Skip to content
https://rgearshop.com/

Resistance Kitty

The sassiest cat fighting fascism

  • Home
    • About Resistance Kitty
  • Resistance Kitty News
  • Revolution 2025
  • Resistance Directory
  • EpsteinWiki
  • Subscribe
  • Resistance Kitty Merch
  • Toggle search form

#167 How to Monitor Right-Wing Militia Activity Without Getting Targeted

Posted on December 9, 2025March 3, 2026 Dr. Harmony By Dr. Harmony No Comments on #167 How to Monitor Right-Wing Militia Activity Without Getting Targeted
Skill Level: Intermediate
What This Tool Is

This guide teaches you how to keep an eye on militia chatter, recruitment signals, and planned actions without ever putting yourself in their line of sight. Monitoring extremist activity is essential to community defense — but it must be done with discipline, distance, and digital hygiene. You are gathering intelligence, not playing undercover cowboy. The goal: stay informed, stay protected, stay anonymous.

Why It Matters

Right-wing militias rely on two things to thrive:

  1. People not paying attention, and
  2. People paying the wrong kind of attention

They exploit online radicalization pipelines, encrypted group migration, political unrest, and moments of crisis to recruit, train, and mobilize. Many violent plots are foiled because someone — often a random community member — noticed unusual movement: gear stockpiling, coordinated messaging, new local cells forming, or sudden spikes in encrypted-channel traffic.

Monitoring this activity helps:

  • Local organizers prepare safe protest strategies
  • Journalists and watchdogs track threats
  • Lawyers document patterns for federal cases
  • Communities avoid being blindsided by violence

And yes — your notes today may end up in tomorrow’s indictments.

Real-World Example

Ahead of January 6th, open-source researchers and everyday internet sleuths noticed pattern shifts: Proud Boys and Oath Keepers moving to encrypted apps, stockpiling tactical gear, and sharing location-based instructions. Many reported these findings to journalists, nonprofits, and law enforcement. These open-source dots later became critical evidence in federal sedition cases.

You don’t need to infiltrate extremist circles. You just need eyes, patterns, and operational security.

Step-by-Step Instructions
1. Never Monitor From Your Real Identity

Create a separate digital identity for research purposes.

  • New email
  • New browser profile
  • VPN always on
  • Never connect from home or work
  • No personal details, no unique writing style

Think “blank slate,” not “DIY FBI.”

2. Use OSINT-Only Sources — Don’t Join Their Groups

Monitor militia movements through:

  • Public Telegram channel previews
  • Reddit threads
  • Open-source extremist trackers
  • Court filings
  • Journalists covering these networks
  • Platforms like SITE Intelligence, ACLED, SPLC reports

You are a passive observer, never a participant.

3. Map Language, Not Individuals

Extremists rarely say “we’re planning violence on Saturday.”
Instead watch for:

  • “Patriot meetups”
  • “Training weekends”
  • “Gear checks”
  • “Protect our communities” (coded for armed presence)
  • References to local elections, immigration centers, or protests

Patterns > usernames.

4. Track Geographic Clustering

Keep notes on:

  • Which counties see spikes in militia activity
  • Businesses that serve as meet-up hubs
  • Gun stores reporting unusual bulk purchases
  • Churches or bars used for recruitment

Local clusters often precede mobilization.

5. Watch Encrypted-App Migration Waves

When groups flee to encrypted platforms like Signal, Telegram, or Zello, that’s a signal.
It often means:

  • They expect law enforcement attention
  • They’re planning something higher-risk
  • They’re coordinating across states

You don’t need to join — the migration itself is intel.

6. Save Everything — Screenshots, Archives, Timelines

Keep a secure folder documenting:

  • Dates
  • Screenshots
  • Links
  • Observed patterns
  • Local relevance

Use tools like Proton Drive, Standard Notes, or offline encrypted storage.

7. Never Engage, Argue, or “Correct” Them

Zero comments, zero reactions, zero messages.
The moment they notice you, you’ve failed the assignment.

8. Share Your Findings Safely

Depending on risk level, share with:

  • Local journalists
  • Trusted activist networks
  • SPLC or ADL threat trackers
  • The #Revolution2025 ecosystem when appropriate
  • Civil-rights attorneys involved in monitoring extremist cases

If the threat is imminent or credible, notify local law enforcement through a lawyer or advocacy group, not directly.

9. Protect Your Mental Health

Extremist content is psychologically corrosive.
Set limits:

  • Never scroll at night
  • Use content warnings for yourself
  • Step away when it gets heavy
  • Debrief with a trusted friend or organizer

Fascism is toxic — treat exposure like handling hazardous waste.

10. Know When to Stop

If your digital safety feels compromised or your monitoring starts putting you at risk, you stop.
You’re a civilian, not a spy.
Your safety is part of the work.


R – A Woman’s Place Is In ANTIFA Dark Style Unisex T-shirt
Resistance Survival Guide Tags:community defense, digital safety, extremism, militia monitoring, operational security, OSINT

Post navigation

Previous Post: December 9, 2025 Day 323
Next Post: Day 324 Agenda

Related Posts

  • #101 Herd Immunity, Not Herd Stupidity Resistance Survival Guide
  • #169 How to Apply Pressure Without Burning Yourself Out Resistance Survival Guide
  • RSG #210 How Data Brokers Track Activists (And How to Remove Yourself) Resistance Survival Guide
  • #75 How to Build a Stealthy Resistance Network with Stickers and Signal Resistance Survival Guide
  • #13 How to Build a Protest Shield Wall Like a Pro Resistance Survival Guide
  • #42 How to Build a Mutual Defense Map Without Naming Names or Burning Your Network Resistance Survival Guide

More Related Articles

RSG #210 How Data Brokers Track Activists (And How to Remove Yourself) Resistance Survival Guide
#144 Feeding the Resistance During a Shutdown Resistance Survival Guide
#176 How to Use “Receipt Stacking” to Expose Power Lies Without Losing Your Mind Resistance Survival Guide
#15 How to Shut Down a Public Comment Section Like a Saboteur Resistance Survival Guide
#63 How to Fight Back When Healthcare Becomes Pre-Authorized Oppression Resistance Survival Guide
#182 Do a Digital Safety Reset Before the Weekend Resistance Survival Guide

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

RSS FEED

Categories

  • Call to Action
  • Civic Mischief HQ
  • Executive Orders
  • Featured Resisters
  • Knives Out Activities
  • Resistance Kitty Comics
  • Resistance Survival Guide
  • Resistance Wins
Sign Up To Get Resistance Kitty in your inbox!

We don’t spam! Read our privacy policy for more info.

Check your inbox or spam folder to confirm your subscription.

Recent Posts

  • Day 426 Resistance Update and Agenda
  • March 12, 2026 Day Comic 426
  • How to Use Court Records to Investigate Public Officials
  • Day 425 Resistance Update and Agenda
  • March 11, 2026 Day Comic 425

Recent Comments

  1. Eric Toft on Sign the Petition: Preserve Public Access to Epstein Investigation Records
  2. Dr. Harmony on Day 391 Agenda
  3. Remy Schneider (Scott) on Day 391 Agenda
  4. Dr. Harmony on #184 Surviving the Authoritarian News Cycle Without Burning Out
  5. LegumesBeans on #184 Surviving the Authoritarian News Cycle Without Burning Out

Copyright © 2026 Resistance Kitty.