The Civic Security Guide

A comprehensive resource for activists, protesters, and community organizers.

View the Project on GitHub lumpencamp/civic-security

The Activist’s Guide to Counter-Surveillance

This guide provides a layered defense strategy for activists to protect their privacy, security, and ability to organize against government and municipal surveillance. These are not theoretical concepts; they are practical, actionable steps to create a safer environment for dissent.


Layer 1: Individual Digital Defense (The Foundation)

Your personal security is the bedrock of your group’s security. If one person’s digital life is compromised, it can expose the entire network. Treat these steps as mandatory.

Secure Baseline: Your Digital Armor

  1. Full-Disk Encryption (FDE): This makes the data on your computer unreadable without your password. If your device is seized, your data remains safe. Modern operating systems (Windows, macOS, Linux) and smartphones have this built-in. Action: Ensure FDE is enabled on all your devices (laptops and phones). It is usually on by default, but verify it in your security settings.

  2. Strong Passcodes, Not Biometrics: Your fingerprint or face can be legally compelled by law enforcement in many jurisdictions. A strong passcode cannot.
    • Action: Use a long, unique passcode (at least 12 characters with numbers, symbols, and mixed case) for your phone and computer. Disable fingerprint and face unlock, especially when heading to a protest.
  3. Regular Software Updates: Updates aren’t just for new features; they contain critical patches for security vulnerabilities that governments and hackers exploit.
    • Action: Enable automatic updates on all your devices and applications. Don’t delay them.

Communication Security: Speak Freely

  1. Signal for All Sensitive Communication: Signal uses end-to-end encryption, meaning only you and the recipient can read your messages. Your telecom provider, the government, and even Signal itself cannot access your content.
    • Action: Mandate Signal for all group chats and sensitive one-on-one conversations. Set messages to disappear by default (e.g., after one week) to minimize your data trail.
  2. Verify Safety Numbers: This step ensures you are talking to the right person and not an impostor or a man-in-the-middle attack.
    • How-To: In a Signal chat, tap the person’s name at the top, then “View Safety Number.” Compare this number with your contact in person or through another secure channel (like a video call on Signal). If they match, mark it as verified.

Anonymity: When You Need to Disappear

  1. Tor Browser for Research: When researching sensitive topics, Tor hides your IP address, preventing websites and network observers from knowing who you are and where you are connecting from.
    • When to Use: Use Tor for researching opposition groups, accessing blocked websites, or any online activity you don’t want tied to your real identity.
    • Action: Download and use Tor Browser from the official website: torproject.org.
  2. Tails OS for High-Stakes Activities: Tails is a complete operating system that runs from a USB stick. It forces all your internet traffic through Tor and leaves no trace on the computer you use it on.
    • When to Use: Use Tails for high-risk tasks like leaking documents to a journalist or communicating as a whistleblower.
    • Action: This is an advanced tool. If your work involves high personal risk, research and learn how to use Tails OS properly.

Mobile Security: Hardening Your Most Vulnerable Device

Your smartphone is a tracking device. For serious activism, you must take serious measures.


Layer 2: Group Operational Security (OPSEC)

OPSEC is the practice of protecting your group’s plans and activities. It’s a mindset, not just a tool.

The Need-to-Know Principle

Limit the spread of information. The fewer people who know a detail, the smaller the risk of it being leaked, whether accidentally or through an informant.

Secure Planning Protocol

How you plan is as important as what you plan. Insecure planning is a gift to your opposition.

Data Minimization

Don’t create data that can be used against you. If it doesn’t exist, it can’t be stolen, leaked, or subpoenaed.


Layer 3: Direct Technical Countermeasures

These are active measures to defeat specific surveillance technologies you may encounter.

Countering Stingrays (IMSI-Catchers)

Stingrays are fake cell phone towers used by police to track the phones of everyone in a given area. They are a dragnet surveillance tool.

Countering Facial Recognition

Facial recognition is used to identify protesters from photos and videos, often long after an event.

Countering Data Brokers & Social Media Scraping

Police purchase data from brokers who scrape your information from social media and other public sources to build a profile on you.


Technology alone is not enough. Use the law and public pressure as powerful shields and swords.

Using the Law as a Shield

Proactively use existing laws to protect your rights and create costs for surveillance.

Freedom of Information Act (FOIA)

FOIA is a law that gives you the right to access information from the federal government. Most states have similar public records laws for state and local agencies.

Public Advocacy: The Ultimate Counter-Surveillance

Surveillance thrives in secrecy. The most powerful countermeasure is to drag it into the light.