Resistance Survival Guide #223
Political surveillance is not just something that happens in spy movies. It happens quietly through everyday technology—phones, email accounts, social media platforms, and massive data brokers that collect information about nearly everyone online. Governments, private contractors, and extremist networks increasingly monitor digital activity to map social movements, track organizers, and identify influential voices.
Activists and ordinary citizens often assume they are too small to attract attention. In reality, surveillance systems rarely target just one person. Instead, they collect large amounts of data and analyze networks of relationships. A single exposed conversation can reveal entire organizing groups. That is why learning basic digital self-defense is one of the most practical skills any modern activist can develop.
The goal is not to disappear from the internet. The goal is to reduce the amount of information available to people who want to monitor or disrupt democratic organizing.
Skill Level: Beginner → Intermediate
Why This Matters
Surveillance can be used to intimidate activists, track protest organizers, and identify political networks long before any public action takes place. Even publicly available information—like location tags or unencrypted messages—can allow hostile actors to build a detailed map of a movement.
Movements that protect their communication channels are far harder to disrupt. The civil rights movement, labor organizing campaigns, and investigative journalism have all depended on secure communication networks. Digital security today plays the same role.
Learning a few privacy habits protects not only you, but also everyone you communicate with.
What This Is
Digital self-defense means limiting the amount of data that governments, corporations, and bad actors can collect about you online. It involves choosing safer communication tools, protecting devices, and being thoughtful about what information is shared publicly.
- Several organizations provide excellent guidance for activists and journalists learning these skills. The Electronic Frontier Foundation maintains a comprehensive digital privacy guide called Surveillance Self-Defense that explains practical protection strategies. https://ssd.eff.org
- The Freedom of the Press Foundation also publishes digital security resources for journalists and activists. https://freedom.press
- For step-by-step privacy tools and training materials, the Security in a Box project provides a large library of digital safety guides used by human rights organizations around the world. https://securityinabox.org
Step-by-Step Instructions
Step 1: Move sensitive conversations to encrypted messaging
Many messaging platforms store conversations that can potentially be accessed by governments, companies, or hackers. When organizing political activity or discussing sensitive topics, use end-to-end encrypted messaging services.
One of the most trusted tools is Signal, a free encrypted messaging app used by journalists, activists, and human rights organizations worldwide. https://signal.org
Signal encrypts messages so that only the sender and the recipient can read them. Even the company running the service cannot access message content.
Step 2: Protect your email communications
Email is one of the easiest forms of communication to monitor because many services scan messages and store large amounts of user data. For more private communication, consider using privacy-focused email providers that emphasize encryption and minimal data collection.
Services such as Proton Mail are designed with privacy in mind and are widely used by journalists and security professionals. https://proton.me/mail
Using encrypted email reduces the amount of personal data stored on corporate servers.
Step 3: Use a privacy-focused web browser
Your web browser reveals an enormous amount of information about you. Websites, advertisers, and trackers collect browsing patterns that can build a detailed profile of your interests and activities.
The Tor Browser routes your internet traffic through a distributed network designed to hide your location and browsing patterns. https://www.torproject.org
Another privacy-friendly option is Firefox, especially when combined with privacy extensions recommended by the Electronic Frontier Foundation.
Step 4: Reduce the data you share on social media
Social media platforms are some of the largest sources of surveillance data. Governments, researchers, and extremist groups regularly analyze public posts to map activist networks.
You can reduce exposure by:
- Avoiding real-time location posts during protests
- Removing identifying details from profiles
- Reviewing old posts that reveal personal information
- Turning off automatic location tagging in apps
Small adjustments in social media behavior can significantly reduce how easily someone can track your movements or connections.
Step 5: Use a VPN on public Wi-Fi
Public Wi-Fi networks in coffee shops, airports, and hotels are often insecure. A Virtual Private Network (VPN) encrypts your internet traffic so other people on the network cannot intercept it.
Services such as Proton VPN and other privacy-focused providers can add a layer of protection when using public networks.
Example
During major protest movements around the world, authorities have often monitored open social media posts and unencrypted messaging platforms to identify organizers. In several documented cases, investigators were able to map protest networks simply by analyzing digital communications.
Groups that shifted organizing conversations to encrypted messaging apps and adopted basic digital security habits were significantly harder to monitor. Their networks remained more resilient because sensitive discussions were not easily accessible.
Required Reading
- Electronic Frontier Foundation — Surveillance Self-Defense
https://ssd.eff.org - Freedom of the Press Foundation — Digital Security Training
https://freedom.press/training - Security in a Box — Digital Safety Toolkit
https://securityinabox.org
Conclusion
Surveillance works best when people assume their privacy does not matter. But protecting personal communication is not about hiding wrongdoing—it is about defending freedom of speech, association, and political participation. By choosing encrypted communication tools, limiting unnecessary data sharing, and learning basic digital security habits, individuals and activist communities can significantly reduce their exposure to surveillance.
Democracy depends not only on courage and protest, but also on the quiet work of protecting the networks that allow people to organize safely.
Kitty’s Resistance Projects
- Resistance Directory: https://resistancedirectory.com/
- EpsteinWiki: Epsteinwiki.com
Support Resistance Kitty’s Work
- Kitty Merch: https://tr.ee/–Pu9s-BUL
- Support Kitty: https://buymeacoffee.com/resistancekitty
