burner phone

(redirected from burner phones)

burner phone

A cell phone, usually prepaid, that one uses to avoid having their activities (often illicit or inappropriate ones) traced to them. The suspect's wife didn't know he had a second phone, so I bet it's a burner phone he used for drug deals.
See also: burner, phone
References in periodicals archive ?
We are talking about cloned plates and burner phones - they have put new the plates on cars, they have got rid of phones.
Burner phones are used to call remote villages and spread pre-recorded messages all over the country.
They're using burner phones so we don't know who they are "I can't speak for everyone but what's happening, making our lives more dangerous doesn't deter sex workers.
He said FAIA also provided burner phones and supplies to help them in the days after Michael.
After the Doctor was killed by Sally in the (http://www.ibtimes.com/imposters-season-2-finale-spoilers-episode-10-synopsis-sneak-peek-released-2688379) Season 2 finale of "Imposters," Ezra answered one of their former boss' burner phones and pretended to be him.
The gang used burner phones and sim card encryption in a bid to keep the authorities at bay.
Her scheme also included creating fake email accounts, purchasing burner phones that were used as the contact numbers on the fraudulent applications, and routing the victims' mail to be forwarded to vacant or abandoned properties.
Suddenly this is not just a legal drama, but a spy thriller, all stealth and dodgy burner phones. Did I mention this was created by the writer of Homeland and 24?
Suddenly, this is not just a legal drama, but a spy thriller, all stealth and dodgy burner phones. Did I mention this was created by the writer of Homeland and 24?
Suddenly, this is not just a legal drama but a spy thriller, all stealth and dodgy burner phones. So it's no real surprise that it was created by the writer of Homeland and 24.
He emphasized that terrorists have other secure means besides social media to plot attacks, such as burner phones and encryption.
For example, the Paris terrorists congregated in safe houses in Belgium to plan their attack, and while some had downloaded messaging apps with encryption, to a significant degree they used burner phones (14) to coordinate during the attack.
The mules then divide their stashes into smaller wraps to sell on for double the price as directed on untraceable "burner phones" by the Mr Bigs in the cities.
And, while they carried it out, they communicated using "burner phones" before meeting in a car park in the town before dumping Williams' Renault Clio - the number plate of which she had altered with masking tape.