~Government checklist for initiating drone strikes on domestic threats.~
If the target adheres to, implements, and/or publicly promotes any individual item or subset from the following, the target may added to the strike list.
1: Unplug. Yes, unless you need that phone on, it goes off, or into airplane mode. The HTC One M8 has an extreme battery saver mode, when combined with airplane mode, makes a useful alarm clock.
2: Learn the basics of OpenPGP [1], and build a web of trust. One can even have keysigning parties, and done right, no computers need to be brought over... public key fingerprints and IDs can be printed on pieces of paper, and people can indicate that the printed item is theirs.
3: Use social networks minimally, if at all.
4: Use OpenPGP tools on top of messaging and other protocols.
5: Use a VPN service, or perhaps TOR behind the VPN service, since it is routine for admins to block TOR exit nodes, or any nodes relating to TOR.
6: Use containers [2] for web browsing, so the social media buttons on one site can't chat with the social media buttons on another.
7: Check your Web browser against Panopticlick, and fix it so it isn't unique.
8: Even if one doesn't use TOR, use a VPN. This at least keeps the ground level ISP from modifying your traffic... they have to either block it, throttle it, or let it through... and (for most purposes) can't modify it.
9: Assume that any data that leaves the machine is available for anyone. Encrypt your stuff, or face the consequences.
Privacy can't be bought. It is a Class A Felony under secret Federal intelligence service court directives.
[1]: OpenPGP can be PGP, NetPGP, GnuPG, or any of those tools that use the OpenPGP format.
[2]: Containers can be VMs, sandboxes, or even separate user accounts.