How to Secure Your Phone for the No Kings Protest

October 16, 2025

How to Secure Your Phone for the No Kings Protest

A complete, practical guide to protecting yourself and your community from digital tracking and surveillance.

Lori Corbet Mann

Oct 15, 2025

Subscribe

Dear friends

This post is about using technology safely at a protest — how to protect yourself, and the people you organise with, from unnecessary risk.

It’s a longer read than I would have liked — I’ve learned that when I just post the steps, I’m flooded with questions asking why, so I’ve explained the reasoning too. But if you prefer to skip straight to the practical advice, you’ll find a downloadable checklist at the end.

Technology is everywhere: phones, tablets, headphones, smartwatches, fitness trackers. In everyday life that’s fine, but at a protest it can expose you and others to tracking and surveillance.

This guide explains how those devices broadcast information, how that data can be used to identify or locate you, and what you can do to reduce those risks. The aim isn’t to frighten you — it’s to help you make calm, informed choices about what you carry and how you use it.


How your devices broadcast and why it matters

All modern devices communicate through one or more short-range or cellular radios. In practice, that means they’re constantly reaching out to the world around them —your smartwatch trying to reconnect to your phone sends small radio signals every few seconds. The main connections are:

Many consumer devices continue to emit low-level Bluetooth or Wi-Fi signals even after we think we’ve turned them off. This lets them reconnect quickly when we use them again or bring them near a paired device — but it also means those signals can be used to identify and locate you.

Here’s how that happens.


Stingrays and Other Wireless Scanners

‘Stingrays’ — also known as IMSI catchers or Cell Site Simulators — are surveillance devices that pretend to be legitimate mobile towers. Their purpose is to trick nearby phones into connecting so identifying information can be captured.

When any wireless device is powered on — whether a phone, smartwatch, fitness tracker, Bluetooth headset, or key-finder — it sends out short signals searching for known networks or paired accessories. A cell-site simulator can intercept the cellular part of this traffic, while other scanners can log the Wi-Fi and Bluetooth signals from wearables and accessories.

Once a connection or detection occurs, these systems can:

Together, these tools make it possible to locate you, identify you, and link you with others in the same area through the devices you carry.

Stingrays have been used to track protesters since the 2015 demonstrations in Baltimore, which followed the police killing of Freddie Gray — often without court approval. These systems don’t discriminate. Any wireless device that’s switched on and within range will almost certainly be detected and logged.


Encryption won’t save you

Mobile networks encrypt much of your traffic — calls, texts, and data — so only your device and the network can read it. Cell-site simulators don’t try to break that encryption; they exploit how devices handle connections.

When your phone connects, a simulator can:

Some advanced systems — usually state-level — can decrypt content depending on the device, encryption type, and operator capability.

End-to-end encrypted apps such as Signal, WhatsApp, and iMessage protect message content because encryption happens before the data leaves your device. But the surrounding metadata — who you contact, when, and from roughly where — remains exposed.


Metadata: the invisible paper trail

Even when you’re not posting or messaging, your devices keep sending signals. Each one carries metadata — details about what connected, when, and through which path.

Metadata includes:

Those fragments expose patterns. They show your movements, who you were near, and how long you stayed. Combined with data from others, they create detailed maps of associations and networks. Law enforcement agencies have used this information to identify and track protesters after events, tracing them back to homes and workplaces.


Geofence warrants

It isn’t only live surveillance tools that create risk. Police can also use what’s called a “geofence warrant” to ask companies such as Google or Apple for information about every device detected in a specific area during a set time window. These requests draw on the location data apps routinely collect when a phone is switched on and connected.

If your phone stays off the entire time you’re at a protest, it won’t appear in that data. But if it’s on before or after, or if an app updates your location once you reconnect, those records can still place you nearby.

Share


Stage 1: Leave these devices at home

The safest step you can take is to leave anything that transmits a signal at home.

These record movement, location, and heart-rate data that can later show exactly where you went and when. Many also contain microphones and reconnect automatically to mobile or Wi-Fi networks, even when paired devices are off.

If you need to track time, wear a plain digital or analogue watch. No smartwatch is safe in a protest setting.

Bluetooth accessories constantly broadcast unique identifiers so your phone can find them. Those signals can be captured by scanners nearby. Earbuds often stay powered on in their case, continuing to emit short-range signals.

For ear protection, use wired earphones or foam earplugs. There’s no secure wireless option.

Trackers such as AirTags and Tiles are designed to broadcast their location. They’re detectable by almost any scanning system, including those used by law enforcement.

The clue is in the name: leave all trackers at home.

These devices broadcast unique identifiers and may reconnect automatically to known networks, even when you think they’re offline. Some cameras embed GPS coordinates in every image.

If you need to document an event, use a basic camera with no wireless features, or disable connectivity in the menu and remove any networked memory cards.

For reading or note-taking, use paper.


Stage 2: Decide whether to bring a phone

Going without a phone can feel unsettling. You may want it to contact others, check maps, take photos, or stay reachable if you’re a carer. Those are all valid reasons. But phones also carry risks at protests that you should weigh carefully.

Your phone holds message histories, contact lists, photos, location logs, saved passwords, and links to cloud accounts. If it’s seized or lost, authorities can copy those files and use them to identify and locate you or people in your network — family, friends, or fellow organisers. They can also reach linked cloud backups or already-signed-in accounts, pulling older data that exposes private places such as home addresses.

A single seized device can have consequences that reach far beyond its owner.

At large protests, networks often fail simply because too many devices are trying to connect. Authorities can also deliberately disrupt service, blocking calls or throttling apps so messages and live updates don’t get through. Having a phone doesn’t guarantee you’ll be reachable when it matters.

Any time your device is powered and connecting, it leaves a record. Even brief use creates traces that can be collected and linked later.

Share


2.1 Key decisions to make before the protest

Before anything else, decide whether taking a phone is worth the risk — and how much risk you’re willing to accept. That choice shapes everything that follows.

You have three options:

Ask yourself:


2.2 Leaving all phones behind

Leaving your phone at home means there’s no digital trace linking you to the protest. Cellular networks can’t log your presence, and nothing on the device can be seized or examined. This also protects others: without your phone, you’re not carrying contact lists, message histories, or location logs that could identify them.

The trade-off is communication. You’ll lose live updates, maps, and coordination tools — but if you can manage without them, this is the safest option available.

If you plan to go without a phone:


2.3 Using a secondary or burner phone

If you need to communicate but don’t want to risk your main device, use a separate one with little or no personal data. It should exist only for protest or organising purposes and never be linked to your daily life.

A secondary phone is an older device you already own and repurpose for limited use. It may still carry traces of your history — past accounts, saved networks, or locations — so it reduces risk but doesn’t remove it entirely.

A burner phone is bought specifically for anonymity and wiped or discarded after use. It contains no personal identifiers, accounts, or reused SIMs. The goal is to make it impossible to link the device to you through network or data records.

(If the situation feels serious enough to warrant a burner, you might want to reconsider whether bringing any phone is worth the exposure.)

Preparing a secondary phone

Buying and preparing a burner

SIM card and service plan

For both secondary and burner phones


2.4 Using your primary phone

If you must bring your main device, you can still reduce the harm if it’s lost, seized, or monitored.

Before attending
• Back up important data to an encrypted drive at home.
• Sign out of unnecessary apps and cloud services.
• Delete sensitive messages, photos and documents.
• Remove automatic logins from social and other apps.
• Turn off automatic photo uploads and backups.

The next section will walk through how to harden whichever device you bring so that, if it’s lost, seized, or scanned, it reveals as little as possible.

Share


Stage 3: Securing and configuring your device

If you decide to bring a phone, this section walks you through the steps that most reduce risk if it’s lost, seized, or monitored. Read each item as a task: do it, test it, practise it, then check again before you leave.

Preparation


Privacy and data


Network and signal control


Apps and communication


Practise and readiness

Before the protest, rehearse in real time:

The difference between knowing these steps and being able to do them automatically matters most when you’re stressed or need to act fast.


If your device is seized

Share


Stage 4: Reviewing your devices before the protest

Before you leave, run a full check:

Before stepping out, double-check that every device you carry is silent, disconnected, and inert.


Stage 5: When you must stay connected

If you have no choice but to connect when you’re on the ground, do it once, briefly, and with intention.


Stage 6: After the protest

Once you’re home and safe, take a moment to close things down properly.

For a secondary or burner phone

If you took your primary phone

A brief review like this protects not only your data, but also the safety of anyone in your contact lists or message history.


If you follow this checklist, your devices will be as secure as it’s realistically possible to make them. Nothing can remove risk entirely, but every step you take cuts your digital exposure and helps protect the people around you. You’ve done the hard work of preparing with intent. Go safely, stay steady, and know you’re as ready as anyone can be.

In solidarity, as ever

— Lori

📋You can download the checklist here. It’s free to all readers.

© Lori Corbet Mann, 2025

Leave a comment


📌 I’m sharing something each day this week to support you at Saturday’s No Kings protest. I may not be alongside you in person, but I’ll be here to help you stay steady and grounded as you step into that space.

What You’ll Find Here This Week

If you’d like to stay connected as these pieces go out over the week, you’re very welcome to subscribe.

And if you think these posts might help others prepare, please share them — my up-to-date posts on staying safe during collective action are free for everyone to read and share.

Reply via email

© 2026 rcanzlovar.com | About | Contact | Privacy Policy | RSS Feed