What to do when you risk being arrested
In some regions, prominent human rights defenders, activists, journalists and lawyers have to choose between going into exile or risking to be arrested and legally prosecuted, often in unfair conditions.
This is a situation that the Front Line Defenders Digital Protection team has been frequently observing especially in Central American countries like Guatemala, El Salvador and Mexico.
To help people at risk protect their activities, information and contact networks, we have developed a series of guidelines and recommendations that can make it harder to extract data from their personal and work devices.
If you are preparing to go into exile or to travel in riskier situations, read our guide on how to protect your information and devices while traveling.
Assess your situation
Talk to a lawyer
- Assess your legal situation: how likely is it that you will be detained?
- If you work with a group, the recommendations in this post are not necessary for the whole staff of your organization, but they are essentials for those most at risk.
- Know your rights. In particular you may want to know if:
- you can refuse to provide the passwords or codes to unlock your phone and computer;
- the agents need a warrant from a judge to seize your devices;
- they need a warrant that specifies which devices (brand and model) they can take;
- you can refuse to provide the passwords to access your social media accounts and other online services;
- you can make one or more phone calls after you have been arrested;
- you can call a lawyer before you provide any information to the authorities.
- Remember: if violent interrogation or torture are a possible scenario, it is better to have empty devices, so you can provide your passwords without exposing yourself or others to higher risks.
Map your data
As a first step to prepare for a possible detention, take an inventory of the most important information in your devices (phones, computers, external hard drives, USB sticks, SD cards, etc.). Include in your inventory all information you store online (on online storage platforms, mailboxes, etc.)
- You can find recommendations on how to proceed in the Holistic Security Manual.
- Don't forget to go through all your devices and make a digital inventory of any sensitive information: pictures, text documents, PDFs, chats, attachments, login credentials, etc.
Prepare for potential detention
When you have a clear vision of what your devices contain, you can proceed to:
- deleting what you don't need;
- backing up what you want to keep;
- deleting what you've backed up from your computer and phone;
- disconnecting your devices from online storage platforms and mailboxes where you keep sensitive information;
- (if possible) uninstalling any apps that you use to access online services and only accessing them through a browser.
Back up important information
- Learn how to back up your data more securely.
- You can choose to back up important information on an encrypted external storage device and/or on a secure online storage platform.
- When making this choice, consider: could the authorities decide to seize your external storage devices and force you to give them the password to decrypt it, or try to crack the password? If so, consider backing up on a secure online storage platform and access this platform only through a browser so you can better hide that you have account on that platform.
- If you keep producing content in your devices, repeat the backup process regularly and then delete all information again.
Minimize data in your devices
Try to reduce the data in your phone and computer to a bare minimum: what is not stored on your devices can not be breached by any tool or person.
- Once you have completed your backup, delete all data, or at least the most sensitive ones, from your devices.
- Go through our guide on how to protect your information and devices while traveling for more recommendations on how to clean up your devices before agents search through them.
- Consider keeping all your data and work in a secure cloud storage service.
- Try to access the online storage platform through a browser rather than through an app.
- Make sure to delete all browsing history at the end of each session. This way you can keep working without storing data in your device.
- Consider accessing the online storage platform through Tails to reduce the risk of leaving traces of your activities in your devices.
Store sensitive files in a secure app
- If you really need to keep some files in your computer, consider storing them in a secure app.
- Consider storing sensitive information in a hidden Veracrypt volume if you're using a computer.
- Consider using Tella if you're storing sensitive data in a phone. On Android, you can also camouflage Tella so it looks like a functional calculator.
Protect your devices against malware infections
If you think there might be an ongoing investigation on you, be sure to protect your devices against the risk of surveillance through spyware.
Prepare your phone
For all phones
- If you can, avoid linking your phone to your personal Google or iCloud account; if you really need Google or iCloud services, create a new account.
- Avoid biometrics to lock your phone. Instead, use at least a 6-digit PIN, or even better a password with a minimum of 8 characters.
- Make sure automatic updates are enabled.
- Remove all the apps that contain private or sensitive information or that connect to online services including personal, sensitive or valuable information and/or your contacts network, as most likely the authorities will be able to access them through forensics tools.
- If you don't want or cannot delete these apps, consider hiding them.
- Use your phone only for less sensitive purposes.
- Read our guides on how to use Android or iOS more securely.
- On iPhone, enable Lockdown Mode.
- On Android, enroll in Google's Advanced Protection program.
[Optional but recommended] Install Graphene OS
- If you can, buy a new or used Google Pixel (ideally an 8a or a more recent model).
- Get a trusted technologist to remove the default operating system by installing Graphene OS.
- We recommend you follow the instructions in the anarsec guide on how to install and configure Graphene OS.
- Once Graphene OS is installed in your phone, use the Auditor App to ensure that your device is running a verified operating system with a locked bootloader and that you will be able to check in the future that no tampering has occurred..
- Create different profiles on the phone (admin, work, bank, social media, etc.).
- We recommend to create (at least) a second user profile on Graphene OS. Use the first profile (owner profile), the one that you created when installing the operating system, only to install apps and for administration purposes. Use the other profile(s) for communications, data storage, etc. This will ensure even better protection of your data.
- Use the default browser and PDF reader built into Graphene OS.
- In Graphene OS, the PDF reader and Vanadium browser are specially hardened to cover several attack vectors.
Prepare your computer
- Follow our guides to use macOS, Windows or Linux more securely.
- If you really need to keep information in your computer, make sure to encrypt your hard drive.
[Optional but recommended] Use Tails on your computer
Tails is an operating system that runs on a USB stick or an SD card. Once you turn off your computer, no traces of your work stay in the hard drive or RAM. Also, Tails only connects to the internet through the Tor network, so your online traffic is also anonymized.
By using Tails, you can avoid leaving any traces of your most sensitive activities in your computer, so if your device is seized nobody will be able to find out what you had been doing with it.
- Read more about Tails.
- Learn how to install Tails in a USB stick or SD card.
- Learn how to start using Tails.
If you need, you can also create a persistent storage volume inside your Tails stick and store sensitive information inside this encrypted container.
- Read more on persistent storage.
- Note that the persistent storage is not hidden. An attacker in possession of your USB stick can know that there is a persistent storage volume and force you or trick you to give out its passphrase. If you need to hide sensitive data, consider using a VeraCrypt hidden volume in an external storage device instead.
[Optional] Install Qubes OS to protect your data from online attacks
If you need to protect your data from online attacks, consider installing Qubes OS and configuring it based on the SecureDrop guide for journalists and human rights workers.
- Qubes OS is an operating system developed to increase security by isolating different compartments (called qubes) inside your computer. You can assign some of these compartments to less sensitive purposes while completely isolating from the internet other qubes containing more sensitive information.
- Qubes OS will not necessarily protect your data from someone who can use forensic tools to search your computer, but it can protect sensitive information from remote attempts at hacking into your computer.
Review your password strategy
The weakest point of any encryption, secure tool or service is the password you use to protect it with - if your passwords are not strong enough, it won't take a lot of effort to crack them and decrypt your sensitive data or access your online platforms and communication tools.
- Make sure you are using strong and unique passwords.
- Save your passwords in a secure password manager.
- If you are using an offline password manager like KeePassXC, back up your password database securely.
- Use 2-factor authentication for all your online accounts.
- When you enable 2-factor authentication make sure to download backup codes and save them in your password manager together with your password for that account.
- If you use a 2-factor-authentication app, make sure to back it up somewhere safe. To make sure you can back up your codes, consider using one of the following apps:
- Proton Authenticator (for Android, iOS, Windows, macOS and Linux) lets you back up your 2FA codes to iCloud on Apple devices or to a location of your choice on Android devices. If you're using an Android device, you can also choose the frequency of your backups.
- Aegis for Android backs up your codes automatically.
- Raivo for iOS syncs your one-time passwords to iCloud.
Chat more securely
- Read our recommendations on using messaging apps more securely.
- In particular, make sure to protect your sensitive chats with end-to-end encryption and enable disappearing messages in all your chat apps.
- Use a messaging app that protects your communications through end-to-end encryption by default, ideally Signal or another secure messaging app.
Protect your connections
If you think there might be an ongoing investigation on you, be sure to protect your connections from online surveillance.
- Learn how to browse the web more securely.
- Only connect to the internet through a trusted VPN.
- If you need to be sure that nobody can trace your online activities back to you, consider anonymizing all your connections through Tor.
Possibly don't use apps to access online services
- If you need to access your sensitive emails or online cloud service, use a browser to log in and then log out when you're done. Avoid using apps for your online accounts whenever possible: this will reduce the traces of your activities you leave in your devices.
- After logging out from your accounts, make sure to set your browser to delete all your browsing history at the end of every session and close the browser.
Choose trusted contacts you can inform in case you are arrested
- Consider securely giving your trusted contacts passwords to your most sensitive accounts and to your Google or iCloud accounts and asking them to suspend your social media accounts and wipe your phone remotely in case you are arrested.
- When sharing a password with someone, only do this in person or through secure communication tools protected by end-to-end encryption. Ideally, share with them a KeePassXC database rather than the passwords in an unencrypted document.
- Read our recommendations on how to share passwords more securely.
- Make a list of digital security helplines to support your contacts in suspending your accounts more quickly.
- Among the helplines that can help, consider Access Now Digital Security Helpline and Front Line Defenders' emergency contact.
- Also review the Digital First Aid Kit support page to look for help desks that may support your contacts for specific needs.
Set emergency apps to inform your trusted contacts and delete sensitive data
- On Android, you can set the Personal Safety app to start emergency actions like calling for help, sharing your location with your emergency contacts or recording video.
- If you have an Android device, you can also install Ripple and set it to delete all sensitive data and apps in case of an emergency.
- If you have an iPhone, you can use Emergency SOS to alert your emergency contacts about your arrest and share live video or existing photos with them.
During the detention
- If possible, keep all your devices off.
- Only turn on your phone to call your trusted contacts (if you are allowed to do so). After calling them, switch off your phone again and do not unlock it.
Once you are released from detention
- If the authorities give you back your devices, do not use them until an expert can run a forensics analysis and make sure they're clean from malware.
- Consider that it might be impossible to confirm your devices have been infected and that you might have to replace them entirely.
Resources
- Coping with Prison
- Front Line Defenders, Workbook on Security: Practical Steps for Human Rights Defenders at Risk, Appendix 9, Check list: Detention / Arrest / Abduction / Kidnap, pp. 78-80, 2011.
- EFF Surveillance Self-Defense, Security Scenarios - Human rights defender? Recipes for organizations who need to keep safe from government eavesdroppers
- IBON International, A Quick Guide on Security for Human Rights Defenders (last updated: February 14, 2025)
- Craig Higson Smith, Daniel Ó Cluanaigh, Ali G. Ravi, Peter Steudtner, Holistic Security Manual, "Creating Security Plans and Agreements", p. 134 ff., 2016.
Image: Blockhead, Los Angeles 2017, by Hans-Jörg Aleff, released under the Creative Commons Attribution-NonCommercial-ShareAlike 2.0 Generic license.