,BURN] ,PHONE ,BE/ ,PRACTICES ,PEOPLE 3 ,AU?OR 3 ,CRIME?,9C4 ,TEXT 3 ,A BURN] PHONE IS A S+LE-USE PHONE1 UNATTA*$ TO Y\R ID5TITY1 :I* CAN !ORETICALLY BE US$ TO COMMUNICATE ANONYM\SLY 9 SITUATIONS :]E COMMUNICATIONS MAY BE MONITOR$4 ,:E!R OR NOT US+ A BURN] PHONE IS ITSELF A 0BE/ PRACTICE0 IS UP = DEBATE1 BUT IF Y\'VE MADE ! *OICE TO USE ONE1 !RE >E SEV]AL ?+S Y\ %\LD KEEP 9 M9D4 ,BURN] PHONES >E NOT ! SAME AS DISPOSABLE PHONES4 ,A BURN] PHONE IS1 AS M5TION$ ABOVE1 A S+LE-USE PHONE PROCUR$ SPECIFICALLY = ANONYM\S COMMUNICATIONS4 ,IT IS CONSID]$ A MEANS ( CL&E/9E COMMUNICATION1 & ITS EFFICACY IS PR$ICAT$ ON HAV+ FLAWLESS SECURITY PRACTICES4 ,A DISPOSABLE PHONE IS ONE Y\ PUR*ASE & USE NORMALLY ) ! UND]/&+ ?AT IT MAY BE LO/ OR BROK54 ,BURN] PHONES %\LD ONLY EV] TALK TO O!R BURN] PHONES4 ,US+ A BURN] PHONE TO TALK TO SOMEONE'S EV]YDAY PHONE LEAVES A TRAIL BETWE5 Y\ & Y\R CONTACT4 ,= ! SAFETY ( EV]YONE )9 Y\R COMMUNICATION CIRCLE1 BURN] PHONES %\LD ONLY BE US$ TO CONTACT O!R BURN] PHONES1 SO Y\R RELATION%IPS WILL NOT COMPROMISE Y\R SECURITY4 ,!RE >E A NUMB] ( WAYS TO >RANGE ?IS1 BUT ! BE/ IS PROBABLY TO MEMORIZE Y\R [N NUMB] & %>E IT 9 P]SON ) :OEV] Y\'RE HOP+ TO COMMUNICATE )4 ,AGREE 9 ADVANCE ON AN 9NOCU\S TEXT !Y WILL S5D Y\1 SO ?AT :5 Y\ P[] Y\R PHONE ON Y\ CAN ID5TIFY !M BAS$ ON ! MESSAGE !Y'VE S5T & NO?+ ELSE4 ,9 SITUATIONS :]E Y\ >E MEET+ PEOPLE 9 A L>GE CR[D1 IT IS PROBABLY ,O,K TO COMPLETE ?IS PROCESS ) Y\R PHONE TURN$ ON1 AS WELL4 ,9 EI!R CASE1 IT IS UNNECESS>Y TO REPLY TO ! 9ITIATION MESSAGE UNLESS Y\ HAVE IMPORTANT 9=MATION TO IMP>T4 ,REMEMB] TOO ?AT Y\ %\LD KEEP Y\R CONTACTS & Y\R COMMUNICATIONS AS SP>SE AS POSSIBLE1 9 ORD] TO M9IMIZE POT5TIAL RISKS TO Y\R SECURITY4 ,NEV] TURN Y\R BURN] ON AT HOME4 ,S9CE CELL PHONES BO? LOG & TRANSMIT LOCATION DATA1 Y\ %\LD NEV] TURN ON A BURN] PHONE SOME:]E Y\ CAN BE L9K$ TO4 ,?IS OBVI\SLY COV]S Y\R HOME1 BUT %\LD ALSO EXT5D TO Y\R PLACE ( WORK1 Y\R S*OOL1 Y\R GYM1 & ANY:]E ELSE Y\ FREQU5TLY VISIT4 ,NEV] TURN Y\R BURN] ON 9 PROXIMITY TO Y\R MA9 PHONE4 ,AS EXPLA9$ ABOVE1 PHONES >E BASICALLY TRACK+ DEVICES ) ADDITIONAL COOL FUNCTIONS & FEATURES4 ,BECAUSE ( ?IS1 Y\ %\LD NEV] TURN ON A BURN] 9 PROXIMITY TO Y\R 0REAL0 PHONE4 ,HAV+ A DATA TRAIL PLAC+ Y\R O/5SIBLY ANONYM\S BURN] 9 ! SAME PLACE AT ! SAME TIME AS Y\R P]SONALLY-ID5TIFY+ PHONE IS AN EXCELL5T WAY TO GET ID5TIFI$4 ,?IS ALSO MEANS ?AT UNLESS Y\'RE 9 A L>GE CR[D1 Y\ %\LDN'T P[] Y\R BURN] PHONE ON 9 PROXIMITY TO Y\R CONTACTS' P[]$-UP BURN]S4 ,DON'T REF] TO Y\RSELF OR ANY ( Y\R CONTACTS BY NAME4 ,GIV5 ?AT ! PURPOSE ( US+ A BURN] PHONE IS TO PRES]VE Y\R ANONYMITY & ! ANONYMITY & ! PEOPLE >\ND Y\1 ID5TIFY+ Y\RSELF OR Y\R CONTACTS BY NAME UND]M9ES ?AT GOAL4 ,DON'T USE ANYONE'S LEGAL NAME :5 COMMUNICAT+ VIA BURN]1 & DON'T USE PSEUDONYMS ?AT Y\ HAVE US$ ELSE:]E EI!R4 ,IF Y\ MU/ USE ID5TIFI]S1 !Y %\LD BE UNIQUE1 E/ABLI%$ 9 ADVANCE1 & NOT REUS$4 ,CONSID] US+ AN 9NOCU\S PASSPHRASE TO COMMUNICATE1 RA!R ?AN US+ NAMES AT ALL4 ,?9K 0HEY1 DO Y\ WANT TO GET BRUN* ,TUESDAY80 RA!R ?AN 0HEY1 ?IS IS ,SECRET ,SQUIRREL40 ,?IS ALSO ALL[S = CALL-&-RESPONSE AS AU!NTICATION4 ,= EXAMPLE1 Y\'LL KN[ ! CONTACT Y\'RE 9T5D+ TO REA* IS ! CORRECT CONTACT IF !Y RESPOND TO Y\R BRUN* 9VITATION )1 0SURE1 LET ME *ECK MY CAL5D> & GET BACK TO Y\40 ,ADDITIONALLY1 ?IS AU!NTICATION PRACTICE ALL[S = ! USE ( A DURESS CODE1 0,I CAN'T MAKE IT TO BRUN*1 ,I'VE GOT A YOGA CLASS CONFLICT10 :I* CAN BE US$ IF ! P]SON Y\'RE TRY+ TO COORD9ATE ) HAS RUN 9TO TR\BLE4 ,BEW>E ( ,I,M,S,I CAT*]S4 ,ONE REASON Y\ WANT TO KEEP Y\R AU!NTICATION & DURESS PHRASES AS 9NOCU\S AS POSSIBLE IS BECAUSE LAW 5=CEM5T AG5CIES >\ND ! WORLD >E 9CREAS+LY US+ ,I,M,S,I CAT*]S1 ALSO KN[N AS 0,/+RAYS0 OR 0,CELL ,SITE ,SIMULATORS0 TO CAPTURE TEXT MESSAGES & PHONE CALLS )9 !IR RANGE4 ,!SE DEVICES PRET5D TO BE CELL T[]S1 9T]CEPT & LOG Y\R COMMUNICATIONS1 & !N PASS !M ON TO REAL CELL T[]S SO Y\R 9T5D$ CONTACTS ALSO RECEIVE !M4 ,BECAUSE ( ?IS1 Y\ PROBABLY DON'T WANT TO USE Y\R BURN] TO TEXT ?+S LIKE1 0,HEY >E Y\ AT ! PROTE/80 OR 0,YO1 DID Y\ BR+ ! ,MOLOTOVS80 ,UND] NORMAL CIRCUM/ANCES1 ! USE ( 5CRYPT$ MESS5G]S SU* AS ,SIGNAL CAN CIRCUMV5T ! USE ( ,/+RAYS FAIRLY EFFECTIVELY1 BUT AS BURN] PHONES DO NOT TYPICALLY HAVE ! CAPABILITY = 5CRYPT$ MESSAG+ 7UNLESS Y\'RE BUY+ BURN] SM>TPHONES71 IT IS NECESS>Y TO BE C>EFUL AB\T :AT Y\'RE SAY+4 ,BURN] PHONES >E S+LE-USE4 ,BURN] PHONES >E MEANT TO BE US$ ONCE1 & !N CONSID]$ 0BURN$40 ,!RE >E A LOT ( REASONS = ?IS1 BUT ! PRIM>Y REASON IS ?AT Y\ DON'T WANT Y\R CL&E/9E ACTIONS L9K$4 ,IF ! SAME 0BURN]0 PHONE />TS %[+ UP AT ! SAME EV5TS1 PEOPLE 9VE/IGAT+ ?OSE EV5TS HAVE A BROAD] SET ( DATA TO BUILD PR(ILES FROM4 ,:AT ?IS MEANS IS1 IF :AT Y\'RE DO+ REALLY DOES REQUIRE A BURN] PHONE1 !N :AT Y\'RE DO+ REQUIRES A FRE%1 CLEAN BURN] EV]Y S+LE TIME4 ,DON'T LET SLOPPY EXECUTION ( SECURITY MEASURES NEGATE ALL Y\R EF=TS4 ,PROCURE Y\R BURN] PHONE C>EFULLY4 ,Y\ WANT Y\R BURN] TO BE UNTRACEABLE4 ,?AT MEANS Y\ %\LD PAY = IT 9 CA%2 DON'T USE Y\R DEBIT C>D4 ,ASK Y\RSELF3 >E !RE SURVEILLANCE CAM]AS 9 OR >\ND ! PLACE Y\ >E BUY+ IT8 ,DON'T BR+ Y\R P]SONAL PHONE TO ! LOCATION :]E Y\ BUY Y\R BURN]4 ,CONSID] WALK+ OR BIK+ TO ! PLACE Y\'RE PUR*AS+ Y\R BURN]2 COV]+ EASILY-ID5TIFIABLE FEATURES ) CLO?+ OR MAKEUP2 & NOT PUR*AS+ A BURN] AT A LOCATION Y\ FREQU5T REGUL>LY 5\< ?AT ! /AFF RECOGNIZE Y\4 ,NEV] ASSUME BURN] PHONES >E 0SAFE0 OR 0SECURE40 ,= BURN] PHONES TO PRES]VE Y\R PRIVACY1 EV]YONE 9VOLV$ 9 ! COMMUNICATION CIRCLE HAS TO MA9TA9 GOOD SECURITY CULTURE4 ,SAFE USE ( BURN]S DEM&S PROP] PRECAUTIONS & GOOD HYGI5E FROM EV]YONE 9 ! NETWORK3 A FAILURE BY ONE P]SON CAN COMPROMISE EV]YONE4 ,CONSEQU5TLY1 IT IS IMPORTANT BO? TO MAKE SURE EV]YONE Y\'RE COMMUNICAT+ ) IS ON ! SAME PAGE REG>D+ ! SAFE & PROP] USE ( BURN] PHONES1 & ALSO TO ASSUME ?AT SOMEONE IS LIKELY TO BE C>ELESS4 ,?IS IS ANO!R GOOD REASON TO BE C>EFUL ) Y\R COMMUNICATIONS EV5 :ILE US+ BURN] PHONES4 ,ALWAYS TAKE RESPONSIBILITY = Y\R [N SAFETY1 & DON'T HESITATE TO ]ASE & DIT* Y\R BURN] :5 NECESS>Y4 7,S\RCE3 ,RETRIEV$ ON #b#i? ,OCTOB] #bb FROM CRIME?9C4COM47 ,FROM 3 ,!,AN>*I/,LIBR>Y4ORG4 ,*RONOLOGY 3 ,JANU>Y #a#c1 #bbb 3 ,BURN] ,PHONE ,BE/ ,PRACTICES -- ,ADD$4 FILE G5]AT$ FROM 3 HTTP3_/_/REVOLTLIB4COM_/