The Civic Security Guide

A comprehensive resource for activists, protesters, and community organizers.

View the Project on GitHub lumpencamp/civic-security

A Practical Guide to Combating Government Surveillance

For the Non-Technical Activist


Introduction: Why This Guide Matters

In the digital age, activism relies heavily on technology for organizing, communication, and outreach. However, these same tools can be used by government agencies for surveillance. Understanding the landscape of modern surveillance is not about paranoia; it’s about strategic security. This guide is designed to demystify the primary techniques used by state-level actors and provide you with a foundational understanding of how to protect yourself, your community, and your work. The core principle is simple: knowledge empowers you to make informed decisions about your security.


Part 1: Bulk Data Collection - The Dragnet

The foundational concept of modern surveillance is “collect it all.” Government agencies operate on the assumption that most unencrypted digital communications are collected and stored by default. This is accomplished through massive, automated programs that form a wide dragnet.

PRISM Program

Upstream Collection


Part 2: Targeted Surveillance - The Microscope

While bulk collection is a dragnet, agencies also use specific tools to zoom in on individuals and groups.

Cell-Site Simulators (Stingrays/IMSI Catchers)

Social Media Monitoring

The Role of Data Brokers


Part 3: Investigative Techniques - Hiding the Trail

Beyond technology, it’s crucial to understand the legal tactics used to obscure how surveillance is conducted.

Parallel Construction


Conclusion: A Strategic Approach to Security

The goal of this guide is not to induce fear, but to foster a strategic mindset. You cannot stop bulk collection, but you can encrypt your communications to make the collected data useless. You may not know if a Stingray is active, but you can choose to leave your phone at home. By understanding these surveillance techniques, you can move from a reactive to a proactive security posture. Adopting privacy-preserving tools and practices is a fundamental and necessary act of digital self-defense for modern activism.