top of page


This is what I will do on the day Democracy dies.

This comprehensive strategy is designed with the specific purpose of protecting groups most at risk during such political transitions—political activists, minority communities, LGBTQ+ individuals, and other groups that frequently find themselves targeted by regimes and movements hostile to democratic norms. (i.e. MAGA)

The intent of this strategy is to offer a dual-phased approach that prepares for both pre-election and post-election scenarios. By doing so, we aim to ensure that the rights and safety of at-risk populations are maintained regardless of political developments. The strategy encompasses a series of actions focused on enhancing data privacy, establishing covert safe havens, and creating paper organizations to provide both legal and social cover. Each element has been carefully crafted to blend into the community seamlessly, thereby minimizing the risk of detection and retaliation by potential adversaries, including groups like MAGA, known for their hostility towards certain demographics and ideologies.

The details outlined here are not merely precautionary; they are essential in a time when political unpredictability can lead to sudden and severe consequences for those standing on the front lines of advocacy and social change. This introduction sets the stage for a strategy that is both protective and adaptive, ensuring that all measures are grounded in a deep understanding of the risks involved and the absolute necessity for discretion and thoroughness.

Background Context

Political Climate Overview

The global political landscape is currently characterized by increasing instability and a troubling shift toward authoritarian governance. This trend manifests distinctly in various regions, contributing to a world where democratic principles are routinely challenged and often undermined.

  • Increasing Volatility: Across the globe, nations are experiencing heightened political instability which, in many cases, precipitates the rise of authoritarian rule. This instability often stems from economic distress, social unrest, or perceived governmental inefficiencies, which authoritarian figures exploit to consolidate power.

  • Shifts Toward Authoritarianism: Recent years have seen several governments adopt practices that are starkly authoritarian. Examples abound where states have suppressed free speech through censorship, manipulated electoral processes to maintain power, and systematically weakened the independence of the judiciary. These actions not only compromise the checks and balances essential to democratic governance but also threaten the fundamental rights and freedoms of their citizens.

  • Hostility Towards Democratic Norms: A significant rise in movements and ideologies that oppose democratic norms has been noted, often under the banners of nationalism or populism. These movements exploit fears and prejudices, rallying support through divisive and sometimes xenophobic rhetoric, posing a direct threat to the pluralistic fabric of societies.

Vulnerable Groups

In this increasingly authoritarian environment, certain groups find themselves particularly vulnerable to persecution and discrimination. Their exposure to risk is exacerbated by their visibility and their perceived opposition to authoritarian values and practices.

  • Political Activists: Typically the first in the line of fire, political activists face significant dangers under authoritarian shifts. Their efforts to organize opposition, promote democratic values, and protect human rights often make them targets for harassment, arbitrary detention, and worse, as they are viewed as direct threats to authoritarian interests.

  • Minority Communities: Ethnic, racial, and religious minorities frequently endure increased discrimination and violence when authoritarian regimes rise to power. Such regimes often scapegoat these communities, enacting policies that strip them of their rights and freedoms, and in some cases, actively encourage acts of violence and persecution against them.

  • LGBTQ+ Individuals: LGBTQ+ communities are exceedingly vulnerable under more conservative or outright authoritarian regimes. They may face draconian legislation, social ostracism, and violence. These measures not only threaten their personal safety but also seek to erase their presence from public life.

  • Other At-Risk Populations: Refugees, immigrants, and individuals with dissenting ideological views are also at significant risk. They may confront stricter immigration controls, risk of expulsion, and exclusion from political participation. Under authoritarian regimes, these groups often experience a harsh curtailing of their freedoms and a denial of their right to partake in society.

The Threat of Project_2025

A specific example of these growing threats is the emergence of initiatives like Project_2025, which symbolize the strategic and organized efforts by authoritarian groups to reshape societies according to their ideologies. Project_2025 is often cited as a blueprint for systemic change intended to dismantle current democratic frameworks and replace them with systems that suppress dissent and centralize power. This project is not merely a theoretical risk but a concrete plan that could lead to significant repression of any form of resistance or criticism.

This background context sets the stage for understanding the critical need for a robust strategy to protect vulnerable groups and preserve democratic norms. The following sections will delve into the specifics of pre-election and post-election strategies designed to counter these threats and safeguard the fundamental rights and freedoms of those at risk.


Pre-Election Strategy: Part 1 - Data Privacy and Social Media Scrubbing



The primary objective of this part of the strategy is to safeguard personal data to protect individuals from potential threats in a politically unstable environment. By minimizing the digital footprint, the strategy aims to prevent hostile entities from using online activities and histories against individuals, especially those active in movements or communities that could be targeted in a regime shift.


Importance of Data Privacy

In the context of potential authoritarian shifts, personal data on digital platforms can be weaponized against individuals. This includes identifying personal networks, political stances, and other sensitive information that could lead to harassment or worse. Protecting this data is not just about privacy; it's about maintaining personal safety and freedom in the face of growing surveillance and repression.



Timing and Planning

  • When to Begin:

    • Initiate the data scrubbing process six months prior to critical political events, like elections or significant legislative changes, to ensure that the data is irrecoverable by the time these events occur.

  • How to Plan:

    • Set up a phased plan that includes initial assessments, periodic reviews, and final checks. This plan should cover all platforms where personal data might be stored, from social media to cloud storage services.

Content Removal

  • Types of Content to Remove:

    • Political Statements: Remove posts or likes that clearly align with specific political ideologies or opposition movements. For example, deleting tweets supporting political protests or Facebook posts criticizing government policies.

    • Group Affiliations: Withdraw from public or semi-public social media groups that are directly associated with activist movements or politically sensitive causes. For instance, leaving a Facebook group dedicated to organizing protest events.

    • Personal Beliefs: Scrub any content that expresses strong ideological beliefs that could be targeted under a new regime, such as blog posts advocating for controversial reforms or Instagram posts supporting marginalized communities.

  • Reasons for Removal:

    • Removing such content significantly reduces the risk of being targeted based on historical data. This proactive step is crucial for individuals who could be directly impacted by policy changes, ensuring that their online presence does not inadvertently expose them to risks.

Privacy Education

  • Educational Initiatives:

    • Workshops and Seminars: Conduct these sessions focusing on teaching effective methods for securing online profiles and handling personal data. For example, a seminar could demonstrate how to use Facebook’s privacy settings to hide past posts and tighten profile visibility.

    • Online Resources: Develop comprehensive guides that detail steps for data auditing on popular platforms like Twitter, LinkedIn, and Google. These guides would offer instructions on reviewing and deleting old posts, checking app permissions, and understanding privacy policies.

    • Community Outreach: Collaborate with local libraries, schools, and community centers to spread awareness about the importance of data privacy. This might include setting up informational booths, distributing flyers, or hosting Q&A sessions with privacy experts.


  • Example of Effective Content Removal: Jane Doe, an activist, reviewed her Twitter account and removed tweets that could be controversial. She deleted tweets advocating for large-scale protests and any direct criticisms of political figures known for their harsh retaliation against dissenters.

  • Community Education Example: A community center hosts a monthly workshop where participants are taught how to scrub their digital footprints effectively. These workshops provide hands-on training on privacy settings for major social networks and strategies for minimizing personal data exposure online.

This refined approach to data privacy ensures that individuals are not only aware of the risks but are also equipped with the tools and knowledge to protect themselves effectively. By systematically reducing their digital footprint, individuals can navigate politically turbulent times with greater security and confidence.

Pre-Election Strategy: Part 2 - Establishment of Covert Safe Havens in Plain Sight


The primary purpose of creating covert safe havens is to provide secure and discrete support networks for vulnerable individuals in anticipation of potential political instability. These havens are designed to integrate seamlessly into everyday community settings, offering legitimate public functions while maintaining a dual capability to protect and assist those in need. This approach ensures that these safe havens can operate without attracting undue attention, blending naturally into their environments while fulfilling their protective roles. By carefully selecting and managing these dual-functionality locations, this strategy not only provides vital support and protection for vulnerable individuals but also ensures that these safe havens remain sustainable and integrated within their communities. This seamless integration into everyday life is key to maintaining the operation's discretion and effectiveness, safeguarding those at risk while minimizing the chance of detection.


Selection of Locations

Choosing the right locations is critical to the effectiveness and discretion of these safe havens. The criteria for selecting these locations include:

  • Community Integration:

    • Locations should be well-integrated within the community, serving as familiar and accepted places that naturally attract a diverse range of clientele. This integration helps the safe haven to appear ordinary and unremarkable, reducing the likelihood of scrutiny.

  • Visibility and Accessibility:

    • While the locations should be visible enough to be considered a normal part of the community, they must also feature private spaces such as basements, cellars, or back rooms. These areas should be easily accessible to those in need without drawing attention from the general public.

  • Economic Viability:

    • It is essential that these locations can sustain a legitimate business model. This not only supports the community financially but also underpins the covert operations, ensuring they can continue without financial strain or suspicion.


These locations must adeptly balance their public and covert functionalities:

  • Public Business Functions:

    • Types of Businesses: The strategy focuses on establishments like coffee shops, bars, community farms, maker spaces, and recreational venues like RV parks or camping grounds. These businesses are generally well-received and frequented by the public, providing a solid cover for the covert activities.

    • Community Services: Each business should offer valuable services such as food production, educational workshops, or leisure activities. These services contribute positively to the community, enhancing the business's credibility and integration.

  • Covert Support Functions:

    • Plausible Dual Use Areas: Utilize existing structures that naturally offer privacy, like root cellars on farms or basements in urban buildings. These spaces should be typical of the property and require minimal adjustment to serve as safe areas, thus avoiding any construction that might appear suspicious or clandestine.

    • Transport Services: Implement transportation services that align with the business model. For example, a delivery service from a farm or a mobile workshop from a construction site can double as a method for safely moving individuals in need. This strategy includes using common roles like Uber drivers for transportation, where the individual being transported is actually posing as the uber driver for a white family, blending into a service role, reducing visibility and suspicion from MAGA.

Implementation Examples

  • Farm Example:

    • Location: A community-supported agriculture (CSA) farm that is well-known for its fresh produce and community engagement through regular farm festivals and events.

    • Dual Functionality: The farm features a large barn or a root cellar typically used for storing seasonal equipment and produce. This can also provide temporary shelter, offering a safe and private space for at-risk individuals. The regular turnover of visitors and workers for legitimate agricultural purposes ensures that any additional traffic blends in without arousing suspicion. Furthermore, depending on the last two minutes of hate, MAGA may overlook minorities or immigrants if they are in a non-lucrative looking service role, such as produce picker.

  • Maker Space in Urban Area:

    • Location: Situated in a bustling mixed-use neighborhood, this maker space is a hub for creativity and innovation, offering classes in carpentry, electronics, and more.

    • Dual Functionality: Besides the public workshop area, there's a secure back area designed for project storage. This space can also function as a discreet meeting point or temporary safe area for individuals who require shelter or a momentary escape from external threats. Furthermore, a maker space is a place full of tools, skilled craftspeople, and materials that can be repurposed for other uses, such as [ REDACTED ].

Pre-Election Strategy: Part 3 - Formation of Paper Organizations




The primary goal of forming paper organizations is to establish entities that provide legal and social fronts for covert operations, safeguarding vulnerable groups. These organizations serve to legitimize and camouflage the broader protective activities under the guise of engaging in widely accepted or non-controversial community functions. By strategically leveraging these types of organizations, the strategy ensures that protective measures are embedded within non-controversial, community-valued services. This careful planning helps maintain the sustainability of the operations, reduces the risk of exposure, and enhances the long-term viability of protecting vulnerable populations amidst political turbulence.




Types of Organizations


Select organizations that are universally accepted and less likely to attract negative attention from antagonistic groups such as MAGA:

  • Sports Clubs and Teams:

    • Focus on sports that are popular and carry positive, community-building connotations. These organizations can organize local leagues, tournaments, and training sessions, serving as a natural gathering point for the community and a cover for larger mobilization efforts.

  • Garden Clubs:

    • Establish co-ops or community gardens that involve activities related to food production, which are generally viewed positively and align with subsistence and sustainability goals. These can also serve as educational centers for farming techniques, appealing to a broad segment of the community.

  • Kennel Clubs:

    • Set up organizations centered around animal care, such as dog training clubs or equestrian schools. These activities appeal to animal lovers and are unlikely to draw suspicion from conservative groups. They also provide opportunities for fundraising and community involvement.

Operational Setup

  • Compliance with Local Laws:

    • All organizations must operate within the legal framework, ensuring they do not attract scrutiny that could lead to uncovering their covert purposes.

  • Maintenance and Oversight:

    • Regularly review and maintain operational protocols to keep the organizations effective and compliant. This includes keeping financial records clean and transparent to avoid audits that could expose the dual functions.

  • Integration with Safe Havens:

    • Use these organizations as legal fronts or logistical hubs for the covert safe havens, facilitating communication and resource distribution discreetly. They can serve as rallying points for community support without directly exposing the linked covert operations.

Implementation Examples

  • Community Sports Club:

    • Setup: A local soccer club that hosts regular matches and youth training camps. It is deeply integrated into the community, providing a robust platform for events that can serve broader agendas.

    • Dual Functionality: Leverage the club’s events for discreetly organizing meetings and transporting supplies under the guise of sports activities, utilizing equipment transport as a cover for moving sensitive materials.

  • Garden Club:

    • Setup: A cooperative that offers memberships for local produce and hosts regular workshops on sustainable farming practices.

    • Dual Functionality: Use the co-op’s storage facilities and workshops as discreet points for gathering and distributing resources, you can grow food for poor people under the pretense of agricultural activities.

  • Dog Training Club:

    • Setup: Organize a club that offers dog obedience classes and therapy animal training, which can attract a wide array of participants.

    • Dual Functionality: Utilize the club’s regular gatherings and the innocuous nature of its activities to conduct meetings and organize volunteer networks for covert operations, masked by the club’s community-focused events. This can be a double edged sword, but you can tell a lot about a person by how they treat animals. Furthermore, trained dogs have their uses.

Section 3: Post-Election Strategy - Pivoting Operations


  • Activate and utilize the full scope of prepared safe havens and paper organizations in response to the election outcomes.

  • Protect individuals from potential crackdowns or aggressive measures by newly empowered government authorities targeting vulnerable groups.

Overall Strategic Actions

  1. Activate Covert Safe Havens and Paper Organizations:

    • Evaluate the political environment post-election and determine the level of threat to vulnerable communities.

    • Activate contingency plans in prepared safe havens and paper organizations to provide immediate support and protection.

  2. Utilize Established Networks and Resources:

    • Employ pre-arranged logistics and support systems to distribute resources, provide shelter, and facilitate the safe movement of individuals at risk.

  3. Community Integration Strategies:

    • Deepen involvement in local community activities that are non-political and broadly supported to avoid backlash.

    • Increase participation in community service projects that enhance local development and provide essential services, reinforcing the organization's value to the community and obscuring its protective roles.

Examples of Pivoting Operations Using Small Businesses

  1. Carpet Cleaning Services:

    • Use service vans for discreet transportation of individuals and supplies, leveraging routine operations as cover.

    • Legend has it that Cleopatra was smuggled into court rolled up in a carpet.

  2. Landscaping and Gardening Services:

    • Employ landscaping crews to offer jobs and shelter in modified storage units, providing a plausible reason for the movement and congregation of workers.

    • MAGA has no respect for minorities, but they like mowed lawns. Transporting people of color in the guise of lawn care workers will usually be ignored.

  3. Mobile Pet Grooming Services:

    • Utilize pet grooming vans to distribute resources discreetly and move individuals between safe locations under the guise of service calls.

    • Pet first aid equipment can also be used on two legged mammals.

  4. Food Trucks:

    • Operate food trucks to serve dual purposes—providing food to vulnerable populations and acting as mobile meeting points for logistics coordination.

    • Food trucks can have electronic messaging services, connected to GPS, and deliver data just by driving by.

  5. House Painting Businesses:

    • Leverage access to residential areas and use vans for safely relocating individuals under the guise of transporting workers and supplies.

    • Cans of paint can be used to store all sorts of things.

  6. Residential Cleaning Services:

    • Use cleaning teams for discreet distribution of supplies and temporary housing solutions, under the guise of deep-cleaning or house-sitting services.

  7. Plumbing and Electrical Services:

    • Dispatch tradespeople to carry necessities and check on at-risk individuals without drawing attention, using routine service calls as cover.

    • Plumbers carrying large pipe shaped constructions are less suspicious.

  8. Bicycle Repair Shops:

    • Implement mobile bicycle repair services for flexible and discreet transport of supplies and aid.

    • Bicycle frame tubes can have dual uses.

  9. Fitness and Personal Training Services:

    • Use private training sessions to provide physical and mental support discreetly, checking on individuals’ well-being under the guise of health and wellness coaching.

    • A fitness bootcamp fun run can be an actual bootcamp.

  10. Local Bakery or Pizzeria Delivery Services:

    • Use delivery operations to routinely check on community members under the routine delivery of food, covering a broad area without suspicion.

    • Bakers are up early every day without drawing suspicion.

Monitoring and Adaptation

  • Continuously Monitor the Political and Social Environment:

    • Regular assessments to adapt operations effectively, ensuring ongoing safety and effectiveness.

    • Ready to expand the scope of operations or alter methods based on emerging needs and threats.

Legal Navigation

  • Strategically Navigate Laws:

    • Ensure all activities remain compliant yet structured to conceal their true purposes, adapting to any new legal challenges post-election. MAGA does not have respect for Rule-Of-Law, but low level MAGAts will usually follow the law if it is the course of lease resistance.



Examples of Pivoting Operations for Employees in Large Businesses

1. Data Privacy Enhancements

  • Employee Action: IT staff increase encryption and security measures, adding features like data obfuscation and deliberate vulnerabilities that make data tracking and user identification more difficult for unauthorized entities.

  • Discretionary Element: These changes are publicly promoted as new advanced security measures to protect customer data from increasing global cyber threats.

2. Supply Chain Redistribution

  • Employee Action: Supply chain managers discreetly inform resistance networks about locations and times of important emergency supplies shipments under the guise of optimizing logistics for efficiency.

  • Discretionary Element: Publicly, these changes are announced as strategic adjustments to better meet the dynamic needs of markets and reduce operational costs.

3. Corporate Philanthropy Redirection

  • Employee Action: Executives redirect corporate philanthropy funds to support 'capitalist' endeavors that indirectly benefit resistance efforts, such as investing in businesses owned by at-risk community members.

  • Discretionary Element: These investments are framed as exploring new market opportunities and potential high-growth areas, appealing to shareholder interests.

4. Product Development with Hidden Features

  • Employee Action: Product managers design products that incorporate raw materials which can be easily repurposed or integrated with features that allow resistance networks to piggyback communications.

  • Discretionary Element: These products are marketed as innovative and versatile, with the added functionalities promoted as providing extra value to consumers.

5. Legal Department Advocacy Against Harmful Laws

  • Employee Action: Company lawyers actively challenge laws from Project_2025 that might impose severe surveillance measures detrimental to business operations, like mandatory data sharing with government bodies.

  • Hypothetical Law: "All telecommunications companies are required to install government monitoring software." (I mean, they already have it, but bear with me here, this is an example)

  • Discretionary Element: Legal challenges are framed as protecting the company's competitive edge and customer trust.

6. Marketing Campaigns with Subtle Messages

  • Employee Action: Marketing teams develop campaigns that subtly endorse themes of resilience and unity, using coded language that resonates with resistance supporters.

  • Hypothetical Campaign: Launch a national campaign for a telecommunications product under the slogan "Stay Connected, Stay Strong," which subtly encourages unity and resilience. I'm not in marketing, so I really don't know how to not sound like 1984.

  • Discretionary Element: Campaigns are officially aimed at boosting brand loyalty and market presence during turbulent times.

7. Community Engagement for Resource Distribution

  • Employee Action: Community relations staff organize local events that double as distribution points for essential supplies to at-risk populations, such as geriatric health fairs or local business expos.

  • Discretionary Element: These events are positioned as part of corporate efforts to engage with potential customers, masking their dual purpose.

8. Internal Training on Privacy and Security

  • Employee Action: Implement training programs that ostensibly enhance employee awareness about privacy and security but also educate them on how to discreetly handle sensitive information about at-risk colleagues.

  • Discretionary Element: Training is marketed internally as essential upskilling in response to global increases in data breaches and cyber threats.

9. R&D for Dual-Use Technologies

  • Employee Action: R&D staff focus on developing technologies that can be used both commercially and to aid resistance efforts, such as drones designed for commercial delivery that can also be used for discreet surveillance or off the books deliveries. Police radios that can be used to track the police.

  • Discretionary Element: The dual-use nature of these technologies is touted as a cost-effective solution to multiple market needs.

10. Strategic Public Relations

  • Employee Action: PR teams craft narratives around corporate actions that align with resistance goals, framing them as innovative responses to market demands or regulatory changes. (i.e. We think different! We're the rebels from StarWars. ) (Note: It's a trap!)

  • Discretionary Element: These narratives emphasize the corporation's adaptability and forward-thinking, which is attractive to investors and customers alike, while subtly supporting resistance efforts.

In the face of rising authoritarianism and potential threats, it's understandable to feel overwhelmed by the detailed strategies and safety measures we've outlined. However, it's important not to let panic set in. The purpose of these strategies is not to alarm you but to prepare and empower you and your community.

For many of us, blending seamlessly into our surroundings comes naturally and doesn’t require drastic changes to our daily lives. For those who cannot hide—the most visible and vulnerable among us—it becomes not only an option but a responsibility for their allies to step up and implement these strategies. This dual approach ensures that while some continue their lives with minimal disruption, others work behind the scenes to maintain safety nets and support systems. This collective effort is what builds a robust resistance movement capable of withstanding pressures and protecting its members from harm. It's not just about individual safety; it's about community resilience.

By taking proactive steps now, we ensure that everyone has the support they need to face whatever may come. This strategy is about being ready, not scared. It’s about building a network of support that can operate effectively under pressure while maintaining a facade of conformity to protect all its members.

Let’s focus on being prepared and connected, on understanding our roles, and on supporting each other. With careful planning and solidarity, we can navigate these challenges without fear, safeguarding our rights and freedoms in the process. Remember, the goal here is to keep the light of democracy burning, no matter how dark the times may seem.

sorry if my formatting is all over the place. This is jumble of my notes. I figure perfect is the enemy of good, and some of you have some anxiety over this. The rest of you...should....But It's going to be OK, because we have feet and hands and arms, and we can MAKE it OK.

bottom of page