A guide to police surveillance of your devices

Long Read
various graphics about device surveillance
Explainer

If the police seize your phone during a protest, they can use mobile phone extraction tools to gather data from it (UK edition).

Explainer

This guide explains how the police can access data to your Cloud-based services and the apps that store data in there, such as Slack, Telegram and WhatsApp. (UK edition)

Explainer

A brief guide to how IMSI catchers can be used at a protest and how you can minimise risks to your data (UK edition).

Explainer

A brief guide to how social media monitoring can be used at a protest, and how you can minimise risks to your data (UK edition)

Explainer

A brief guide to how hacking can be used at protests and how you can minimise risks to your data (UK edition).

Police forces have a wide array of surveillance capabilities. This section of our 'Free to Protest' guide focuses on capabilities that target your devices, in particular your mobile phone, and some strategies you can use to reduce the risk of your device being compromised.

We also have a whole section of our 'Free to Protest' guide that looks in more detail at how to protect your devices against surveillance at protests.

But even, for example, if you leave your mobile phone at home before going to a protest, the police have other surveillance capabilities that can still be used to identify you or monitor you at a protest, such as facial recognition and gait recognition technologies. See our separate section on 'A guide to surveillance of your face and body at protests'.

Our campaign
Related learning resources