Krypt3ia

(Greek: κρυπτεία / krupteía, from κρυπτός / kruptós, “hidden, secret things”)

Archive for January 9th, 2026

Physical Security Playbook for Protesting in Today’s Environment

with one comment

Informed by Recent ICE-Related Protests and Violent Encounters

Context and Rationale

In early January 2026, the fatal shooting of 37-year-old Renee Nicole Good by a U.S. Immigration and Customs Enforcement (ICE) officer in Minneapolis sparked widespread protests both in Minnesota and across multiple U.S. cities. Demonstrations include rallies in Indianapolis, Philadelphia, Kansas City, and other major population centers demanding accountability and changes to enforcement practices. The incident, captured on video and widely shared online, intensified criticism of federal immigration enforcement and led to heightened tensions between protesters and federal agents. (CBS News)

Additional reported incidents include other federal immigration agents shooting and wounding individuals during enforcement operations, such as in Portland, Oregon, further fueling protest activity and public calls for restraint and transparency. (AP News)

Protesters are responding not only to singular events but to a pattern of aggressive engagements by federal immigration agents that have raised both local and national concerns about excessive force and the safety of peaceful demonstrators. (Just Security)

In this environment, physical security planning is essential, not only to minimize the risk of injury during demonstrations but also to enable lawful expression while avoiding escalation and preventing opportunistic harm.

Core Principles

  1. Lawful, Non-Confrontational Conduct
    Actions should remain peaceful, lawful, and constitutional. Security planning enhances safety, not escalation.
  2. Risk Awareness and Adaptability
    Recognize that enforcement dynamics, crowd behavior, and public safety conditions can shift rapidly.
  3. Preparation for Environmental Stress
    In high-tension protests, especially those with recent police or federal agent violence, crowd size, police posture, and local policies (curfews, declared assembly zones, dispersal orders) determine the physical conduct of action.
  4. Prioritize De-escalation
    Avoid actions that could be construed as threatening, aggressive, or provocative; these increase risk to participants.

Section A: Pre-Protest Physical Security Planning

Site Assessment and Selection

  • Reconnoiter the location in advance to identify entry and exit routes, chokepoints, safe havens (e.g., adjacent parks, medical tents), and potential high-risk zones such as federal buildings where heavy enforcement presence may exist.
  • Understand terrain limitations: tight corridors, dead ends, narrow sidewalks, and heavy traffic intersections create entrapment risk.

Intelligence on Enforcement Posture

  • Monitor local law enforcement and federal agency announcements regarding planned enforcement activity.
  • Review recent news coverage (e.g., Minneapolis, Portland incidents) for patterns of federal agent use of force or crowd-control tactics at similar protests.

Team Roles and Responsibilities

  • Safety Marshals: trained volunteers responsible for observing crowd dynamics and helping prevent harm.
  • Medical Support: volunteers identified in advance with basic first-aid supplies; accessible at designated points.
  • Communications Anchor: a person responsible for staying in contact with coordination leads and relaying real-time developments.

Personal Physical Preparedness

  • Wear sturdy, comfortable footwear suitable for prolonged standing or movement.
  • Dress in layers appropriate to climate, with non-restrictive clothing that facilitates mobility.
  • Carry minimal personal items; avoid backpacks or gear that could be grabbed or could impede movement.
  • Bring sufficient water and necessary medications; ensure medications are easily accessible.

Section B: On-Site Physical Security Procedures

Situational Awareness and Movement

  • Continuously scan the environment quietly and unobtrusively, identify exits, shifts in crowd energy, and approaching enforcement actions.
  • Maintain spacing within the crowd that allows for rapid movement; avoid congregating in tight clusters near enforcement lines.
  • Establish and communicate multiple escape routes beforehand.

Crowd Flow and Bottleneck Avoidance

  • Avoid areas where the crowd is compressed between physical barriers such as fences, walls, or building corners.
  • If movement stalls unexpectedly, reposition laterally rather than deeper into the crowd to prevent being trapped.
  • Encourage participants to stay near peripheral areas initially and flood toward safer ground if an aggressive tactical response begins.

De-escalation Posture

  • Maintain calm body language; avoid gestures that could be misinterpreted as antagonistic.
  • Do not engage with counter-protesters or provoke enforcement officers.
  • If chanting, do so in ways that highlight peaceful intent (e.g., “Peaceful assembly,” “We stand for justice”).

Section C: Responding to Enforcement Actions

Federal and Local Response Awareness

  • Recognize that federal agents (including ICE) sometimes deploy crowd-control tools—pepper balls, tear gas, flash bangs, or physical formations, especially near federal buildings. 
  • Avoid confrontation lines; withdraw calmly to secure zones if dispersal orders are issued.

Handling Aggressive Tactics

  • When tear gas or irritants are deployed:
    • Move upwind if possible.
    • Cover nose and mouth with cloth if no protective gear is available.
    • Blink rapidly; avoid rubbing eyes with hands if contaminated.
  • Do not attempt to disarm, seize, or interfere with law enforcement devices; such actions dramatically increase risk.

Legal Orders and Compliance

  • Comply precisely with lawful orders to disperse, particularly from clearly identified law enforcement officers.
  • If you believe an order is unlawful, comply first and contest later; refusal in the moment increases risk of injury or arrest.

Section D: Group Conduct and Safety Nets

The Buddy System

  • Participants should attend in pairs or small groups with pre-defined check-ins.
  • Establish a meeting point outside the main protest area if separation occurs.

Communication Signals (COMMS)

  • Agree in advance on simple, calm verbal or visual cues to indicate:
    • Need to withdraw
    • Enforcement action nearby
    • Medical emergency

Medical and Legal Support

  • Ensure teams know the location of volunteer medics if available.
  • Keep a record of local legal observers and emergency contacts.

Section E: After-Action Safety

  • After the immediate action, reunite with your group before dispersal.
  • Avoid lingering near enforcement apparatus or aggressive crowds.
  • Encourage debriefing and reporting on any observed injuries or threats; community reporting can assist in accountability efforts.

Section F: Special Considerations for ICE-Related Protests

Given recent incidents involving federal immigration enforcement, including the fatal shooting of Renee Nicole Good and subsequent multi-city protests, organizers and participants should be cognizant of:

  • Heightened tensions at federal enforcement sites and near courthouses.
  • Rapid mobilization of protests following news of violence by federal agents, sometimes in multiple states on the same day. 
  • The potential for federal agents to be present beyond routine local police, including in riot gear or crowd-control formations. This may change the dynamic of street safety even for peaceful demonstrations.

Summary Checklist: Physical Security

Before

  • Assess site, exits, and terrain.
  • Assign roles and safety teams.
  • Prepare personal gear and hydration.
  • Learn enforcement patterns in the area.

During

  • Maintain situational awareness.
  • Avoid confined spaces or crowd compression.
  • Withdraw calmly at the first sign of aggressive tactics.

After

  • Reunite with a group and disperse methodically.
  • Document any injuries or unusual enforcement conduct.
  • Debrief for future planning.

This document is intended to be integrated with broader protest planning materials and updated as conditions on the ground evolve. It reflects the current environment of heightened protest activity around ICE actions and aims to give lawful protesters practical guidance to reduce physical risk in volatile contexts. 

Written by Krypt3ia

2026/01/09 at 15:34

Posted in Uncategorized

Tagged with , , , ,

A practical Technical Security playbook oriented toward lawful, peaceful protest in the United States. 

with one comment

Designed to reduce avoidable risk from surveillance, device seizure, data exposure, doxxing, and opportunistic violence, without advising wrongdoing or evasion of lawful processes. 

This is not legal advice.

Introduction

Public protest has always carried risk. What has changed in recent years is the density and permanence of that risk. Surveillance is no longer exceptional or episodic; it is ambient. Data collection is not limited to state actors; it is embedded in consumer devices, platforms, cameras, and data markets that operate continuously before, during, and long after a protest ends. At the same time, enforcement environments have become less predictable, accountability less certain, and post-event retaliation, through doxxing, employment pressure, or targeted harassment are more common. For many participants, the most serious consequences now occur after they have gone home.

This document is written for that reality.

It does not assume criminal intent, nor does it advocate evasion of lawful authority. It assumes lawful, peaceful protest conducted in an environment where risk is unevenly distributed, rules may be applied selectively, and mistakes compound quickly across technical, physical, and personal domains. In such conditions, safety is not achieved through any single tactic or tool. It is achieved through discipline, preparation, and an understanding that phones, bodies, identities, and communities are all part of the same security system.

The playbook that follows treats technical security, physical safety, operational behavior, and personal exposure as inseparable. A compromised phone can lead to compromised relationships. A moment of physical isolation can create lasting digital consequences. An impulsive post can undo hours of careful on-the-ground decision-making. Conversely, small, well-chosen precautions, clear threat modeling, device hardening, role clarity, exit planning, can dramatically reduce harm without diminishing the expressive or democratic purpose of protest.

This document is intentionally conservative. It favors risk reduction over bravado, exit options over endurance, and community protection over individual visibility. It is designed to be useful to first-time protesters and experienced organizers alike, adaptable across roles, and readable without technical specialization. Where possible, it consolidates guidance from established civil-liberties, digital-rights, and safety organizations into a single, coherent framework.

Above all, this playbook starts from a simple premise: the goal of protest is not merely to show up, but to return safely, with your autonomy, relationships, and future intact. Everything that follows is in service of that outcome.

Start with a threat model (10 minutes that changes everything)

Before you optimize tactics, define what you are protecting and from whom.

Assets at risk:
Your identity, your contacts, your location history, message content and metadata, photos and video (yours and others’), and your online accounts.

Likely threats at protests:
Device loss or theft, device confiscation, account compromise, location tracking via routine phone telemetry, large-scale video capture, social media OSINT, and post-event doxxing campaigns. These threat categories; loss, confiscation, disruption, and targeted surveillance, are explicitly identified by Amnesty International.

Constraints:
Local laws and policies (mask restrictions, curfews, dispersal orders), your role (organizer, medic, marshal, journalist, attendee), and your risk tolerance.

This threat model determines whether you should bring a smartphone at all. Multiple civil-liberties organizations recommend considering leaving it at home if feasible.

TECHSEC: Hardening your phone so seizure or loss is less catastrophic

CAVEAT: BURN PHONES

Much has been said about obtaining a “Burn Phone” if you plan on protesting. While this might be a prudent measure, there are a few things you must do in order to insure the security you are attempting to create by getting one.

  • First, pay with cash, do not have a paper trail from purchase
  • Disguise yourself as much as possible when purchasing, avoid cameras, phones can be tracked all the way back to purchase
  • Understand that this device is a throwaway, no personal data should reside on it.
  • Do not load your apps you use every day
  • Keep the contacts empty and always erase call logs if possible
  • Do not assume that buying a new SIM card means your phone isn’t trackable. Each use should be its only use.
  • Follow all of the rules below for the burn phone just as you would for your personal to minimize risk.

Device encryption and lock discipline (highest ROI)

  • Ensure full-device encryption is enabled. Modern iOS and many Android devices encrypt by default when a passcode is set.
  • Use a strong passcode (long PIN or alphanumeric) and set auto-lock to a short interval.
  • Disable biometric unlock (Face ID, fingerprint) before arrival. Biometrics can be physically compelled in ways a passcode typically cannot.

(Encryption, passcodes, biometrics guidance: ACLU of DC)

Minimize exposed data on the lock screen

  • Disable lock-screen message previews.
  • Remove sensitive widgets (calendar, email snippets, smart-home controls).

Reduce radios and location leakage when not actively needed

  • Use airplane mode when not communicating to reduce emitted signals and routine location updates.
  • Turn off Bluetooth and Wi-Fi unless actively required.
  • Use a reliable Faraday bag after putting the phone in airplane mode and turning off Bluetooth and Wi-Fi. Keep the device in the Faraday bag until far enough away from the event before taking it out and turning it back on.

(Radio and signal-reduction guidance consolidated from ACLU of DC and World Justice Project toolkits)

Pre-protest data minimization

  • Back up your phone beforehand so it can be wiped and restored if needed.
  • Remove or sign out of high-risk apps (primary email, banking, password managers) if not required onsite.
  • Update the operating system and critical apps before you go.

(Backup and update guidance consolidated from protest safety toolkits)

COMMS OPSEC: Make coordination resilient and reduce collateral exposure

Prefer end-to-end encrypted messaging for coordination.
Signal is widely recommended in protest safety guides as an additional layer of protection.

Group hygiene to prevent cascade compromise

  • Keep logistics in small, role-based groups (marshals, medics, legal observers), not mass chats.
  • Use disappearing messages for operational chatter when appropriate, balancing legal and accountability needs.
  • Treat anything sent digitally as potentially shareable later.

Non-digital fallback

  • Agree on a rally point, an exit route, and a check-in time in case of network disruption.

(Encrypted comms and fallback planning consolidated from Amnesty and allied civil-liberties guidance)

PERSEC: Protect identity, relationships, and your wider community

Many harms occur after protests through doxxing, employer pressure, stalking, and targeted harassment.

Identity compartmentation

  • Keep protest planning separate from personal accounts and personal devices when feasible.
  • Avoid using primary social accounts for logistics; reserve them for public advocacy only.

Photography and community privacy

  • Do not publish images that identify other attendees without consent (faces, tattoos, unique clothing, license plates).
  • Strip location metadata before sharing images; treat live posting as a location broadcast.

Post-event doxxing resilience

  • Lock down social profiles.
  • Remove public phone numbers and addresses.
  • Enable strong two-factor authentication.
  • Expect adversarial OSINT: minor visual details can triangulate identity.

On-the-ground OPSEC: Reduce risk from chaos, confusion, and escalation

Buddy system and role clarity

  • Attend with at least one trusted person and designate a communications anchor.
  • If separated, go to the fallback point rather than searching.

Situational awareness without paranoia

  • Identify exits, bottlenecks, and kettling risks.
  • Avoid confrontations; risk spikes when you are isolated, emotionally escalated, or near flashpoints.

Documentation and rights

  • Know your rights regarding protest activity and police interactions.
  • Save protester-rights guidance for reference.

(Rights guidance consolidated under ACLU national resources)

PHYSICAL SECURITY: Reduce Risk of Injury, Isolation, and Opportunistic Violence

This section addresses bodily safety and crowd dynamics, not confrontation or escalation.

Personal Physical Readiness

  • Dress for mobility and endurance; avoid restrictive clothing.
  • Bring water, weather protection, and required medications.
  • Avoid carrying unnecessary items that limit movement.

Crowd Safety and Movement

  • Identify exits, open spaces, and bottlenecks early.
  • Avoid compressed areas where movement is constrained.
  • Monitor changes in crowd energy and enforcement posture.

De-Escalation and Exposure Control

  • Do not engage counter-protesters, agitators, or law enforcement beyond what is legally required.
  • Avoid flashpoints and escalation zones whenever possible.
  • Leave early if conditions deteriorate; do not wait for certainty.

Medical and Emergency Awareness

  • Know where volunteer medics or first-aid points are located, if present.
  • If injured, overwhelmed, or disoriented, disengage and seek assistance rather than pushing forward.

If your phone is taken, lost, or you are detained: reduce blast radius

  • A strong passcode plus encryption remains the core safeguard.
  • Assume unlocked devices expose all on-device data.
  • After any incident, rotate credentials for critical accounts and review access logs.

(Device seizure guidance consolidated under ACLU DC and EFF resources)

A Reusable quick checklist before you go

Before

  • Update OS and apps.
  • Back up device.
  • Enable encryption, set strong passcode, disable biometrics.
  • Hide lock-screen previews and remove sensitive widgets.
  • Configure and test secure communications.
  • Remove unnecessary sensitive apps and data.

During

  • Use airplane mode when not actively communicating.
  • Keep Bluetooth and Wi-Fi off unless needed.
  • Stay with buddy and follow pre-planned meet points.

After

  • Review and remove posts that expose others.
  • Rotate passwords if anything felt off.
  • Debrief and update your threat model.

Appendix A

Protest Safety, Security, and Privacy Playbooks (United States)

Scope: Lawful, non-violent protest activity
Purpose: Reference directory of vetted, publicly available guidance covering digital security (TECHSEC), personal and organizational security (OPSEC/PERSEC), physical safety, surveillance awareness, and legal rights.

A.1 Digital & Technical Security (TECHSEC)

Digital Security Guidelines for Protests

American Friends Service Committee
Use case: Consult before attending a protest to prepare your phone, reduce stored data, and understand digital risks across the full protest lifecycle.

Digital Security Guidelines for Protests | American Friends Service Committee

Surveillance Self-Defense

Electronic Frontier Foundation
Use case: Reference when you need deeper technical explanations of encryption, secure messaging, metadata, and surveillance threats beyond protest-specific summaries.

Surveillance Self-Defense

Digital Safety Practices for Protesters (PDF)

ReconcilingWorks
Use case: Use as a printable or offline guide for step-by-step phone and communication safety before, during, and after protest activity.

Activist Digital Security & Preparedness Checklist

ActivistChecklist.org
Use case: Use as a quick pre-protest and post-protest checklist when time or attention is limited.

Prepare for a Protest | Digital Security Checklists for Activists

A.2 Privacy & Surveillance Countermeasures

How to Defend Against Police Surveillance at Protests

ACLU of the District of Columbia
Use case: Consult when preparing for protests in heavily policed or camera-dense environments where device seizure or surveillance is a concern.

How to Defend Against Police Surveillance at Protests – ACLU of DC

Protest Surveillance Overview

Surveillance Technology Oversight Project
Use case: Read to understand what surveillance technologies may be deployed against protesters and how collection often extends beyond the event itself.

Protest Surveillance — S.T.O.P.

A.3 Legal Rights & Physical Safety

Protesters’ Rights

American Civil Liberties Union
Use case: Reference before attending a protest to understand your constitutional rights, police powers, and how to respond during encounters.

Protesters’ Rights | American Civil Liberties Union

Peaceful Protest & Protest Safety Resources (PDF)

The Leadership Conference on Civil and Human Rights
Use case: Use as a consolidated legal and physical safety reference when planning or supporting larger demonstrations involving many participants.

Tips for Preparedness, Peaceful Protesting, and Safety

Human Rights Campaign
Use case: Consult for general preparedness, wellbeing, and situational awareness guidance, especially for first-time protesters.

Tips for Preparedness, Peaceful Protesting, and Safety

A.4 Journalism, Documentation, and Observer Safety

A Journalist’s Guide to Safely and Responsibly Covering Protests

Lenfest Institute for Journalism
Use case: Use when documenting protests to balance safety, ethics, legal exposure, and protection of subjects.

A journalist’s guide to safely and responsibly covering protests – The Lenfest Institute for Journalism

How to Protest Safely: Gear, Tips, and What to Do

WIRED
Use case: Read for a high-level overview of physical preparation and situational safety when you need accessible, non-technical guidance.

Protesting Tips: What to Bring, How to Act, How to Stay Safe | WIRED

A.5 Legal Environment & Policy Tracking

U.S. Protest Law Tracker

International Center for Not-for-Profit Law
Use case: Consult when assessing legal risk by state or tracking changes in protest-related laws over time.

US Protest Law Tracker – ICNL

A.6 Notes on Use

  • These resources are complementary, not interchangeable.
  • Technical security guidance should always be paired with legal and physical safety awareness.
  • Local conditions and laws vary and should be checked prior to action.
  • This appendix is intended as a reference library, not tactical instruction.

Written by Krypt3ia

2026/01/09 at 15:02