Skill Level: đžđžđž Advanced Organizer
Why This Matters
When militarized police or federal agents move in, they donât just bring batons and tear gas â they bring surveillance tech. From cell tower spoofers to social media monitoring, theyâll track who youâre talking to, where youâre going, and what youâre planning. If youâre organizing protests, mutual aid, or community defense, you need to make sure your communication lines arenât wide open for the regime to read like a grocery list.
Example of Importance
In multiple cities, including Portland in 2020 and Atlanta in 2023, federal and local law enforcement used âstingrayâ devices to scoop up cell phone data from protest zones. Messages, call logs, and even location data were collected without protesters realizing it. That data was then used to build dossiers, track leaders, and coordinate arrests.
Step-by-Step Resistance Plan
- Use Encrypted Messaging Apps
- Primary: Signal, Session, or Element (Matrix).
- Avoid SMS, Facebook Messenger, and unencrypted email for anything sensitive.
- Turn Off Location Tracking
- Disable GPS when not actively navigating.
- Keep your phone in a Faraday pouch in high-risk areas to block tracking entirely.
- Separate Your Protest Device
- Use a cheap âburnerâ phone with no personal accounts tied to your real name.
- Keep personal and activism devices completely separate â no cross-login.
- Limit Group Sizes in Chat
- Large group chats are vulnerable. Organize into smaller cells with minimal overlap.
- Use disappearing messages and verify contacts before adding anyone.
- Secure Your Accounts
- Enable two-factor authentication (preferably via an authenticator app, not SMS).
- Regularly change passwords and avoid reusing them.
- Beware of Metadata
- Even if messages are encrypted, metadata (who you contacted and when) can still be tracked.
- Rotate communication times and avoid predictable patterns.
- Practice OPSEC in Person Too
- Phones can be compromised even when âoff.â Leave them outside of sensitive meetings or in Faraday bags.
- Keep written notes minimal and destroy them after use.

Sources
- EFF â Surveillance Self-Defense
- Privacy International â Stingray Surveillance
- Signal â Official Site