Protesting is a part of the democratic process. Whatever you’re protesting or counter-protesting, here are some simple steps to take before hitting the streets.
Before going to a protest, demonstrators or observers should note that their cellphones may subject them to surveillance tactics by law enforcement. If your cellphone is on and unsecured, your location can be tracked and your unencrypted communications, such as text messages, may be intercepted. Additionally, police may retrieve your messages and the content of your phone if they take custody of your phone, or later by warrant or subpoena.
Deciding how and if to bring your phone
Your proximity to organizers of a protest, your immigration status (there are higher stakes for international students—here’s what to know if you’re asked about your immigration status at a protest), and other factors mean there is no one-size-fits-all privacy advice for whether to bring your mobile phone to a protest.
“All protesting and all marches are a series of balancing acts of different priorities and acceptable risks,” said Mason Donahue, a member of Lucy Parsons Labs, a Chicago-based group of technologists and activists that run digital security training classes and have investigated the Chicago Police Department’s use of surveillance technology. “There is a lot of communication ability that goes away if you don’t bring a phone period,” he said.
Leaving your phone behind means the data it holds and transmits will be the safest it will ever be, but it also means giving up access to important resources. It becomes much more difficult to coordinate with others, or get updates from social media. For many, phone cameras are also the only way they can document what’s happening.
If you have access to a separate phone, whether it’s a “burner” phone, an old smartphone that you can reset, or an old-fashioned camera, you could choose to bring these devices instead of your regularly-used phone. Not everyone, however, has access to these devices, or can afford to purchase a separate phone just for protesting.
If you take your cell phone with you, the rest of this guide runs through how to minimize risks to your privacy.
Use a passcode, not a fingerprint
Fingerprint and face locks may be convenient ways to secure your phone, but they don’t always work in your favor if your phone is seized by law enforcement.
In the United States, the Fifth Amendment to the Constitution grants people the right not to be “compelled in any criminal case to be a witness against” themselves. When it comes to whether you’re obligated to unlock your smartphone, your Fifth Amendment protection varies depending on whether you’re using a passcode or biometrics like a fingerprint or face scans.
Courts have made opposing rulings on whether the Fifth Amendment applies to both passcodes and biometric locks, and most recently, a federal appeals court ruled that law enforcement can compel a person to unlock their phone using their fingerprint. On the whole, if you are choosing to bring your phone, privacyexpertsrecommend that you use a passcode as your best option, but it isn’t failsafe.
“Police have these tools by Cellebrite, which essentially try to do tons and tons of guesses really fast on your phone to see what the passcode is. It works pretty effectively for the police because most people use fairly predictable and simple numerical codes,” explained David Huerta, a digital security trainer at the Freedom of the Press Foundation.
He recommends using an alphanumeric passcode, the longer the better. To add an alphanumeric passcode:
iPhone: Settings > Face ID & Passcode > Turn Passcode On 또는 Change Passcode > Passcode Options > Custom Alphanumeric Code
iPhone: Settings > Face ID & Passcode >Tap Reset Face ID
Android: Settings > Security & location > Pixel Imprint > Click Delete next to each fingerprint
Jennifer Granick, Surveillance and Cybersecurity Counsel at the American Civil Liberties Union, told The Markup, “It is legal to refuse to unlock your phone or to disclose your passcode, citing your Fifth Amendment rights if possible. There should be no negative ramifications.” Granick noted however, that police do not always act lawfully.
Subdue your signals (and download Signal)
Protesters should be prepared for surveillance of their cellphone’s transmissions—even if they don’t make any calls, Huerta said.
In some parts of the United States, law enforcement has tools that can intercept cellphone signals, called “stingrays” or “IMSI catchers.” Stingrays collect the identifying details of phones in the area by “impersonating” cell towers, and newer models are believed to be able to intercept calls and messages, according to TechCrunch.
In 2018, the American Civil Liberties Union identified 75 agencies in 27 states and the District of Columbia that owned stingrays.
You can configure your phone to avoid connecting to the subset of stingrays that use 2G connections:
Android (v12 or newer): Settings > Network & Internet > SIMs > [Carrier] > Allow 2G
Note that activating “Lockdown Mode” on iPhone will restrict your phone use, and enhance your security, in a number of other ways; see the link above for more details. Similarly, you may experience less reliable cellular connectivity on Android without the 2G option enabled.
Huerta said that since some of these devices can scoop up text messages, you should use an encrypted messaging app like Signal 또는 WhatsApp instead of your default one. (For iPhone users, iMessage is encrypted, but be warned: If you text with an Android phone user, it automatically switches to SMS, which is not.)
Huerta recommends Signal over other apps because it’s battle-tested: In 2016, the U.S. District Court for the Eastern District of Virginia served a subpoena on Open Whisper Systems, the company that makes the app, seeking information about two Signal users for a federal grand jury investigation. The only information the company was holding? The time the users’ accounts were created and the date the users last connected to the app’s servers.
Lockdown location tracking
Law enforcement can also request “cell tower dumps” from telecom providers. In its February 2020 transparency report, AT&T disclosed that it received 1,289 demands for cell tower searches during the second half of 2019. The company said that the demands “ask us to provide all telephone numbers registered on a particular cell tower for a certain period of time.”
Because of the risk of such surveillance, some experts suggest turning off your cellphone altogether at a protest. For instance, the Electronic Frontier Foundation recommends turning your phone off or enabling airplane mode while you’re at the protest, because it ensures that your device won’t be transmitting signals.
But turning off your phone means you won’t be able to communicate with others or use your camera to record. So if you have to keep your phone on, try to at least manage what location information your apps may have. The Verge has a handy guide for Android users, and Business Insider has a comparable one for iPhone users.
You can even turn off all location services entirely:
iPhone: Settings > Privacy > Toggle Location Services off
Android: Settings > Location > Toggle Use location off
Harden your hardware
Another scenario that Huerta suggested that protesters consider is what to do if your phone is seized by law enforcement. If you can, back up your device before heading out to make the decision to wipe it if you find yourself in a tight situation a little bit easier. There are tutorials for both iPhone 그리고 Android users.
Encrypting your phone also makes it more difficult to access information if it’s been seized, because files can only be read if someone has the encryption key. DuckDuckGo, the privacy-oriented search engine, has step-by-step instructions for both iPhone and Android users.
Neutralize notifications
Notifications are normally a great way to quickly check messages, but if your phone is lost or seized, it may reveal information that you’re not comfortable sharing with others.
“Many times, if you don’t have a chance to turn off your phone before a device gets seized, even if law enforcement can’t unlock your phone,” Huerta said, if your notifications are on, “they don’t even have to unlock your phone, they can just scroll down and see everything that you’re up to.”
Reducing the amount of open information that sits on your locked screen can increase the security of you and the people you’re communicating with.
On Android, you can strip notifications of context by going to Settings > App & notifications > Notifications, going to the “Lock screen” section and turning off Sensitive notifications.
With iPhones, you can change how detailed an app’s notifications are by going Settings > Notifications, selecting that app and then scrolling down to the Options section and setting “Show Previews” 에게 “Never” 그리고 “Notification Grouping” 에게 “Automatic.”
You can also turn off notifications entirely:
iPhone: Settings > Notifications > Set Show Previews 에게 Never
Android: Settings > Apps & notifications > Notifications > Notifications on lock screen 또는 On lock screen > Don’t show notifications
Think before you share
Photos and videos can reveal more than you intend.
Image files can contain metadata that includes the date the photo was taken, the make and model of the device it was shot on, and even the GPS location of where it was taken. One of the easiest ways to strip a photo of its accompanying metadata is to take a screenshot of it and post that instead of the original image, Huerta explains.
And even if you use a screenshot, check the image for information you might not want to make public, such as indications of location and the identity of other people.
Law enforcement has access to powerful facial recognition databases. Civilians also have tools in reach that can reverse engineer the who, what, and where of your social media posts. One way to mitigate these is to cover up identifying information using an emoji or by drawing over it with a solid color.
Phones can run out of battery, get lost, broken, or taken away. Don’t make it your only way to access important contact information.
Reporter Madeleine Davies suggested writing down the phone number of a lawyer or emergency contact on your arm with a Sharpie.
The National Lawyers Guild operates legal support hotlines across the United States that are specifically for people who have been arrested at political demonstrations. Look up a hotline for your area and write it down.
This article is copublished with The Markup, a nonprofit, investigative newsroom that challenges technology to serve the public good. Sign up for its newsletters.
Dan Phiffer was a software developer who helped with building The Markup's website and keeping it running smoothly.
Prior to joining The Markup, he worked at the American Civil Liberties Union, helping... More by Dan Phiffer
Tomas Apodaca was a journalism engineer. He supported CalMatters and The Markup’s journalism by exploring data, reverse-engineering algorithms, and creating custom tools.
Before joining CalMatters... More by Tomas Apodaca
Miles is a full stack software developer, writer, and visual artist based in Western New York. They believe that code can be a powerful and flexible tool for justice and equity, and are glad to be at CalMatters... More by Miles Hilton
Maddy Varner was an investigative reporter at The Markup. More about Maddy here. More by Maddy Varner
Republish
How to prepare your phone for a protest
독자들과 저희의 이야기를 공유하고 싶어하시는 것을 정말 좋아합니다. 수백 개의 출판사가 저희 작품을 정기적으로 재출판합니다.
CalMatters의 모든 기사는 다음 조건 하에 무료로 재출판할 수 있습니다.
Give prominent credit to our journalists: Credit our authors at the top of the article and any other byline areas of your publication. In the byline, we prefer “By Author Name, CalMatters.” If you’re republishing guest commentary (example) from CalMatters, in the byline, use “By Author Name, Special for CalMatters.”
Credit CalMatters at the top of the story: At the top of the story’s text, include this copy: “This story was originally published by 칼매터스. 가입하기 for their newsletters.” If you are republishing 해설, include this copy instead: “This commentary was originally published by 칼매터스. 가입하기 for their newsletters.” If you’re republishing in print, omit the second sentence on newsletter signups.
Do not edit the article, including the headline,단, 시간, 장소 및 편집 스타일의 상대적인 변화를 반영하는 경우는 예외입니다. 예를 들어, "어제"를 "지난주"로 변경할 수 있으며 "Alameda County"를 "Alameda County, California" 또는 "여기"로 변경할 수 있습니다.
기사의 현지화에 도움이 되는 보고서를 추가하면, 귀하의 스토리에 이 사본을 포함하세요: "[귀하의 출판물]의 추가 보도" 그리고 저희에게 알려주세요. republish@calmatters.org.
다른 질문이나 특별한 요청이 있으신가요? 아니면 저희 스토리 중 하나가 청중에게 미친 영향에 대한 좋은 스토리가 있으신가요? 여러분의 의견을 듣고 싶습니다. 다음 주소로 문의하세요. republish@calmatters.org.
Gift this article
How to prepare your phone for a protest - CalMatters
Whatever you’re protesting or counter-protesting, here are some simple steps to take before hitting the streets.
칼매터스
캘리포니아에 대한 설명
Dan Phiffer
Dan Phiffer was a software developer who helped with building The Markup's website and keeping it running smoothly. Prior to joining The Markup, he worked at the American Civil Liberties Union, helping to build web-based tools and products. Before that, Dan worked on data at Mapzen and launched website redesigns at The New Yorker and The Museum of Modern Art. Dan occasionally teaches, most recently a course on Hacktivism at Rensselaer Polytechnic Institute. He lives in Troy, N.Y.
Tomas Apodaca
Tomas Apodaca was a journalism engineer. He supported CalMatters and The Markup’s journalism by exploring data, reverse-engineering algorithms, and creating custom tools. Before joining CalMatters and The Markup, Tomas worked at Nava PBC and Code for America, building software that helped people access and navigate government services. Before that, he helped build digital maps in Mongolia, collected data for an elections API in Indonesia, and worked against HIV/AIDS in the Democratic Republic of Congo.
Miles Hilton
Miles is a full stack software developer, writer, and visual artist based in Western New York. They believe that code can be a powerful and flexible tool for justice and equity, and are glad to be at CalMatters and The Markup, using code to hold those who misuse it to account. After earning a degree in Computer Science from Columbia University, Miles worked at education technology startups in the New York City area, expanding the reach and accessibility of computer science education by stressing the creative potentials of code. They then worked at CNN on the CNN+ news streaming service, creating Interview Club. This live interview platform put the mic in user’s hands, allowing them to steer conversations with subject-matter experts. They have volunteered as a programmer with U.S. Digital Response, creating a grant-finding platform for NGOs and local governments, and are an active member of the Out in Tech professional community, where they volunteer as a technical mentor and as a programmer, creating websites for international LGBTQ+ groups.
Maddy Varner
Maddy Varner was an investigative reporter at The Markup. More about Maddy here.