Using Signal Groups for Activism
Good tutorial by Micah Lee. It includes some nonobvious use cases.
Good tutorial by Micah Lee. It includes some nonobvious use cases.
Ian Stewart • July 10, 2025 11:57 AM
There was an activism group a decade ago where we live because our local council wanted to pull down our homes to build high-end luxury flats and offices for foreign investors. Because of the diverse group involved a traditional samizdat was printed by a local print shop. However some people did scan it and forward it by email.
When there is a diverse group of people, some older people who have little interest in the web, smart phones or social media this is a better method I believe.
Michael Singer • July 10, 2025 12:40 PM
I think Micah Lee would have more credibility if he didn’t repeatedly use fallacious language like “Israeli genocide.”
Shoal Creek • July 10, 2025 12:54 PM
I do believe one Michael Singer is not following the moderation policy, just as this comment is not following the moderation policy. Michael Singer’s entire comment is nothing more than a weak attack on the author of the article with no data to back his claim. His comment does nothing to advance the discussion around Signal and its use and/or security implications. I would expect both this comment and Michael Singer’s comment be removed in light of the moderation policy.
Wild River • July 10, 2025 1:37 PM
@Shoal Creek,
The claim of @Michael Singer is that if one uses loaded language (as per your example), one turns away the other half of people who don’t subscribe to it. While they claim that specific term is fallacious, which is a value-judgment I have no need to get into, it IS objectively true that it will turn away the people who don’t agree and that probably isn’t contributing to Micah Lee’s agenda, unless that agenda is security only for the same-minded, which I’d prefer to give him the benefit of the doubt on, as I’m sure you are not just Micah Lee masquerading, trying to use your questionable on it’s merits and definitively subjective interpretation of the moderation policy to censor an opinion ypu dislike 🙂
Eric • July 10, 2025 1:58 PM
Micah Lee claims the examples are from his own use, making them valid examples. The argument that the issue description is a problem is an argument inherently passing judgement on the issue at hand. The same invalid argument could be made for the other examples given — there are many who don’t approve of people protesting ICE activities, for example.
It is likely that any example of using such groups for activism is going to be “approved” by some people and “disapproved” by others. That does not make the examples themselves invalid.
Clive Robinson • July 10, 2025 2:13 PM
@ ALL in the UK,
As others and the referenced article have brought up a certain conflict and people that might believe in free speech about it…
You should all be aware of, and take caution that,
The very much “on the take” actions of UK ministers including Yvette Cooper who have claimed a protest group is a terrorist organisation.
Whilst I might not agree with the actions of the protest group, I can not see any legitimate reason to call them terrorists unlike those working for the politicians.
Any way mentioning the now “proscribed group” by name is technically a serious crime… So how I caution against it without mentioning them is one of those things that arise with major abuses of power by politicians…
So I will just link to Minister Yvette Cooper’s own words made in the UK “Commons parliament” as justification for the “on the take” actions that she and other ministers profit by,
https://hansard.parliament.uk/commons/2025-06-23/debates/25062337000014/PalestineActionProscription
The idiot. • July 10, 2025 3:29 PM
My problem with this is that while all of the security measures were true, I’ve read about the cases where secure means of comm unication were created and ran by monitoring agencies then marketed well. I feel like you couldn’t reasonably trust any major platform you didn’t create yourself for that reason.
( at least, if you have reason to distrust your current government)
Winter • July 11, 2025 1:42 AM
@the i
I feel like you couldn’t reasonably trust any major platform you didn’t create yourself for that reason.
Your advice is self defeating.
If you created the communication platform yourself, you advice the people you want to communicate with to not use it.
If they created it, you won’t use it.
How then to communicate?
Your advice only benefits the persecutors. So maybe we should not trust your advice.
But without trust, why should we communicate?
lost • July 11, 2025 2:19 AM
Micah has no credibility to teach about OPSEC.
https://www.mintpressnews.com/bad-track-record-gets-worse-new-whistleblower-outed-intercept/239822/
Winter • July 11, 2025 7:13 AM
@lost
Micah has no credibility to teach about OPSEC.
I cannot find a connection between your accusation and the link you supplied.
Could you be bothered to give some supporting evidence?
Clive Robinson • July 11, 2025 10:26 AM
@ Winter,
With regards your comment to @lost of,
“I cannot find a connection between your accusation and the link you supplied.”
That’s because the article has not been read by @lost.
A check on this and other related sites shows a “concerted plan” to “dish dirt” on behalf of a clique within a national government that war mongers very frequently.
Thus I suspect that @lost is a payed for troll just cutting and pasting from some well heeled script supplier.
We see such well heeled funders in the UK slipping tens of thousands at a time into the “pockets” of UK ministers who many call “Blairites” but other words are rather more appropriate.
So many have been caught taking money or gifts in ways to get around regulations, it’s clearly not “accidental” but quite deliberate enrichment for political favours and the like.
Clive Robinson • July 11, 2025 10:28 AM
@ Winter,
With regards your comment to @lost of,
“I cannot find a connection between your accusation and the link you supplied.”
That’s because the article has not been read by @lost.
A check on this and other related sites shows a “concerted plan” to “dish dirt” on behalf of a clique within a national government that war mongers very frequently.
Thus I suspect that @lost is a payed for troll just cutting and pasting from some well heeled script supplier.
We see such well heeled funders in the UK slipping tens of thousands at a time into the “pockets” of UK ministers who many call “Blairites” but other words are rather more appropriate.
So many have been caught taking money or gifts in ways to get around regulations, it’s clearly not “accidental” but quite deliberate enrichment for political favours and the like.
Anonymous • July 11, 2025 10:29 AM
At a June trial in Rotterdam, a 43-year old man admitted to copying files from ASML and sending them to a person in Russia using the Signal messaging app.
I don’t know how this was discovered.
https://apnews.com/article/asml-netherlands-espionage-chips-e34383a9156895967828c60d40b3cfb7
lurker • July 11, 2025 1:46 PM
@lost
Dunno abt Micah, but that story you linked belongs in the next thread on Tradecraft …
Clive Robinson • July 11, 2025 2:21 PM
@ lurker,
With regards your comment to @lost of,
“…but that story you linked belongs in the next thread…”
The problem is “check the dates and times,
1, Lost posts = July 11 2025 2:19 AM
2, Bruce post = July 11 2025 12:06 PM
Nearly half a day preceding as @Winter will probably confirm.
The idiot • July 15, 2025 8:13 PM
@ winter
Just train one semi competent coder per group of known allies, pull rocket.chat or create a similar vetted thing, keep your network closish. most likely, less likely though if your pulling open source it can of course be compromised. Haha
Just to avoid the bigger net and have a small working encrypted communication network.
I’m an idiot who knows nothing, haha. Don’t mind me.
Winter • July 16, 2025 1:48 AM
@The Intelligence Challenged Person
Just train one semi competent coder per group of known allies, pull rocket.chat or create a similar vetted thing, keep your network closish.
This sounds like the very successful scheme developed by the ANC in South Africa.[1]
It was very secret&secure, required specialists to develop, training, and a sizeable organisation to deploy.
As your plan, it could only serve a rather limited group of people, who were already organized at a rather high cost.
In the other hand, Signal connects millions of unorganized lay people without training at a very low cost per connection.
So, you try to get your system on the air, connecting the people you know well. I will use Signal and communicate with whomever I want without having to organize with them beforehand.
[1] ‘https://www.news.uct.ac.za/article/-2024-01-22-the-secret-communications-network-that-helped-end-apartheid
Clive Robinson • July 16, 2025 6:42 AM
@ Winter, et al,
With regards “Operation Vula” it became more public around the end of 2013. In part because those involved had hit retirment age, and felt the need to “correct the historians” and their false assumptions given as though facts (not uncommon to happen hence the slew of WWII info in the 70’s and 80’s).
History sees Operation Vula in several ways but one thing they have probably got right was,
“It was too little too late”
And although effective at what it did, the need for it had passed for a whole number of reasons.
Also as has been pointed out the release of information appeared coincident with the drip drip release of bad news about the ANC internal conflicts and actual violence of power struggles.
The thing most do not realise is that those 8bit home/business computers of the 1980’s are way way more secure than anything you could reasonably buy post 1995.
They did not contain “radio systems” and they did not contain “Flash Memory” nor importantly did they have “semi mutable memory” like hard drives.
So once turned off and the cassette tape / micro drive or floppy disk was removed and in effect destroyed there was no real “physical evidence” that could be used.
Unlike modern PC’s that are designed from the ground up to betray you at every level, because private information is seen as currency by rather more than Government guard labour intelligence / counter-intelligence / security agencies.
It’s why I call current AI LLM and ML systems the worst form of surveillance tool so far pushed out by the “Silicon Valley Corps” like Alphabet/Google, Meta, Microsoft and even Apple.
Operation Vula was a system in a particular point in time.
For instance back then telephone boxes were on nearly every street corner in town thus having them to use randomly gave security. The modern mobile phones that have replaced them give no such security.
Likewise the Internet has destroyed the advantages of international phone calls, that although “circuit switched” were to difficult to trace back effectively. Where as TCP… you effectively have a back trace from the initiation of the first ACK, even though it is packet switched.
If people were to try to do an Operation Vula today they would do it very very differently to then.
As I’ve mentioned before I used to once run my own “Pirate” look-alike “Numbers Station” for “other reasons”. It was down in the 6Mhz “49 meter broadcast” band that used to provide good coverage at low power and because it had little “ground wave” was difficult to DF (look up NVIS as to why).
As the generator, I used an Apple ][ and early “voice card” I’d designed that just sat there making hour after hour of “numbers” to low cost cassette tape. I later did similar with a 386 PC as it did not need a voice card, just pushed out “.WAV” files in a basic format. A friend did a version for a BBC model B that they had access to.
Oh the thing about “DTMF” is they are really not at all nice to work with as they don’t have a nice sound envelope for various “technical reasons”.
But they were in use to send messages long before Operation Vula, by certain terrorist organisations to send “bomb warnings” to News Paper “news desks” and the like thus serving a triple purpose,
1, Keeping journalists in the primary loop.
2, Providing a cut-out from authorities.
3, Ensuring that warnings were made public.
Also they could be sent in less than a minute from any phone or importantly “telephone pair”.
Because in rural areas quite often phone wires remained above ground and thus could be tapped onto.
Likewise in built up areas there were “frame boxes” on street corners where putting a tap in on a random pair was trivial.
Likewise in the major towns and above with tower blocks you could do the same in the basement frame room.
Look up a device called “A Pole Job” it was a way to do a random connection remotely and could be quite sophisticated. But these to are passing into history, their time from the 1960’s to 2010’s now effectively passed. Much like their brethren of the “infinity bug”.
Yvette Cooper • July 16, 2025 7:37 AM
I support Palestine Action. Which is something i do not intend to say out loud next time i’m in the UK.
I’ll also take a “burner” phone instead. Cheapest android i could find, different sim, uninstalled/deactivated most crap, installed FOSS alternatives. No messaging apps installed.
My regular phone will stay at home.
Subscribe to comments on this entry
Sidebar photo of Bruce Schneier by Joe MacInnis.
Winter • July 10, 2025 7:52 AM
A reminder:
If you think this is important, donate to Signal! Link is in the app.
It is free to users, but it costs them money to run it.