Anonymous

How (and Why) to Use a Burner Phone

11/2/2023

      How (and Why) to Use a Burner Phone

      DO’s and DONT’s for using a burner phone

      Example: Setting up a Straight Talk TCL A3 phone

      Afterword

      More Reading

      Appendix A: Firefox Settings

      Appendix B: Signal Settings

      Appendix C: Phone Settings

How (and Why) to Use a Burner Phone

Mobile phones are vital for on-the-ground resistance coordination; however they weren’t designed with privacy and security by default. Not only do they do a poor job of protecting your communications, they also expose you to surveillance risks — especially GPS and cellular tower location tracking. As an example, the FBI can submit a warrant to a cellular service provider for the phone numbers and associated information (such as location history from GPS or cellular towers) of cell phones that were close to an event. The radius of search around the event can be several miles and they can use a large time window to search for phone numbers. From this information they can determine what phones were in the area, who those phone numbers regularly communicate with, and any identifying information tied to the phones. To learn more about what the FBI and other law enforcement agencies can do with your cell phone data, and how they obtain it, see the FBI CAST Geo-Location Field Resource Guide in the Additional Reading section. The following guide explains how to set up and use a burner phone to minimize these risks.

A ‘burner phone’ is a mobile cellular phone purchased with the intention of destroying (burning) it in the near future. Burner phones are inexpensive (usually $20-$40) and purchased in cash along with a prepaid (no contract) plan. A burner phone should have a removable battery and should not be linked to your personal identity and social networks in any way. If a phone is never tied to your personal identity, or the identity of comrades, friends, and family, any metadata or location data captured by law enforcement will tell them little more than that a person was in a location using a mobile phone.

Burning a phone entails first wiping the phone (factory reset), then opening the phone, removing and smashing the sim card, smashing the electronics inside, then lighting the phone, sim card, and electronics on fire and discarding the melted remains in a safe spot, or throwing all components into a safe body of water at least a few feet deep. Be careful to remove the battery before burning it (the battery will explode in fire).

Sometimes a burner phone refers to a mobile cellular device that will be used only one time. This guide describes practices for using a burner phone over a longer period of time. These phones are used in a closed network of burner phones, where neither the burner phones nor their contacts are connected to government names. You should keep a burner phone for no longer than a month, and burn phones more frequently if needed, particularly if the network is compromised, for example if one of the members of the burner network is arrested.

Burner phones should also be used for civilian purposes (“civ phones”) because they are not tied to your identity. Civ phones may be tied to other phones that are identifiable (such as friends and family). There are comrades who have used only burner civ phones for decades with no problem; they are just as effective for civilian purposes as contract phones, and are also much cheaper.

Although mobile phones can be made safer, no tool can ever fully protect your privacy. The safest way to protect yourself is to never discuss any sensitive topics, never record any sensitive information, and never use a phone to communicate sensitive information. Law enforcement cannot use evidence that does not exist. A good idea is to imagine the consequences if your phone were to be confiscated and your messages and contact list were to be read aloud in a court of law.

If you must communicate sensitive information, always do it on a need-to-know basis (compartmentalization) using coded language. Compartmentalizing information to only the individuals who need to know limits the potential for information leak to law enforcement, and using coded language prevents law enforcement from understanding any information that is leaked.

Not generating sensitive information, compartmentalizing, and using coded language are the three most important tactics to protect your communications from law enforcement. Practice them. Use them. Be strict.

DO’s and DONT’s for using a burner phone

Example: Setting up a Straight Talk TCL A3 phone

Here is an example of setting up a Straight Talk TCL A3 phone to be a burner phone. This can be purchased from Walmart. The other Straight Talk phones from Walmart will have a similar setup. Be sure to get a phone with a removable battery.

Afterword

So far physical security is a much bigger risk than phone security when this guide is followed. You’re much more likely to get physically nabbed, caught on camera, or snitched on than having some problem with your phone. For this reason burners are just a tiny piece of security culture. Take your physical security very seriously.

More Reading

https://theanarchistlibrary.org/library/crimethinc-what-is-security-culture

https://ssd.eff.org/en/playlist/privacy-breakdown-mobile-phones

https://www.eff.org/deeplinks/2022/10/california-court-suppresses-evidence-overbroad-geofence-warrant

https://www.documentcloud.org/documents/21088576-march-2019-fbi-cast-cellular-analysis-geo-location-field-resource-guide

Appendix A: Firefox Settings

Open Firefox. Go to the top right and find the three vertical dots and click them. This should bring up the menu. Click Settings near the bottom of the menu.

Search

Homepage

Logins and passwords

Autofill

Set as default browser

Private Browsing

HTTPS-Only Mode

Enhanced Tracking Protection

Site Permissions

Delete browsing data on quit

Notifications

Data Collection

Advanced

Appendix B: Signal Settings

Profile

Account

Chats

Stories

Notifications

Privacy

Advanced

Appendix C: Phone Settings

Network & Internet

Connected Devices

Notifications

Battery

Sounds & Vibration

Display

Security

Privacy

Location

Safety & Emergency

Passwords & Accounts

Google

System