of.
  • The phone company records details of all the calls that is made from the phone. Including length and to which phone number it is to. This information is usually sent to the owner of the cell phone subscription. And may be accessible to family members. Some companies even provides the possibility to read all text messages.
  • Parental mode on phones can be customized in a way that gives someone access to all your data sent.

Using a cell phone when escaping is a giant risk factor. Ways to negate the risks include:

  • Not bringing your phone.
  • Adjusting the settings on the phone you bring.
  • Borrowing someone else's phone or buy a prepaid phone in someone else's name or nameless when possible.
  • Tor in Firefox from an open wireless access point, if possible.(Orbot). Don't have it installed when going trough security.
  • VPN

Mix and match these to get the risk vs usability you desire. You may need a phone to ask for help, so not bringing one is risky to.

Credit cards

Every transaction and it's location from a credit card is tracked. If someone has access or parental control of your bank account they know when and where you use it. Cash is king. Sometimes it's possible to get visa gift cards that aren't traceable to a person.

Public anonymity

Saudi has a muslim majority and an a religiously enforced anonymity on women. Use this to your advantage. If you wear a niqab when you enter a foreign country and stay near others with niquab when leaving the plane. It is difficult to track you in the crowd. If the thugs from the Saudi embassy can't single you out, they will have a much harder job in infringing on your rights. If you arrive at your final destination, leave the airport as soon as possible. If you are transferring to a different country you must be prepared to blend in with different people. Change in the restroom to something bland or tourist like.

If you have a visa or a refugee status in Australia. You need to go to their embassy to show that you have arrived. Try to get to their embassy as fast as possible. This is not required, but gives you a head start if trouble comes. Find friends at the airport you might need allies. Sometimes the embassy are helpful in letting you enter the plane from a different entrance, if you have someone on your tail. They will be standing next to the gate looking for you when the plane takes of.

Know your rights

When you land on a International airport you are in a internationalized zone. In this zone the law of the country you are currently in apply. This means that if someone is caught in this zone doing criminal activities they are liable to be tried in the court of that country. Most western, Asian and so on has anti human trafficking laws. These usually include all involuntary travel of people, by fooling, intimidating or using force. All kinds of sending someone against their will or even holding them against their will, may be illegal. You should study or skim these laws for the country, before you travel and use them to argue if you get in trouble.

Due to widespread propaganda from the Saudi embassy and little knowledge of the law in general. Airport personnel, airport companies, security and even law enforcement in general. May have a bias and actually assist in sending refugees out of the country against their will. This is why you should have a basic understanding of your rights and contact the correct authorities.

Avoid liars and have a plan B already planned.

The most common way of fooling refugees to cooperate in international airport is by directly lying. Offering you help and bringing you out of the public. Before taking your papers, passports etc. Demand to speak with the correct authorities.

A way the Saudi embassy fool people is by providing other authorities with false information. This usually makes them play along. People generally do not expect a embassy to lie. This is why it is extremely important that you are clear when asking for help. "I am a refuge, I'm held in internationalized zone, which is under jurisdiction. I am a refugee/migrant that has visa in "x". I wish to be protected as a refugee under "x" and defended against human trafficking under "x". Laws can usually be found on wikipedia. They do not have the right to take your phone, but they do that sometimes. But they don't dare to do that to locals or other tourists.

In the world shocking case of Dina Ali, a video of airport personnel saying orphan Dina's father, was coming to get her can be seen. This highlights how Saudi embassy is willing to lie, in order to get other authorities on their side. In this case it was Manila airport officials, that was fooled to assist in a terrible case of human trafficking.

Documents. Always have copies of your documents in cloud services. Create a separate account using a VPN and upload copies of all your documents, use a nationality that has privacy protection(Sweden, US). If you get to the embassy correct embassy or in the hands of government officials. You can provide documentation despite it being taken. You wan't to create the separate account under an alias. You can use google docs, dropbox or similar. Remember the passwords. Don't select stay logged in, so authorities get access.

Gather evidence

Use a recording device and take names. If you manage to get authorities attention or you manage to get to the correct embassy. They will directly deny any involvement. A Saudi woman I spoke to that traveled with permission, but was still chased by the embassy. Say attention from Saudi embassy ceased, when she got to the the correct embassy. That is no guarantee they will let up the hunt. They are willing to lie about everything to anyone, so if you have recordings you can prove it and gain the trust.

Remember you are not the first or the last refugee from Saudi and all forms of documentation is helping the next ones escape. Maybe you get sent back and get to escape another day. Think ahead. If the people who assisted in your right violations the first time is in bars or fired, the likelihood someone else or you on your second run will be stopped is decreased. Also if airport personnel gets the pressure of a human trafficking lawsuit once, they will likely cooperate the second time.

Ways of gathering evidence:

Safest should be used during the entire escape. Primitive recording device not connected to the Internet. It can be a mp3 player without headset, set on record and hidden in a pocket. This can be marked with an address for it to be delivered if lost. The address should be someone you trust. You can drop this if you are sent back or give it to some civilians on the airport if you can. If it is cheap and promises a reward, it is more likely to be sent. Maybe even already having a stamp on it.

Videos, can be recorded when trouble arise. They can circulate social medias quite quickly, but social media is to be avoided unless a crisis is building. Social media is a desperation measure and is also to create political traction.

Live stream, this is one of the most powerful tools. It is impossible to delete it and if captured abroad. You can live stream video or sound if the situation gets bad. You can also set up a live stream to a person you trust in case. This stream can then be published by the person watching if things get out of hand. And clips can be made from it proving what is going on.

To onlookers from Saudi

This is not meant as an attack on Saudi, but this need to stop. You can make it so women don't want to leave in the first place, by granting them rights and protection. As a citizen of a different wealthy country, I experience women trying to get in rather than to leave. If you fixed yourself up a bit, maybe that would be the case for Saudi as well. If you in any sense think people trying to escape Saudi are bringing you a bad name, know that you are the cause and not them. Trying to stop them only brings greater attention.


This article is free to, copy, redistribute, re-blog , publish under a different name without giving credit, modify or use in any way desired.


You got HACKED!! (No I didn't, or did I ??)

There is a lot of malicious software out and going recently and you might get hacked. You are more likely to be hacked by some kid on the internet than American CIA. I'm sorry to break your wet dream of being hacked by a hairy ginger CIA operative. The most common methods as of today are using fake websites(phishing), links with software that abuse the authentication software and trojans from free software. I do not consider DDos a hack, a hack is when someone takes control of your accounts or hardware.

Tip 1 - Use two-step and wit to avoid phishing.

yoda meme starwars two step authentication

Phishing isn't really hacking per say, it's a short cut to get access to your account. Someone creates an exact copy of popular websites and send you the link. If you log in, instead of getting logged in. The hacker records your information. Then later he can use your password to compromise your services. The best way to avoid phishing is to use two-step verification. It's mandatory to use two-step on emails that you have used to register services. If your email gets compromised a hacker can reset all your password on other services. A really bad day.

Most browsers also use a verification service to check if you are on an authentic site. It's the green thing that appears in front of the url. Keep an eye on it especially if you are on a public computer.

Tip 2 - Avoid clicking short code links from people you don't trust.

meme your a special kind of idiot

Your browser is easy to compromise and the amount of malicious scripts out there; is limitless. The modern way of getting people to click on malicious links is by using short links with media that looks like it comes from a valid source. Be careful with what tweets you click on and from who. Some of the links abuses social media identification keys and cookies to gain control of your social media accounts. They will be able to change your passwords if you are using incompetent service providers.

Tip 3 - Get free software from the author.

meme free app

Go to the trouble to find the homepage of the program you are going to download. Make sure you use a link they give you, to download free software. It is very common to have free software libraries for you to download stuff. But they are often funded by adware and spyware and alike. These have security holes that hackers can take advantage of. Another easy trick to find safe and good free software is to look for software that is also available in Linux. This is because free in Linux usually means it's free like beer, also open as in free like freedom. In windows terminology free usually means you don't use money, but they get the money by other means. These services keep paywalls alive, because it hinders distribution of free software.

Tip 4 - Antivirus etc...

antivirus meme

An antivirus is not the saving grail of malicious software, like it used to be. You should have it, but never trust it. Antivirus software is bloated and intolerable. Sometimes it's better not having them. This is true especially on low powered machines, leave them as is. Always download antivirus software from the source. Many antivirus software's lie about catching viruses. They detect things that are not viruses to appear better than competitors. The best defense against malicious software, is not getting it on your computer. An antivirus is just a helmet, it does not protect you from stupid.

Tip 5 - Cloud and easy to remember passwords

meme the cloud toy story

Now that most is in the cloud, computer hacking is becoming less valuable. Security in your browser and your social media accounts is getting more important. Especially the passwords. One way of avoiding loosing your passwords to key-loggers is using a key-chain, the problem is that key-chains are only as safe as your key-chain. It's also easier to forget the passwords.

Tip 6 - Use different passwords


I recommend using different passwords for each service, and a way of making them easy to remember. For example if you have a base password which is the same, then you add some letters of each service. This will make it impossible to guess the other passwords. Choose a gibberish word of 3 or more random characters, that is not in the dictionary and 3 or more numbers, that are not your date of birth. (Not 1234,1111,1337 or 4242). You can take the first and the last, or even according to the numbers you picked. Now you can easily remember all your passwords. When you change a password, change all the passwords and chose a slightly different formula. You should change once in a while. Use a large letter and a symbol. It does not make your passwords much safer, but some services require it. It’s better to have it on all than to have inconsistency.

Here are two examples:

‘word”letters based on number”number’425F!stysplintF!stysplinter425F!stysplintwt425F!stysplintaf425
 ‘word”letters based on number”number’ 3638B!ringB!ringdtd.3638B!ringiei.3638B!ringcock3638

Yousician? What is it

Yousician is a game that teaches you to play real instruments. You get lessons, feedback and to learn some cool songs. I don't quite know if I wan't to call it a game, tutorial or program. The instruments you can learn to play is piano and different kinds of guitar. The main feats of this program is it's simplicity and usability. It takes Singstar and Guitar hero type games, to a new extreme. Instead of flicking a flap up and down, you take out your guitar and play some riffs.


Yousician is pretty usable in the free version. It's not to limited and it is possible to play unlocked tracks without the feedback function after the limited free practice time runs out. The paid version is however a bit pricey. To play all instruments for a month you have to cash out $29.99. Compared to other games this is a lot and I bet the sales and profit would go up, if they pushed down the price. I recommend using the free version if you are only planning to play once in a while.


Yousician has managed to get a green interface, to look about right.  It has a balanced amount of lesson time and playtime and was very easy to set up. (I just turned down the sound to minimum on my amp and plugged it in the microphone slot. GooD HaCkEr) One thing I really did not like, was when you played to many wrong notes it stopped the song. It also had a very loud sound that almost gave me a heart attack.

(They are not paying me for this, I just like the program.. game... tuto.. something yes.)

To get Yousician go to their website and download for free.