Skip to content

Field Security Guide

Guidance for device and personal security when operating in high-risk environments. Staying vigilant and using a combination of modern technology with traditional practices can significantly enhance personal and device security.


  • Prefer physical SIM cards over eSIMs - Easier to remove quickly
  • Use local SIM cards when traveling to avoid tracking patterns
  • Don’t associate multiple devices - Each device should have its own identity
  • Keep devices isolated - Never use personal and operational devices near each other

Faraday bags block all wireless signals, preventing tracking:

  • Use separate bags for each device
  • Always test - Try sending a message from inside the bag to verify it blocks signal
  • Keep devices in bags when not actively in use
  • Multiple layers provide better protection
  • Change devices regularly if possible
  • Use dedicated devices for sensitive work
  • Monitor for unusual behavior - battery drain, overheating, unexpected activity
  • Keep software updated - Security patches matter
  • Full-disk encryption enabled on all devices

Be aware of how you can be tracked:

VectorRisk
Wi-FiDevices probe for known networks, revealing history
BluetoothCan be tracked even when “discoverable” is off
CellularIMSI catchers can intercept communications
GPSApps may track location even when not in use
Fitness appsStrava, etc. can reveal patterns and locations
  • Disable Bluetooth when not actively using it
  • Avoid wireless earbuds in sensitive situations
  • Turn off Wi-Fi when not connecting to known networks
  • Use airplane mode when location privacy is critical
  • Check app permissions and revoke unnecessary access

  • Use Signal for all sensitive communications
  • Keep contacts minimal on operational devices
  • Use nicknames or codes instead of real names
  • Avoid digital storage of the most sensitive information
  • Paper can be safer for critical notes (and can be destroyed)
  • Use a password manager (Bitwarden, KeePassXC)
  • Memorize critical passwords - don’t rely solely on the manager
  • Different passwords for different security levels
  • Enable MFA wherever possible
  • Build mental maps of contacts and procedures
  • Develop a personal system for remembering critical information
  • Practice recall regularly
  • Have backup plans that don’t require devices

  • Recognize surveillance indicators - Same person appearing multiple times, unusual interest in you
  • Notice patterns - Vehicles that appear repeatedly, people taking photos
  • Trust your instincts - If something feels wrong, act on it
  • Be aware of cultural differences in expressions and behaviors
  • Vary your routes - Don’t establish predictable patterns
  • Change timing - Don’t always leave/arrive at the same times
  • Use reflective surfaces to check behind you without turning
  • Know your environment - Identify exits, safe spaces, public areas
  • Have plans ready for different scenarios
  • Know local emergency numbers
  • Identify safe havens (embassies, hospitals, police stations - depending on context)
  • Keep emergency contacts memorized

  • Backup all data securely
  • Remove unnecessary apps and data
  • Update all software
  • Test Faraday bags
  • Charge all devices
  • Research local laws and conditions
  • Know your rights at border crossings
  • Expect device searches - Consider travel devices with minimal data
  • Don’t lie - But you don’t have to volunteer information
  • Know what’s on your devices - Be prepared for questions
  • Maintain heightened awareness
  • Be cautious with new contacts
  • Recognize minders or followers
  • Know when to abort - Safety over mission

Signs you may be under surveillance:

  • Same individuals appearing in different locations
  • Vehicles that seem to follow your movements
  • People who seem unusually interested in your activities
  • Feeling of being watched (trust this instinct)

Low-key methods:

  • Change your route
  • Enter a public, crowded space
  • Stop and window shop (use reflection to observe)
  • Take public transportation with multiple transfers

Direct methods (use judgment):

  • Directly approach and ask if they need something
  • Take their photo
  • Enter a police station or embassy

Evasion:

  • Use crowds to break visual contact
  • Enter buildings with multiple exits
  • Use restrooms to change appearance or exit differently

  • Assume messages may be intercepted outside encrypted channels
  • Verify identities before sharing sensitive information
  • Use disappearing messages for sensitive conversations
  • Don’t discuss locations in messages when in sensitive areas
  • Have code words for emergency situations

If you suspect your device is compromised:

  1. Don’t use it for anything sensitive
  2. Don’t tip off that you know
  3. Use it for disinformation if strategic
  4. Get a clean device for actual operations
  5. Report to trusted contacts via secure means

  • Awareness is the best defense - Avoid situations before they become dangerous
  • De-escalation first - Violence should be the last resort
  • Know local laws - Self-defense laws vary significantly
  • Consider consequences - Physical confrontation has legal and safety implications
  • Non-lethal options are generally preferred
  • Practical items (flashlight, umbrella) can serve dual purposes
  • Weapons can escalate situations and attract attention
  • Training matters - Untrained use of any tool can backfire

  • Devices charged
  • Unnecessary data removed
  • Location services configured appropriately
  • Faraday bags ready
  • Emergency contacts memorized
  • Route planned with alternatives
  1. Stay calm
  2. Protect what you can
  3. Get to safety
  4. Contact trusted support
  5. Document everything
  6. Assess and adapt

This guide draws from field experience in high-risk environments. Always adapt practices to your specific situation and threat level.