Now it is not necessary to rely on txt messages alone, if you use large SD cards you would have stores of randomness to handle an enormous amount of voice and video traffic as well.
One must take care though! Certain smartphones do not have just one mic, some are internal and very sensitive…mainly they pick up and store/forward voice. When you muffle the phone with your sleeve to speak privately to someone standing by the inner mic might catch the conversation.
Thus, if you are going to use voice on such a system then a small white noise device would be needed so you could inject the phone with a masking noise and thus removing any abilities of an internal mic…ditto with cams…drop the smartphone is a sack or place in pocket or purse if you are paranoid.
Video can also be transferred. It uses up a great deal more random data of course, But it you are using a pair of 512gb SD cards you can send a lot of video and images…albeit the transfer rate will be sluggish…short clips are your friend. Military systems can transfer video/audio in real time….what do you think they are gawking at in the situation room…its' possibly someones cellphone that has had a patch downloaded to function as a relay.
Now. The same setup could be made much easier to use by building it into a snap-on hard case for the various phones…this can work but care would have to be taken to not leak any clues to the insecure smartphone as no telling what is inside there.
Foe the ultimate paranoid I suggest going with a dongle that can go in your pocket\purse and send txt messages.
Now PLEASE be aware that this will ensure the total security of your comms but the telcos will still have your metadata!
I will post again and describe in detail three methods that can negate the use of metadata…the best you can do to mitigate the metadata is to follow strict rules and use burner phones. preferably purchased using a buyer that you don't know.
The safe way to gather together comms gear that cannot be tracked back to you would fill a small book…I intend to write that book. and others.
More later relating to communications tricks.
i.e. Like how to buy a cheap 20 dollar handie, take it to the middle of nowhere, put it on the right frequency and get access to some very interesting people.
For now, never have a burner phone with a battery installed ANYWHERE near you..feds love burner phones..lol
This is because idiots pull out a burner phone and use it while their real phone is in their pocket…..The morons Struck and page did this…now the two phones are linked together by close proximity…stupidity.
Use burners far from your real phone,far from your home, far from your gym, far from your associates, far from cameras. NEVER call anyone who is a known associate of you, you will need a trusted someone to carry the message to the recipient. Don't use a burner in the same place twice or a visitor may be waiting.
Use deception, use a burner in the midst of your enemies, or in their place of work/refuge….it will make them very paranoid.
Keep in mind that just listening to a receiver can be dangerous…
On the back of all radios you will find a sticker that says the device is part 15 compliant. What this means is the rf that the receiver transmits is below an acceptable level. The intermediary frequency that the radio transmits on is generally 10.7mhz up or down from the signal you are monitoring. so, someone could conceivably determine what frequencies your radios were tuned to..and this might be important so beware.
Radio stations used to park cars along the highways and could count the number of drivers tuned into their station as a good test of their popularity.
When it comes to computers, radio, electronics their are many tricks.