Field Security Guide
Field Security Guide
Section titled “Field Security Guide”Guidance for device and personal security when operating in high-risk environments. Staying vigilant and using a combination of modern technology with traditional practices can significantly enhance personal and device security.
Device Security
Section titled “Device Security”SIM Card Management
Section titled “SIM Card Management”- Prefer physical SIM cards over eSIMs - Easier to remove quickly
- Use local SIM cards when traveling to avoid tracking patterns
- Don’t associate multiple devices - Each device should have its own identity
- Keep devices isolated - Never use personal and operational devices near each other
Faraday Bags
Section titled “Faraday Bags”Faraday bags block all wireless signals, preventing tracking:
- Use separate bags for each device
- Always test - Try sending a message from inside the bag to verify it blocks signal
- Keep devices in bags when not actively in use
- Multiple layers provide better protection
Device Practices
Section titled “Device Practices”- Change devices regularly if possible
- Use dedicated devices for sensitive work
- Monitor for unusual behavior - battery drain, overheating, unexpected activity
- Keep software updated - Security patches matter
- Full-disk encryption enabled on all devices
Signal & Network Tracking
Section titled “Signal & Network Tracking”Tracking Vectors
Section titled “Tracking Vectors”Be aware of how you can be tracked:
| Vector | Risk |
|---|---|
| Wi-Fi | Devices probe for known networks, revealing history |
| Bluetooth | Can be tracked even when “discoverable” is off |
| Cellular | IMSI catchers can intercept communications |
| GPS | Apps may track location even when not in use |
| Fitness apps | Strava, etc. can reveal patterns and locations |
Mitigation
Section titled “Mitigation”- Disable Bluetooth when not actively using it
- Avoid wireless earbuds in sensitive situations
- Turn off Wi-Fi when not connecting to known networks
- Use airplane mode when location privacy is critical
- Check app permissions and revoke unnecessary access
Contact & Information Management
Section titled “Contact & Information Management”Secure Practices
Section titled “Secure Practices”- Use Signal for all sensitive communications
- Keep contacts minimal on operational devices
- Use nicknames or codes instead of real names
- Avoid digital storage of the most sensitive information
- Paper can be safer for critical notes (and can be destroyed)
Password Management
Section titled “Password Management”- Use a password manager (Bitwarden, KeePassXC)
- Memorize critical passwords - don’t rely solely on the manager
- Different passwords for different security levels
- Enable MFA wherever possible
Memory Systems
Section titled “Memory Systems”- Build mental maps of contacts and procedures
- Develop a personal system for remembering critical information
- Practice recall regularly
- Have backup plans that don’t require devices
Personal Security
Section titled “Personal Security”Behavioral Awareness
Section titled “Behavioral Awareness”- Recognize surveillance indicators - Same person appearing multiple times, unusual interest in you
- Notice patterns - Vehicles that appear repeatedly, people taking photos
- Trust your instincts - If something feels wrong, act on it
- Be aware of cultural differences in expressions and behaviors
Counter-Surveillance
Section titled “Counter-Surveillance”- Vary your routes - Don’t establish predictable patterns
- Change timing - Don’t always leave/arrive at the same times
- Use reflective surfaces to check behind you without turning
- Know your environment - Identify exits, safe spaces, public areas
Emergency Situations
Section titled “Emergency Situations”- Have plans ready for different scenarios
- Know local emergency numbers
- Identify safe havens (embassies, hospitals, police stations - depending on context)
- Keep emergency contacts memorized
Travel Security
Section titled “Travel Security”Before Traveling
Section titled “Before Traveling”- Backup all data securely
- Remove unnecessary apps and data
- Update all software
- Test Faraday bags
- Charge all devices
- Research local laws and conditions
At Borders
Section titled “At Borders”- Know your rights at border crossings
- Expect device searches - Consider travel devices with minimal data
- Don’t lie - But you don’t have to volunteer information
- Know what’s on your devices - Be prepared for questions
In the Field
Section titled “In the Field”- Maintain heightened awareness
- Be cautious with new contacts
- Recognize minders or followers
- Know when to abort - Safety over mission
When Followed or Watched
Section titled “When Followed or Watched”Recognizing Surveillance
Section titled “Recognizing Surveillance”Signs you may be under surveillance:
- Same individuals appearing in different locations
- Vehicles that seem to follow your movements
- People who seem unusually interested in your activities
- Feeling of being watched (trust this instinct)
Response Options
Section titled “Response Options”Low-key methods:
- Change your route
- Enter a public, crowded space
- Stop and window shop (use reflection to observe)
- Take public transportation with multiple transfers
Direct methods (use judgment):
- Directly approach and ask if they need something
- Take their photo
- Enter a police station or embassy
Evasion:
- Use crowds to break visual contact
- Enter buildings with multiple exits
- Use restrooms to change appearance or exit differently
Communication Security
Section titled “Communication Security”Secure Messaging Principles
Section titled “Secure Messaging Principles”- Assume messages may be intercepted outside encrypted channels
- Verify identities before sharing sensitive information
- Use disappearing messages for sensitive conversations
- Don’t discuss locations in messages when in sensitive areas
- Have code words for emergency situations
When Devices May Be Compromised
Section titled “When Devices May Be Compromised”If you suspect your device is compromised:
- Don’t use it for anything sensitive
- Don’t tip off that you know
- Use it for disinformation if strategic
- Get a clean device for actual operations
- Report to trusted contacts via secure means
Self-Defense Considerations
Section titled “Self-Defense Considerations”General Principles
Section titled “General Principles”- Awareness is the best defense - Avoid situations before they become dangerous
- De-escalation first - Violence should be the last resort
- Know local laws - Self-defense laws vary significantly
- Consider consequences - Physical confrontation has legal and safety implications
Tool Selection
Section titled “Tool Selection”- Non-lethal options are generally preferred
- Practical items (flashlight, umbrella) can serve dual purposes
- Weapons can escalate situations and attract attention
- Training matters - Untrained use of any tool can backfire
Quick Reference
Section titled “Quick Reference”Before Going Out
Section titled “Before Going Out”- Devices charged
- Unnecessary data removed
- Location services configured appropriately
- Faraday bags ready
- Emergency contacts memorized
- Route planned with alternatives
If Compromised
Section titled “If Compromised”- Stay calm
- Protect what you can
- Get to safety
- Contact trusted support
- Document everything
- Assess and adapt
This guide draws from field experience in high-risk environments. Always adapt practices to your specific situation and threat level.