Burner Phones & Security Culture (2025 Edition)
Learn how to choose, use, and dispose of burner phones safely while embedding them in a broader security culture for protests, cross-border travel, and mutual aid.
𧨠Burner Phones & Security Culture (2025 Edition)
Info
This course covers how to choose, set up, use, and dispose of burner phones safely, while embedding them in a security culture that includes physical OPSEC, digital hygiene, and disciplined community norms.
Why It Matters
Burner phones limit exposure if confiscated, hacked, or tracked.
They support operational security through compartmentalization, anonymity, and metadata hygiene.
But they are not foolproof β they only work when integrated into a culture of discipline, threat modeling, and secure routines.
Fundamentals: What & Why
- Burner phones are prepaid devices bought anonymously, stripped of personal accounts, and used only for a specific window or operation.
- Use cases:
- High-risk protests where tracking is likely.
- Cross-border travel or heavily surveilled areas.
- Temporary communication channels separate from primary devices.
Burner Lifecycle & Acquisition
- Buy anonymously (cash only, avoid loyalty cards or linked locations).
- Setup securely:
- Remove biometrics (fingerprint, face unlock).
- Enable a strong passcode and full-device encryption.
- Disable all location tracking and push notifications.
- Install minimal apps only (e.g., Signal), no personal logins or cloud sync.
- Use for one operation, then wipe or physically destroy β never reuse burners for new actions.
Integration into Security Culture
- Keep burners off and in airplane mode when not in active use.
- Strip metadata from all images and files before sharing (ObscuraCam, Scrambled EXIF).
- Pair burners with burner SIMs and numbers β no crossover with personal devices.
- Debrief after use to update threat modeling and refine protocols.
Threat Modeling & Red Flags
- Burner phones can draw attention at borders or checkpoints (anomaly factor).
- Always combine with clean car principles, rotating routes, and unlinked identities.
- Know the limits of burners β if seized, assume all contents are compromised.
Ethical & Community Norms
- Burners should never leak private info about others.
- Share best practices and refresher trainings regularly to keep pods aligned.
- Revisit zines and guides annually to stay updated with evolving threats and tools.
Burner Phone Checklist
- Purchased anonymously with cash.
- Biometrics removed, strong passcode enabled.
- Device encrypted, location services disabled.
- Minimal apps installed (secure messaging only).
- Stored in airplane mode until deployment.
- Metadata scrubbed before sharing media.
- Used once, then wiped or destroyed.
- Logged in debrief for OPSEC review.
Resource Appendix
- What is Security Culture (Crimethinc)
- Digital Security-Culture Zine (Climate Defense Project, 2023)
- What is Security Culture? (Sprout Distro Guide)
- Activist Smartphone & Burner Phone Guide (Privacy Guides)
π Knowledge Check
Why are burner phones valuable for mutual aid and direct action work?
What is the most secure way to purchase a burner phone?
Which of these practices compromise a burner phoneβs security?
When should you destroy or wipe a burner phone?
What is the main reason to keep a burner phone powered off and in airplane mode when not in use?
Which of the following is a good practice for protecting media shared from a burner phone?
If a burner phone is seized by authorities, what assumption should you make?
What is a red flag that a burner phone might draw unwanted attention?
Which of these actions align with good security culture?
What should you always do after retiring a burner phone?
π« You must register and log in to mark this lesson as qualified. Registering helps us track progress, verify training, and build trust across our network.
You can use your Dispatch login here if you already created an account there. Likewise, creating an account here will let you use the same credentials on Dispatch.
Complete and pass the quiz above to unlock this button. Youβll need at least 80% correct.