Situation Index


Individual Security

You want to understand what data you’re already broadcasting Chapter 1 — location history audit on iPhone and Android.

Your phone is leaking data to brokers and law enforcement Chapter 2 — advertising ID deletion, app permission audit, field journal setup, lateral research technique.

You feel anxious about surveillance but don’t know where to start Chapter 3 — EFF five-question threat model, tier classification (Tier 1/2/3).

Your passwords are reused or weak Chapter 4 — Bitwarden setup, two-factor authentication hierarchy (SMS → authenticator app → hardware key), HaveIBeenPwned breach check.

Your conversations aren’t encrypted Chapter 5 — Signal installation, disappearing messages, Registration Lock, content vs. metadata distinction.

You don’t know what surveillance infrastructure exists in your area Chapter 6 — ALPR, facial recognition, cell-site simulators, social media monitoring; EFF Street-Level Surveillance atlas.

You want to understand how state surveillance has historically targeted organizers Chapter 7 — COINTELPRO tactics and modern equivalents, legal phrases for encounters with law enforcement, ACLU Know Your Rights.

Your personal information is publicly searchable online Chapter 8 — data broker opt-out workflow (TruePeopleSearch, Spokeo, Whitepages, BeenVerified, Radaris), Google “Results About You,” Optery scan, username reuse audit.

Your browser is tracking you across sites Chapter 9 — Cover Your Tracks fingerprint test, Firefox hardening, uBlock Origin, DuckDuckGo, DNS over HTTPS, VPN selection (Mullvad, ProtonVPN).

You need to verify whether something you’ve seen is true Chapter 10 — SIFT method (Stop, Investigate source, Find better coverage, Trace claims), lateral reading, family code word protocol for AI voice cloning.

You’re overwhelmed by security practices and burning out Chapter 11 — three-mode security organization (daily habits, scheduled maintenance, situational activations), personal security checklist template.

You want to help someone else adopt security practices Chapter 12 — MINDSPACE behavioral framework, persuasion matching by case study, Signal adoption workflow, Level 1 readiness self-assessment.


Group Formation

You’re ready to find one person to work with Chapter 13 — one-to-one relational meeting (IAF model), 45-minute structured listening conversation.

You and a partner need shared security practices Chapter 14 — shared security floor, weakest-link model, bootstrapping paradox, harm reduction philosophy.

You want to find potential group members in your area Chapter 15 — neighborhood mapping (people, gathering places, existing organizations), geographic anchoring, weak ties.

You need to have a first conversation with someone new Chapter 16 — the approach framework (shared observation, listen for care, share honestly, invite curiosity), graduated identity revelation.

You’re preparing for your group’s first meeting Chapter 17 — purpose statement, three ground rules, first-meeting script, three rotating roles (facilitator, note-taker, process-checker).

You’re running your first meeting Chapter 18 — script execution, time discipline, role rotation, post-meeting field journal reflection.

Your group needs security agreements Chapter 19 — four group security conversations (platform, information boundaries, breach protocol, security champion), setup party, blameless breach protocol.

Your group needs to move off an insecure platform Chapter 20 — Signal group configuration checklist, migration timeline (setup party → parallel running → sunset date), Safety Number verification.

Your group is stuck in disagreement and it feels like failure Chapter 21 — groan zone concept, consensus spectrum (Agree → Reservations → Stand Aside → Block), “I” statement structure, graduated response (Ostrom’s model).

You’re adding new members without fracturing the group Chapter 22 — concentric circles model (public/operational/sensitive), onboarding sequence (vouching → one-to-one → document review → first meeting → shared activity → full membership), post-addition debrief.

Your group needs a shared identity and sustainable infrastructure Chapter 23 — Story of Self protocol, Story of Us protocol, peer coaching debrief card, five infrastructure elements, operating document.

Your group depends too much on one person’s knowledge Chapter 24 — skill share format (15 min teach, 10 min practice, 5 min discuss), popular education sequence, first-steps guide, authority transfer.

The original urgency that brought your group together is fading Chapter 25 — identity conversation protocol, motivation mapping, outward connection guide, motivational diversification.

Your group is ready to act but unsure when or how Chapter 26 — collective action planning checklist, debrief protocol, behavioral recognition markers for identifying other organized groups, readiness as threshold.


Network Coordination

Recognizing and vetting another group Chapter 27 — behavioral recognition, boundary-spanner protocol, Zaheer’s inter-organizational trust framework.

Establishing shared security across groups Chapter 28 — inter-group information-sharing agreement, compartmentalization as care, liaison communication model.

Planning and debriefing joint actions Chapter 29 — first joint action design, the debrief-as-learning framework, complementary action model.

Governance and decision-making Chapter 30 — consent-based governance, decision domain mapping, spokes council structure, coalition agreement template.

Navigating institutions and geographic difference Chapter 31 — co-optation dynamics, complementary partnership model, rural coordination adaptations.

Handling inter-group conflict and sustaining the network Chapter 32 — three-step escalation protocol, network health check, rotating roles.

Civic monitoring and shared infrastructure Chapter 33 — Observer Corps model, FOIA as civic tool, network-level civic infrastructure.

Shared principles and structural accountability Chapter 34 — Freeman’s structurelessness diagnostic, shared principles process, onboarding protocol.

Producing materials for others Chapter 35 — near-peer teaching, starter kit framework, reproduction as completion.