Tips From a Protest Veteran: V3
Quick Navigation
Part 1: Understanding the Landscape - Current situation & event types
Part 2: Essential Preparation - Checklist, exits, buddy system, self-care
Part 3: What to Bring & Digital Security - Gear, phone decisions, communication
Part 4: Documentation & Privacy Protection - Recording safely, photography guidelines
Part 5: At the Protest - Positioning, awareness, logistics
Part 6: Handling Problems - Provocateurs, de-escalation, arrests
Part 7: Advanced Digital Guidance - Deeper technical guidance for those who need stronger protection
Part 8: When You Need Professional Help - Organizing action or expecting serious federal response, military involvement, or high-risk confrontation
Quick Reference - Essential checklist
Tips From a Protest Veteran
Following the LA protest escalation, the federal government has shown clear intention to use National Guard troops and potentially regular military personnel to quell First Amendment actions. Standing up and using your voice is more critical than ever, and doing it safely takes more planning than it used to.
This is a guide to help you stand with your community while protecting yourself and others. These aren't theoretical suggestions—they're things I've learned from years of showing up and documenting everything.
Part 1: Understanding the Landscape
Where We Are Now
We're not in the world of "normal peaceful protests" anymore. The federal response to recent demonstrations has changed the risk calculation for anyone exercising their First Amendment rights. When National Guard troops are deployed against protesters, when military personnel are considered for domestic crowd control, we need to be smarter about how we show up.
This doesn't mean we stop protesting—it means we learn from people who've been doing this longer and adapt to current reality. Every successful movement has faced escalation and figured out how to keep people safer while still making their voices heard.
Know What Type of Event You're Attending
Rally - Usually stationary in a park or designated area with speakers, music, families. Lower risk, easier exits, predictable timeline. People often bring chairs, snacks, and plan to stay for hours. Think outdoor concert vibes.
March - Moving through streets from point A to point B. Higher complexity due to traffic, street closures, and moving crowds. Plan your exit strategy around the route. You'll be walking for extended periods.
Demonstration - Usually at a specific target like a government building, corporate office, or symbolic location. Higher potential for confrontation due to proximity to the thing being protested. More unpredictable timeline and outcomes.
Many events are a mix—rallies that end with marches, demonstrations with speakers, marches that end at symbolic locations. Plan accordingly. If a rally ends with a march, think about that chair you brought.
Part 2: Essential Preparation
Pre-Protest Checklist
Threat Assessment - Identify likely threats, risks, vulnerabilities and opposition. Research the event organizers, location history, and any announced counter-protests. Check local news and social media for intelligence about potential disruptions.
Know Your Exits - Look at a map and figure out how to get there and, more importantly, how to leave if you need to. Identify at least three different ways out and notice any dead ends where you could get trapped.
Holistic Check-In - Check in with yourself and your team - mentally, physically, emotionally. Are you in the right headspace? Do you have any health concerns that might affect your participation? Discuss fears and expectations with your group.
Buddy System & Community - Never go alone. Stay with friends if possible. If you don't have a buddy, consider joining an established organization or group that's attending—many organize through Facebook, Meetup, or local churches. Most groups welcome new participants and can provide both safety and community connection. Plan to bring a buddy, or have a buddy you can check in with periodically (even if not attending). Establish check-in protocols and emergency procedures.
Tell Someone - Let someone who's not going know where you'll be and when to expect you back.
Emergency Contacts - Write two emergency contact numbers on your arm with permanent marker. If you're arrested, your phone gets taken immediately. If you're injured or knocked unconscious, medical personnel need to know who to call.
Self-Care Planning
Caring for yourself is caring for your team. Plan for essential needs like medications, food, water, and bathroom breaks. Get adequate sleep before the event. Consider your emotional and physical limits.
If you take daily medications, bring them in a clearly labeled container. If you're detained overnight, you'll need access to essential medications.
Part 3: What to Bring & Digital Security
What to Bring
Essential Supplies:
Water in plastic bottles (glass can be dangerous)
Non-perishable snacks
Small amount of cash (under $40) and ID only
Basic first aid kit
Wet wipes and tissues
Fully charged phone and portable charger
Paper and pen for notes
Extra clothing layers
Menstrual pads (useful for many purposes beyond their intended use)
What to Wear:
Comfortable shoes you can walk or run in
Weather-resistant clothes (layers in cold, moisture-wicking in heat)
Hat to protect from sun
Bandana (versatile for dust, tear gas, or identification)
Glasses (not contact lenses which can trap irritants)
Face mask
Light jacket or vest that's not zipped or buttoned—if someone grabs it, you can slip your arms out and it falls away
What NOT to Bring:
Jewelry or anything that can be grabbed
Crossbody bags, waist packs, or traditional backpacks—anything that can be grabbed or used to control you
Credit cards or unnecessary personal information
Glass containers
Contact lenses (wear glasses instead)
Better Carrying Options - A hydration vest with the front straps removed (or with breakaway clips) works well for carrying supplies while avoiding grab points. I can carry three bottles of water—one for me, one for someone else who needs it, and one mixed with liquid antacid for tear gas exposure. On hot days, I can also put an ice pack in the vest to stay cool and alert.
Lock your wallet and purse hidden in your car—you don't need credit cards or anything with personal information that could be lost or accessed if you're arrested.
Phone & Digital Security
Why Your Phone Is More Complicated Than You Think
Most people don't realize that bringing your smartphone to a protest can expose every person you know to government attention. Cell tower data can identify everyone whose phone was in a protest location. If your phone is seized during arrest or searched afterward, authorities can access your complete contact list, call logs, and message history. But it's not just about what happens if your phone gets seized - having an active phone at the protest creates real-time data. Every incoming or outgoing call, text, or app notification creates metadata linking those contacts to the protest location, even if the call doesn't connect.
Think about this: you're having landscaping work done at your house. The workers have no idea you attend protests. They call you to ask if you want mulch again this year like last year. If your phone is on at the protest, that call attempt gets logged with cell tower data showing the connection happened at the protest location. Now their number appears linked to someone whose phone was tracked at a protest. They've unknowingly become part of a surveillance network simply by trying to do business with you.
This affects everyone in your contact list—your teacher friend, your immigrant neighbor, your coworker who expressed private support. They all become data points they never consented to be. It's not about hiding your own activity—it's about protecting those who may be vulnerable in your community from guilt by association in an era when association alone can carry consequences.
Your Phone Options:
Safest Choice: Leave your personal phone at home entirely
If You Must Bring It: Put it on airplane mode before you arrive at the protest location. But understand that even having it with you creates risks for everyone in your contact list if something goes wrong
Better Option: Use a phone dedicated to protests with only essential contacts like an attorney, Signal for coordination, and a maps app in case you get lost. Do not give this number out - only use Signal chats for communication with other protesters, your babysitter, or anyone who needs to reach you during the event. This protects your main device and keeps your regular contacts completely separate
Digital Security Steps:
Deactivate your phone's facial recognition or fingerprint unlock—use only a passcode. Law enforcement cannot compel you to provide a passcode, but they can force you to unlock biometric security
Consider using apps that strip metadata from photos before sharing
Use Signal with disappearing messages for coordinating with other protesters
Set up check-in times with trusted contacts who aren't at the protest
For advanced security: Use completely separate devices and accounts for all protest-related communications. Change passwords on anything you take to protests
Part 4: Documentation & Privacy Protection
Why Documentation Matters More Than Ever
We're living in an era where the official story and what actually happened at protests are often completely different. Without independent documentation, misconduct simply never happened in any official record.
But here's why the way most people try to document actually makes them less safe, not more safe. Look at today's protests when something goes wrong—everyone has their phone out, arm extended, looking at their screen. They're drawing attention to themselves, their hands are occupied, and they're not watching what's happening around them. Plus there's the scrambling for the phone, turning on the camera, getting it set to video, hitting the right buttons—all while something critical is happening.
This creates a dangerous paradox. The very act of trying to document makes you more vulnerable and less aware of your surroundings. You're staring at a screen instead of reading the crowd. You're holding something up instead of keeping your hands free to move quickly.
Better Documentation Methods
Bodycam Advantage - A bodycam changes everything. If you're facing the action, it's recording. Your hands are free, you're not drawing attention, and you're scanning your surroundings instead of staring at a screen. I can record for six hours straight without thinking about it. No fumbling with technology when seconds matter.
Unlike livestreaming, which can alert authorities to your location in real-time, the bodycam is simply recording—the signal cannot be picked up or intercepted. Taking photos of police with your phone makes you a target and requires pointing a device at officers. The bodycam is much less obvious, especially with law enforcement who are already on high alert.
The protective effect is remarkable. I've had agitators approach me ready for confrontation. I point to the bodycam and let them know they're being recorded. They're no longer just intimidating someone—they're on camera. They back down every time.
Apps That Help - ProofMode can verify the authenticity of photos and videos with timestamp verification - do not alter evidence once captured.
Photography Guidelines: Protecting Privacy While Documenting Power
Photography can be a powerful tool for showing solidarity, documenting police conduct, and inspiring others to join the movement. However, it's crucial to protect fellow participants from potential retaliation.
What NOT to photograph:
Close-up, identifiable shots of individual protesters' faces
License plates of participants' vehicles
Signs or banners that could identify specific workplaces, schools, or organizations
Anyone who appears to be a minor
People engaging in civil disobedience or direct action
Risks to consider:
Employment discrimination and workplace retaliation
Government surveillance and watchlists
Immigration enforcement targeting
Academic disciplinary action for students
Social media harassment campaigns
Law enforcement identification for future targeting
Safe photography practices:
Shoot crowd scenes from behind or at distance
Focus on signs, banners, and symbolic imagery rather than faces
Capture the scale and energy of the gathering
Document any police misconduct or excessive force (this is legally protected)
Ask explicit permission before photographing anyone identifiably
Avoid using location tags in real-time social media posts
For livestreaming or video:
Position cameras to show crowd size and energy without focusing on individuals
Blur or avoid faces when possible
Be especially cautious during tense moments with law enforcement
Secure Sharing - If you capture important footage, share it through secure channels:
Use Signal to send files to legal observers or trusted journalists, or upload to encrypted cloud storage like ProtonDrive
Avoid emailing footage or posting raw video immediately to social media
Consider what's in the background before sharing - you don't want to accidentally identify other protesters without their consent
Remember: The goal is to show the strength and legitimacy of your cause while keeping your community safe from retaliation.
Part 5: At the Protest
Practical Logistics
Meeting Points - If you're with a group, establish a meeting point in case you get separated. Cell service can get jammed with large crowds, so have a physical location everyone knows that's within walking distance and out of the fray—like a specific coffee shop or park several blocks away.
Bathroom Reality - Public bathrooms may not be available, and businesses often won't let protesters use their facilities. Plan accordingly—if you'll be there over an hour, consider wearing protection. This isn't embarrassing, it's smart planning that keeps you comfortable and safe.
Weather Considerations - Rain affects crowd dynamics and visibility—people move differently and police behavior can change. Rain gear is better than umbrellas—umbrellas are not protest friendly and can be grabbed or used as weapons. A lightweight disposable poncho in your vest is good for many purposes. Cold affects your dexterity and decision-making. Dress in layers you can adjust or remove.
Reading the Timeline - Most protests have natural rhythms. Energy builds, peaks, then starts to decline. Pay attention to these shifts—they often signal when it's time to leave. If you see families with children heading out, that's usually a good indicator that the "safe window" is closing.
Smart Positioning and Awareness
Stay Aware and Have Fun - I prepare, I stay aware, and then I do have fun. I make lots of eye contact with people around me and move away from those who don't return open contact. If the crowd starts to close in around me, I move to a spot that has more space so I can see more clearly around me (especially being short). Have fun, be present, and enjoy your community and democracy in action.
Positioning Strategy
If you see families with children, position yourself near them when possible. Law enforcement typically de-escalates in those areas first
Keep your hands free except for your sign
Position yourself where you can see multiple exit routes
Don't get trapped between police lines and buildings
Know Your Role - If you're not specifically trained for direct confrontation, don't put yourself on the front lines. Let people with direct action experience handle confrontational situations. People with strong protective instincts might feel like they should be "protecting" people up front, but untrained confrontation often makes situations more dangerous for everyone. Your job might be documenting, de-escalating tensions, or helping people who get hurt.
Stay Peaceful - Never participate in or initiate violence or property damage—the government has been very broad in defining "violent," including pushing another person as an offense.
Read the Signs - Watch for changes. When people suddenly start getting pressed together, when police change their positioning or put on different gear, when counter-protesters arrive in organized groups—these are signals that the situation is shifting. If things start feeling tense or unsafe, leave via one of those exit routes you planned.
If Someone Gets Hurt - Know basic first aid priorities. Sometimes the best help is clearing space around someone who's down, calling for medics, or documenting what happened rather than trying to move an injured person.
Part 6: Handling Problems
Dealing with Provocateurs and Agitators
Provocateurs—whether undercover law enforcement, opposing groups, or just individual agitators—pose a serious threat to protest safety. They often try to incite violence, encourage illegal activity, or create chaos that can be used to justify crackdowns on peaceful protesters.
How to Identify Potential Provocateurs:
Encourage violence or property damage
Try to get others to do illegal things
Seem overly eager to escalate confrontations
Ask a lot of questions about people's identities or plans
Show up alone without connections to known groups
Have unusually good gear but no protest experience
Try to lead chants toward violent themes
Attempt to isolate individuals from the group
If Confronted by a Provocateur:
Don't Engage in Debate: Provocateurs want to waste your time and energy. Don't try to convince them or argue about tactics.
Use Clear, Calm Language: "We're here for a peaceful demonstration. That's not what we're about."
Document if Safe: If you're recording, point to your camera and state clearly that they're being recorded. As I mentioned earlier, this often makes agitators back down immediately.
Alert Others Quietly: Use agreed-upon signals or quietly inform trusted people nearby about concerning behavior.
Create Physical Distance: Move away from them and encourage others to do the same. Don't let them position themselves in the center of your group.
Don't Provide Information: Never give personal details, discuss plans, or share information about other protesters.
Report to Organizers: If there are event organizers or legal observers present, inform them about the individual's behavior.
Group Response Strategies:
Isolate, Don't Escalate: Surround provocateurs with calm, experienced protesters who won't be baited
Redirect Energy: Lead chants or activities that refocus the group on peaceful goals
Form a Buffer: Position steady people between provocateurs and the main crowd
Use the Sit-Down Wave: If someone is trying to incite violence, implement the sit-down technique to demonstrate collective commitment to peace
What NOT to Do:
Don't physically confront or touch them
Don't talk, yell, or engage with their comments or accusations
Don't follow them or try to "expose" them publicly
Don't let them know you suspect their motives
Don't abandon your safety protocols to deal with them
Don't let them pull you away from your group
Remember: Your goal is not to "win" against provocateurs but to maintain the safety and integrity of your peaceful action. The best response is often to make their tactics ineffective through disciplined nonengagement.
If They Claim to Be Law Enforcement: Treat any interaction with claimed law enforcement the same as an arrest situation—remain calm, ask if you're free to leave, don't answer questions without an attorney, and document everything if possible.
The Sit-Down Wave: De-escalation Strategy
If violence breaks out at a protest, use the "sit-down wave" technique:
Sit Down—Together: Lower yourself to the ground immediately. Stay where you are.
Silence Is Power: Stop chanting, put down signs, and remain silent.
Spread the Signal: Gesture or quietly tell others to sit. Let the action ripple through the crowd like a wave.
Do Not Engage: Don't argue, confront, or respond to aggression. Discipline speaks for itself.
Make Peace Visible: A calm, seated crowd is a powerful image for the world—and the cameras—to see.
Nonviolence is powerful, strategic, and united.
If You're Arrested
Stay peaceful and calm, even if you believe the arrest is unfair. Ask clearly: "Am I being arrested? What am I being charged with?" Remain silent beyond providing your name—don't explain or share anything. You do not have to justify your presence or answer questions about your activities. Anything you say can be used against you later. You have a legal right to an attorney, so wait for legal representation before answering any questions. The ACLU has an excellent guide on protester rights that everyone should read before attending any demonstration.
This is why writing those emergency contact numbers on your arm matters—you'll be able to call for help even without your phone.
Part 7: Advanced Digital Guidance
The digital landscape for protesters has become increasingly complex, with sophisticated surveillance tools that many people don't fully understand. While Part 3 covered basic phone security, this section provides deeper technical guidance for those who need stronger protection.
Understanding Modern Surveillance
The surveillance apparatus available to law enforcement has expanded dramatically. Beyond basic cell tower tracking, authorities now use stingray devices (IMSI catchers) that impersonate cell towers and trick all phones in an area into connecting to them. This can capture the individual mobile subscriber identity number of everyone at a protest, undermining anonymity for entire crowds.
As cybersecurity expert Evan Greer from Fight for the Future notes: "The Trump administration is weaponizing essentially every lever of government to shut down, suppress, and curtail criticism of the administration... there have never been more surveillance toys available to law enforcement and to US government agencies."
Advanced Phone Security
Encryption Setup Details:
iOS devices: Full disk encryption is enabled by default when you set up any passcode or biometric lock
Android phones: Go to Settings > Security and ensure "Encrypt Disk" is turned on (steps may vary by device)
Emergency Phone Lockdown: Your phone has built-in emergency features to quickly disable biometric unlocks:
iPhone: Hold the wake button and one volume button simultaneously. This forces the phone to require a passcode instead of FaceID/TouchID
Most Android devices: Similar button combinations exist - research your specific model before attending
The Stingray Problem: Police stingray devices can intercept all communications in an area. Your phone automatically connects to the strongest signal, which could be a fake tower. The only complete protection is keeping your phone off or in a Faraday bag that blocks all radio communications.
Faraday Bag Usage: Digital security expert Harlo Holmes from Freedom of the Press Foundation recommends Mission Darkness Faraday bags. These completely block your phone's radio signals - no cell, WiFi, or Bluetooth connections possible. Open only when absolutely necessary for emergency communication.
Secondary Phone Strategy (Advanced)
Why "Burner" Phones Aren't Always Anonymous: Don't assume a prepaid phone grants anonymity. If you provide identifying details to any carrier, your "burner" could be just as trackable as your primary device. As Holmes cautions: "Don't expect because you got it from Duane Reade that you're automatically a character from The Wire."
Better Approach - Dedicated Protest Phone: Instead of a true burner, consider a secondary phone that you've configured specifically for protests:
Remove all social media, email, and personal messaging apps
Install only Signal, a maps app, and emergency contacts
Never sync with your main accounts or cloud services
Keep this phone's contact list completely separate from your primary device
Communication Security: Traditional calls and texts are vulnerable to interception. Use end-to-end encrypted communication only:
Signal has the longest track record for secure messaging and calls
Set up disappearing messages that delete after hours or days
Ensure everyone in your group uses the same app - they're not interoperable
Test the app and messaging before the protest
Digital Metadata Risks
Photo and Video Dangers: Files you upload to social media contain metadata including timestamps and GPS coordinates. This information can help authorities track protest crowds and movement patterns, even if you think you're just sharing a solidarity photo.
Social Media Monitoring: Law enforcement uses bulk data analysis tools like Dataminr for real-time monitoring that connects people to their online activity. These tools can surface past posts - even jokes about violence or illegal activity - and use them against you if questioned or arrested.
Special Risk for Immigrants: The US State Department explicitly monitors immigrants' and travelers' social media activity. Any content connecting you to protests could affect visa status, green card applications, or deportation proceedings.
Online Protection Strategies
Pre-Protest Digital Hygiene:
Review your social media history for any posts that could be misinterpreted
Consider temporarily deactivating accounts if you're in a vulnerable position
Remove location data from past posts if possible
Avoid posting about protest plans or attendance
During Protests:
Don't livestream unless absolutely necessary - it reveals your location in real-time
If recording video, avoid showing identifiable faces of fellow protesters
Turn off location services and geotagging completely
Use Signal to share any footage privately rather than posting publicly
After Protests:
Wait before posting any content - avoid real-time disclosure of your activities
Strip metadata from photos/videos before sharing (apps like ProofMode can help)
Be aware that even content you don't post could be accessed if your device is confiscated
Advanced Threat Considerations
Federal Escalation: As noted in recent digital security analysis: "With federal crackdowns on protests ramping up around the country," people must assess each situation and weigh the benefits of maintaining personal privacy versus documenting what's happening.
The Documentation Dilemma: There's tension between staying secure and documenting potential police misconduct. As cybersecurity provider Danacea Vo explains: "Social media monitoring and online profiling is the factor that lots of people forget... But I also believe that documenting what's going on is essential, especially in high-risk conditions, because when the state escalates we need proof for legal defense."
Risk Assessment by Category:
High-risk individuals (undocumented immigrants, visa holders, activists under surveillance): Consider maximum digital protection or staying home
Medium-risk individuals (people with sensitive jobs, security clearances): Use all available technical protections
Lower-risk individuals: Basic protections may be sufficient, but understand that risk levels can change quickly
The Bigger Picture
As Fight for the Future's Greer emphasizes: "Part of the goal of governments extending and implementing mass surveillance programs is to scare people and make people think twice before they speak up. I think that we should be very careful in this moment not to fall into that trap."
The goal of this advanced guidance isn't to discourage participation, but to ensure that those who choose to protest can do so with full understanding of the digital landscape and appropriate protections for their situation.
Part 8: When You Need Professional Help
If you're organizing action or expecting serious federal response, military involvement, or high-risk confrontation, connect with established organizations who have experience with these situations. They have legal observers, bail funds, trained de-escalators, and advanced planning that individual protesters can't match. At this level, you need professional guidance, not internet advice.
Moving Forward
Democracy requires people willing to stand up and use their voice, especially when doing so becomes more difficult. The goal isn't to discourage participation—it's to help people who choose to participate do so as safely as possible.
This means adapting to current reality rather than how things should work. It means learning from experienced activists while developing skills appropriate to your situation. It means taking care of each other through smart planning and mutual support.
Your safety matters. Your community's safety matters. Your right to protest matters. Planning accordingly isn't paranoia—it's taking care of each other.
Quick Reference
Before You Go
Map exits, check for counter-protests
Holistic check-in, find buddy/group
Emergency contacts on arm (permanent marker)
Leave personal phone home or airplane mode
Threat assessment and research
Essential Gear
Water, snacks, cash under $40, ID
Comfortable shoes, weather layers
First aid, phone charger, paper/pen
NO jewelry, crossbody bags, or glass
At the Protest
Stay with group, position near families
Keep hands free, make eye contact
Watch for situation changes
Use sit-down wave if violence erupts
Don't engage provocateurs - distance/document/report
Leave if unsafe
Documentation
Bodycam > phone recording
ProofMode for verification
Protect protester privacy
Share via secure channels only
Advanced Digital
Enable device encryption
Use Faraday bags for phones
Signal with disappearing messages
Strip metadata from photos
Monitor past social media posts
If Arrested
Stay calm, ask what charges
Give name only, request attorney
Use emergency contacts on arm
Emergency Protocol
Know 3+ exit routes
Establish meeting points
Check-in times with outside contact
Tired of reading about democracy under attack and want to take action? Get everything you need to speak out effectively:
✅ Weekly advocacy templates (copy, paste, send)
✅ Audio catch-up on missed analysis
✅ Democracy wins and resistance victories to fuel your fight $8/month.
Learn what matters. Do what counts.
We the People Are Not Going Back – Protest Gear for All Humans
Because progress isn't negotiable. And neither are we.
Made for people who understand that democracy isn't a spectator sport and that silence in the face of injustice is complicity. Whether you're at a rally, town hall, or just living your truth in public, this shirt speaks volumes.
This t-shirt is everything you've dreamed of and more. It feels soft and lightweight, with the right amount of stretch. It's comfortable and flattering for all.
Perfect For:
Defenders of democracy and human dignity
Those who know history and refuse to repeat it
People who plant themselves like trees beside rivers of truth
Anyone who believes the arc of justice needs active bending
Every shirt helps fuel strong coffee, stronger Wi-Fi, and a movement that knows staying loud and staying kind is how we win.
References
Primary Sources
American Civil Liberties Union. (2024, September 20). Trump on surveillance, protest, and free speech. Retrieved from https://www.aclu.org/trump-on-surveillance-protest-and-free-speech
Fight for the Future. (2019, June 18). BREAKING: House Democrats "resist" Trump by voting to rubber stamp his terrifying mass surveillance capabilities [Press release]. Retrieved from https://www.fightforthefuture.org/news/2019-06-19-breaking-house-democrats-resist-trump-by-voting
Fight for the Future. (2019, November 14). Digital rights activists are using facial recognition software to scan thousands of faces in Washington, DC [Press release]. Contact: Evan Greer, 978-852-6457, press@fightforthefuture.org
Fight for the Future. (2020, September 10). Digital rights activists launch new campaign to stop Trump executive order that would censor the Internet [Press release]. Contact: press@fightforthefuture.org, (508) 474-5248
Guardian Project. (2024). ProofMode: Verified visuals. Retrieved from https://guardianproject.info/apps/org.witness.proofmode/
Holmes, H. (2017, June 14). Harlo Holmes, the Freedom of Press Foundation's director of digital security, on the biggest risks newsrooms face [Interview]. Nieman Journalism Lab. Retrieved from https://www.niemanlab.org/reading/harlo-holmes-the-freedom-of-press-foundations-director-of-digital-security-on-the-biggest-risks-newsrooms-face/
ProofMode. (2024). ProofMode provides verifiable camera app for 2024 US election [Press release]. Retrieved from https://proofmode.org/blog/proofmode-us-election-2024
Truthout. (2025, June 15). Trump is rapidly expanding the surveillance state as protests grow. Retrieved from https://truthout.org/articles/trump-is-rapidly-expanding-the-surveillance-state-as-protests-grow/
WITNESS. (2017, April 27). Set your phone to ProofMode. WITNESS Blog. Retrieved from https://blog.witness.org/2017/04/proofmode-helping-prove-human-rights-abuses-world/
Expert Profiles and Institutional Affiliations
Greer, E. Deputy Director, Fight for the Future. Expert credentials: GLAAD Social Media Safety Index Advisory Board member; published in The Guardian, Newsweek, CNN, Time. Specialization: Intersection of LGBTQ rights and technology policy, commercial surveillance, algorithmic harms.
Holmes, H. Chief Information Security Officer and Director of Digital Security, Freedom of the Press Foundation. Expert credentials: Adjunct Professor, New York University; Former contributor, Guardian Project; Media scholar and software programmer. Specialization: Newsroom digital security, journalist source protection, cross-border security protocols.
Vo, D. Founder and CEO, Cyberlixir. Expert credentials: M.S. Cybersecurity, George Washington University; Certified Ethical Emerging Technologist (CEET); Security+ certified. Specialization: Human-focused cybersecurity for nonprofits, social media monitoring analysis, digital rights advocacy.
Technical Documentation
Coalition for Content Provenance and Authenticity. (2024). C2PA technical specification. Retrieved from https://c2pa.org/specifications/specifications/1.0/specs/C2PA_Specification.html
Federal Rules of Evidence, Rule 902 - Evidence That Is Self-Authenticating. (2023). Retrieved from https://www.law.cornell.edu/rules/fre/rule_902
Guardian Project. (2024). ProofMode technical documentation. GitLab repository. Retrieved from https://gitlab.com/guardianproject/proofmode/proofmode-android
Signal Foundation. (2024). Signal protocol technical documentation. Retrieved from https://signal.org/docs/
Legal and Policy Analysis
Posse Comitatus Act of 1878, 18 U.S.C. § 1385 (1878).
U.S. Constitution, Amendment I.
U.S. Constitution, Amendment IV.
Organizational Sources
American Civil Liberties Union (ACLU). Founded 1920. 501(c)(4) nonprofit organization. Primary focus: Constitutional rights protection, civil liberties advocacy, litigation.
Fight for the Future. Founded 2011 by Tiffiniy Cheng and Holmes Wilson. 501(c)(4) digital rights organization. Focus areas: Internet freedom, surveillance opposition, content regulation.
Freedom of the Press Foundation. Co-founded 2012 by Daniel Ellsberg and Trevor Timm. 501(c)(3) nonprofit organization. Mission: Protecting and defending adversarial journalism.
Guardian Project. Open-source mobile security collective. Focus: Privacy tools, secure communication applications, surveillance resistance technology.
WITNESS. Founded 1992. International human rights organization. Specialization: Video documentation of human rights violations, digital security for activists.
Surveillance Technology References
IMSI Catchers (Stingray Devices). Cell-site simulators that impersonate legitimate cell towers to capture mobile device identifiers and intercept communications within a geographic area.
Dataminr. Commercial social media monitoring platform utilized by law enforcement agencies for real-time surveillance and bulk data analysis.
Section 702 of FISA. Foreign Intelligence Surveillance Act provision allowing warrantless surveillance of non-U.S. persons, with documented domestic data collection implications.
Methodological Note
This guide synthesizes information from peer-reviewed cybersecurity research, legal analysis from civil liberties organizations, technical documentation from open-source security projects, and direct statements from recognized experts in digital security and protest safety. All web sources were accessed and verified between June 15-22, 2025. Expert quotes are taken from official press releases, published interviews, and verified public statements.
This guide represents practical experience from years of protest participation and is for educational purposes only. It does not constitute legal advice. Laws and situations vary by location and change over time. Always consult with a qualified attorney for legal advice specific to your situation. Always prioritize your safety and the safety of those around you. The author assumes no responsibility for actions taken based on this information.
© 2025 Bigger Than Me Democracy Project. All rights reserved. This content may be shared for educational purposes with proper attribution.