By Anonymous and Decay
Panic and paranoia are counterproductive — stop wondering what will happen, or why nothing’s happening. If we’re going to survive the ongoing collapse of capital and empire, we need to be able to identify our goals and work to catalyze the conditions they require. Now is the time to stand up for ourselves and our communities, not kneel before we’re commanded to do so. If you don’t know where to start, here’s a rough guide to community organizing, rapid response networks, and emergency planning.
COMMUNITY ORGANIZING
(adapted from A Civilian’s Guide to Direct Action — CrimethInc)
First of all… Brainstorming: Choose a project (ex. providing groceries to those who cannot leave their homes) and devise a plan. Establish the goals, scope, and timeline of your project.
Structure: Start small. Work tightly with those you know and bring in other individuals and groups thoughtfully. Make sure power and responsibilities are distributed evenly within your group to avoid burnout.
Groundwork: Study the existing infrastructure, gather supplies and equipment, scout the location(s), and begin to divide up roles (ex. food procurement, drivers, community outreach) according to the scale of your project and group.
During and after actions: Stay alert; keep each other informed of upcoming threats, individual capacity, unexpected issues, etc; and debrief. Regroup regularly to discuss what went well and what didn’t.
Remember that community itself is a natural human behavior and exists all around you already. This includes preexisting friend networks, neighborhood watch groups, coworkers, etc — don’t reinvent the wheel, focus on refining and reinforcing it. Be prepared for things to fizzle out occasionally.
Further detailed reading: “How to Start a Successful Group Guide” by Neighborhood Anarchist Collective.
RAPID RESPONSE NETWORKS
Rapid response is a model primarily used by disaster relief organizations to address natural disasters, medical emergencies, and mass casualty events. It relies on preparation and collaboration across highly localized groups to effectively assess and respond to threats. The goal is to document, neutralize, and begin recovery efforts as quickly as possible following an event.
Combining this model with traditional cop watch patrols designed to monitor and track police activities gave rise to anti-ICE rapid response networks across America. These groups typically communicate via end-to-end encrypted messaging platforms, such as Signal, and work within and across cities. Specific patrol groups may arise as needed in the form of temporary offshoots (ex. establishing an escort/observation group for specific schools or streets for a set period of time during ICE operations nearby).
Successful rapid response networks will regularly host or facilitate security trainings, legal support sessions, and mutual aid distribution for affected community members. If your area has an established rapid response network, such as ACILEP in Northern California or Monarca in Minnesota, be sure to communicate verified reports from within your group for broader engagement and information building. Many large groups will keep a running list of known ICE vehicles present in their areas and will follow up with victims and their families to provide additional support. When reporting potential ICE sightings, the following format (SALUTE) is recommended.
Size (ex. 5 enforcement officers)
Activity (ex. stopping random people and
demanding IDs)
Location/direction (ex. heading west from
393 Blossom Hill Rd, San Jose CA)
Uniforms (ex. dark blue vests that read
“POLICE” across the back)
Time (ex. 12:45PM February 11th)
Equipment and weapons (ex. they have
helmets, vests, and batons)
Be careful to verify, document, and clearly communicate these details to avoid false reporting or misdirection of resources.
Once you have a community group, consider whether ICE is or may become a threat in your area and act preventatively. Set up the infrastructure to track them within your community spaces as early as possible.
Community members at high risk include undocumented people, lawful permanent residents, refugees with criminal convictions (regardless of whether they served time), Spanish speakers, people of color, activists, and anyone even marginally in their way.
Identifying ICE activity:
Warning signs include increased police presence, roadblocks or checkpoints, previous raids in the area, and unfamiliar vehicles idling near work zones, schools, and Latinx community centers. ICE typically carries out their operations early in the morning, although they can be active at any time — day or night.
Local Law Enforcement vs ICE agents:
In California, police and sheriff badges are typically star-shaped with six or seven points. Across the U.S., star and shield-shaped badges are both common for law enforcement. ICE typically uses oval or shield-shaped badges with eagle crests.
Unmarked police vehicles may have additional equipment distinguishing them from normal cars, including lights hidden on side mirrors, top of the front window, or behind the grill; push bars on the bumper; dark-tinted windows; partition bars; heavy-duty radio equipment; laptops or multiple screens in the center console; and (in California) CA exempt licenses. Look for unusually clean cars and a lack of personalization.
Undercover police vehicles can be any make and model but may share some characteristics with the above list.
Known unmarked ICE vehicles may include the above traits and will typically be U.S.-made vehicles with ultra-dark tinted windows and regular license plates (or dealership placards). However, they operate more like undercover police vehicles and may be any make or model.
ICE agents will usually be in groups of two or more, avoid showing ID or badges when asked, cover their faces, and dress in semi-casual or tactical gear (t-shirt or polo shirts. tactical vests, utility belts, heavy boots, cargo pants, etc).
When you receive a potential ICE alert, respond if you are nearby or have immediate access to transportation to the location, and verify whether or not ICE is present. If they are, begin filling the following roles (listed in order of importance)
–Cameraperson 1: Films ICE and
gathers information about the victim
–Note-taker: Captures handwritten notes
(including the victim’s full name and date of
birth, as well as their immigration
identification number if applicable)
–Cameraperson 2: Films cameraperson 1
–Dispatcher Liaison: Maintains
communication with RR hotline or group
chat, ensures that all documentation/
photos/videos are sent to coordinator(s)
–Community liaison: Explains the roles
that volunteer responders play to
community members, gather information
from surrounding people
–ICE liaison: Attempts to obtain identifying
information from ICE, deescalate the
situation, and move ICE away from
observers 1-3
Listen and limit communication to “I cannot
speak on anyone’s behalf.” Do not post videos of ICE raids where victims are visible or identifiable on social media without obtaining explicit consent from the individual affected or their families. Be ready for ICE to quickly escalate to violence or turn on observers.
EMERGENCY PLANNING
Under the current fascist regime, building community is only part of the survival strategy. Preparedness is critical on both an individual and collective level, and what follows are some steps to consider as threats escalate. Pick and choose what works for you and your risk level.
General Emergency and Communication Plan
In the event of an emergency (you are abducted or detained by ICE, experience a medical emergency, cannot return home, etc), ensure that you have a trusted contact who has access to your full legal name, birth date, and address. Communicate your medical, childcare, pet care, and other relevant needs. Depending on risk level, consider providing legal releases (power of attorney, medical, estate) and if desired, financial account and information on how to access your living space.
For immigrants, have accessible copies of passport, ID, immigration documents, and proof of residence. Establish protocols for yourself and family or friends about who to contact and what to do in the event of emergency, raid, subpoena, etc. This may include financial account access, transportation plans and emergency relocation, or developing safe words and coded phrases to counter AI deepfakes, covertly signal alarm, and verify authenticity.
Encourage memorizing important phone numbers and practicing emergency plans within your community groups. You may want to discuss and rehearse scenarios like raids, service confiscation, questioning by law enforcement, and loss of communication devices.
Particularly important with rapid response groups and broader activist networks is communication discipline. Do not openly speculate about cases or share sensitive information online or via phone. Law enforcement targets “weak links.” Even end-to-end encrypted platforms are only as secure as the individuals using them.
Legal Plan
Conduct a legal-risk audit to identify who is most at risk or vulnerable to charges (particularly false charges). This may include reviewing property, devices (computers, phones, etc), records, emails, and accounts (social media, financial, etc) to assess what a preliminary investigation may uncover. Initiate and maintain contact with movement-experienced attorneys.
If necessary, plan ahead and secure legal documents you’d want to have prepared in case of an emergency. This may include one or multiple of the following:
Durable Power of Attorney (POA)
This allows you to name someone as your
“agent” to handle your finances and legal
matters if you’re detained, abroad, or
incapacitated. This arrangement stays in
effect even if you’re incapacitated (for
example, hospitalized or in custody). Agent
can sign documents on your behalf, pay
your lawyer, collect paychecks, maintain
your home, etc. Prevents frozen accounts
and unpaid bills.
HIPAA or Medical Privacy Release
Authorizes medical providers to share
health information with specific people such
as your lawyer, family, or trusted friends. If
you’re detained or unconscious, it may be
difficult to find out your condition without
this release.
Advance Health Care Directive / Living Will
Instructs doctors about your wishes
regarding life-sustaining treatment if you
become terminally ill or permanently
unconscious. It reduces the emotional
burden on loved ones and ensures that
your healthcare preferences (not hospital
policy) guide all medical decisions.
Government Agency Release
Allows a trusted person, usually your
attorney or advocate, to communicate with
agencies such as ICE, DHS, DOJ,
jails/prisons, the VA, or Medicaid on your
behalf. This lets your representative request
records, file appeals, or update information
— avoiding delays if you’re detained or
unavailable. Especially important for
immigrants, people on public benefits, etc.
Surveillance Plan
Surveillance isn’t just live video: it’s built on layers of data aggregation. Data brokers collect lists of locations, behaviors, demographics, device IDs, purchase histories, etc. These datasets are sold to law enforcement, private actors, or intelligence agencies. To be as safe as possible, assume all public and digital activity is monitored to some degree.
Research whether or not your area has automatic license plate recognition (ALPR) cameras or contracts with ALPR companies like FLOCK, PlateRanger, Rhombus, etc. These can track your travel via car or other means and build a profile of your vehicle. Other camera systems like Ring doorbells are both widespread in residential areas and vulnerable to attack and access by enforcement agencies.
Be aware that as Al models for creating deepfakes improve, they become harder to detect. Deepfake videos, audio, and manipulated images can depict people saying or doing things they never did. These facial recognition and Al pipelines are now woven into mass surveillance systems.
You cannot fully escape surveillance in America or most other countries with well-funded military and spy systems. Just be aware of what surveillance apparatuses exist in your area and do your due diligence to minimize exposure where possible.
Digital Security Plan
Good digital hygiene can involve regularly clearing out your email, regularly factory resetting your phone, and deleting inactive groups and chat histories. Try to use zero-knowledge backup services.
Consider purchasing services to delete your data from data brokers. California residents can use the state’s DROP program at privacy.ca.gov/drop to legally require data brokers to delete their data for free. These services are not comprehensive, but if you remove some data, algorithms have fewer points to triangulate your identity or movements.
If you plan on using a service like DROP, do not delete your device’s MAID (mobile advertising ID) as you will need it to fully delete the profile of information that advertising agencies have collected on you. A deleted MAID renders the profile inaccessible to you and deletion services, but data brokers can still access the information and potentially connect it to you.
Encrypt all devices and enable two-factor authentication, never use biometrics (facial or fingerprint scanners), and inventory which of your devices and cloud accounts contain sensitive information. Consider storing sensitive files somewhere safe, particularly with an attorney. Be aware of tracking tools (transit cards, RFID, license plates, apps, phones, internet) and clean your data from social media, online dating, other apps with location sharing (Uber/Lyft, Food Ordering, payment apps like Zelle and Venmo) carefully: Remember that deleting doesn’t erase.
Consider taking and/or providing digital security trainings, and set data retention and destruction policies within your group (Electronic Frontier Foundation has guides).
Paper, Records, Ephemera Plan
If raids or searches are a high concern for you, consider taking inventory of all physical records and locking up sensitive files, lists, correspondence, photos, and associated activity. Keep backups or duplicates with your trusted contact or attorney. Prepare your space so nothing can be misused as “evidence.” Think about what is in the space that would be misconstrued in court to keep you in pre-trial detention or add charges or enhancements, for example:
Books, zines, and reading materials =
“radical and dangerous and extreme views.”
Stickers, buttons, patches = “group
affiliation” “danger to law enforcement.”
Posters, art, and flags = “calls to violence”
“threats to the government”
Social media and Signal chats =
“coordination”.
Raid Plan
Train to stay calm, refuse consent, ask for a warrant, and call counsel. Post the script/plan, emergency contacts and instructions at entrances to relevant community spaces.
Detention Plan
Keep the following written down and shared with your trusted contact:
-Attorney’s name and number
-Emergency contact info for anyone else
(kids’ school, work, animal care, etc.)
-Dependents, caregiving, or animal duties
-Medical needs and allergies, glasses, etc
-Where you keep IDs, keys, prescriptions
(in labeled bottles, as required by jails), and
relevant legal documents
Post-Raid / Post-Detention Plan
Contact lawyer and emergency contact person immediately. Document everything:
-When and how agents arrived (time,
agency, vehicles)
-Number of officers, badge numbers, and
identifying details
-Questions asked and items seized
-Witness names and contact info
-Take photos of damage once safe
-Request all paperwork from agency
Avoid using devices once they’ve been seized or tampered with by enforcement agencies.
Transportation / Reunification Plan
Designate who manages vehicles and transportation in emergencies and arrange rides for vulnerable people. Discuss schedules and who will be available for different days or times.
BE READY, NOT SCARED
Frame preparation as proactive care, not panic. Say something like “I’ve been worried that activists are being targeted. We’re safe right now, but I want us to have a plan in case one of us is detained or questioned so no one panics.” You understand yourself and your community better than anyone else (including the feds), and it is up to your group to decide what level of risk is accurate.
Small autonomous groups have been able to land some massive blows against the state throughout history, and the more of us there are the harder it becomes to track and target each of us individually. Safety lies in solidarity.
Don’t forget to create art, arrange potlucks, and check in on your neighbors. Beyond all the security trainings and preparation, joy and connection is what will keep us going when the raids reach our doorsteps. Love you all!
More comprehensive readings include “The Black Flag Catalyst Revolt Guide,” as well as “A Practical Guide to Anarchist Organisation” by Andrew Flood.