ICE Watch Digital Security

 Last reviewed on February 2, 2026
 Takes about 20 minutes - 2 hours

Who this is for: Anyone doing observing ICE's activities to hold them accountable: filming, foot patrols, adopt-a-corner, or rapid response. This includes ICE/DHS/CBP and any agency that is collaborating with them. (Note: accompaniment work and mutual aid work carry a different set of risks—many things in this guide may be useful in those situations, but it wasn't specifically designed for that set of needs.)

Scope: This guide is designed to help you reduce the risk of your private data being exposed to the state or right-wing actors. This includes steps to protect your identity, location, communications, organizing plans, home address,

Risks: ICE's primary activities center on detention and deportation. But digital infrastructure is integral to how they operate and how they attempt to surveil, repress, and punish accountability efforts. For example, we know that ICE is trying to track anyone who films them. Agents use facial recognition and social media monitoring, follow observers home, and do warrantless location tracking. The federal government has tried to build cases against activists for exercising their first-ammenmdent rights. We also know that right-wing adversaries are infilitrating Signal threads, and doxxing activists.

But we can do a lot to protect ourselves! That may sound like a lot, but the federal government is not all-powerful (as they would like you you believe). There are a lot of steps we can take to make their digital surveillance harder, and to keep each other safe in the face of repressive tactics.

We keep us safe: Your phone doesn't just have your data on it. It has your Signal groups, your contacts, photos of community members, threads with other organizers, etc. If it gets seized, your organizing network could be exposed and put at risk. This guide offers steps to take to help keep you and your community safe.

Background: This guide was created in response to the ICE invasion in Minneapolis (early 2026) and was made in consultation with ICE watch organizers there and across the country.

Practices for all ICE observers

everyone

This section is for everyone engaging in accountability work around ICE activities including patrols, filming ICE, blowing whistles, accompaniment, etc.

If you only have 15–20 minutes, start with these items.

Use Signal for encrypted texts and calls, especially your activism and political conversations

Normal calls and texts are not private and can be easily surveilled and turned over to law enforcement

DO: Use Signal
DO NOT: Use Facebook Messenger, Telegram, regular texts, etc. (Avoid WhatsApp if possible)

Most normal texts and calls can be observed by your cell phone provider and the government. Telegram is incredibly insecure. (See below for our thoughts on WhatsApp.)

Signal is the best option to keep your messages secure and to keep who you are talking to private.

How to set up Signal

  1. Install Signal on your phone.

  2. You can now message your existing contacts using their phone number (they must have Signal installed as well). If you're messaging someone new who you don't yet have trust with, you should exchange usernames instead of phone numbers when possible.

  3. To start a new message: Press the "Create" icon in the top right of Signal, then type in either the person's phone number or username

  4. Enable disappearing messages by default: Signal > Profile picture > Settings > Privacy > Disappearing Messages > Set to your desired time.

  5. Follow the Signal Security Checklist to make sure you have the most security and privacy

When to use Signal

Some examples of when you would especially want to use Signal

  • Discussing a protest/action that is not public

  • Organizing a protest/action that is public, but the organizers want to protect their privacy

  • Criticizing the government or other power-holders

What about WhatsApp? (Avoid it if you can, use it if you must)

WhatsApp messages are secured with the encryption method developed by Signal, so the contents of your messages are secure. However, Meta harvests a lot of information about who you are talking to, how often, and what groups you're in. In 2024 alone, they turned over data for 78% of government requests. Your messages are safe, but who you are communciating with is not. It is an option to consider if the community you're working with is unlikely to move to Signal. It is safer than normal texts, Telegram, etc. If you do use WhatsApp, make sure to use the new Strict Account Settings feature and lock down your privacy settings

ImportantChange your default settings so all new Signal threads have disappearing messaged enabled

This keeps everyone safer if someone's phone is ever confiscated or breached.

The best upgrade everyone can make to their use of Signal is to make sure that disappearing messages are enabled by default. Most activists we talk to haven't enabled this by default. (And most people forget to enable it manually for each new thread.)

This keeps you safe and other people safe. We don't know who's phone will be seized by law enforcement. Even if we believe we're talking about perfectly legal things, the government can find ways to twist our words to attempt to make a case against us for our dissent

There are two things to track related to disappearing messages:

  1. First, change your default so any thread you make has this feature enabled.

  2. Second, make sure it is enabled for threads that other people start: if someone else starts the thread, it may not have disappearing messages enabled. You may need to enable it.

How to enable disappearing messages

  1. To change the default: Signal > Profile picture > Settings > Privacy > Disappearing Messages > Set to your desired time (longer or shorter depending on your risk tolerance).

  2. (Android-only) Change your message retention limit: This will delete messages on threads even that don't have disappearing messages turned on. (They will only be deleted on your device.) Signal > Profile picture > Data and storage > Manage storage > Keep Messages > Set to your desired max timeframe. Go back a screen and enable "Apply limits to linked devices".

  3. To change existing threads: Signal > Open the message thread you want to change > Click on the person's name (or group name) at the top of the screen > Disappearing Messages > Set to your desired time

  4. Delete old messages/threads: Disappearing messages does NOT apply retroactively. So you may want to delete old threads on your phone. This will not delete them on other people's phones, unfortunately. So if it is very sensitive, you may need to ask them to also manually delete the thread. (And while you're at it, encourage them to turn on disappearing messages by default!)

Choosing your disappearing message time: How long you set your disappearing times depends on the sensitivity of your messages. A question you might ask yourself is "if someone's device was confiscated or hacked, how important is it that these messages are not accessible?"

  • For chatting about low-risk things with friends, you might choose 4 weeks.

  • For standard political organizing, you might choose 1 week.

  • For a direct action, you might set it to 1 day or 1 hour or 5 minutes, so the messages are gone before the action starts.

Configure Signal to be as secure and private as possible

Hide your real name, real photo, message previews, and set a username

The steps below help protect you if your device is confiscated by the cops, or an adversary (cop or right-wing) in a Signal group is trying to incover your identity.

The list below captures the most important steps. For more detailed instructions and advanced stepsd, read our full Signal Security Checklist →

How to configure Signal to be more secure and private

Change these Signal settings:

  • Enable disappearing messages by default:

    Signal > Profile picture > Settings > Privacy > Disappearing Messages > Set to your desired time (This will only effect threads that you start.)

  • Change your display name to not be your real name:

    Signal > Settings > Tap on your name/icon near the top > Click the top item with the silhouette of a person > Edit your profile display name

  • Change your profile photo to not be your real name:

    Signal > Profile picture > Settings > Tap on your name/icon near the top > Edit photo > Upload a generic photo that you found online that doesn't relate to your identity, work, location, or interests.

  • Create a username and share that instead of your phone number:

    Signal > Profile picture > Settings > Tap on your name/icon near the top > Tap the @ symbol > Edit username > Set your username to something completely unrelated to your identity that you have used anywhere before. It must end in at least 2 numbers. (Tool: Random username generator). Give this username instead of your phone number to increase your privacy.
    Example: @CarefreeMoose.22

  • Hide message previews in notifications:

    Signal > Profile picture > Settings > Notifications > Notification Content > Select "No Name or Content"

  • Hide your phone number:

    Signal > Profile Picture > Settings > Privacy > Phone Number > Under "Who Can See My Number" > Select "Nobody".

  • Enable incognito keyboard (Android-only):

    Signal > Profile Picture > Settings > Privacy > App security > Enable "Incognito keyboard"

Ongoing Signal practices:

  • If someone else starts a new thread (or group), it may not have disappearing messages turned on. Make sure to enable disappearing messages on that specific thread if they did not.

  • Give out your Signal username instead of your real phone number.

Revoke location permissions from individual apps that don't need it (which is most of them)

Protect yourself from apps with location access giving the government or data brokers a detailed log of your movements

DO: Turn off location tracking for most apps
DO NOT: Let every app know where you are

How to review location permissions on iPhone

  1. Go to Settings > Privacy & Security > Location Services

  2. Review each app and set to one of these options:

    • Never: Best choice for most apps

    • Ask Next Time Or When I Share: Good for apps you rarely need location for

    • While Using the App: Only for essential navigation apps

    • Always: Almost no app should have this permission

  3. Make sure to set the Camera app to “Never” so you don’t risk revealing your location when you share or upload photos.

  4. Go to the app labeled System Services > Disable Significant Locations

How to review location permissions on Android

  1. Go to Settings > Privacy > Permission manager > Location

  2. Review each app and set to one of these options:

    • Don't allow: Best choice for most apps

    • Ask every time: Good for apps you rarely need location for

    • Allow only while using the app: Only for essential navigation apps

    • Allow all the time: Almost no app should have this permission

These apps might genuinely need location while in use:

  • Navigation (Apple Maps, Magic Earth, CoMaps)

  • Ride-sharing (but only while actively using)

Some apps might need temporary permission:

  • Food delivery apps only need location when you're actually ordering

Apps that definitely do NOT need location access:

  • Photo apps

  • Social media apps

  • Games

  • Most shopping apps

  • Banking apps

  • News apps

  • Most productivity apps

Remember: Every app with location access is a potential privacy leak. When in doubt, disable location and only re-enable if you find you actually need it.

Keep your phone updated to the latest version of its operating system

Protects you from hackers, spyware, and passcode cracking tools.

DO: Install updates as soon as you're prompted
DO NOT: Keep pushing the "update later" button

The cops have tools that rely on weaknesses in your operating system that get fixed in the latest versions.

Every time a new update comes out, that usually means there are new public vulnerabilities on your device. Think of it as a ticking clock, where hackers now know a new way in to any out-of-date devices.

How to update your phone's operating system

On iPhone: Go to Settings > General > Software Update > If you see an option to update, tap Install now

On Android: Settings > System > System update (or Software update) > Tap Check for update or Download and install if an update is available.

If your operating system is not up-to-date, many of the other recommendations in this guide will not protect your data.

Set your phone passcode to 8 to 10 random digits

It takes years for cops to crack an 8-digit random passcode. They can probably guess your current passcode in less than 5 minutes with automated tools.

DO: Use a random passcode generator to create an 8 to 10-digit code
DO NOT: Use any passcode you thought of yourself (dates, patterns on the keyboard, etc.). Do not use 6-digit passcodes if possible.

How to change your passcode

  1. Generate a random 8 to 10-digit passcode using this random passcode generator. (Don't make one up yourself—humans are bad at choosing randomly!)

  2. Change your passcode:

    On iPhone: Settings > Face ID & Passcode > Change Passcode > Passcode Options > Custom Numeric Code

    On Android: Settings > Security > Screen Lock > Enter Current Lock > PIN/Password > Enter a Passcode

  3. Practice the new passcode at least 10 times in a row right now so are more likely to remember it. (Disabling biometrics will force a passcode request every time you lock the phone.)

  4. Write your new passcode on paper and keep it somewhere safe at home until you've memorized it. Then destroy it after 2–3 weeks. Setting a reminder on your phone can help.

How long does it take to crack a passcode?

Type
Time it takes to crack (average)
Example
6-digit easy-to-guess pattern
Less than 24 hours to crack
333666 (common pattern)
110585 (date pattern for Nov 5, 1982)
6-digit random code
200 days to crack
238253
8-digit random code
40+ years to crack
34780026

Note: These times only apply to phones. Computers can be cracked much more quickly, and need much stronger passwords.

Sources: The estimates in the table above assume real-world observed attempts/second from police forensic hacking tools. If you need more security, use a 10-digit passcode, which will protect you even under the highest-possible cracking scenarios. See the sources linked in the passcode FAQ here.

Fully disable face/fingerprint unlock (biometrics)

Protects you if the cops try to force you to unlock your phone.

Cops can try to force you to unlock your phone with your face/fingerprint (though this usually requires a warrant).

You have stronger legal standing with a passcode than with biometric unlock.

How to disable face/fingerprint unlock

On iPhone: Settings > Face ID & Passcode > Disable "Use Face ID for iPhone Unlock" (you can leave the rest enabled)

On Android: Settings > Lock Screen (or Security) > Biometrics and Security > Disable both "Face Recognition" and "Fingerprint Unlock" for unlocking your phone

Caveat: Face/fingerprint unlock can make it easier to use a strong passcode without typing it every time. If you feel you have to choose between a long passcode and disabling biometrics, we recommend a longer passcode.

Filming securely

everyone

This section is for anyone filming ICE or other government agents.

The goal of filming law enforcement is two-fold:

  1. Deterrent - We know filming won't prevent harm, but it sometimes does reduce the chance of it.

  2. Documentation/accountability - If someone is harmed, we have the documentation to show the courts the public.

It is completely legal and constitutionally-protected for you to film law enforcement.

Record videos without unlocking your phone (just swipe left!)

Protects your data if your phone is seized while you are filming

If your phone is confiscated while you are filming or photographing, the cops can get access to everything.

Your phone lets you take photos without unlocking first, so your data stays more secure.

How to film without unlocking your phone

First, make sure you have face unlock disabled. If you have it enabled, your phone might unlock automatically even if you are still on the lock screen.

On iPhone: Swipe left on the lock screen. (Or long-press on the camera icon.)

On Android: Swipe left on the lock screen, or double-press the power button (if enabled in Settings → System → Gestures → Quickly open camera).

Share videos of ICE encounters carefully (don't immediately post them online)

In some situations, posting can put other activists at legal risk

DO: Coordinate with your activist network before sharing/posting
DO NOT: Post online immediately after filming

Videos of interactions with law enforcement are very importnat in our work. And they can also create legal risk for activists or other individuals.

Before posting, consult with your activist network and/or movement-aligned laywers.

How to share videos/images securely

  • Consult activist community: The people in your network are best positioned to know how to use videos in a way that protects our communities while holding adversaries accountable

  • Consult movement-aligned lawyers: Ask your community if there are local lawyers who are aligned with your cause. If you don't know who to talk to, reach out to CLDC (rapid response hotline: 541-603-6891) or NLG.

Share videos/photos securely (via Signal, etc.)

DO: Send photos using encrypted channels: Signal or Proton Drive or OnionShare
DO NOT: Use a cloud sharing system like Google Photos or iCloud

If you share sensitive videos/photos with trusted activists or lawyers, you want to do it using secure channels. Cloud providers like Apple/Google could turn over your data to the police with a court order.

How to share videos securely

  • Signal: Sharing media via Signal is the easiest and most secure. It also automatically removes "metadata" (like location). But be aware that if your video is long, it will reduce the quality.

  • Proton Drive: You can store files up to 5GB on a free account.

  • OnionShare: Best if you need to send a lot large files. End-to-end encrypted. The person receiving it will need to use Tor Browser.

Consider using a "regular" camera to film instead (if possible)

Most of the digital security advice on this page relates to your phone being confiscated or surveilled.

If you can manage without your phone and are able to get a "regular" camera, that can provide even more protection.

If you have your phone entirely powered down, it is much more protected from surveillance or "phone hacking" tools that cops use.

How to use a "regular camera" to film

Option 1: Phone not with you. The most secure approach is to not have it on you at all while filming in case you are arrested, but many of us need it.

Option 2: Phone with you but entirely off. Make sure it has a strong passcode and the latest operating system.

Cameras to consider:

  • Action cam (GoPro, Akaso, Crosstour, etc)

  • Body cam (BOBLOV, etc)

  • Find a point-and-shoot camera

  • Or just bring a secondary phone

Remove hidden photo info (location, etc.) before posting/sharing

Photos you share can reveal your location or identity if you don't remove that data first

By default, photos and videos from your phone include hidden data ("metadata") that reveals your exact GPS location, timestamp, and phone model.

If we post the photo online, this metadata can be used to track and identify you by law enforcement or right-wing adversaries.

How to remove hidden info from photos before shanig

Our recommendation: Send over Signal

Any photo/video you send over Signal automatically has all of the metadata removed.

If you are trying to share it online, you can send the photo to yourself, then re-save it from Signal and delete the original.

Other secure options

Practices for frequent ICE observers

medium-threat

This section is for anyone who is doing frequent work to hold ICE accountable. Upgrading your security is important because you are taking on more risk.

ImportantConsider getting a secondary phone for ICE watch and rapid response

Protest you and your community because there is less data revealed if your phone is confiscated

ICE watch and rapid response work comes with a higher risk of arrest. The best way to keep not just yourself, but your community safe is to have as little data as possible on the phone that gets confiscated. And the easiest way to accomplish that is to only have a secondary phone with you when doing higher-risk work.

Getting an extra phone may not be accessible to everyone, but we encourage you to ask your network for support—people often have old phones sitting around that still work.

Don't let not having a secondary phone stop you from doing this work.

What should be on a secondary phone:

  • Phone numbers for anyone you may need to be in contact with (friend, family, kids, etc.)

  • Signal threads for that day's work only (leave all other Signal threads, delete all DMs)

  • Private map app like Magic Earth

  • Photos/videos documenting ICE (delete anything not from today after you've saved it somewhere safe)

  • ... And next to nothing else!

Option 1: The more-anonymous approach

How to get a more-anonymous secondary phone

  • Follow our in-depth secondary phone guide if you want more anonymity. This will help you if you think you might be a target for state surveillance (monitoring your phone location because your political work). This guide takes multiple hours to complete.

Option 2: The easier approach

How to get a less-anonymous secondary phone

Not everyone needs the extra anonymity of Option 1 above. This easier approach is linked to your identity—the main goal is simply minimizing data on your phone so you don't put the people you organize with at risk if it's confiscated.

  1. Find a phone: Any phone works—ask around for an old one. Have a tech-savvy friend check if it's "unlocked" (can accept any SIM card).

  2. Get service: Buy a prepaid SIM (Tracfone, Mint Mobile) at Costco, Walmart, or a corner store. Or add a line to your existing plan.

  3. Create a new Apple/Google account: Don't log in with your normal account—your data will sync, defeating the purpose.

  4. Leave your primary phone at home: Only bring the secondary phone for high-risk work. Let close contacts know to reach you there for emergencies.

  5. Keep minimal data: Don't make this your phone for all activism—if confiscated, it would still contain risky data. Only join the day-of Signal thread, skip general coordination channels, and leave threads when your shift ends.

Use a privacy-focused map/navigation app (Apple Maps or Magic Earth)

Protect yourself from Google turning over your data to law enforcement

DO: Use Apple Maps (iPhone-only) or Magic Earth (free)
DO NOT: Use Google Maps

Your location history reveals a lot about your interests, friends, and political activity. It can also be used against you in court.

Your phone is always revealing your approximate location to your cell provider because it knows what cell tower you are connected to. But any app you give your exact GPS location to has much more detail.

You can protect yourself by using a mapping app that is more privacy-preservating.

Apple Maps (iPhone only) offers privacy protections that are stronger than you might expect and is much more private than Google. However, as a big tech company, it's best for everyday use rather than sensitive organizing. We recommend it because it provides live traffic and public transportation features that privacy-focused alternatives lack.

How to set up Apple Maps (iPhone only)

  1. Apple Maps is installed by default (you can re-install it if you removed it).

  2. Go to Settings > Privacy & Security > Location Services > System Services, then disable iPhone Analytics, Routing & Traffic, and Improve Maps.

Magic Earth (iPhone or Android; free) offers strong privacy. It is much easier to use than our other cross-platform suggestion (CoMaps). Some features are only available in the paid version, though.

How to set up Magic Earth (iPhone or Android)

  1. Install Magic Earth (free; paid for live traffic)

  2. It functions mostly like Google Maps or Apple Maps!

CoMaps (iPhone or Android; free) is a less user-friendly than Magic Earth or Apple Maps, but has the strongest privacy promises. You can operate it entirely offline, which is especially helpful for activists doing sensitive work. That said, it doesn't have live traffic data or public transit routes, which makes it hard to use as your main navigation app.

Enable Lockdown Mode (iPhone) or Advanced Protection (Google & Android)

Mercenary spyware is an extremely advanced attack, exploiting sophisticated vulnerabilities on our devices. In response, Apple and Google have introduced an advanced security mode that offers enhanced protection against spyware.

On iPhones, it's called Lockdown Mode and on Android, it's called Advanced Protection Program. (You can also enable Advanced Protection Program on just your Google Account even if you don't have an Android phone.)

We have no reports of anyone getting infected with spyware who had Apple's Lockdown Mode enabled. Android's Advanced Protection is more recent and its effectiveness has yet to be tested.

How to enable Lockdown Mode for iPhones

iPhone: Settings Privacy & Security Lockdown Mode → Enable

Enabling Lockdown Mode introduces some usability tradeoffs on your phone. See list below.

This feature is available for iOS version 16 and above.

How to enable Advanced Protection on Android

Android: Settings Security & Privacy under "Other Settings" tap Advanced Protection.

Note: The location of this setting may vary between Android devices, so we recommend searching for 'Advanced Protection' in the Settings search bar.

This feature is available for Android 16 and above.

Usability trade-offs

For anyone worried about targeted attacks, these usability trade-offs will likely be worth the big increase in security.

iPhone Lockdown Mode: Features that will be harder to use

  • No clickable links in messages (mainly within iMessage) - Links show as raw URLs and don't work (i.e. are not instantly clickable). You have to copy-paste them manually to a browser. This encourages you to make sure they are safe before doing so, since spyware often arrives via a text message containing a custom-designed link that is impossible to ignore for you in particular.

  • Most message attachments blocked (also mainly within iMessage) - When receiving PDFs, documents, Office files, contacts, location over iMessage, you might not be able to view them normally and iMessage will indicate "1 attachment." This is because some spyware can be delivered through malicious attachments.

  • FaceTime calls from unknown contacts blocked - Lockdown Mode will block call attempts from unknown contacts or people you have not been in touch with in the last 30 days. You will be notified if this user attempts to FaceTime you and you can decide to call back if the call attempt is genuine.

  • Web fonts don't load - Websites appear with system fonts only, often looks weird.

  • Images may not display - Some images show as missing image icons.

  • Interactive webpage elements fail - Complex web features, animations, dynamic content often broken.

  • Location sharing is disabled in Find My. You can see other people's locations but they can't see yours.

  • iCloud Shared Albums don't work as expected - When you share photos in a shared album, location information is excluded. Shared Album invitations might be blocked too.

  • Device won't connect to any WiFi automatically - On Lockdown Mode your phone won't connect to insecure WiFi's automatically and you will need to manually connect to the chosen network and accept the security risk.

  • 2G or 3G support is turned off - If you find yourself in a location with 2G or 3G cellular network with Lockdown Mode, your phone will simply not connect (as 2G / 3G is more insecure than 4G / 5G).

Learn more about Apple's Lockdown Mode.

Google/Android Advanced Protection Program:

  • Security key required - Must use security key/passkey for every new device sign-in to Google Account, which can take some getting used to.

  • JavaScript optimizer disabled (Chrome) - Some complex websites may not work properly.

  • No sideloading - Can't install apps from outside Play Store or verified stores.

  • USB locked when device locked - Must unlock device before connecting USB accessories.

  • Insecure Wi-Fi blocked - Won't auto-connect to open/WEP Wi-Fi networks.

  • Enhanced Safe Browsing warnings - More download warnings and potential blocked websites.

  • Fast charging might not work as expected - You might need to unlock the phone in order to activate fast charging.

Learn more about Android Advanced Protection Program.

ImportantRemove yourself from “people search” sites using an automated service (like EasyOptOuts)

Using a tool to automatically remove yourself from all these sites saves a lot of time.

DO: Sign up for EasyOptOuts ($20/year) — or Optery Ultimate ($249/year) for more coverage
DO NOT: We don't recommend DeleteMe because it's less effective than EasyOptOuts

"People search" sites (also known as "data brokers") collect information from public and private records to form a "profile" for basically everyone. If you've ever had a phone number, used a credit card, or voted, you're probably on one of these sites.

Try it out: Search this site for your name or phone number. Most people are surprised how much information is readily available.

Why pay for automatic removal services: You can do this "opt out" process manually, but it takes an incredible amount of time, and you have to re-do it every few months when the data broker sites change. It's ridiculous that we have to pay to protect our privacy, but it saves a lot of time for us to focus on our organizing.

Which automatic removal tool should I use?

  • EasyOptOuts (recommended) - $20/year - It is among the most effective and the cheapest.

  • Optery Ultimate - $250/year - Slightly more effective if you can afford the additional investment. They can take a copy of your ID (with ID number removed) and opt you out from sites that require an ID.

  • What about DeleteMe? - It's the most well-known option, but it was only 27% effective at removing profiles compared to EasyOptOuts (65%) and Optery Ultimate (68%). (Source).

How to remove yourself from "people search" sites using EasyOptOuts

Time required: 5–15 minutes

  1. Sign up for EasyOptOuts ($20/year)

  2. Enter your personal information: Follow the prompts. It is most important to include your current information (address, phone number, email). If you can't find all your past addresses, that's okay.

  3. Continue to the next checklist item to do manual opt-outs for the sites that EasyOptOuts can't handle.

  4. Consider asking anyone who lives at your house to sign up as well. If someone finds out you live together, they could look up that person just as easily and then target you.

Timing: It can take a few days for the initial removals to complete and sometimes up to a couple of months for certain sites.

FYI: We don't get any commissions for any paid services we link to. We recommend them because they're the most effective ones we've found.

EasyOptOuts Privacy: Some people are concerned about entering all their information into a site like this. While no site is immune to data breaches, we trust this site based on their history and reputation. And the information is necessary to do removals.

Alternate tool: Kanary is a free app that searches Google for your personal info and walks you through manually removing it. It is still very time intensive and people are likely to abandon it before they finish all the removals.

Opt-out of Clearview AI to make facial recognition harder for the cops

Helps make it harder for cops to criminalize you for your legal dissent

ICE is using Clearview AI to target people protestors and observers. Many law enforcement agencies also use this platform to do warrantless surveillance.

You can protect yourself by opting out Clearview AI. (FYI - ICE is investing in other facial recognition tools that you can't opt-out of.)

How to opt-out of Clearview AI facial recognition

Submit an opt-out for form Clearview AI - Requires sending a photo of yourself.

Frustratingly, opt-outs are only possible in states that have passed privacy laws.

Install a trusted VPN with ad-blocking to make it harder for cops to do warantless survillance

A VPN makes it harder for websites to track you and prevents your internet provider from logging your traffic.

DO: Install a trust VPN and keep it on. We recommend Mullvad VPN ($5/mo) or IVPN ($6/mo).
DO NOT: Use a random VPN you find online. Nord VPN, Surfshark, ExpressVPN, etc. are popular but not trustworthy.

Anytime you connect to the internet (phone or computer), your internet provider is revealing your approximate location to every site/app you use.

We know that law enforcement agencies are using tools that to track your location using data gathered from apps you have and ads you see. Using a VPN with ad-blocking features enabled makes it much harder for them to track you. Also, police can get a subpoena for your internet traffic from your internet provider.

A VPN (Virtual Private Network) helps mask your location and makes you slightly harder to identify.

A VPN with ad-blocking enabled is especially important on your phone.

Options: All of these are very trustworthy options.

  • Mullvad VPN (top recommendation) -Better privacy since payment info isn't stored, but you need to manually pay each cycle.

  • IVPN can be easier because it automatically renews.

  • Proton VPN has a solid free plan, but it is only for 1 device. To get ad-blocking, you need a paid plan. (See our note regarding concerns about the Proton CEO and why we still offer Proton options.)

How to set up Mullvad VPN

Mobile app

  1. Create an account number and write it down: Create a Mullvad account number (there is no password) and write it down somewhere safe like your password manager.

  2. Pay (aka "Add time"): There is no automatic renewal, so all payments are manual. Paying yearly can make things easier so you don't have to remember.

  3. Install the Mullvad mobile app (iPhone, Android) and use your Account number to sign in.

  4. Enable ad-blocking: Gear Icon ⚙️ > VPN Settings > DNS Settings > DNS content blockers > Enable Ads, Trackers, and (optionally) Malware

Desktop app

  1. Install the Mullvad desktop app (Mac, Windows). Get the Account Number from the phone app.

  2. Enable autoconnect: Find Mullvad in your toolbar > Gear Icon ⚙️ > VPN Settings > Enable "Launch app on start-up" and "Auto-connect"

  3. Enabled ad-blocking: Find Mullvad in your toolbar > Gear Icon ⚙️ > VPN Settings > DNS content blockers > Enable Ads, Trackers, and (optionally) Malware

We recommend keeping your VPN on at all times unless you're having trouble connecting to a site (see below).

Note: Instead of a credit card, you can also order a voucher card for Mullvad or IVPN so that your identity is even more protected. (Yes, we hate Amazon too, but that's the only place online you can buy these cards.)

Downsides to using a VPN

  • You will encounter more CAPTCHAs on websites

  • Some websites may block VPN access, and you'll have to disable it and remember to re-enable it later

  • Some streaming services might not work

If you experience odd behavior on websites, always try turning off the VPN temporarily to see if it will load.

Note: You must use a trusted VPN that doesn't keep logs of your internet traffic and will push back on government requests. We've vetted our top recommendations.

Practices for group coordinators

high-threatThis section is for:
  • Anyone taking on a coordination role within ICE watch networks.

  • Anyone who is taking an intentionally public-facing role

Make sure to do all the items in the sections above as well.

Use Proton Docs and Mail for activism instead of Google Docs and Gmail

Protect yourself and your community from government data demands that you don't know about.

DO NOT: Use Google Docs and Gmail for activism communications

Tech companies (like Google) often receive government demands to turn over all the account data for an activist. This often includes a "gag order" which means the company can't tell the user until months or years later.

Encrypted cloud tools like Proton Mail, Drive, Docs, and Sheets ensure the company doesn't hold readable copies of your data to hand over. If the government wants it, they'd need to demand it from you—giving you notice and the opportunity to challenge it with legal support.

How to set up and use Proton Docs and Proton Mail

Create a Proton account

  1. Sign up for a free Proton account.

  2. Verify: When asked to verify if you are a human, choose the “CAPTCHA” option rather than the “email” option, so you don't link your true identity.

  3. When asked to set your phone number / email as a recovery method, choose Maybe later.

Use Proton Drive/Docs/Sheets

  • Create and edit documents collaborative much like Google Docs. Someone must have a Proton account to be shared directly.

  • Share securely: Only use "share by link" when necessary, set a document password, set the "public link" to have an expiration date.

Use Proton Mail

  • Use Proton Mail for: website accounts, newsletters, public-facing communications needing anonymity, and non-sensitive organizing work.

  • Don't use any email for: truly sensitive communications that might put someone at legal risk.

  • What gets encrypted vs not: Messages between Proton Mail users are automatically end-to-end encrypted. Messages to people using a different email provider will not be encrypted, but you can send a password-protected email.

CryptPad is another popular encrypted doc option, but it very difficult to use. If it has features you need, it accomplishes the same result.

Opt-out of "face search" sites

Protect yourself from a photo being used to find your identity.

You can protect yourself by opting out of "reverse photo search" sites. This makes it harder for someone to use your profile picture online to find out your legal name, which can lead to them finding you on the people search sites mentioned above.

How to remove yourself from "face search" sites

Each of these sites will (ironically) require you to upload a headshot. This is a necessary evil if you want to be removed. You have to decide if the risk of giving them more data is worth the payoff of being opted out.

Sites to opt-out from:

  1. Opt-out of Clearview.ai - Only requires a photo, not a government ID. Frustratingly, opt-outs are only possible in states that have passed privacy laws. Clearview is used primarily by law enforcement agencies, so it is important to opt-out of.

  2. Opt-out of PimEyes - Requires a photo of your government ID. (Block out your ID number!)

  3. Opt-out of FaceCheck.ID - Instead of uploading a government ID, you can upload a selfie you take with two fingers touching your chin. Also, you must manually select which photos you want them to remove.

Disable voice assistants while your phone is locked (Siri or Google Assistant)

Protect yourself from the cops using your phone to do basic commands even when it is locked.

How to disable voice assistants

On iPhone: Settings > Siri > Disable "Allow Siri When Locked"

On Android: Settings > Google > Settings for Google apps > Search, Assistant & Voice > Google Assistant > Disable "Lock screen"

Enable iCloud Advanced Data Protection (iPhone) or Google Advanced Protection Program

Apple, Google, and other services offer additional security features to protect against targeted attacks on your accounts and data. These protect your online accounts with each company, not your device itself.

Apple's Advanced Data Protection enabled end-to-end encryption for most of your content.

How to enable advanced on your email/cloud accounts

Protect your data:

  • iCloud Advanced Data Protection - Enables end-to-end encryption for almost all data stored in iCloud, protecting your information against government court orders. Make sure you save the recovery key somewhere very safe (like a password manager).

Protect your account:

Configure Signal so your phone number not discoverable

Even though your phone number isn't visible on Signal by default, people can still type in your phone number and find you. If you're at risk of harassment, you may want to only share your Signal username with folks instead.

How to make your phone number not discoverable on Signal

  1. If you want to change your username: Signal > Profile Picture > Settings > Tap on your name/icon near the top > Tap the @ symbol > Edit username > Set the username to something completely unrelated to your identity, or any usernames you've used anywhere before. It must end in at least 2 numbers.

  2. Hide your phone number: Signal > Profile Picture > Settings > Privacy > Phone Number > Under "Who Can See My Number" > Select "Nobody".

  3. Make your phone number not discoverable: Signal > Profile Picture > Settings > Privacy > Phone Number > Under "Who Can Find Me By Number" > Select "Nobody".

  4. Tell people your username instead of your phone number when you want to connect with them on Signal.

Use small group chats with short disappearing message timers

A 50-person chat means 50 phones that could be seized, lost, or breached—any one of them exposes the whole conversation. While we sometimes need big Signal groups, don't run all your organizing through one big group chat. When coordinating something specific—an action, a project, a sensitive decision—spin up a small group with only the people who need to be there, and set messages to disappear quickly.

How to keep signal groups small

  • Create a small group with only the people directly involved in a process.

  • Set a short disappearing message timer (1 hour to 1 day for active coordination; 1 week max for ongoing work). The messages only disappear after the person reads them, so you can even set it to 1 hour in some cases.

  • Delete or leave the group when the coordination is done. Do an occassional scrub of old chats you forgot to delete. Remind others to leave and delete.

Leave Signal groups that might put others at risk

This helps protect your network if your phone is confiscated.

If your phone is confiscated by law enforcement, one of the biggest risks is exposing your entire network. Even if people aren't using their real name on their Signal account, there is still a unique ID behind every Signal username. And the cops can use this to correlate someone's identity across many seized devices.

You need to both leave AND delete the group:

  • If you only leave the group, old messages stay on your phone as well as the history of who was in the group.

  • If you only delete the group, new messages will still come through and the thread re-appears.

How to leave AND delete a Signal group

  1. Make a plan to re-join afterwards: When headed into a situation with possible arrest, make a list on paper at home or somewhere safe of all the groups and who you need to message who can re-add you after the action or border-crossing is complete.

  2. To leave the group: Signal > [Group] > Tap the group icon at the top > Click “Leave group” at the bottom.

    • If you're the only admin, you have to either remove all members or assign another admin.

  3. To delete the group from your phone: Signal > Main screen > Swipe left on the thread > "Delete.”

    • This won't delete it for anyone else.

Security hygiene tips:

  • Set a recurring remind to clean up your Signal thread every 3 months.

  • Make sure you take note of which groups you are leaving and who you can ask to re-add you after the action.

Note: If you find this process very annoying and cumbersome (because it is!), that's another good reason to use a secondary phone for actions. That phone would only ever be in the one or two groups needed to pull of the action that day.

Scrub your private data online and social media accounts to defend against harassment/doxxing

Protect yourself from the government or right-wing trolls use publicly available data to target you.

The government uses social media tracking tools to surveil activists without a warrant. Right-wing adversaries use "people search" sites and social media to attempt to scare us into not organizing.

You can scrub your personal information to make it harder to be a target for these attacks.

How to defend yourself against doxxing

We have a detailed guide on how to defend yourself from doxxing and harassment like this.

Here are a few of the most important steps from that guide:

  1. Opt-out of "people search" sites using EasyOptOuts ($20/year)

  2. Lockdown your social media accounts using Block Party (free or $50/year if you use JOINTHEPARTY promo code)

Practices for higher-risk activists

high-threatThis section is for:
  • Immigrant activists (regardless of documentation status) or anyone who's skin color or presentation might put them at higher risk of being targeted by ICE while observing

Make sure to complete the sections above as well.

ImportantFully power off your phone if your risk of arrest is going up

Your data is most protected when your phone is off (not just locked)

When your phone is fully powered off, it's more secure against data extraction by the cops. The data is encrypted until after you enter your passcode for the first time.

Therefore, the number one thing you can do to protect your data is turn your phone off as soon as you think your risk of arrest is going up.

How to power off your phone

  1. On iPhone: Press the screen lock button on the side on the side 5 times to quickly bring up the "Power off" option.
    On Android: Press and hold the power button until the power menu appears, then tap "Power off"

  2. Practice this a number of times so you can do it quickly.

  3. During the high-risk situation, remind people near you to power off theirs phone as well.

Trade-offs: We recognize there are trade-offs in turning off your phone. Sometimes it is more important to film the police or coordinate with our allies. Think through what is the priority for you. If you need to film, consider bringing a secondary phone so you have less sensitive data on it.

Create your emergency plan if you are arrested (or feel unsafe at home)

Planning in advance can help make a stressful situation somewhat easier to navigate.

As dissent is becoming increasingly criminalized, it is useful for us to prepare for the possibility of arrest or feeling threatened at home by adversaries.

How to do emergency planning

Short emergency planning

If you need the "mini-version" of that guide, here are a few questions to answer to start:

  1. Who is in your support network? If you got arrested tonight, who would you call? Do you have their number memorized?

  2. Who will you notify if you know you're going into a higher-risk situation? Consider the Circulo app or a simple Signal thread.

  3. Do they have what they need? Do they have: a list of who else to contact, your medical info, and a legal hotline number? Do they have what they need to care your pets/kids/etc?

  4. Where would you go if you felt unsafe at home? If you had to leave your home tonight because you felt unsafe, where would you stay? Does that person know?

Detailed emergency planning

If you have the capacity, we recommend completing our full emergency guide.

Have Questions?

Let us know if you have questions or feedback so we can make these guides as useful as possible.