Electronic Frontier Foundation

A Protester’s Guide to Cell Phone Use

Who’s Listening & What Can You Do?

2015

      BEFORE THE PROTEST

      AT THE PROTEST

      HELP, I’M BEING ARRESTED!

      OK, NOW HOW DO I GET MY PHONE BACK?

      An added word of caution from the Fifth Estate IT Advisor

FE Note: The police have always done surveillance of revolutionaries. What is new now is the technological capabilities of government snoops. Being noted on paper 3X5 cards didn’t stop our predecessors, and their electronic gadgets won’t deter us.

The Electronic Frontier Foundation defends civil liberties in the digital world. Founded in 1990, the San Francisco-based EFF states that it “champions user privacy, free expression, and innovation through impact litigation, policy analysis, grassroots activism, and technology development.”

With major protests in the news again, they recently updated their Surveillance Self-Defense guide, which includes more detail on security threats facing mobile phone users. Below are excerpts from the Guide. It is available at eff.org in its entirety.

There is a massive volume of law enforcement requests for cell phone data--ranging from location information to actual content--and widespread use of dedicated cell phone surveillance technologies. On the other hand, strong Supreme Court opinions have eliminated any ambiguity about the unconstitutionality of warrantless searches of phones incident to arrest, and a growing national consensus says location data, too, is private.

Protesters want to be able to communicate, document events, and share photos and video with the world. Doing so means facing a complex set of considerations about the privacy of the data those phones hold.

The guide helps answer questions about how to best protect that data, and what rights protesters have in the face of police demands.

BEFORE THE PROTEST

Think carefully about what’s on your phone. In 2011, law enforcement in many states argued that they could search the contents of a phone incident to arrest without a warrant. Today, Due to a unanimous Supreme Court decision in Riley v. California, that’s no longer the case. Still, if you can avoid carrying sensitive data, you don’t have to worry about it getting pulled off the phone. That can include photos, address book, application data, and more. If you don’t need it for the protest, consider removing it for the duration.

If you have access to a temporary phone with only the essentials, that might be a better option. Modern smartphones record all sorts of data, and there may be overlooked sources of sensitive information.

Password protect your phone. Password protection can guard your phone from casual searches, but it can still be circumvented by law enforcement or other sophisticated adversaries.

Start using encrypted communications channels. Text messages, as a rule, can be read and stored by your phone company or by surveillance equipment in the area. If you and your friends can get comfortable with encrypted communications channels in advance, that can keep prying eyes off your texts while they’re in transit.

Direct messages through social media may be encrypted while in transit, but can be subject to subpoenas from law enforcement. You may wish to explore end-to-end encrypted options, like Whisper Systems’ TextSecure, 1 Guardian Project’s mobile IM software Chat-Secure, or the mobile version of Cryptocat, or Whisper Systems’ RedPhone (for Android) or Signal (for iOS) for voice calls, which only store the contents of your communications in an encrypted, unreadable form. “””

End-to-end encryption does not protect your meta-data. In other words, using end-to-end encrypted communications will keep law enforcement from being able to read the contents of your messages, but they will still be able to see who you’re talking to and when you’re talking to them.

AT THE PROTEST

Keep control of your phone. You may wish to keep the phone on you at all times, or hand it over to a trusted friend if you are engaging in action that you think might lead to your arrest. In any case, you can set the lock screen to turn on quickly, so that if you do lose control of your phone, nobody else gets access easily.

Take pictures and video of the scene. As the ACLU says in a recent Know Your Rights guide, “Taking photographs of things that are plainly visible from public spaces is a constitutional right.” Unfortunately, that doesn’t stop law enforcement officers from occasionally demanding that protesters stop doing exactly that.

If you’re planning to document the protest, you should read the whole guide ahead of time. There are special considerations for videotaping, too, so make sure to brush up on that if you plan to be recording video.

Finally, you may wish to explore options that upload directly to another server. Livestreaming sites, and even social media services, can make sure photos and videos get online before law enforcement officers have a chance to delete them.

HELP, I’M BEING ARRESTED!

You have a right to remain silent--about your phone and anything else. If questioned by police, you can politely but firmly decline to answer and ask to speak to an attorney.

If the police ask to see your phone, tell them you do not consent to the search of your device. Again, since the Supreme Court’s decision in Riley, there is little question that officers need a warrant to access the contents of your phone incident to arrest, though they may be able to seize the phone and get a warrant later.

If the police ask for the password to your electronic device you can politely refuse to provide it and ask to speak to your lawyer. Every arrest situation is different, and you will need an attorney to help you sort through your particular circumstance.

Note that just because the police cannot compel you to give up your password, that doesn’t mean that they can’t pressure you. The police may detain you and you may go to jail rather than being immediately released if they think you’re refusing to be cooperative. You will need to decide whether to comply.

OK, NOW HOW DO I GET MY PHONE BACK?

If your phone or electronic device was seized, and is not promptly returned when you are released, you can file a motion with the court to have your property returned. If the police believe that evidence of a crime is on your electronic device, including in your photos or videos, the police can keep it as evidence. They may also attempt to make you forfeit your electronic device, but you can challenge that in court.

Increasingly, we keep our most sensitive communications and personal information on our cell phones. We carry in our pockets these devices that can tremendously enhance our ability to exercise our First Amendment rights, but which also carry serious privacy risks.

An added word of caution from the Fifth Estate IT Advisor

You may have been told that encryption of electronic files, use of the TOR network, secret messaging services, et al, are a safeguard against revelation of information. However, there is no certain protection.

For every tactic proposed to communicate securely, a security expert can propose a theoretical countermeasure. Even the mere use of encryption flags the government to watch your traffic, no matter how innocuous its content.

Governments are gathering information about us at a fantastic rate. Fiber optic cables, local internet service providers, even the various devices that we all use and assume belong to us only, are observed, tapped, and regularly evaluated.

For instance, it can be reasonably conjectured that every device connected to the internet is infused with some eavesdropping mechanism that can record your keystrokes, identify you whether on your own device or not, divine your location even if frequently changed, know the lineage of your friends and family, understand your politics, know where you are, even who you are sleeping with.

Even more frightening: What matters is that you can eventually be tracked if considered a worthwhile investment in server analysis time, and then every human association in your life will be cross-referenced. This kind of information is the oft mentioned metadata, that is, data points that infer the danger you represent to the authorities.


Fifth Estate #393, Spring 2015