Every cell phone works by communicating with the nearby cell towers. Each cell tower’s location is known, and each cell phone has a unique identifier. It’s simple to calculate geographic location from which cell towers are nearest and at what distance. And of course each call is well known to the system. Not only this but the concept of “switched off” is fictional to an important degree — it’s possible for phone software and hardware to be active even when it’s off. And it is definitely possible to compromise phones and install software on them without users’ consent or knowledge. And that can include access to microphone and camera. My understanding is that everything I have written here is true of button phones as well as smartphones.
I generate noise. Tons of it. My phone is constantly doing things and reporting locations that have nothing to do with me.
Meanwhile.. they'll pull you into court, they'll show the jury your faraday bag, ask "what type of person would even own this?" They'll show your phone logs, when it turned off and when it turned back on, then they'll correlate these times with whatever they want to pin on you. Then they'll show premeditation due to the bag.
You CANNOT hide from these people. You CAN give them TONS of useless data, however.
It's information war. You need an actual warfare strategy. Stealth isn't one.
Better yet, throw the damn thing away.
Or don't buy a "smart" phone to begin with.
Every cell phone works by communicating with the nearby cell towers. Each cell tower’s location is known, and each cell phone has a unique identifier. It’s simple to calculate geographic location from which cell towers are nearest and at what distance. And of course each call is well known to the system. Not only this but the concept of “switched off” is fictional to an important degree — it’s possible for phone software and hardware to be active even when it’s off. And it is definitely possible to compromise phones and install software on them without users’ consent or knowledge. And that can include access to microphone and camera. My understanding is that everything I have written here is true of button phones as well as smartphones.
Further, tower sites have "panels" (antenna), they cover about 120 degrees. It is known what panel a phone is connected through/with.
Signal strength and math can develop an arc of probable location in that 120 degrees.
So if a connection to a tower is used, the more crowded the better, but then there are Ring cameras and such.
I just remembered....remember when Ghislaine was found and arrested? She had her phone wrapped in tin foil.
It's a free tool to fuck with them.
I generate noise. Tons of it. My phone is constantly doing things and reporting locations that have nothing to do with me.
Meanwhile.. they'll pull you into court, they'll show the jury your faraday bag, ask "what type of person would even own this?" They'll show your phone logs, when it turned off and when it turned back on, then they'll correlate these times with whatever they want to pin on you. Then they'll show premeditation due to the bag.
You CANNOT hide from these people. You CAN give them TONS of useless data, however.
It's information war. You need an actual warfare strategy. Stealth isn't one.