The Civic Security Guide

A comprehensive resource for activists, protesters, and community organizers.

View the Project on GitHub lumpencamp/civic-security

The Complete Guide to Burner Phones & SIMs

This guide provides a detailed, step-by-step methodology for acquiring and using a ‘burner’ phone and SIM card for anonymous communication. Following these steps is critical to ensure the device is not linked to your real identity.


1. The ‘Why’: Understanding the Threat Model

A burner phone’s primary purpose is to break the link between your identity and your communications. It is not a magic tool that makes you invisible.

What a Burner Phone Protects Against:

What a Burner Phone Does NOT Protect Against:


2. The Acquisition: The Anonymity Foundation

This is the most important phase. A mistake here will compromise the entire effort.

Step 1: Prepare for the Purchase

Step 2: Purchase the Phone

Step 3: Purchase the SIM Card


3. The Setup & Usage: Maintaining Anonymity

Step 1: First Power-On and Activation

Step 2: Usage Discipline


4. The Disposal: Completing the Lifecycle

When the operation is over or if you suspect the phone has been compromised, you must securely dispose of it.

  1. Deactivate Service: Stop paying for the prepaid plan. The number will eventually be deactivated.
  2. Destroy the SIM Card: Remove the SIM card from the phone. Use scissors to cut the chip into multiple pieces. Discard the pieces in different public trash cans.
  3. Destroy the Phone: The goal is to make the internal storage unrecoverable.
    • Remove the battery.
    • Use a hammer or other heavy object to physically destroy the phone, focusing on crushing the main circuit board. For extreme security, you can also use a drill to destroy the memory chips.
    • Discard the destroyed components in separate, public locations.