Checklist
- Level 1: See Clearly [Chapters 1–12]
- Level 2: Find Each Other [Chapters 13–26]
- Level 3: Build Together [Chapters 27–36]
Print this page (Ctrl+P / ⌘P) for a paper checklist.
Level 1: See Clearly
Chapter 1 — See Yourself
- Check your location history (iPhone: Settings > Privacy & Security > Location Services > System Services > Significant Locations; Android: Google Maps > profile > Your Timeline)
- Review how far back the data goes and how precise it is
- Record what you found in your field journal — don’t change anything yet
Chapter 2 — The Invisible Auction
- Delete your advertising ID (Android: Settings > Privacy > Ads > Delete advertising ID; iPhone: Settings > Privacy & Security > Tracking > disable “Allow Apps to Request to Track,” then Apple Advertising > disable Personalized Ads)
- Audit app location permissions — change “Always” to “While Using App” or “Never” for every app that doesn’t need real-time location
- Set up your field journal: a paper notebook or a local-first tool like Obsidian or Logseq (not cloud-based)
- Record what you’ve done so far and what you found
- Look up the monsignor case study through independent lateral research
Chapter 3 — What Are You Actually Protecting?
- Answer the five threat-modeling questions in your field journal: What do I have worth protecting? Who might want access? How likely is it? How bad would it be? How much trouble am I willing to go through?
- Be specific — name actual data, actual people, actual scenarios
- Identify your tier (1, 2, or 3) based on your honest assessment
Chapter 4 — Your Passwords Are Already For Sale
- Check haveibeenpwned.com with your primary email address
- Install Bitwarden (or 1Password) on your phone and primary browser
- Create a strong master password: a passphrase of 4–5 random words, written on paper until memorized
- Generate a new unique password for your email account using Bitwarden
- Enable two-factor authentication on your email — use an authenticator app over SMS
- If Tier 2 or 3: look into getting a hardware security key (YubiKey)
- Record which breaches appeared, your email’s new 2FA status, and accounts still using reused passwords
- Begin the slow migration: every time you log into a site, change the password to one Bitwarden generates
Chapter 5 — Who’s Listening?
- Install Signal on your phone
- Move one important conversation to Signal
- Enable disappearing messages (tap contact name > set to 1 week)
- Enable Registration Lock (Settings > Account > Registration Lock)
- Record who you moved to Signal, what resistance you encountered, what persuasion worked
Chapter 6 — The Watchers
- Search “[your city] Flock Safety” or “[your county] ALPR” for automated license plate readers
- Check the EFF’s Street-Level Surveillance atlas (atlas.eff.org)
- Write what you find in your field journal
Chapter 7 — COINTELPRO Never Ended
- Read the ACLU Know Your Rights overview (aclu.org/know-your-rights)
- Memorize and write down four phrases: “Am I free to go?” / “I do not consent to this search.” / “I am exercising my right to remain silent.” / “I want to speak to a lawyer.”
Chapter 8 — You Are Not Hard to Find
- Search yourself on TruePeopleSearch.com — record what the site has on you
- Search yourself on Spokeo.com — record what it has on you
- Google yourself: full name + city, name + phone number, name + email address
- Opt out of TruePeopleSearch (bottom of homepage > “Do Not Sell or Share My Personal Information”)
- Opt out of Spokeo (spokeo.com/optout)
- Opt out of Whitepages, BeenVerified, and Radaris
- Use a disposable email for opt-outs if possible
- Set up Google “Results About You” (myactivity.google.com/results-about-you)
- If Tier 2 or 3: run the free Optery scan (optery.com)
- Audit your usernames across platforms for reuse and real-name connections
- Record what you found, what you’ve requested removal from, and what’s outstanding
Chapter 9 — Your Browser Is a Fingerprint
- Test your browser fingerprint at coveryourtracks.eff.org — record the result
- Install uBlock Origin on Firefox
- If still using Chrome: switch to Firefox
- Switch your default search engine to DuckDuckGo
- Re-run the fingerprint test after changes and compare results
- If Tier 2 or 3: enable Enhanced Tracking Protection in strict mode
- If Tier 2 or 3: try Firefox Multi-Account Containers
- If Tier 2 or 3: enable DNS over HTTPS in Firefox
- If considering a VPN: use Mullvad or ProtonVPN
Chapter 10 — Seeing Through the Noise
- Find a claim on social media that makes you feel something — write down what it claims, who made it, and what evidence is presented (do not share or react)
- Apply the SIFT framework: Stop, Investigate the source, Find better coverage, Trace claims to origin
- Practice SIFT on two more claims this week — one from a source you trust, one you don’t
- Set up a family code word for phone identity verification (defense against AI voice cloning)
- Bookmark primary source repositories: PACER, congress.gov, fbi.gov/vault, your state judiciary’s court records
Chapter 11 — When to Worry and When to Live
- Build your personal security checklist with three sections: permanent changes, scheduled maintenance (with frequency), and situational activations (with triggers)
- Set recurring calendar reminders for maintenance items (quarterly data broker opt-outs, app permission audits, HIBP checks, device updates)
- Review your checklist against the work from Chapters 2–10
Chapter 12 — The Hardest Skill
- Install Signal with one person who doesn’t have it yet — do it together, in person or on a call
- Move one existing group chat to Signal
- Teach one concept from this book to someone who hasn’t read it
- Record who you talked to, what you shared, how it landed, what resistance you encountered
- Complete the Level 1 self-assessment: field journal with threat model and security checklist; Signal with at least one active conversation; at least one teaching interaction documented; maintenance schedule set with calendar reminders
Level 2: Find Each Other
Chapter 13 — The First Conversation
- Conduct a one-to-one relational meeting with your Level 1 partner (45 minutes)
- Each person gets 15 minutes of uninterrupted speaking: Why do you care? What are you afraid of? What do you want to protect?
- Spend 10–15 minutes in open conversation about what you heard
- Record an impression in your field journal — what moved your partner, where concerns overlap, where they diverge
- Sit with the conversation for a day before moving on
Chapter 14 — Security Is a Conversation Now
- Share relevant parts of your individual threat models with your partner
- Identify your shared security floor — the minimum practices you both commit to
- Establish the starting floor: Signal with disappearing messages, alphanumeric passcode, current OS, notification previews off
- Agree on information boundaries: who knows about the partnership, what stays private
- Write the shared security floor down — both partners keep a copy
- Test the floor: Signal message with disappearing messages, verify Safety Numbers via QR code, confirm notification previews off
- Record what the conversation was like and what surprised you about your partner’s risk tolerance
Chapter 15 — How to See Your Neighborhood
- Each partner independently lists at least five people who have expressed concern about something local
- Map places where people gather face-to-face: churches, community centers, parks, diners, libraries, bleachers
- Identify what’s already happening: neighborhood associations, mutual aid groups, PTAs, community gardens
- Map at least ten potential people between you
- Compare maps — identify overlaps and divergences
- Write the map in your field journal — analog, not digital
- Note who has signaled readiness for more than complaining
Chapter 16 — The Approach
- Pick one person from your network map
- Talk to them in person — not text, not DM, not email
- Start with a local observation; listen for what they care about
- Share what you’ve been doing when it feels honest — don’t mention the journal, the model, or any program
- Invite curiosity, not commitment: “Would you want to talk more about this sometime?”
- If they say no, accept it gracefully
- Run the anti-manipulation check: Am I genuinely curious? Would I be fine if they said no? Am I sharing something true?
- Debrief with your partner — what happened, what surprised you
- Write in your field journal what you heard, not what you said
Chapter 17 — What You’re Building (And What Breaks It)
- Write a shared purpose statement with your partner — one sentence: “We’re here because…”
- Agree on three ground rules: one person speaks at a time; what’s shared stays here; when you disagree, say what you need
- Write the purpose statement and ground rules down physically
- Print the first-meeting script and bring it
- Assign three rotating roles: facilitator, note-taker, process-checker
- Hold the first meeting using the script: Opening (2 min), Go-Round #1 (15 min), Go-Round #2 (15 min), Prioritize (10 min), Closing (5 min)
- Write in your field journal: What worked? What was awkward? What surprised you?
Chapter 18 — The First Meeting
- Hold the first group meeting — three people, in person if possible
- Start and end on time
- Use all three roles: facilitator, note-taker, process-checker
- Bring food or drinks
- Each person writes individually in their field journal afterward
- Compare journal observations before the next meeting
- Assign the next facilitator before leaving; rotate all three roles
Chapter 19 — Security Culture Is Care
- Hold a meeting focused on group security — four conversations: communication platform, information boundaries, breach protocol, security champion
- Get everyone on Signal; hold a setup party to configure it together
- Enable disappearing messages (one week); verify Safety Numbers in person
- Agree on information boundaries and write them down
- Agree on blameless breach response: acknowledge, identify what made the mistake easy, adjust practices
- Assign a security champion for the first month (rotates monthly)
- Add all security agreements to your group’s operating document
Chapter 20 — The Platform Move
- If migrating: set up Signal group, hold setup party, configure all settings, verify Safety Numbers, set a sunset date for the old channel, delete the old group on that date
- If already on Signal: run a group audit — walk through every setting together
- Re-verify Safety Numbers with each person
- Record in your field journal: Did everyone move? Was there resistance? How did it resolve?
Chapter 21 — The Groan Zone
- Practice the consensus spectrum at your next meeting on a real decision: Agree, Reservations, Stand Aside, or Block
- Write group agreements together: How do we handle disagreement? What happens when someone is upset? How do we handle political disagreements? What happens when someone breaks a norm?
- Add agreements to your operating document
- Record: Did the group use the consensus spectrum? Did anyone block or stand aside?
Chapter 22 — Growing Without Breaking
- Identify two potential new members, each vouched for by a current member
- Conduct a one-to-one conversation with each candidate (Chapter 13 format)
- Share operating documents with new members before their first meeting
- Have the new person participate in a meeting
- Do a low-stakes shared activity with the new person
- Debrief as a group after each addition
- Pause between additions — stabilize before growing further
- Record: Who did you bring in? What changed when the group grew?
Chapter 23 — Who We Are (And How We Work)
- Run Story of Self: each person gets 2 minutes (challenge, choice, outcome)
- Run Story of Us: 15 minutes answering — What brought us together? What do we share? What are we building?
- Write down your Story of Us — something any member could tell a stranger in sixty seconds
- Formalize five infrastructure elements: role rotation schedule, fixed meeting rhythm, social element, accountability practice (“Who is doing what by when?”), debrief protocol (four questions on a card)
- Write infrastructure into your operating document
- Record: What was it like to hear five stories? Did the group resist any structural elements?
Chapter 24 — Teaching Each Other
- Hold a skill share: each person teaches something (15 min teach, 10 min practice, 5 min discuss)
- Use the popular education sequence: ask what the group knows, fill gaps, practice together
- Collaboratively write a one-page “first steps” guide for new members — plain language, no jargon
- Revisit and update the guide after a week
- Record: What did each person teach? What surprised you? What’s on the first-steps guide?
Chapter 25 — What Keeps You Together
- Hold an identity conversation (30 min): What brought us together? What keeps us together if urgency fades? What are we building that matters regardless?
- Write the answers as the group’s anchor document
- Discuss each person’s actual motivations for attending — name them honestly and write them down
- Make contact with one existing organization in your community
- Attend one of their meetings or events; introduce yourselves as neighbors
- Report back: What did you learn? Is there overlap? Do you trust them?
- Record: What surprised you in the identity conversation? Who did you connect with?
Chapter 26 — What Five People Can Do
- Complete a collective action: skill share, mutual aid delivery, community listening session, or group attendance at a public meeting
- Plan the action using all Level 2 skills: facilitation, roles, security culture, decision-making, coordination
- Debrief afterward: What did we try? What worked? What was hard? What next?
- Continue outward connections — attend events, map who’s working in your area
- When encountering other groups, assess how they work, not just what they say
- Write your answer to “What would you tell someone just starting?”
Level 3: Build Together
Chapter 27 — Two Circles
- Identify another group through behavioral recognition in shared civic spaces
- Designate boundary-spanners (ideally two per group)
- Decide as a group: what boundary-spanners can share, what you want to learn, what they cannot commit to
- Conduct at least two boundary-spanner meetings using the first-contact protocol (four questions: how did your group come together, what are you working on, what’s been hard, what does your community need)
- Return to your group and report honestly on the other group’s practices
- Record observations: alignment, misalignment, open questions
Chapter 28 — Shared Ground, Separate Rooms
- Each group designates a liaison; discuss role, boundaries, and rotation cadence with your full group first
- Liaisons create a shared Signal channel (just the two liaisons) with disappearing messages, notification previews off, Safety Numbers verified in person
- Conduct a shared threat model conversation: where does coordination create exposure, what information creates risk, what stays internal
- Write an inter-group information-sharing agreement using three categories: flows between groups, stays internal, requires consent
- Both groups keep a copy
- Review the agreement after your first joint action and adjust
Chapter 29 — Do Something Small Together
- Plan a joint action using the Midwest Academy Strategy Chart — small enough to succeed
- Divide responsibilities explicitly between both groups; document the division
- Execute the action
- Run a joint debrief within 48 hours (five questions: what did we try, what worked, what was hard, what would we change, what did we learn about working together)
- Record debrief findings: what you learned about working together, what you’d change
Chapter 30 — Decisions Without a Boss
- At a joint meeting, adopt consent-based decision-making through a spokes council; designate spokes, define mandates, set rotation and cadence
- Map decision domains together: internal, joint, individual, gray areas — spend real time on the gray areas
- Practice a real consent decision through the spokes council
- Write a coalition agreement: who’s in, how decisions are made, what’s shared vs. autonomous, how disagreements are handled, how the agreement changes
- File governance documents in the field journal
Chapter 31 — The Landscape Around You
- At a joint meeting, map your institutional landscape: name, constituency, overlap, engagement history, partnership opportunity, co-optation risk
- Make one institutional contact as a network — attend an event, invite a representative, or propose a collaboration
- Check the ICNL US Protest Law Tracker for your state
- Download and distribute ACLU Know Your Rights guides to all network members
- Identify your nearest NLG chapter and local legal aid organizations
- Conduct a 30-minute legal orientation at a joint meeting
- Document the institutional map, legal resources, and notes from your first institutional contact
Chapter 32 — What Holds When It’s Hard
- Conduct a network health check: workload distribution, operating pace, what’s working, who’s close to stepping back, what absorbs a transition
- Document results and compare to previous assessments (or establish the baseline)
- Practice the peer mediation protocol — run a simulation with a plausible scenario even if no real conflict exists
- Walk through the full protocol: separate preparation, opening statements, diagnostic question, resolution spectrum, documented outcome
- If ready: explore a third-group connection using behavioral recognition and the Chapter 27 protocol
- Implement rotating coordination roles with explicit descriptions and term limits
- Build explicit permission to rest into the coalition agreement
- Name whether the network is at crisis pace or sustaining pace
Chapter 33 — More Than the Sum
- Identify the two or three government bodies most relevant to your community
- Assign groups to attend their next meetings on a rotating basis
- Each observer uses the observation template: date, body, attendance, agenda vs. discussion, decisions, surprises
- Share observations through the liaison channel
- Discuss findings at the next spokes council meeting
- Make civic monitoring a sustainable ongoing rotation
- File a public records request on a specific issue surfaced by monitoring or community knowledge
- Share what you file and receive through the liaison channel
- Add civic monitoring updates as a standing spokes council item
Chapter 34 — Shared Principles, Separate Paths
- At a joint meeting, write shared principles using four questions: What brought our groups together? What holds us together? What commitments do we share? What do we refuse to do?
- Aim for three to seven principles; write them together
- Schedule a review at a defined interval
- Distribute and discuss Freeman’s “Tyranny of Structurelessness” (jofreeman.com) using three diagnostic questions: Where is informal hierarchy? Where is structure helping? Where is it constraining?
- If growing: run the onboarding protocol (boundary-spanner meetings, probationary period, shared principles review, consent-based admission)
- If not growing: revisit and update the coalition agreement
- Document shared principles — date it, note who was present, note principles that generated significant discussion
Chapter 35 — What You’d Tell Someone Starting
- Meeting 1: work through four starter kit questions (essential skills, protocols that worked, what you learned the hard way, what you’d tell someone starting); assign drafting teams
- Each team produces a rough draft before the next meeting
- Meeting 2: bring sections together, read aloud, discuss gaps and redundancy
- Meeting 3: incorporate revisions, produce a final version the network agrees on
- Share through the liaison channel
- Discuss who beyond the network should receive the starter kit
- Keep it short enough to read in a single sitting
Chapter 36 — The Path Is People
- Look at what the network has built — people, practices, infrastructure, connections — and sit with it
- Write what you would tell the person you were at the beginning
- Write it for whoever comes next
- Record a snapshot of the network: groups, projects, functioning systems, unresolved challenges
- Date the snapshot