Burner Phones from a SIGINT Perspective

View Latest Activity

Home Forums Radio & Communication Burner Phones from a SIGINT Perspective

Viewing 11 reply threads
  • Author
    • #96963
      Joe (G.W.N.S.)

        This article by Heimdall.

        Heimdall is a former Signals Intelligence (SIGINT) Collector and Analyst with tactical and operational experience, including multiple deployments to Iraq and Afghanistan.

        One definition of Operations Security (OPSEC) is the protection of critical information. It’s probably safe to say that freedom fighters who find themselves operating in a semi-permissive or non-permissive environment and conducting security missions against a tyrannical regime would consider their personal identities, the location of their homes, the identities of their closest friends and business associates, among other information, critical information worthy of protection under OPSEC.

        Let’s talk baseline. Every single place you go, the roads and sidewalk you take to get there, and every single person or business you call is your baseline. Time of day is a dimension in each of these things as well.

        This is an outstanding article packed with quality information, a true must read.

        But here is the key: NONE of those phones are ever used to contact anybody truly associated with the user. Call businesses you NEVER go to. Call people with have no personal connection (bonus points for calling oppressive elements of the state, get the dog chasing it’s own tail). As a matter of fact, your real phones and your burner phones should never be co-located.

        Bold is mine and is worth great consideration and thought to future possibilities!

      • #96964

          (Reply not from Max, a result of the subscription changeover)

          I’m surprised there aren’t any replies/questions concerning this very important topic. All missions are doomed if proper COMSEC and OPSEC protocols aren’t adhered to by everyone involved. This stuff may seem boring and dry when compared to the bang bang stuff but it will compromise you before you ever go hot if you fail to practice. Thanks for the great info.

          Alpha Mike Foxtrot…Gulf War I…21SOS…somewhere in the Magic Kingdom

          NSA approved reply

        • #96965

            Hey dredd – Glad to hear that you get this stuff. If only everyone else did…

            Also, thank you for your service.

          • #96966

              Loved the article and took its lessons to heart.
              Just not ready to invest in lots of extra phones yet :)

            • #96967

                Ive been looking at this for while now. How do you activate the phone anonymously?

              • #96968
                Joe (G.W.N.S.)

                  Ive been looking at this for while now. How do you activate the phone anonymously?

                  Prepaid phone cards bought by cash, registered at either non-connected (to user) phone or anonymously online (library etc…), done far from your AO.

                  Use of a cutout to purchase is best.

                  (real phones and your burner phones should never be co-located)

                • #96969
                  Joe (G.W.N.S.)

                    When choosing these prepaid phones ensure its a service that works well in your AO.

                    Understand that phone technology changes, the phones I purchased in 2000 are obsolete.

                    The SIM cards can also change standards.

                    How often? Not very often, but if you’ve been doing this as long as I have it does happen so you need to keep up with it.

                    The prepaid cards you purchased with cash don’t last forever either, depending on carrier.

                    I place a emphasis on stupid phones, like flip phones without GPS capability, yes they can still be tracked, but why make it easier.

                    Are there alternatives?

                    A basic tablet; again no GPS, can do VOIP with a variety of free services over a WIFI or MIFI connection. You can change phone numbers easily and even do text and voice messages. Again same rules apply about calling phones connected to you.

                    Consider all of the free WIFI areas that could be used.

                    Use a VPN or TOR though understand that this is not fullproof, just less traditional and who you are communicating with.

                    It’s possible to use an appropriate yagi antennas to extend range so your not sitting inside McDonald’s when investigators show up.

                    Additionally a mesh network can extend your standoff distance.

                    Could be useful if your trying to identify those after you.

                    P2P WiFi and bluetooth can also allow shortrange comms with low probability of intercept.

                    There are many options depending on your preparations and knowledge.

                    Sharing a Email account where you leave drafts, but never send them maybe if use as well. Again can be tracked, depending on how high a priority you are and how bad they want you.

                    With forethought a less apparent codes can be used and don’t overlook image steganography with text and email.

                  • #134016
                    Joe (G.W.N.S.)

                      Given recent posts thought this was a good time for a bump!

                      There are many hidden gems in above, hidden in plain sight for those unaware or not practicing true critical thinking!

                      Pay attention or suffer the consequences! B-)

                      Note: I started this Thread in our early days here, I’ve been utilizing this since the beginning of this technology.

                    • #134109
                      Robert Henry

                        Thanks Joe!


                        Lost my MVT class list- been here a time or two :)
                        Team Coyote. Rifleman Challenge- Vanguard

                      • #134132
                        D Close

                          Joe would you reactivate the link article if you have it?

                        • #134137
                          D Close
                          • #134140
                            Joe (G.W.N.S.)

                              Joe would you reactivate the link article if you have it?

                              It no longer exists! :scratch:

                              Burner phones have a place, however they no longer can be used safely beyond a single event. The days of a stream of burner phones giving you constant daily communications are gone.

                              Security in the name of privacy is beyond the capabilities of most people in today’s world. Their expectations of 24/7 networking is no longer possible with privacy.

                              The dedication required is not possible without significant sacrifice.

                          Viewing 11 reply threads
                          • You must be logged in to reply to this topic.