Skip to content

Digital Security Tactics (Mobile Phones)

The tactics listed below are case- and context-specific. They need to be adapted to the local situation.

  1. Buy lower-end, simple phones that do not allow third-party applications to be installed. Higher-end ones with more {www:functionalities} carry more risk. Use cash to purchase your phone and SIM card. Avoid town centers and find small or second-hand shops as these are unlikely to have security cameras. Do not give your real details if asked; many shops do not ask for proof of ID.

… [read more]

2 thoughts on “Digital Security Tactics (Mobile Phones)

  1. The New Nokia Lumia 900 ( Nokia Lumia 900 RM-808) is out with great review. The Lumia, slated for the masses, is a full fledge and slick Windows’ smart phone, not a feature phone. It is only $100 but comparable to the Iphone spec wise. Whereas the current iPhones lack Verizon’s LTE (Long Time Evolution), which is the latest and fastest network technology, much faster than 4G, the Lumia has it. It is also a GSM phone (SIM – subscriber identification module ) ideal for mass send off to Ager Bet instead of the very expensive iPhone.

    FCC and carriers planning stolen phone database
    Ben Kersey, Apr 11th 2012

    The FCC and wireless carriers are working together on a new plan that would try and discourage the theft of cellphones by rendering them useless once reported stolen. They hope to create a national database of stolen cellphones in coordination with law enforcement bodies across the country, allowing carriers to disable voice and data services on stolen phones altogether. Right now if a cellphone is stolen, the user can call their carrier and cancel all service on that phone, but it doesn’t stop the thief from activating a new service. Whereas they wouldn’t be able to get away with that on Verizon, who block stolen cellphones, they could on AT&T and T-Mobile. All four major carriers have agreed to work together on the new database.
    Carriers plan to use a UDID (Unique Device Identifier) for every phone, and build the database around that. If the carrier blocks a specific UDID, a new SIM card wouldn’t work in the handset, regardless of original or new carrier. The plan isn’t perfect, though: the block would only work in the United States. If stolen phones were shipped overseas, they would work in other countries, since there’s no worldwide database of stolen phones. The plan is similar to what some countries, like the UK, already have. For example, if a phone is stolen in England and you have the phone’s IMEI (International Mobile Equipment Identity) number, you can call the carrier and block that phone from being used ever again on any carrier in the country. The FCC wants there to be compatibility between different countries, but there’s no guarantee that the plan will be enforceable across the globe.

  2. Unfortunately in Ethiopia all stores, even the ones in alley ways and remote villages ask for real government issued photo id and 2 recent pictures of the user. The woyanes ask the stores to account for all the sim cards they sold, not just by name, but pictures and a photocopy of the government issued ID.

    Buying low-end phones is not going to help either, as the Woyanes don’t use sophisticated technology to install software in your phone. All they do is have their chinese made recorders installed next to the phone exchanges/routers. Remember Woyanes own the government phone company.

    The safest way to use a phone for resistance against woyane is the most low tech. That requires of course some diligence and street smarts.

    Use pick pockets to steal phones from individuals you already identified as linked to Woyanes (security personnel and their thugs). Use it for 2-5 minutes, not more, and destroy the phone immediately. If used longer you risk being located.

    And keep it low. Don’t do it on a regular basis; do it only when absolutely necessary. Remember destroying the phone, you don’t want someone else find the phone and get in trouble.

    Finding pick pockets is simple. There are people whose business is connecting pickers with users. Enquire around, you will be surprised.

Leave a Reply