Mobile Phone Security Screen
Mobile Phone Security Screen
Mobile Phone Security Screen
Håkan Geijer
Some of the most powerful tools at our disposal are our internet connected
smart phones. Instant communication and the sum of all human knowledge at
our fingertips massively increases our ability to affect the world around us. But
this connectivity comes at the cost of increased surveillance by State security ap-
paratuses and private individuals. Those who are active in liberatory movements
are aware—to varying degrees—of this surveillance, and collectively we have de-
veloped operational security (OpSec) practices and an internal security culture to
counter disruptions to our efforts to organize.
There are many urban legends around phones use that stem from inaccurate
understandings of the technology used by phones and what capabilities the State
and private actors have at their disposal to surveil individuals via their phones.
Threat modeling is the process of identifying threats and building specific and
pragmatic countermeasures against them, but without accurate models of one’s
adversaries, such models lead to ineffective countermeasures. Action taken based
off misinformation can lead to easy arrest or create the impression of an all-seeing
adversary thus stifling action. This zine covers the basic technologies of phones
and addresses common urban legends so that you and your comrades can resist
disruption and organize effectively.
There is no such thing as perfect security. It is not a binary that is either
“on” or “off,” nor is it even a spectrum of “better security” or “worse security.”
Security is best discussed as “more secure under these conditions against those
threats.” What might be effective for keeping the State from tracking your location
via your phone might be useless for keeping an abusive partner from reading your
messages. This guide will help you understand the risks you face so you can make
informed decisions. Security culture is not a guarantee of safety, but it is harm
reduction. It may prevent your imprisonment or save your life or the lives of those
around you.
This zine was written at the start of 2022 by anarchists in Europe and North
America, and as such this knowledge will be most relevant to those close to us
in both space and time. We intentionally omit (most) legal considerations; just
because your adversary isn’t allowed to do something doesn’t mean they won’t do
it anyway. We instead focus on what is technically possible. We also acknowledge
the biases we can’t see past (they can still be found in this zine), and we are not
able to predict the future. You will have to use the knowledge of your personal
and local contexts to adapt what is written here to the specific threats you face.
Phone Tech
In order to understand how phones can be compromised and used to facilitate
surveillance, we need to have an accurate understanding of how the different
technologies used in phones work, such as the phone’s hardware, the phone’s
firmware and operating system, mobile networks, and to some extent the internet
at large. This will help you build a threat model so you can make informed
decisions which is preferable to memorizing seemingly arbitrary steps.
Cellular Networks
Cellular networks take their name from the many overlapping cells of coverage
provided by transceiver towers.3 In urban areas, there is more dense coverage, so
a single phone is in contact with more towers. In suburban and rural areas, there
is less overlap, and consequently a phone is in contact with fewer towers.
Network operators can use information about the signal itself to estimate
phone locations. Coarse location can be determined by the angle-of-arrival at
the tower or by knowing from which sector4 the signal arrived. When a phone’s
2 Internet service provider
3 Not all cellular sites are towers, but using the layperson term suffices.
4 The cone-shaped area covered by a single antenna.
distance from multiple towers is simultaneously measured, the network provider
can triangulate the phone’s location very accurately.5 LTE networks can position
a phone’s position to within a few tens of meters, and 5G networks are able do
this to within 5 meters. The more towers there are, the more reliably a phone’s
location can be determined, thus rural triangulation is generally less accurate
than urban triangulation.
When phones connect to a cellular network, they send a unique device ID
(IMEI6 ) along with their subscriber’s ID (IMSI7 ). An IMSI is typically stored on
a physical SIM8 card or eSIM.9 This means that swapping multiple SIM cards
between a device or one SIM card between multiple devices can create a hard link
between these identities. A valid SIM or IMSI is not required to make a phone
call; these only authenticate the device to the carrier and determine if the device
is permitted to make calls or use mobile data. For example, in most (if not all)
regions, emergency services can be called without a SIM. Removing a SIM card
from your phone does not prevent tracking.
Types of Phones
Most people who say “phone” and mean “smart phone,” namely one with an op-
erating system and apps that can be installed by users. A basic phone is the least
sophisticated kind of mobile phone, the kinds seen in the early days of widespread
mobile phone adoption that can only make phone calls and send SMS messages.
Somewhat rare these days are feature phones. They are somewhere between smart
phones and simple phones. They may have vendor specific applications such as
an email client or internet browser built in. To differentiate feature phones and
basic phones from smart phones, the term “simple phones” is used to describe the
two former types.10
Smart Phones
Smart phones generally have a location service feature that allows the phone
to provide high-accuracy, real-time location data to applications, most notably
maps. The location service uses signals received from GPS11 or GLONASS12
satellites to triangulate the phone’s position. Most phones use A-GPS13 which
5 This is called “uplink multilateration.” And as a note, we’re using “triangulation” to mean
“multilateration” because in this case it’s worth trading technical accuracy for understandability.
6 International Mobile Equipment Identity.
7 International Mobile Subscriber Identity.
8 Subscriber Identity Module.
9 Embedded-SIM, a chip integrated directly into the device.
10 Some people use the phrase “dumb phone” to mean either all simple phones or just basic
Malware
Malware is malicious software. It is a program that does something you don’t
want and tries to hide its activities. Malware created by the State often has the
goal of simply surveilling and spreading to other phones or even electronics like
WiFi routers.
Old internet security training said that malware is installed by visiting dodgy
websites or opening attachments on emails from unknown recipients, and while
this is still true, the attack surface of your phone is far larger. Most, if not all, of
your apps poll for notifications or wait for notifications to arrive from Google Play
Services and then make requests to the app’s servers. Some malware is zero-click
meaning that it requires no user interaction. As an example, the Pegasus spyware
from the NSO Group used a zero-click exploit and targeted activists, journalists,
and politicians. Malware can be installed on our phone even if you only use
trusted apps and only (knowingly) accept messages from trusted contacts.
Some malware only stays in your phone’s memory while your phone is on and
is unable to persist across reboots. Because of this, some malware will hijack the
phone’s shutdown routine and do a false shutdown. Still, periodically rebooting
your phone has the potential to clear malware.
If you believe your phone has been compromised, you will need to find a
malware specialist who can help you determine this, and you may need to get a
new device. Malware is less common than you think, but don’t let its uncommon
nature cause you to ignore legitimate warning signs. State-sponsored malware
will not be as readily detectable as low-effort malware, so the common methods
may not apply. Detection is unfortunately not something you can do yourself.
Operating Systems
One of the most common questions activists ask about smart phones is “Which
is more secure, iOS or Android?” As with all security questions, the answer is “it
depends.”
Smart phone operating systems (OSes) come in two flavors: iOS for Apple
devices and Android for everything else. iOS is proprietary with private source
code. Android is a base OS with public source code that manufacturers can
modify for their devices. Manufacturers’ Android OSes generally have private
source code. In addition, there are many full versions Android maintained by the
open source community, most notably LineageOS.14 GrapheneOS and CalyxOS
are open source Android OSes that have a significant focus on privacy and security.
When a phone is powered on, the hardware starts loading the OS using a
process where each step verifies the integrity of the software needed for the next
step. This goes by various names such as secure boot or verified boot. In order
to install a custom OS, this verified boot process must be disabled otherwise the
hardware would refuse to load the custom OS because it is not cryptographically
signed by a trusted key that was included by the original equipment manufacturer.
This allows for the possibility of a malicious OS that could read your data being
installed instead of the genuine OS, either by physical access or by malware. This
does not, however, mean that stock OSes are more or less secure than custom
OSes. It means that there is a different risk profile when disabling verified boot
and using a custom OS.
When malware is developed, it must target a single application or OS. Devel-
oping malware is expensive and time-consuming, and once malware is deployed,
it can be detected and rendered unable to infect new devices by updates to the
targeted app or OS.15 Because of this, it is more economical to write malware that
14 LineageOS is the successor the popular but discontinued CyanogenMod.
15 Additionally, malware has the interesting property that when used it can be captured and
cloned so that others can reuse it. This would be like if every time a missile landed on enemy
territory, there would be a chance it could be instantly copied and infinitely reproduced, and
also that that particular type of missile would be much more likely to be intercepted in the
future. Militaries would be hesitant to fire so many missiles and would need to be much more
strategic about their targets.
can target many users. iOS has a limited number of versions for a limited number
of devices, whereas the Android ecosystem is much more diverse. This means that
targeting Android users is less economical and more difficult for adversaries.
Our recommendations are as follows:
• For most individuals who are trying to avoid mass surveillance and low-effort
hackers, iOS or stock Android are sufficient as they are easiest to use.
• For individuals who are significantly involved in social movements or expect
to be individually targeted, at this time we recommend for their organizing
and political work that they use GrapheneOS without Google Play Services,
use f-droid as the sole app repository, and install only the minimum number
of apps required for communications.
• For individuals who have attracted or expect to attract the attention of
intelligence agencies, phones should be avoided for everything related to
activism.
Device Encryption
iOS and Android offer the ability to encrypt your personal data. This goes under
various names like Data Protection or Device Encryption. Phones generally do
not have device encryption enabled by default. This feature must be enabled by
the user either when the phone is set up or later in the settings. Likewise, the
protection against excessive login attempts must also be enabled.
Device encryption implementations generally use a hardware security module
(HSM) or a security coprocessor,16 special chips in the phone that handle encryp-
tion, decryption, and the cryptographic keys used for these operations. These
chips are important because they protect the keys from unauthorized access and
tampering. These chips may impede adversaries from accessing your data, but it
is no guarantee. The tool GrayKey—among others—is capable of exploiting bugs
in HSMs, and in some case it can quickly crack the unlock password and decrypt
the data. The HSMs that may be secure today might have new bugs discovered
next month, and law enforcement may develop new techniques for recovering data
some 5 or 10 years in the future. Device encryption does a good job preventing
your data from being accessed if a chud gets access to your phone of if a cop
snatches it during a stop-and-frisk. It is not likely to withstand concerted efforts
from State intelligence agencies like MI5 or the FBI from accessing your data.
A high profile example of this when the FBI cracked the password of mass
shooter’s phone about a year after the 2015 San Bernardino shooting. About 5
years after that, it was revealed access to the data was done via a series of exploits
against the software in the HSM.
16 On Apple devices, this chip is called the Secure Enclave.
Use of device encryption may help protect against data capture, but the only
way to ensure that data does not get into law enforcement’s hands is
if that data never existed in the first place.
VPNs
A virtual private network (VPN), in the context most activists’ use the term, refers
to an application that routes a device’s internet traffic to a service whose purpose
is to obfuscate the user’s web traffic and IP address from network observers or
the servers that are being connected to. When used, VPNs will protect your
traffic from snooping on public WiFi networks, and they will hide your IP address
from servers you connect to. They can add some misdirection to investigations
and make passive surveillance more difficult, but VPN apps can leak traffic, or
you might forget to enable them. Traffic to and from your VPN provider can
be correlated by State intelligence agencies who are able to view all internet
traffic, and your VPN can be legally compelled to collect or turn over logs to law
enforcement. VPNs are cheap, they can improve the security in a few ways, but
they should not be relied on to provide anonymity against the State.
IMSI Catchers
An IMSI catcher17 is device that spoofs being a legitimate cell tower and induces
phones to connect to it thus allowing eavesdropping or the sending of SMS mes-
sages or phone calls. Sometimes this spoofing is detectable, but detection of them
should not be relied on. In some regions they may be deployed without a war-
rant, in particular during demos. In part, IMSI catchers work by downgrading
the protocol to one with no encryption or one with breakable encryption. Even
though smart phones have preferences for protocols that offer more protection
against interception and spoofing, to enable phones to function in regions with
only 2G, and because it is part of the GSM standard, smart phones can still be
downgraded into using insecure protocols by IMSI catchers. Phone calls and SMS
messages sent and received by smart phones are not robust against interception
by IMSI catchers.
Faraday Bags
Phones send and receive information using electromagnetic radiation. This radi-
ation can be blocked by special materials. Urban legends and some supporting
evidence say that signals can be blocked by putting a phone in one or more crisp
bags18 that have foil lining, but this—like many countermeasures—should not be
relied on. A purpose-built Faraday bag can be acquired, and these can be counted
on to block phone signals.
17 Often IMSI catchers are referred to by the popular brand name StingRay.
18 Also known as “chip bags,” for the yanks.
If you need to transport phones and ensure that they are not leaking signals,
turning them off may not be enough. Few smart phones can have their batteries
removed. Something leaning on them in your bag might press the power button.
Malware can hijack the shutdown routine and prevent the phone from actually
powering off when you try to shut it down. Placing a powered off phone in a
Faraday bag can prevent them from sending signals and will significantly reduce
the possibility that the location can be determined.
Security Basics
There are some phone practices that tend to be advisable for most activists. A
few are detailed here.
Updates
Without reservation, the single best thing you can do to prevent yourself from
getting hacked by law enforcement—or random hackers—is to promptly install
updates to your phone’s operating system and all apps. It may be annoying,
but many updates contain security patches for critical vulnerabilities. If nothing
else, this can prevent your bank, money transfer, or payment accounts from being
drained.
Password Managers
The second most useful and generally applicable security practice is to use a
password manager for all your accounts, including those used on your phone.
There are paid versions that allow automatic synchronization of passwords across
devices and automatic logins to webpages. However, these require some level of
trust in the corporation offering the product. Free alternatives like KeePassX exist
but do not have the ease of use that paid products do. When using a password
manager, all your accounts should have strong, unique, random passwords. These
are typically automatically generated by the manager. The master password to
unlock the manager should be a long, random phrase.
Humans are notoriously bad at generating the randomness needed for pass-
words, and using the opening line of your favorite poem, or some tricky substitu-
tion rules to change antifascism to an7if4sc1sm! can be quite easily cracked by
computers. Diceware is a method of creating passwords by rolling dice and using
them to select words from a predefined list. Five words is the absolute minimum,
six is better, but anything over eight is overkill. Doing this provides unguessable
randomness that you cannot create on your own, and moreover this randomness
is easily memorizeable. An English-language, user-friendly wordlist is provided
by the EFF. An example phrase is MutableCalmBlubberFitJustify (please do
not actually use this one; make your own).
Table 1: Sample EFF Diceware Entries
Numbers Word
24311 drowsily
24312 drudge
24313 drum
24314 dry
24315 dubbed
24316 dubiously
24321 duchess
24322 duckbill
Usage
The mantra “just use Signal” is often repeated by activists, but it falsely assumes
everyone has identical threat models. In some regions, use of Signal may be
blocked by national firewalls, or its use may be so infrequent that doing so may
flag a user as suspicious. In North America and Europe, these drawbacks generally
do not exist. However, there are common complaints against Signal such as that
it requires a phone number to register, and that contact lists are shared with the
server in merely semi-secure ways to allow for contact discovery and initial key
exchange.
For most apps, when messages are received, they are decrypted and stored in
19 There are more interesting peer-to-peer chat apps like Briar and Cwtch that are metadata
resistant and possess other interesting security properties, but they do not have wide adoption.
They are also not available for iOS which prevents most crews from using them for secure comms.
plaintext on the device. Some apps like Signal allow you to set a password to
prevent access to the message while someone else is using your phone, but this
does not re-encrypt them in any way. If device encryption is enabled on your
device, you regain some privacy over these messages as discussed in the device
encryption section.
Because messages are stored in plaintext, and because they might be recover-
able even with device encryption, you likely want to enable disappearing messages.
On some apps, one party may enable disappearing messages for everyone in the
chat. On other apps, each party must enable disappearing messages to ensure
all messages eventually disappear. It may be inconvenient to have disappearing
messages as searching for an image, file, or some decision is only possible as far
back as say 1 week or 1 month. This may be preferable to having a multi-year
long log of everything you’ve said or thought, and in particular everywhere you
said you’ve been.
What this means is that you should strongly prefer text and voice chat apps
that have mandatory E2EE unless there is a compelling security reason not to, you
should verify keys before messaging, and you should likely enable disappearing
messages.
Don’t “Just Use Signal”
Various privacy orgs and concerned activists did an excellent job encouraging
the adoption of Signal in the wider public and especially among activists. They
did possibly too good a job as many individuals took this to mean “if you use
Signal, then you are totally secure.” This has led to some people discussing things
they absolutely should not discuss over electronic mediums and then assuming
it’s fine because they used Signal. Every security countermeasure has some set of
assumptions it works with, and from that there may be accepted risk or things
that are out of scope. Signal is very good at preventing a State-level actor from
using mass surveillance to read the contents of text message. It even hides some—
but not all—metadata. Other chat apps have roughly a similar threat model.
However, if your phone is compromised by malware because you have drawn
attention to yourself or simply gotten unlucky, Signal will not prevent your comms
from being read.20
For some languages, in particular languages based on characters rather than
letters, an Input Method Editor (IME) is used to convert sequences of Latin letters
into the target language’s characters. These are often third-party apps that are
installed. Signal fails to adequately warn users who use IMEs about the possibility
that their chats could be read by the software and reported to the State before
20 Further, some folx have atrocious security practices of joining many large Signal group chats
and discussing their actions without vetting who else is in the group. It doesn’t matter how
good the encryption is if one of the group members is an infiltrator or snitch.
Figure 2: Input Method Editor and Pinyin Candidates
Email
There are ways to make email communication more secure, but email as a pro-
tocol and communications medium is generally not secure for private commu-
nications. Boutique and activist-friendly email providers (i.e., non-Gmail/non-
Microsoft/etc.) do not offer significant security benefits against interception by
law enforcement or hackers. When sending emails, some people use PGP or
S/MIME, but these are difficult to use and have an overall poor user experi-
ence. Two people using these encryption methods can have fairly good protection
against having their email read, but one misclick can send the entire history of
a conversation in plaintext thus making it viewable by law enforcement. Proton-
Mail has made bold claims about encryption for their emails and clients, and many
activists have taken these half-truths to mean that using a ProtonMail account
means all of their email are encrypted, but this is not the case. Email should
generally be avoided for planning and especially for secure communication.
That said, email remains popular because every device can send and receive
email, and some people “don’t do chat apps.” For coordinating a local tenant’s
union or setting up shifts at the local infoshop, email may be fine. If you choose
to use email, assume that law enforcement are reading all messages, and keep
conversation to a minimum. Do not discuss illegal activities. Do not discuss juicy
scene drama that can be exploited by the State.
Finally, there are legitimate use cases where email and PGP can be a last
resort such as a one-time-use encrypted channel for someone on the run so that
they can set up a second more secure channel. In cases like this, phones should
still be avoided because of their ease of trackability.
Multiple Aliases, Multiple Phones
Depending on your threat model, you may choose to maintain multiple phones
that are linked to your multiple aliases. For example, you may have one phone
linked to your status quo public life with social media accounts you used to connect
with family and a second phone with a separate SIM and separate accounts tied
to your activist life. This segregation of accounts is part of a process called
compartmentalization.
The first benefit is that the use of distinct devices for each of your aliases pre-
vents programming errors or user errors from exposing your private information.
Apps on your phone may have unexpected behavior such as sending your entire
contact list a request to connect when you sign in to a new messenger app. You
may make a mistake and reply to a social media post from the wrong account.
When you click on an email address intending to use one of your aliases, your
phone’s OS might start composing an email with a default email client tied to a
different alias.
The second benefit is that your activist device can be minimal and only used
for secure communications. Each app you install is a possible route for malware
to get on your phone, so if your phone has only a bare-bones OS and two chat
apps, it is more difficult to compromise.
Using multiple phones on its own does not prevent law enforcement from tying
your aliases together. If you carry the phones at the same time or use them at
the same locations, they can be linked.
As an alternative to multiple phones, you can reduce some of the risk of
leaking data via error or unexpected behavior by creating multiple profiles on
your Android device. This will not protect you against malware, but it does offer
some protection.
One of the most common use cases for having multiple phones is for organizing
a union. Some companies require apps to be installed for remote management as
a way to protect corporate intellectual property or to mitigate security breaches.
These are spyware apps, and they can completely control your phone. Even those
aside, many companies require a chat app for communicating. You should avoid
organizing on company devices or ones with corporate spyware installed, and you
should avoid using company chat in unionization efforts.
Crimey and not because they are actually describing the properties of a burner phone.
22 Theft of phones with an activated SIM card is generally not recommended because each
theft creates an additional location data point that can be tied to the action, the phones might
not be able to be unlocked, and the owners may have the devices added to deny-lists maintained
by the carriers so that they cannot be used for making calls or using data.
a pay phone or socially engineer a stranger at a train station to let you borrow
theirs for just a few minutes.
When we say that a burner can be used for one action, we mean “one time-
boxed sequence of activities.” This may mean one direct action that takes place
over only two hours. It also may mean the planning and coordination in the
month before an action as well as the action itself.
With particularly careful usage, a single closed affinity group can reuse their
set of burner phones for recurring actions. If this is the case, the phones need to
be cycled in batches so that the different closed loops of burners don’t overlap
with each other.
A non-mandatory, but strongly recommended property is that burner phones
should not be purchased immediately before an action. This creates the additional
possibility that the stored security footage of the purchase could still be accessible.
Attempting to obfuscate the existence of the closed loop between the phones
can help prevent the detection of the affinity group. One step is not activating
them all in a short time frame. Gradual activation is less detectable when the
State analyses the data. Make a few phone calls from random locations to numbers
someone would plausibly call, but do not speak if someone picks up. Call numbers
with expected long wait times like banks or insurance companies. Call a few
local shops before they open or after they close. The fake phone calls may be
unnecessary as many users in certain regions never place phone calls and simply
use their data plan for everything.
Because of the carefulness with which a burner must be acquired and used, it
is highly unlikely that it is worth the trouble. If you think your action requires a
burner phone, you should almost certainly attempt to find a way to do the action
without any phones at all. To help make it clear to others that a burner phone
must have these properties, avoid use of the phrase burner phone and prefer demo
or disposable phone when applicable.
Graceful Degradation
This zine principally discusses ideal characteristics for secure phone usage, but
often these ideals are not attainable. One such example is if you are organizing
with people who cannot afford smart phones. Getting cheap simple phones to
a network for organizing an action or even for coordinating regular meetings
can be easier and more financially manageable than doing the same with smart
phones. Unfortunately, the lack of encrypted voice and chat apps means increased
surveillance for your messages.
To prevent the State from gaining too much information about your actions,
you will have rely on human solutions rather than technical solutions. An agree-
ment to only ever discuss meeting times and locations with a minimal amount
of information can reduce the gathered information to an absolute minimum. A
simple codebook that replaces common phrases used in organizing with random,
innocuous code phrases can create misdirection if someone attempts to investi-
gate, and the use of code phrases can prevent automated systems from alerting
authorities.
Using patterns like this allows you to gracefully degrade from higher security
to lower security without completely exposing yourself to surveillance and State
repression. These methods require greater care, but they are doable.
Making a Plan
We cannot pretend to know your threat model, and we cannot address every bit
of nuance for every region and situation. What we can do is list some guidelines
that are generally applicable. When reading these, you need to consider what is
practical. What can you actually do? And what will people in your social circle
do? Your new plan doesn’t have to be perfect. It just has to be better than
whatever you’re doing now. If this means making compromises on security so you
can continue to organize, you may have do that. But at the same time, don’t let
others’ poor security endanger you. Find a balance.
This is by no means an exhaustive list, but are some ways to develop personal
OpSec and group security culture:
• Use a smart phone as they are more secure against most threats activists
face than simple phones.
• Do not bring your phone to activities that might interest police, and in
particular protests that might be rowdy.
• Prefer E2EE encrypted apps for communication, enable disappearing mes-
sages, and avoid email.
• Use a password to unlock your phone, and enable device encryption.
• Disable fingerprint unlock on your phone before going to bed or leaving it
unattended.
• Regularly back up photos and other data to an encrypted drive and remove
them from your phone.
• Delete old data: DMs, group chat, emails, calendar events, etc.
• Leave group chats where you do not need to be present, and remove inactive
members from group chats.
• Practice leaving your phone at home or powering it off when running errands
or for small actions to habituate yourself to its absence.
• Start all meetings by establishing whether or not electronics are permitted.
If not, power them off, collect them, and move them out of range of your
conversation.
Alternatives
It is always easier to say “do this instead” rather than “don’t do that,” and
when trying to change behavior or practices, providing alternatives increases the
chances that someone will drop the old, insecure behavior. There are legitimate
reasons to have phones, and alternatives can mean less burden when we give up
our phones or change our habits.
Barriers to getting rid of phones is that people want to have info, gather info,
and trade contact info. A pen and a note pad and let you have your collective’s
meeting minutes accessible in an analog manner. You can use it to trade contact
info, and if you’re slick, you can carry a copy of your device’s cryptographic
fingerprint to establish a secure line even when you and the other party do not
have your phones on you. A paper calendar can allow you to schedule. Printing
out paper maps of the area of operations for an action can help you navigate. If
you create paper copies of information, ensure you promptly and securely dispose
of it to avoid creating a literal paper trail of your activities.
Phoneless Contingencies
While your plan may work today, it must also be forward thinking. You may
rely heavily on your phone for organizing while accepting the security risks, but
there may come a time when repression or catastrophe disables your phones or the
internet. It is common during heightened repression for the State to cut mobile
phone service or the internet for entire regions. If your ability to organize and
your safety relies on nearly everyone having phones and working internet, you are
setting yourself up for certain modes of failure. Word of mouth and the so-called
sneakernet are fallbacks, and your planning needs to incorporate the possibility
that this will the only way to move information.
Case Studies
To make the previous discussions more concrete, we’re providing a number of
case studies drawn from our experiences. Some of these cases show individuals
who already have more accurate threat models, and others who do not. Some
are based on urban legends, and others more on verifiable facts or very probable
conjectures. Where there are errors, they are discussed.
Assumptions
The group has assumed that the police only want to listen to their conversations
if they are about past or future illegal activities. They have assumed that their
everyday conversations are uninteresting and uninformative.
Countermeasures
The group has taken no countermeasures against their conversations being over-
heard.
Analysis
If the group is consciously not discussing plans or past actions, then obviously no
microphone can overhear what isn’t said aloud. However, planned and carried-
out actions aren’t the only thing the State is interested in. Gossip, drama, love
interests, social ties, and even the dispositions of people and orgs within a milieu
toward one another are valuable intel. This can allow the State to create more ac-
curate social maps. If the State suspects one individual was involved in something
they are investigating, and they know the individual had accomplices, using social
maps that are constructed from bit of casuals conversation can help them narrow
down their list of suspects or reveal the members of an affinity group. Such over-
heard conversations can give the State insight about who is feeling ostracized and
resentful so that they can be targeted to become an informant. Small conflicts
and be exploited, and heated emotions can be fanned into roaring disputes.
Recommendations
There is a generational split among activists between those who organized before
the widespread use of mobiles phones and those who began organize after the
ubiquity of phones. There is a also a further split between those who organized
using simple phones before the popularity of smart phones, and those who have
always organized in a world where nearly all of their contacts have smart phones.
This gap is notable by the ability to make plans on the assumption the other people
wouldn’t have phones such as fixing locations and times with less spontaneous
changes. Additionally, those who organized prior to the adoption of mobile phones
have a more acute sense of what it was like for organizing to increasingly take
place where everyone effectively had microphones present.
As mentioned earlier in this zine, smart phones allow us to instantly commu-
nicate and have limitless information on hand at all times. This comes with the
cost of new avenues for surveillance. Activists should be mindful that mobile
phones present in homes, cars, and social settings might be gathering soft intel-
ligence on social groups. If we were to make the recommendation that phones
should be more frequently powered off, we might be laughed at for paranoia or
for the impracticality of the suggestion. So-called liberal democracy gives the illu-
sion that we do not live under a repressive police state, yet there are many cases
where innocuous social circles and activists groups are hacked and surveilled, not
to mention the more radical and involved groups.
Our suggestion is not that we should never have phones on our persons, but
we do want to suggest that everyone become more aware of the effort the State
expends to surveil and the utility of the information gleaned from casual conver-
sation. There may come a time when repression heightens and we begin to feel its
presence more sharply. To prepare for such times and to build habits that enable
us to resist such repression, our suggestion is more moderate. Practice heightened
security starting now. See if you can organize phoneless events. When you hang
out or go hiking, even if you meet at a pub, see if you can get everyone to leave
their phones at home. Accustom yourself to their absence. Feel the freedom of
knowing you’re not leaking location data to the State and that no one can hear
your conversation except for those present.
Closing Remarks
Technology is not good or bad—at least most isn’t. It’s not inherently liberatory
or oppressive. New tech creates new opportunities while closing off others. With
phones, this is no different. Having access to instant communications and vast
knowledge in our pockets is tremendously powerful, but it comes with the cost of
increased surveillance.
You may think the State isn’t surveilling you, but if you’re involved in libera-
tory social movements—even loosely—it surely is. Protecting yourself can protect
your friends, family, or comrades who are move deeply involved in the movement.
You may think that the State is hacking your phone to tap your housing co-op’s
weekly meetings, but it almost certainly isn’t. Maximum security at all times is
unattainable, and aiming for it is taxing.
After reading this you might be tempted to say “but they’ll track me no matter
what.” The belief that any level of safety against external threats is impossible
is called security nihilism. People who feel this often take one of two paths.
They can believe that no countermeasures work, so they keep acting and take
no precautions thus creating a self-fulfilling prophecy ending with their arrest.
Or they can believe in the supremacy of the State and become paralyzed with
inaction. Repression works not just because of the stick that hits us or prison that
cages us, but also because of the fear of those punishments and our subsequent
self-imposed inaction.
Any steps you take can protect you, and many of them are so simple that you
can start applying them right now. At the easiest, you can avoid dragnet surveil-
lance by using basic encrypted messenger apps and leaving your phone at home
during demos or direct actions. Every step you take beyond those will require
your adversaries make more concerted efforts if they want to surveil or disrupt
you. Time and resources are limited, even for the large intelligence agencies. Hu-
mans make mistakes, and computers break. Your adversaries are fallible, and you
can significantly decrease the amount of data they can capture and what sort of
insights they can glean from it.
Moreover, the State isn’t always using the maximum theoretically possible
surveillance methods. Just because it’s possible for the State to hack your phone
or track it, they surely aren’t doing that to catch you walking through parks
after their closing hours. Even in cases where the State wants to use maximum
surveillance, they may do so ineptly. Your threat model should account for the
realistic expected response from your adversaries given their knowledge of your
actions.
Learn about how the police, fascists, and other adversaries in your area operate,
and come up with a threat model for yourself and your crews. Discuss it at length
with your comrades. Start with a few bits of OpSec knowledge and turn it into a
security culture. Foster shared understanding and practices that lead to increased
security against the threats you’re likely to face. Take concrete steps, but make
them pragmatic. Start slow with just a few new things at a time until they become
normalized, then build from there. A plan is only good if you carry through with
it, and trying to rush many large changes into a group tends to be overwhelming
and frustrating. Most successful plans are applied incrementally.
Beware of urban legends. Activist spaces are rife with them, and security is no
exception. Ask “how?” and “why?” when people make claims about surveillance
or countermeasures. Base your threat model and your security plan on verifiable
facts—or at least very probable conjectures with supporting evidence.
Use this knowledge to protect yourselves as you reshape the world.