Tech Jamming & Signal Defense
Use technology to protect communication and disrupt surveillance.
Tech Jamming & Signal Defense
Info
This course explores digital protection strategies, anti-surveillance tactics, and signal disruption for frontline and remote defense. It is intended for trained dispatchers, tech specialists, or trusted support crew.
Purpose of This Role
Surveillance and digital interference are growing threats to organizing, mutual aid, and protest safety. The Tech Jamming role supports:
- Preserving communication under surveillance
- Preventing tracking and monitoring
- Disrupting hostile tech tools or signals (if needed)
- Responding rapidly to digital compromise
This is a high-risk, highly technical role requiring deep trust, ethics, and teamwork.
Understand the Threat Landscape
Threat Type | Description |
---|---|
Cell tower spoofing | Fake towers intercepting calls or SMS |
IMSI catchers | Devices tracking phone numbers or capturing data |
Stingrays | Government-grade surveillance mimicking real towers |
WiFi injection | Forcing connections to capture or modify traffic |
Bluetooth sniffing | Passive location tracking via BT devices |
Geofencing alerts | Triggers based on entry/exit from zones |
Radio scanning | Intercepts open-band (FRS/GMRS) comms |
Jamming vs Shielding vs Redirecting
Method | Purpose | Risk |
---|---|---|
Jamming | Interrupts wireless signals like WiFi, LTE, radio | π₯ High (illegal in most areas) |
Shielding | Physically blocks signals using Faraday gear | β Low |
Redirecting | Routes traffic through safer channels (e.g. VPNs) | β οΈ Moderate |
Warning
Jamming RF signals is illegal in many jurisdictions. It must be limited to life-threatening surveillance contexts and used only by trained operators.
Tools of the Trade
Tool | Purpose | Risk |
---|---|---|
Faraday bags | Block signals to/from devices | Low |
Mesh radios (Meshtastic/goTenna) | Encrypted local communication | Low |
SDR scanners | Detect or analyze signals (e.g. IMSI catchers) | Moderate |
Signal-blocking tape | Spot-shielding phones or radios | Low |
VPN with kill switch | Prevent IP leaks if disconnected | Low |
RF analyzers | Detect frequency spikes or interference | Moderate |
Low-power jammers | Disrupt signals (where legal) | Very High |
Compromised Gear Protocol
If your gear is seized, corrupted, or compromised:
- π§Ή Wipe: Secure-erase any logs, SIMs, or temp files immediately
- π Lock: Use passcodes and remote disable tools (e.g. Find My Device kill switch)
- π¦ Contain: Place compromised gear in Faraday bag and isolate
- β οΈ Log: Record incident details (time, location, type of breach)
- π§ Escalate: Inform digital security team or dispatch lead
Deployment Checklist
- π² Devices charged, firmware updated
- π² VPN active and tested
- π² SIMs removed or disabled
- π² Faraday bags ready for fallback
- π² Mesh radios synced, field-tested
- π² Emergency comms plan confirmed
Multi-Layer Communication Strategy
Use the Least Privilege Principle: Only trusted people should access signal gear.
Tier | Method | Use Case |
---|---|---|
1 | Encrypted apps (Signal, Session) | Primary secure messaging |
2 | Mesh radios | Peer-to-peer fallback |
3 | QR codes, briefings, paper maps | No-signal environments |
Always assume cellular and open-band channels are monitored.
Counter-Surveillance Habits
- π Lock devices with passcodes or biometrics
- π΅ Use airplane mode or power off when idle
- β Avoid tracking-based apps
- π Rotate identities and burner devices
- π Do not leave devices unattended
Situational Response Guide
π¨ You detect an IMSI catcher
- π Alert team leads + dispatch immediately
- π Switch to fallback comms (mesh, runners)
- π‘οΈ Shield devices with Faraday protection
- π Log location and time for review
π΅ Area suddenly loses reception
- Suspect jamming or tower spoofing
- Switch to offline or mesh-based fallback
- Use visual codes if planned
- Donβt panicβassess, then regroup
π― Volunteer is being tracked
- Power down device or remove SIM
- Shield the phone in a Faraday container
- Refrain from destruction unless safety-critical
- Flag for digital security follow-up
Working as a Team
Coordinate closely with:
- π§ Dispatchers β fallback protocols and rotation
- πΆ Field leads β safe placement of devices
- ποΈ Legal observers β document surveillance activity
- β De-escalators β support during tense moments
Legal Risks & Ethical Boundaries
Warning
Interfering with emergency or public radio bands is a felony. Never jam indiscriminately.
β
Only operate in legal bands or shield locally
β Never disrupt emergency, hospital, or aid frequencies
β
Log every use of interference or shielding tools
β Donβt provokeβyour job is defense, not attack
After an Action
- π§Ό Wipe logs, rotate credentials
- π Archive incident notes securely
- π§ Debrief with dispatch and digital ops
- π¦ Store signal gear offline when not in use
Glossary
Faraday Bag β A pouch that blocks radio frequencies.
IMSI Catcher β Device mimicking a cell tower to intercept phones.
Mesh Radio β Peer-to-peer encrypted comms tool not relying on cell or WiFi.
SDR β Software-defined radio; scans, analyzes, or fakes signals.
Wardriving β Mapping WiFi signals using GPS.
Rabbit Hole
πΆ Map Your Cityβs Stingray Risks Use FOIA or published documents to locate known surveillance zones. β Tool: OpenCellID + WiGLE.net
Rabbit Hole
π» DIY SDR Projects Use a $20 USB radio dongle to detect and analyze wireless activity. β Tool: RTL-SDR + GQRX + CubicSDR
Summary
You protect movement safety through digital discretion and tech literacy.
Keep tools sharp, data clean, and risks low.
Preserve the signalβdonβt become the noise.
Success
Stay calm. Stay ethical. Shield what matters.
Ready to Certify?
If you understand the risks, tools, and responsibilities of Tech Jamming & Signal Defense, you may now proceed to the certification test.
π Knowledge Check
What is the primary purpose of using a Faraday bag in field operations?
It is legally acceptable to jam public emergency communication channels during high-risk protests.
Which of the following are wireless surveillance threats a Tech Jammer may need to detect?
Which of the following are best practices for tech jammers during field deployment?
You detect an IMSI catcher in the protest zone. What is your correct first action?
Using VPNs with kill switches can help reduce the risk of data leaks when devices disconnect suddenly.
What is one ethical post-action step Tech Jammers should take?
When is a mesh radio network preferable to cellular communication?
How can you improvise a Faraday shield for a phone if a bag is unavailable?
You suspect a volunteer is being tracked. What is the safest first step?
π« You must register and log in to mark this lesson as qualified. Registering helps us track progress, verify training, and build trust across our network.
You can use your Dispatch login here if you already created an account there. Likewise, creating an account here will let you use the same credentials on Dispatch.
Complete and pass the quiz above to unlock this button. Youβll need at least 80% correct.