drawn patterned graphics
Safety Access to information

Mobile Phone Security

Resources you can use to learn about phone security.

Investigators are exposed to many potential threats – from governments, private companies, organised groups – in the course of their work.

There are, therefore, dangers to be aware of and necessary security measures to be taken if you decide to communicate by mobile phone. An easy-to-spy-on device – as exposed during the Prism scandal - phones can indeed tell on you and your sources.

Tactical Tech has produced a number of resources you can use to learn about phone security.

Security in a Box has a chapter entitled “How to Use Smartphones as Securely as Possible” and one on using mobile phones as securely as possible. 

Me and My Shadow has a chapter on geolocation services for smartphones and the risks they carry, as well as tips for those using SMS and MMS.

Finally, have a look at the Guardian Project's website, created by a group of activists dedicated to creating open source apps to increase security and privacy on smartphones.

More about this topic

photo of the Exposing the Invisible - The Kit's cover
Access to information Safety Verification Data Mapping Metadata Research

Exposing the Invisible - The Kit

The Kit is a collaborative, self-learning resource that makes investigative techniques and tools...
illustration of a computer and USB flash drive on a gray background

From Tails to Whiskers: How We Created a Secure Investigation Framework

At Tactical Tech we sometimes experiment with creating tools and software that we think are...
Safety Conflict and Power Research

Risk Assessment Is a Mindset, Not a Checklist

Conducting investigations is risky. Unfortunately, individual investigators rarely have...
gloomy cloudy sky

Technology Is Stupid: How to choose tech for remote working

This article addresses questions about which tech is good, safe and appropriate to use in these...


The operating system designed to preserve your privacy and anonymity.

GPG Encryption for Your Emails

A tool allowing you to encrypt the content of your emails if the person you write to also uses it.
Safety Research

Tor Browser

A tool to browse the web securely.