Version 1

Tech Jamming & Signal Defense

Use technology to protect communication and disrupt surveillance.

35 min readΒ·Qualified Lesson

Tech Jamming & Signal Defense

Direct Action & Protective Roles
Tech & Comms Track

Info

This course explores digital protection strategies, anti-surveillance tactics, and signal disruption for frontline and remote defense. It is intended for trained dispatchers, tech specialists, or trusted support crew.


Purpose of This Role

Surveillance and digital interference are growing threats to organizing, mutual aid, and protest safety. The Tech Jamming role supports:

  • Preserving communication under surveillance
  • Preventing tracking and monitoring
  • Disrupting hostile tech tools or signals (if needed)
  • Responding rapidly to digital compromise

This is a high-risk, highly technical role requiring deep trust, ethics, and teamwork.


Understand the Threat Landscape

Threat TypeDescription
Cell tower spoofingFake towers intercepting calls or SMS
IMSI catchersDevices tracking phone numbers or capturing data
StingraysGovernment-grade surveillance mimicking real towers
WiFi injectionForcing connections to capture or modify traffic
Bluetooth sniffingPassive location tracking via BT devices
Geofencing alertsTriggers based on entry/exit from zones
Radio scanningIntercepts open-band (FRS/GMRS) comms

Jamming vs Shielding vs Redirecting

MethodPurposeRisk
JammingInterrupts wireless signals like WiFi, LTE, radioπŸ”₯ High (illegal in most areas)
ShieldingPhysically blocks signals using Faraday gearβœ… Low
RedirectingRoutes traffic through safer channels (e.g. VPNs)⚠️ Moderate

Warning

Jamming RF signals is illegal in many jurisdictions. It must be limited to life-threatening surveillance contexts and used only by trained operators.


Tools of the Trade

ToolPurposeRisk
Faraday bagsBlock signals to/from devicesLow
Mesh radios (Meshtastic/goTenna)Encrypted local communicationLow
SDR scannersDetect or analyze signals (e.g. IMSI catchers)Moderate
Signal-blocking tapeSpot-shielding phones or radiosLow
VPN with kill switchPrevent IP leaks if disconnectedLow
RF analyzersDetect frequency spikes or interferenceModerate
Low-power jammersDisrupt signals (where legal)Very High

Compromised Gear Protocol

If your gear is seized, corrupted, or compromised:

  • 🧹 Wipe: Secure-erase any logs, SIMs, or temp files immediately
  • πŸ” Lock: Use passcodes and remote disable tools (e.g. Find My Device kill switch)
  • πŸ“¦ Contain: Place compromised gear in Faraday bag and isolate
  • ⚠️ Log: Record incident details (time, location, type of breach)
  • 🧠 Escalate: Inform digital security team or dispatch lead

Deployment Checklist

  • πŸ”² Devices charged, firmware updated
  • πŸ”² VPN active and tested
  • πŸ”² SIMs removed or disabled
  • πŸ”² Faraday bags ready for fallback
  • πŸ”² Mesh radios synced, field-tested
  • πŸ”² Emergency comms plan confirmed

Multi-Layer Communication Strategy

Use the Least Privilege Principle: Only trusted people should access signal gear.

TierMethodUse Case
1Encrypted apps (Signal, Session)Primary secure messaging
2Mesh radiosPeer-to-peer fallback
3QR codes, briefings, paper mapsNo-signal environments

Always assume cellular and open-band channels are monitored.


Counter-Surveillance Habits

  • πŸ” Lock devices with passcodes or biometrics
  • πŸ“΅ Use airplane mode or power off when idle
  • ❌ Avoid tracking-based apps
  • 🎭 Rotate identities and burner devices
  • πŸ‘€ Do not leave devices unattended

Situational Response Guide

🚨 You detect an IMSI catcher

  • πŸ”” Alert team leads + dispatch immediately
  • πŸ” Switch to fallback comms (mesh, runners)
  • πŸ›‘οΈ Shield devices with Faraday protection
  • πŸ“ Log location and time for review

πŸ“΅ Area suddenly loses reception

  • Suspect jamming or tower spoofing
  • Switch to offline or mesh-based fallback
  • Use visual codes if planned
  • Don’t panicβ€”assess, then regroup

🎯 Volunteer is being tracked

  • Power down device or remove SIM
  • Shield the phone in a Faraday container
  • Refrain from destruction unless safety-critical
  • Flag for digital security follow-up

Working as a Team

Coordinate closely with:

  • 🧭 Dispatchers – fallback protocols and rotation
  • 🚢 Field leads – safe placement of devices
  • πŸ‘οΈ Legal observers – document surveillance activity
  • βœ‹ De-escalators – support during tense moments

Warning

Interfering with emergency or public radio bands is a felony. Never jam indiscriminately.

βœ… Only operate in legal bands or shield locally
❌ Never disrupt emergency, hospital, or aid frequencies
βœ… Log every use of interference or shielding tools
❌ Don’t provokeβ€”your job is defense, not attack


After an Action

  • 🧼 Wipe logs, rotate credentials
  • πŸ”’ Archive incident notes securely
  • 🧠 Debrief with dispatch and digital ops
  • πŸ“¦ Store signal gear offline when not in use

Glossary

Faraday Bag – A pouch that blocks radio frequencies.
IMSI Catcher – Device mimicking a cell tower to intercept phones.
Mesh Radio – Peer-to-peer encrypted comms tool not relying on cell or WiFi.
SDR – Software-defined radio; scans, analyzes, or fakes signals.
Wardriving – Mapping WiFi signals using GPS.


Rabbit Hole

πŸ“Ά Map Your City’s Stingray Risks Use FOIA or published documents to locate known surveillance zones. β†’ Tool: OpenCellID + WiGLE.net


Rabbit Hole

πŸ“» DIY SDR Projects Use a $20 USB radio dongle to detect and analyze wireless activity. β†’ Tool: RTL-SDR + GQRX + CubicSDR


Summary

You protect movement safety through digital discretion and tech literacy.

Keep tools sharp, data clean, and risks low.
Preserve the signalβ€”don’t become the noise.

Success

Stay calm. Stay ethical. Shield what matters.


Ready to Certify?

If you understand the risks, tools, and responsibilities of Tech Jamming & Signal Defense, you may now proceed to the certification test.

πŸ“˜ Knowledge Check

What is the primary purpose of using a Faraday bag in field operations?

It is legally acceptable to jam public emergency communication channels during high-risk protests.

Which of the following are wireless surveillance threats a Tech Jammer may need to detect?

Which of the following are best practices for tech jammers during field deployment?

You detect an IMSI catcher in the protest zone. What is your correct first action?

Using VPNs with kill switches can help reduce the risk of data leaks when devices disconnect suddenly.

What is one ethical post-action step Tech Jammers should take?

When is a mesh radio network preferable to cellular communication?

How can you improvise a Faraday shield for a phone if a bag is unavailable?

You suspect a volunteer is being tracked. What is the safest first step?


🚫 You must register and log in to mark this lesson as qualified. Registering helps us track progress, verify training, and build trust across our network.

You can use your Dispatch login here if you already created an account there. Likewise, creating an account here will let you use the same credentials on Dispatch.

Complete and pass the quiz above to unlock this button. You’ll need at least 80% correct.