Planning to Hold a Protest? Here are Some Digital Security Tips to Keep You Safe

Protestors are more aware than ever that they are not completely safe.

The federal government has come up with new policies to put their digital security at risk. Exercising First Amendment rights is not as safeguarded as it once was.

Peaceful protestors are victims of government surveillance programs, and their associations and movements may be mapped and tracked. This is a bit unfair since all American citizens have a basic right to assemble peacefully and hold demonstrations.

Nevertheless, if you have a Smartphone, you are giving authorities a convenient way to track your whereabouts and activities.

If you support peaceful protests and plan to hold one, here are some tips to keep yourself and your data safe:

  1. Remove biometric features from your phone

    If you use your fingerprint to unlock your smartphone, you might want to switch to a PIN or a password (here are some tips on how to create an ironclad password). While fingerprint scanning is convenient, it can be used against you. If you take part in a protest, the police can force you to unlock the phone with your fingerprint.However, the police cannot force you to give the phone password if they don’t have a warrant.

    Also, despite all the assurance provided by phone companies that they will not collect fingerprint data, hackers can still break into their system. They can use this data to steal your identity and engage in criminal activity.

    The latest face recognition in iPhone 8 poses similar security concerns. Police have the right to ask you to use face recognition to unlock your phone during a protest. They may also be able to forcibly unlock your device against your will.

  2. Use a VPN

    In August 2017, the US government tried to unmask everyone who visited an anti-Trump website. The website was hosted on DreamHost and the latter was approached by the federal agencies to get the IP addresses and other details of its visitors.

    However, DreamHost contested the warrant issued by the government to obtain all the details of the users, which created a public uproar. The warrant was withdrawn later.When the US government asked DreamHost to turn over the details of the visitors to, the hosting company denied. If they had turned over the details to the government, the details of hundreds of people would have fallen in the hands of surveillance agencies.

    What if an incident like this happens in the future and the company hands over all the warranted details? Your IP can be tracked back to your location and your activities can be monitored – all because you visited a certain website.

    If you want to stay safe, it’s best to hide your IP address. You can hide behind another IP address with the help of a VPN. A virtual private network will assign you a different IP when you browse the internet. You can check your IP address using this tool.

    The hosting company and even your ISP cannot detect the real IP behind the fake one provided by the VPN. Using a VPN will also keep you safe from hackers because the virtual network encrypts the data when it leaves your computer.

  3. Encrypt the storage of your device

    Encryption protects the data on your phone and other devices. You can get full-disk encryption to ensure that each file on your storage is secured. When you use a VPN, the data that is sent and received by your computer is encrypted.With storage encryption, you can encrypt the data that is stored on your device. When you encrypt your disk, all your photos, videos, text messages, and browser passwords get encrypted.

    If police confiscate your encrypted phone, they will not be able to read your personal files and see your photos.

    Apart from that, there are chances of losing your phone in a protest. This means that all of your data could wind up in the wrong hands. Fortunately, all Android devices running Lollipop and above and all iPhones since 5s can be encrypted.

    Even if you have encrypted your device, be sure to use a strong password of about 10-12 random characters. A strong password is needed because encryptions can sometimes be decrypted using brute force attacks.
    You can create highly secure passwords using this tool.

  4. Carry a clean phone

    If your phone is confiscated by the police, they can scan through your texts, photos, videos, and apps. To make sure your data is secure even if your device is confiscated, always carry a clean phone, or burner phone.

    It’s a good idea to purchase an inexpensive pay-as-you-go phone and pay for refill time with cash.Leave your smartphone at home during your protest. Also, if you lose the burner phone or it is taken away, it won’t be a huge financial loss. Also, keep the location services turned off. Once you have used the phone and don’t need it anymore, it can be recycled safely.

  5. Turn on airplane mode

    Once you have coordinated with your friends and have met each other, you will probably not need to message them. When you’re all together, put the phone in airplane mode. This way, your device will stop transmitting while you protest. Decide on a spot where you can meet up if your friends get separated.

  6. Don’t bring a phone

    The reality is that you really don’t need a phone during a protest. If you’re meeting your friends, there’s no need to text or Facebook them.

    You can discuss a meeting spot with your friends early on and assemble there. Communication is still possible when you leave your phone at home.


  7. Leave social media out of the picture

    If you plan to organize a protest, it’s a good idea to look beyond Facebook and Twitter.

    While these social media platforms will give you a lot of exposure, they also come with their own set of risks. Law enforcement agencies can easily view the event page, comment on it, and keep a check on everyone commenting on it.

Protesting on the streets to make your voice heard is your fundamental right. But since the government has the power to crack down on peaceful protests as well, it’s important to keep your safety and digital security in mind.

Was this helpful? Share it!