Burner Phones - rarely used properly - Compartments may be good enough

Lots of OPSEC Operational Security Guides and social media comments mention "Burner Phones"

e.g. https://riotmedicine.net/static/downloads/riot-medicine.pdf
"A burner phone is a very particular type of phone that must meet the following

Amended list:

  1. The phone must be purchased individually using cash Bulk purchases (defined as low as two phones at a time !) are often not allowed in e.g. supermarkets even though there are no explicit warning signs This attracts staff attention to an unusual purchase which they may well remember or retain a record of on CCTV
  2. The SIM card used for the burner phone must be purchased using cash
  3. The initial activation of the SIM card when it is first registered with the network is stored forever during its lifetime, including Location Data. Do not do this at home or work or at a secret meeting place even if you do not make or recieve any calls.
  4. The phone and SIM card must be purchased by a user with no other phones or traceable devices on their person at that time
  5. The phone and SIM card pair must only be used with each other
  6. The phone must never be taken to locations associated with the user unless it is both off and in a Faraday bag.
  7. The phone must never be used in the presence of non-burner phones or other devices that can be tracked back to the user.
  8. Any accounts on the phone must be made anonymously and only ever used with that phone.
  9. The phone must be used for exactly one action. Few spies, drug dealers or terrorists can afford to do this, unless the Burner Phone is literally for bomb activation or threats
  10. The phone must only ever contact other burner phones or unaffiliated parties (e.g., an office or opponent who is targeted by the action).
  11. The phone and SIM card must be destroyed after the action.
  12. No Apple iOS iCloud or Google drive backups should be enabled on a true burner phone, but may be important for a travel across borders phone.
  13. Location Services should be turned off on a Burner phone - use a disposable paper map printout
  14. Do not connect to Home or Work WiFi Access points - Disconnect then Forget any WiFi and Bluetooth you use, several blocks away from a meeting or protest etc. both coming and going
  15. Securely disposing of a SmartPhone and / or SIM Card is harder than you think, especially if you are under physical survvellance. Several terrorists have thrown their phones down drains etc. only to have them retrieved by the police and forensically examined. Other terrorists have taken the precaution of doing a factory reset and permanently locking their e.g. Apple iPhone (making sure there are no backups in iCloud etc.)

If any of these are violated by any parties involved in an action,
location tracking and network mapping can potentially identify the entire

Also do not use your Burner Phone too soon:



One of the Snowden documents, mentioned some of GCHQ's data filtering of billions of Mobile Phone Call DetailRecords
seraching for Burner Phone Closed Loops (suspicious). If the analysts' serach criteria are too strict, they may well miss some real Burner Phones which have called a few innocent numbers
as chaff or a disguise.





Another one descibes some Contact Chaining





Obviously phoning a known to be monitored land line or mobile phone e.g. friends or family is lethal to a Burner Phone, but happen due to complaceny or ignorance.

N.B. a friend once "burned" an unused burner phone which they had on them, because their normal phone had run out of battery and it was necessary to call an ambulance in an emergency in the street. All 999 calls in UK are monitored recorded and location tracked, for good emergency services reasons. No credit or even a working SIM card is needed for 999 calls.

Encrypted SIM Cards

It is possible to purchase expensive (£1000 a year) Encrypted SIM cards which try to obscure your physical location somewhat and which try to foil IMSI Catchers e.g. via ia Omerta Digital, which connect to random cell towers rather than the strongest signal

Not broadcasting IMEI and IMSI does hide data, but also makes your phone stand out in data analyses, unless there are several such Encrypted SIMs in the same area. Similar to being the only Tor user on a network at a relevant time, this may be enough circumstantial evidence for a court.


Another privacy threat is being able to identify your location from cell tower data. With a standard SIM card, a number of markers are provided tying the phone to you & your location. Again we use a series of strategies to render this impossible & tactics used include:

Your SIM card doesn't broadcast a IMSI number (this is your phone number)
Your IMEI number is not broadcast
We connect to a random cell tower, not the strongest signal, meaning you can't triangulate the position of the phone
There is no billing information to cross-reference
Our servers also encrypt any geolocation data residing in the call.
So besides protecting your call contents, we also protect your location, an important factor for many investigations.

Obviously the lack of records means no paper trail can be traced back to you from any calls however we provide a much more significant level of anonymity. Authorities can establish every device a SIM has been used in by merit of the IMSI number broadcast whilst an IMEI can be used to identify every SIM which has been used in a phone. Since our SIMs present neither number these risks are mitigated.

About this blog

We know that there are decent, honest, trustworthy individual politicians, civil servants, law enforcement, intelligence agency personnel and broadcast, print and internet journalists etc., who often feel powerless or trapped in the system. They need the assistance of external, detailed, informed, public scrutiny to help them to resist deliberate or unthinking policies, which erode our freedoms and liberties.

Some of these people will, in the public interest, act as whistleblowers, and may try to leak documents or information to the mainstream media, or to political blog websites etc.

Here are some Spy Blog "Hints and Tips", giving some basic preecautions, and some more obscure technical tips, which both whistleblowers, journalists, and bloggers need to be aware of, in order to help preserve the anonymity of whisteleblowing or other journalistic sources, especially in the United Kingdom, but applicable in other countries as well.

Whistleblower anonymity may not always be possible, or even necessary, forever into the future, but it is usuially crucial during at least the early stages of a "leak", whilst it is being evaluated by others, to see if it merits wider publication and publicity.

Email & PGP Contact

Please feel free to email your views about this blog, or news about the issues it tries to comment on.


Our PGP public encryption key is available for those correspondents who wish to send us news or information in confidence, and also for those of you who value your privacy, even if you have got nothing to hide.

You can download a free copy of the PGP encryption software from www.pgpi.org
(available for most of the common computer operating systems, and also in various Open Source versions like GPG).

We look forward to the day when UK Government Legislation, Press Releases and Emails etc. are Digitally Signed so that we can be assured that they are not fakes. Trusting that the digitally signed content makes any sense, is another matter entirely.


Tag Cloud

CryptoParty London

CryptoParty London

Most months there is a CryptoParty London event. where some of these Hints and Tips and other techniques are demonstrated and taught.

Usually at:

Juju's Bar and Stage 15 Hanbury St, E1 6QR, London

Follow on Twitter: @CryptoPartyLDN

Syndicate this site (XML):


Campaign Button Links

Watching Them, Watching Us, UK Public CCTV Surveillance Regulation Campaign
UK Public CCTV Surveillance Regulation Campaign

NO2ID Campaign - cross party opposition to the NuLabour Compulsory Biometric ID Card
NO2ID Campaign - cross party opposition to the NuLabour Compulsory Biometric ID Card and National Identity Register centralised database.

Gary McKinnon is facing extradition to the USA under the controversial Extradition Act 2003, without any prima facie evidence or charges brought against him in a UK court. Try him here in the UK, under UK law.
Gary McKinnon is facing extradition to the USA under the controversial Extradition Act 2003, without any prima facie evidence or charges brought against him in a UK court. Try him here in the UK, under UK law.

FreeFarid.com- - Kafkaesque extradition of Farid Hilali under the European Arrest Warrant to Spain

Peaceful resistance to the curtailment of our rights to Free Assembly and Free Speech in the SOCPA Designated Area around Parliament Square and beyond

Parliament Protest blog - resistance to the Designated Area restricting peaceful demonstrations or lobbying in the vicinity of Parliament.

Petition to the European Commission and European Parliament against their vague Data Retention plans
Data Retention is No Solution Petition to the European Commission and European Parliament against their vague Data Retention plans.

Open Rights Group

renew for freedom - renew your passport in 2006
Renew For Freedom - renew your Passport in the Summer Autumn of 2006.

The Big Opt Out Campaign - opt out of having your NHS Care Record medical records and personal details stored insecurely on a massive national centralised database.

Tor - the onion routing network
Tor - the onion routing network - "Tor aims to defend against traffic analysis, a form of network surveillance that threatens personal anonymity and privacy, confidential business activities and relationships, and state security. Communications are bounced around a distributed network of servers called onion routers, protecting you from websites that build profiles of your interests, local eavesdroppers that read your data or learn what sites you visit, and even the onion routers themselves."

Tor - the onion routing network
Anonymous Blogging with Wordpress and Tor - useful Guide published by Global Voices Advocacy with step by step software configuration screenshots (updated March 10th 2009).

Amnesty International's irrepressible.info campaign

BlogSafer - wiki with multilingual guides to anonymous blogging

NGO in a box - Security Edition privacy and security software tools

Home Office Watch blog, "a single repository of all the shambolic errors and mistakes made by the British Home Office compiled from Parliamentary Questions, news reports, and tip-offs by the Liberal Democrat Home Affairs team."

Reporters Without Borders - Reporters Sans Frontières - campaign for journalists 'and bloggers' freedom in repressive countries and war zones.

Committee to Protect Bloggers - "devoted to the protection of bloggers worldwide with a focus on highlighting the plight of bloggers threatened and imprisoned by their government."

Wikileaks.org - the controversial "uncensorable, anonymous whistleblowing" website based currently in Sweden.

Public Concern at Work - "(PCaW) is the independent authority on public interest whistleblowing. Established as a charity in 1993 following a series of scandals and disasters, PCaW has played a leading role in putting whistleblowing on the governance agenda and in developing legislation in the UK and abroad. All our work is informed by the free advice we offer to people with whistleblowing dilemmas and the professional support we provide to enlightened organisations."