Organizing Under Surveillance: The New Resistance Dilemma
As Americans mobilize against Trump's second term, they face unprecedented government surveillance powers. How do grassroots movements balance security with the openness needed for mass organizing?
Millions Want to Resist. Few Know How to Do It Safely.
Signal downloads surged 300% in the 48 hours after Trump's inauguration. Across America, grassroots movements are forming to protect immigrants, defend civil rights, and oppose federal policies. But these organizers face a chilling reality: a government with vast surveillance powers and willing corporate partners.
The dilemma is stark. Mass movements need mass participation, but every new member increases exposure to government monitoring. Immigration and Customs Enforcement (ICE) and Customs and Border Protection (CBP) operate with paramilitary ambitions and budgets larger than some countries' militaries.
"You're caught between secrecy and openness," says Eva Galperin, cybersecurity director at the Electronic Frontier Foundation. "The power of organizing comes from numbers and solidarity, but you also need to protect sensitive information from law enforcement subpoenas."
The Art of Strategic Transparency
Security experts call it "threat modeling"—deciding what needs protection and what can remain public. Matt Mitchell, former CryptoHarlem founder and CEO of Safety Sync Group, warns against over-encryption: "If you try to secure everything, you create barriers and increase mistakes."
The key insight? Not everything needs hiding. Public rallies requiring city permits will become public anyway. The challenge is protecting the truly sensitive: meeting locations, warehouse addresses, member identities.
Taylor Fairbank from humanitarian group Distribute Aid illustrates this balance: "I'll never leave Facebook because grandparents in the UK reach out once a year offering knitted hats for refugee camps. It's my job to be available on insecure tools to make those connections." But warehouse locations? "We've seen our warehouses targeted for theft and political violence. That stays secret."
Signal: The Gold Standard (With Caveats)
Every expert WIRED consulted recommended Signal as the core communication tool. Unlike WhatsApp, Signal doesn't log metadata—crucial when authorities come knocking. Its disappearing messages feature, settable from 30 seconds to 4 weeks, dramatically reduces leak risks.
But Signal isn't bulletproof. Groups over 50 people "aren't private spaces," Galperin warns, citing Trump administration's SignalGate scandal. End-to-end encryption can't prevent human leaks.
Biometric unlocking poses another risk. As Washington Post reporter Hannah Natanson's case showed, facial recognition and fingerprints have weaker Fourth Amendment protections. For sensitive organizing, security experts recommend "alt phones" with stronger protections—compartmentalizing high-risk communications from daily life.
The Corporate Cooperation Problem
The surveillance threat isn't just technical—it's structural. Silicon Valley companies routinely comply with government data requests. Even encrypted platforms can reveal metadata: who contacted whom, when, and from where.
This cooperation extends beyond messaging. Cloud storage, email providers, and social media platforms all present vulnerabilities. The solution isn't paranoia but strategic thinking about which tools to use for which purposes.
Beyond the Technical Fix
Technology alone can't solve the surveillance-organizing dilemma. The most secure communications mean nothing if members lack basic digital hygiene or if the movement becomes so secretive it can't grow.
"A very large part of activism is telling people what you're doing," Galperin notes. "It's casseroles and phone trees. Deeply unsexy, but not secret work."
The challenge for 2025's resistance movements: building mass participation while protecting vulnerable members from a government with unprecedented surveillance capabilities.
This content is AI-generated based on source articles. While we strive for accuracy, errors may occur. We recommend verifying with the original source.
Related Articles
Phone hacking tool maker Cellebrite has shifted its response to abuse allegations. After cutting off Serbia, why is it dismissing similar claims from Kenya and Jordan?
An Angolan journalist's phone was hacked by sanctioned spyware maker Intellexa. Why are banned surveillance tools still thriving globally?
When Big Tech banned adult content, queer communities built their own platform. Batemates now serves 10,000 users willing to pay $18/month for authentic connection.
Senator Ron Wyden has expressed 'deep concerns' about CIA activities. His track record suggests we should pay attention.
Thoughts
Share your thoughts on this article
Sign in to join the conversation