Situation Index
Individual Security
You want to understand what data you’re already broadcasting Chapter 1 — location history audit on iPhone and Android.
Your phone is leaking data to brokers and law enforcement Chapter 2 — advertising ID deletion, app permission audit, field journal setup, lateral research technique.
You feel anxious about surveillance but don’t know where to start Chapter 3 — EFF five-question threat model, tier classification (Tier 1/2/3).
Your passwords are reused or weak Chapter 4 — Bitwarden setup, two-factor authentication hierarchy (SMS → authenticator app → hardware key), HaveIBeenPwned breach check.
Your conversations aren’t encrypted Chapter 5 — Signal installation, disappearing messages, Registration Lock, content vs. metadata distinction.
You don’t know what surveillance infrastructure exists in your area Chapter 6 — ALPR, facial recognition, cell-site simulators, social media monitoring; EFF Street-Level Surveillance atlas.
You want to understand how state surveillance has historically targeted organizers Chapter 7 — COINTELPRO tactics and modern equivalents, legal phrases for encounters with law enforcement, ACLU Know Your Rights.
Your personal information is publicly searchable online Chapter 8 — data broker opt-out workflow (TruePeopleSearch, Spokeo, Whitepages, BeenVerified, Radaris), Google “Results About You,” Optery scan, username reuse audit.
Your browser is tracking you across sites Chapter 9 — Cover Your Tracks fingerprint test, Firefox hardening, uBlock Origin, DuckDuckGo, DNS over HTTPS, VPN selection (Mullvad, ProtonVPN).
You need to verify whether something you’ve seen is true Chapter 10 — SIFT method (Stop, Investigate source, Find better coverage, Trace claims), lateral reading, family code word protocol for AI voice cloning.
You’re overwhelmed by security practices and burning out Chapter 11 — three-mode security organization (daily habits, scheduled maintenance, situational activations), personal security checklist template.
You want to help someone else adopt security practices Chapter 12 — MINDSPACE behavioral framework, persuasion matching by case study, Signal adoption workflow, Level 1 readiness self-assessment.
Group Formation
You’re ready to find one person to work with Chapter 13 — one-to-one relational meeting (IAF model), 45-minute structured listening conversation.
You and a partner need shared security practices Chapter 14 — shared security floor, weakest-link model, bootstrapping paradox, harm reduction philosophy.
You want to find potential group members in your area Chapter 15 — neighborhood mapping (people, gathering places, existing organizations), geographic anchoring, weak ties.
You need to have a first conversation with someone new Chapter 16 — the approach framework (shared observation, listen for care, share honestly, invite curiosity), graduated identity revelation.
You’re preparing for your group’s first meeting Chapter 17 — purpose statement, three ground rules, first-meeting script, three rotating roles (facilitator, note-taker, process-checker).
You’re running your first meeting Chapter 18 — script execution, time discipline, role rotation, post-meeting field journal reflection.
Your group needs security agreements Chapter 19 — four group security conversations (platform, information boundaries, breach protocol, security champion), setup party, blameless breach protocol.
Your group needs to move off an insecure platform Chapter 20 — Signal group configuration checklist, migration timeline (setup party → parallel running → sunset date), Safety Number verification.
Your group is stuck in disagreement and it feels like failure Chapter 21 — groan zone concept, consensus spectrum (Agree → Reservations → Stand Aside → Block), “I” statement structure, graduated response (Ostrom’s model).
You’re adding new members without fracturing the group Chapter 22 — concentric circles model (public/operational/sensitive), onboarding sequence (vouching → one-to-one → document review → first meeting → shared activity → full membership), post-addition debrief.
Your group needs a shared identity and sustainable infrastructure Chapter 23 — Story of Self protocol, Story of Us protocol, peer coaching debrief card, five infrastructure elements, operating document.
Your group depends too much on one person’s knowledge Chapter 24 — skill share format (15 min teach, 10 min practice, 5 min discuss), popular education sequence, first-steps guide, authority transfer.
The original urgency that brought your group together is fading Chapter 25 — identity conversation protocol, motivation mapping, outward connection guide, motivational diversification.
Your group is ready to act but unsure when or how Chapter 26 — collective action planning checklist, debrief protocol, behavioral recognition markers for identifying other organized groups, readiness as threshold.
Network Coordination
Recognizing and vetting another group Chapter 27 — behavioral recognition, boundary-spanner protocol, Zaheer’s inter-organizational trust framework.
Establishing shared security across groups Chapter 28 — inter-group information-sharing agreement, compartmentalization as care, liaison communication model.
Planning and debriefing joint actions Chapter 29 — first joint action design, the debrief-as-learning framework, complementary action model.
Governance and decision-making Chapter 30 — consent-based governance, decision domain mapping, spokes council structure, coalition agreement template.
Navigating institutions and geographic difference Chapter 31 — co-optation dynamics, complementary partnership model, rural coordination adaptations.
Handling inter-group conflict and sustaining the network Chapter 32 — three-step escalation protocol, network health check, rotating roles.
Civic monitoring and shared infrastructure Chapter 33 — Observer Corps model, FOIA as civic tool, network-level civic infrastructure.
Shared principles and structural accountability Chapter 34 — Freeman’s structurelessness diagnostic, shared principles process, onboarding protocol.
Producing materials for others Chapter 35 — near-peer teaching, starter kit framework, reproduction as completion.