Skip to content
https://rgearshop.com/

Resistance Kitty

The sassiest cat fighting fascism

  • Home
  • About
  • News
  • Comics
  • Survival Guides
  • EpsteinWiki
  • Resistance Directory
  • Merch & Mayhem
  • Subscribe
  • Toggle search form

How to Securely Document and Preserve Evidence of Government Abuse

Posted on March 17, 2026March 17, 2026 Dr. Harmony By Dr. Harmony No Comments on How to Securely Document and Preserve Evidence of Government Abuse

Resistance Survival Guide #225

Skill Level: 🛠️ Intermediate

Authoritarian movements rely on secrecy. When abuse is hidden, officials can deny that it ever happened. One of the most powerful tools ordinary people have is documentation. Photos, videos, witness notes, and preserved records can expose misconduct, support lawsuits, and help journalists investigate abuses of power.

Citizen documentation has played a major role in exposing wrongdoing around the world. Investigative groups such as Bellingcat, human-rights organizations like WITNESS, and investigative outlets such as ProPublica frequently rely on evidence collected by witnesses and ordinary citizens. When documentation is done correctly, it becomes powerful evidence that courts, journalists, and investigators can verify.

This guide explains how to safely document and preserve evidence so it can be used by journalists, lawyers, and investigators.

Why This Matters

Authoritarian systems often depend on confusion and denial. When there is no documentation, powerful institutions can rewrite the story. But when people record events clearly and preserve the evidence properly, the truth becomes much harder to hide. Civil rights organizations such as the American Civil Liberties Union and investigative journalists frequently rely on citizen footage and records to expose abuses of authority.

In short, documentation transforms rumors into verifiable evidence.

What Secure Evidence Documentation Is

Secure documentation means collecting evidence in a way that protects accuracy, authenticity, and safety. Evidence must remain unaltered so investigators can verify it later. Human rights investigators use structured documentation practices described in resources like the Verification Handbook and training materials from WITNESS documentation guides.

When done correctly, even a single video or photo can become part of a major investigation.

Step-by-Step Instructions

Step 1 — Prioritize Your Safety

Before documenting anything, make sure you are in a safe position. Do not move closer to dangerous situations simply to capture footage. If violence appears likely or law enforcement begins making arrests, step back and observe from a safer distance. Organizations such as the Committee to Protect Journalists emphasize that documentation should never place the witness in immediate danger. Evidence only matters if the person recording it remains safe.

Step 2 — Capture Clear, Continuous Footage

When recording video, try to film continuously rather than stopping and starting repeatedly. Continuous footage helps investigators confirm that events were not edited or manipulated. Include surrounding details such as buildings, signs, street names, or landmarks. These details help investigators verify the location later using open-source analysis methods often used by groups like Bellingcat.

Step 3 — Record Important Context Immediately

After documenting an event, write down key information while the memory is still fresh. Include the date, time, location, and any identifiable information such as badge numbers, vehicle license plates, agency names, or names of people involved. This type of contextual information is extremely valuable to investigative reporters at organizations like ProPublica and civil rights lawyers investigating misconduct.

Step 4 — Preserve the Original File

Never edit or modify the original recording. The original file contains important metadata such as timestamps and device information that investigators may need to verify authenticity. If you want to share the footage publicly, make a copy of the file and edit the copy instead. Keeping the original untouched preserves its evidentiary value.

Step 5 — Back Up the Evidence Securely

Store copies of the evidence in multiple secure locations so it cannot easily be lost or destroyed. Encrypted cloud services like Proton Drive or secure file-sharing tools such as OnionShare can help preserve evidence safely. Multiple backups protect the information in case a device is lost, confiscated, or damaged.

Step 6 — Share Evidence With Trusted Investigators

Instead of immediately posting sensitive footage online, consider sharing it with journalists or investigative organizations that can verify and protect the evidence. Secure submission platforms like ProPublica Secure Tips, the HushLine secure tip system, or investigative groups such as Bellingcat allow whistleblowers to submit material safely.

Step 7 — Protect Your Identity When Necessary

If documenting politically sensitive events, consider protecting your identity before sharing material publicly. Anonymous submission systems and privacy tools can reduce the risk of retaliation. Privacy-focused tools such as the Tor Browser are often used by journalists and whistleblowers to protect their digital identity when sharing sensitive information.

Example

Citizen documentation has repeatedly exposed abuses of power. A well-known example occurred during the killing of George Floyd, where bystander video contradicted the initial police narrative and became key evidence in the criminal trial of former officer Derek Chauvin. Without that footage, the case might never have received national attention.

Required Reading

If you want to improve your documentation skills, these resources are widely used by journalists and investigators:

  • WITNESS — Video as Evidence Training
  • Verification Handbook for Investigative Reporting
  • Bellingcat Open-Source Investigation Guides
  • Committee to Protect Journalists Safety Resources

Conclusion

Authoritarian power thrives when wrongdoing disappears into darkness. Documentation shines light where institutions fail. By safely recording events, preserving original evidence, and sharing it with trusted investigators, ordinary people can help expose abuses that might otherwise be hidden. Every phone camera can become a tool of accountability when used carefully and responsibly. Resistance is not only protest — it is truth preserved.


Kitty’s Resistance Projects

  • Resistance Directory: https://resistancedirectory.com/
  • EpsteinWiki: Epsteinwiki.com

Support Resistance Kitty’s Work

  • Kitty Merch: https://tr.ee/–Pu9s-BUL
  • Support Kitty: https://buymeacoffee.com/resistancekitty

R – We Tread On Tyrants Dark Style Unisex T-shirt
Resistance Survival Guide Tags:activist documentation tools, Bellingcat investigation methods, citizen journalism, documenting government abuse, evidence preservation guide, open source investigations, recording misconduct safely, whistleblower evidence protection

Post navigation

Previous Post: Day 429 Resistance Update and Agenda
Next Post: Day 430 The Patriotism Detector

Related Posts

  • build small trust circles
    RSG #248: Creating Small Trusted Circles Instead of Broadcasting Everything Online Resistance Survival Guide
  • #40 How to Weaponize Your Burner Phone Without Getting Burned Resistance Survival Guide
  • Join me and Municorn for laughs and optimism. Tie together the four themes—repair, AI, open source, and decentralization—into a cohesive narrative about reclaiming agency online. Listeners will learn about the growing ecosystem of tools that let individuals own their data, control their hardware, and participate in a privacy‑respecting digital economy. links used https://www.backmarket.com/en-us?srsltid=AfmBOop7ypCfWaz2dFNlI1V2YpTQCRQrMgPqjN2BAiiTd4YJn9I-oylC https://www.ifixit.com/Right-to-Repair https://www.forbes.com/sites/bernardmarr/2020/06/22/10-wonderful-examples-of-using-artificial-intelligence-ai-for-good/ https://blog.google/innovation-and-ai/products/dolphingemma/ https://www.ludlowinstitute.org/articles/kyc-is-the-crime Zero-Knowledge Proofs (ZKPs): Prove something (like your age or citizenship) without revealing documents https://chain.link/education/zero-knowledge-proof-zkp Decentralized Identity (DID): You control what gets shared, and with whom https://www.okta.com/blog/identity-security/what-is-decentralized-identity/ Homomorphic Encryption: Allows platforms to verify encrypted data without ever seeing it https://www.internetsociety.org/resources/doc/2023/homomorphic-encryption/?gad_source=1&gad_campaignid=23556850968&gbraid=0AAAAADqyrA9MF3JcwbP_jiH1ECkZdCdM8&gclid=CjwKCAiAkvDMBhBMEiwAnUA9BU1iwRhz2Qi-HCaD8d5EekwC5IM7TMsbXJNj6oa36TppCFHFOmo6eRoCzG0QAvD_BwE support my work https://buymeacoffee.com/nightfire Join the conversation: Follow me on Bluesky: ⁠ https://bsky.app/profile/nightfire55.bsky.social Join my community on Discord: ⁠ https://discord.gg/7RwMvwsPRw Reach out to me directly via email: Nightfire55@sudomail.com
    Reclaim Your Digital Power: How Repair, AI, and Decentralization Are Flipping the Script Resistance Survival Guide
  • #120 How to Strike Back – General Strikes & Protest Power Resistance Survival Guide
  • #44 How to Spot, Stop, and Sabotage ICE Raids in Your Community Resistance Survival Guide
  • #113 Fighting Junk Science Like a Cat with a Laser Pointer Resistance Survival Guide

More Related Articles

#178 Evidence Preservation: How to Archive Social Media Videos Safely Resistance Survival Guide
#13 How to Build a Protest Shield Wall Like a Pro Resistance Survival Guide
RSG #197 How to Archive Web Pages and Social Media Posts So They Hold Up as Evidence Resistance Survival Guide
How to Build a Local Resistance Network From Scratch Resistance Survival Guide
How to Turn One News Story Into 10 Pieces of Resistance Content Resistance Survival Guide
How to Spot and Report Election Disinformation Campaigns Resistance Survival Guide

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

RSS FEED

Categories

  • Call to Action
  • Civic Mischief HQ
  • Executive Orders
  • Featured Resisters
  • Knives Out Activities
  • Resistance Kitty Comics
  • Resistance Survival Guide
  • Resistance Wins
Sign Up To Get Resistance Kitty in your inbox!

We don’t spam! Read our privacy policy for more info.

Check your inbox or spam folder to confirm your subscription.

Recent Posts

  • Confessions to a Machine Exposes the Dangerous Illusion of AI Therapy
  • Day 464 Resistance Update and Agenda
  • Day 464 Redacted for His Pleasure 
  • RSG #252: How to Prepare for Internet Blackouts or Platform Shutdowns
  • Day 463 Evidence Evaporation

Recent Comments

  1. Dr. Harmony on RSG#199 Creating a Personal Legal Emergency Card
  2. Dr. Harmony on RSG#199 Creating a Personal Legal Emergency Card
  3. Monica on RSG#199 Creating a Personal Legal Emergency Card
  4. Monica on How to Prepare for War-Related Disruption Without Panicking
  5. Dr. Harmony on Request for Emergency Medical and Constitutional Review of Presidential Fitness

Copyright © 2026 Resistance Kitty.