Privacy Tools Guide

A burner phone for protests provides separation between your protest participation and your primary identity, reducing law enforcement tracking risk and protecting contacts. This guide covers selecting appropriate hardware, configuring secure messaging, protecting evidence of police conduct, and operational security practices that minimize law enforcement surveillance during demonstrations.

Why Burner Phones Matter for Protest Safety

Law enforcement attends protests with cell-site simulators (Stingrays) that intercept signals from all phones in an area. This technology identifies which phones were present at a location and when. Police can later cross-reference this data against subscriber information to target specific participants.

Additionally, if police confiscate your primary phone, burner phone separation prevents them from accessing protest contacts, messages, and communications. Digital evidence of police misconduct (photos, videos, audio) stored on a burner phone remains protected if your primary phone is seized.

Burner phones also prevent protest participation from appearing on your digital timeline. Your primary phone’s location data, if searched by law enforcement, won’t show protest attendance if you’re not carrying it.

Phone Selection

Buy a used phone in cash from a private seller to avoid purchase records. Avoid brand-new phones whose serial numbers are registered to you. Target older models (2-3 years old) because they’re cheaper used and less likely to have biometric authentication that law enforcement could force you to unlock.

Recommended specifications:

Why Android: Android allows installation of custom ROM (operating system) for maximum control and privacy. iOS requires relying on Apple’s default configurations and is harder to configure for forensic security.

Avoid: Brand new phones (purchase traceable to you), flagship models (distinctive to identify you with), phones with known security vulnerabilities.

Purchasing approach: Search local Facebook Marketplace, Craigslist, or OfferUp. Negotiate by text before meeting. Meet in a location with security cameras (retail stores, busy areas) to provide alibi if police question the purchase later. Pay cash. Do not provide your real name or contact info beyond the phone number you’re using.

SIM Card Setup

Use a prepaid SIM card purchased with cash. Bring only your burner phone and cash to the store—no ID, no wallet with identification.

Prepaid SIM options:

Activation process:

  1. Buy prepaid SIM with cash
  2. Do not provide ID, name, or personal information
  3. Use a generic name if system requires one (“John Smith” with birth date 01/01/1950)
  4. Provide a temporary email address (create throwaway email separately)
  5. Do not link to your primary phone, address, or any identifying information
  6. Activate minimal data plan ($5-10/month prepaid)

Note: US carriers are increasingly requiring ID verification for activation. Some states require ID for any SIM purchase. Research your state’s requirements beforehand. If ID is required, use the burner phone setup as one-time protection with assumption that you’re identified but messages remain private.

Operating System Configuration

Before installing any apps or connecting to networks, configure the phone for privacy.

Android Setup:

  1. Power on without connecting to Wi-Fi or cellular
  2. Select “Skip” for all setup wizards and account linking
  3. Go to Settings → About → Build Number (tap 7 times to enable Developer Options)
  4. Go to Developer Options → Enable “USB Debugging”
  5. Disable location services: Settings → Location → Off
  6. Disable Wi-Fi: Settings → Wi-Fi → Off
  7. Disable Bluetooth: Settings → Bluetooth → Off
  8. Enable flight mode: Settings → Network & Internet → Flight Mode → On
  9. Only enable cellular connection (keep flight mode, tap airplane icon, disable flight mode for cellular only)
  10. Disable all Google services: Settings → Accounts → Remove any Google accounts

App Installation:

  1. Connect to burner phone via USB cable on a secure computer
  2. Install apps via USB without connecting to Google Play (prevents tracking via app install)
  3. Alternative: Use F-Droid app store (open source, privacy-focused)

Communication Apps

Select messaging apps that use end-to-end encryption and don’t require phone verification.

Signal

Briar

Wire

Jami (formerly GNU Ring)

Apps to avoid: WhatsApp (Facebook owned, metadata logged), Telegram (not fully end-to-end encrypted by default), Google Messages, Facebook Messenger.

Evidence Collection Setup

Protect photos and videos of police conduct with automatic encryption and secure backup.

Camera Configuration:

  1. Use default camera app (minimal metadata leakage)
  2. Disable geotagging: Camera app → Settings → Location tags → Off
  3. Disable saving to cloud: Settings → Disable Google Drive, OneDrive, Dropbox

Evidence Encryption:

  1. Install Nextcloud (encrypted cloud storage): Download APK from official source
  2. Set up Nextcloud account on non-protest email
  3. Configure automatic photo backup with client-side encryption
  4. Photos backup automatically and encrypted without your phone seeing plain content

Alternative: Local Encryption:

  1. Install VeraCrypt (open source disk encryption)
  2. Create encrypted volume for evidence storage
  3. Mount only when backing up evidence
  4. Keep volume unmounted during protest (evidence protected even if phone seized)

Operational Security During Protest

Phone Management:

Communication Protocol:

Location Awareness:

Law Enforcement Interaction:

Digital Forensics Protection

If law enforcement images your phone (forensic copy), maximize time between protest and forensic examination.

Forensic Delay Tactics:

  1. Create large video files in encrypted folder (forensic examination takes hours per GB)
  2. Fill remaining storage with dummy videos (unnecessary data increases analysis time)
  3. Change phone time to future date (confuses some forensic tools)
  4. Use encryption on entire phone filesystem (SlimRoms, Graphene OS on supported models)

Better approach: Don’t store sensitive evidence on the phone long-term. Back up evidence to encrypted cloud storage immediately after protest, then delete from phone.

Post-Protest Procedures

After protest:

  1. Back up evidence photos/videos to encrypted Nextcloud
  2. Verify backup succeeded
  3. Delete all evidence from phone
  4. Clear message history (Signal: chats → Settings → Data & Storage → Clear All)
  5. Document protest observations in writing (on computer, not phone)
  6. Do not connect burner phone to Wi-Fi
  7. Power down burner phone and remove SIM

One week later:

  1. Factory reset burner phone: Settings → System → Reset → Erase all data
  2. Remove SIM
  3. Destroy SIM card (cut into pieces, burn)
  4. Sell phone back via Facebook Marketplace (different seller than purchase to create distance)

Using a burner phone is legal. Burner phones have legitimate uses: protecting privacy, separating work/personal contexts, preventing identity theft. Simply possessing a burner phone is not illegal.

Law enforcement may investigate burner phone use as suspicious behavior if discovered. However, demonstrating that this was your only communication during protest (all encrypted) provides strongest defense that you were not orchestrating illegal conduct.

If arrested, your attorney will advise you whether to produce the phone or assert Fifth Amendment rights. Follow legal counsel, not this guide.

Cost Summary

The cost is low relative to legal expenses if you’re identified and charged. Even if you never use the burner phone setup, understanding these practices reduces anxiety about protest attendance and government surveillance.

Built by theluckystrike — More at zovo.one