Skip to content
https://rgearshop.com/

Resistance Kitty

The sassiest cat fighting fascism

  • Home
  • About Resistance Kitty
  • Resistance Directory
  • EpsteinWiki
  • Kitty Merch & Mayhem
    • Resistance Kitty Merch
    • Coloring Pages
    • Protest Sign Graphics
    • Resistance Survival Guide
  • Subscribe
  • Toggle search form

Resistance Survival Guide #201 — How to Recognize Online Manipulation, Bots, and Infiltrators in Local Groups

Posted on February 13, 2026February 12, 2026 Dr. Harmony By Dr. Harmony No Comments on Resistance Survival Guide #201 — How to Recognize Online Manipulation, Bots, and Infiltrators in Local Groups

Online spaces now function as the real-world coordination layer for communities. Rides get arranged there. Safety alerts get posted there. Volunteers get recruited there. Because of that, local organizing groups — even small neighborhood Signal chats or Facebook groups — are routinely targeted for disruption. The goal is rarely persuasion. The goal is instability. When people distrust each other, they stop cooperating, and a group quietly collapses without anyone ever shutting it down.

This guide is not about hunting enemies or accusing strangers. Most disruptive behavior does not come from professional operatives. It comes from trolls, scammers, provocateurs, rumor-spreaders, or emotionally reactive participants whose behavior has the same effect: confusion and division. You are learning pattern recognition and response discipline so your community stays functional.

Skill Level: Intermediate

Why This Matters

Disruption almost never starts with censorship. It starts with emotional escalation. A group becomes flooded with alarming claims. Members argue about intentions instead of solving problems. Leaders burn out trying to manage constant emergencies. People who just wanted to help quietly leave. At that point the group hasn’t been attacked — it has been destabilized.

Community groups exist to solve practical problems: childcare coordination, safety alerts, mutual aid, meetings, and information sharing. When communication reliability breaks, real-world support breaks. Preventing that requires structure, not suspicion. Stability is created when members learn to evaluate behavior patterns instead of personalities. The objective is simple: slow reactions, increase verification, and keep conversations task-focused.

What This Is

You are not trying to identify a specific person as an infiltrator. That approach creates paranoia and harms innocent members. Instead, you identify destabilizing behaviors and respond to those behaviors consistently regardless of who performs them.

You are managing the environment, not judging people.

Anyone — including sincere members — can temporarily act in ways that destabilize a group. The response remains the same: slow down, verify information, and redirect toward constructive action.

The Five Common Disruption Patterns

1. The Urgency Pusher

Behavior: pushes the group to act immediately without verification.

Typical language:
“Everyone needs to show up right now.”
“If you don’t act tonight you don’t care.”
“We can’t wait to confirm anything.”

Why it matters:
Urgency bypasses planning. People make unsafe travel decisions, attend unverified events, or spread incorrect warnings. In real incidents this causes panic and sometimes places members in physical danger.

Response:
Establish a standing rule:

The group does not mobilize the same day information appears unless verified by multiple sources.

Slowing the timeline protects people and removes the manipulator’s leverage.

2. The Information Flooder

Behavior: overwhelms the group with constant alarming content.

Signs:
• dozens of posts daily
• dramatic headlines
• reposted screenshots with no source
• minimal verification

Why it matters:
Information overload creates exhaustion. Members mute notifications or disengage entirely. Critical real alerts then get missed.

Response:
Create a structured posting system: a daily information thread or designated channel for news. Encourage summaries rather than link-dumping. This preserves signal over noise and keeps the group usable.

3. The Conflict Igniter

Behavior: converts disagreements into personal accusations.

Patterns:
• labels (“traitor,” “extremist,” “fake ally”)
• reposted private messages
• demands public loyalty declarations
• pressures others to pick sides

Why it matters:
Trust is the operating system of a community. Once people fear being attacked, participation collapses.

Response:
Adopt a visible norm:

The group discusses plans and actions, not personal character.

Redirect discussion back to tasks. Do not debate personalities publicly.

4. The Risk Escalator

Behavior: encourages reckless or illegal behavior rapidly.

Examples:
• confrontation without safety planning
• property damage suggestions
• ignoring permits or logistics
• dismissing legal risk

Why it matters:
Unsafe action isolates the group and exposes members to legal harm. Even members who disagree often leave quietly afterward.

Response:
Create a standing policy:
No real-world activity is planned without safety review, logistics, and informed consent. Calmly restate the rule and do not engage emotionally.

5. The Private Messenger

Behavior: pulls members into side conversations and spreads distrust privately.

Signs:
• messaging newcomers individually
• requesting personal data
• claiming leadership cannot be trusted
• encouraging secrecy

Why it matters

Parallel information channels fracture shared reality. Members act on different assumptions and rumors multiply.

Response

Normalize transparency. Encourage decisions to be summarized publicly in the group space. Private discussions about logistics are fine; private discussions about group trust are destabilizing.

Step-by-Step Protection Plan

Step 1 — Post Group Norms Early

Before conflict appears, establish visible expectations:
• verify before sharing alerts
• no doxxing
• no immediate mobilization without confirmation
• safety planning required

Predictable rules reduce emotional reactions later.

Step 2 — Assign Simple Roles

Even small groups benefit from structure:
• discussion moderator
• information verifier
• event coordinator

Shared responsibility prevents leader exhaustion and improves reliability.

Step 3 — Require Verification for Alerts

Before acting, ask three questions:

  1. Who directly witnessed this?
  2. Is there a second independent confirmation?
  3. Does it specifically affect our community?

If any answer is unclear, wait.

Step 4 — Move Arguments Off Text

Text communication magnifies misunderstanding. Encourage voice or video conversations for conflicts. Most disputes resolve quickly once tone and intent are heard.

Step 5 — Remove Quietly if Needed

If behavior repeatedly destabilizes the group, restrict posting or remove the person without public confrontation. Public accusations damage more relationships than quiet moderation.

Example

A member posts an urgent warning about a sudden enforcement sweep and urges everyone to gather immediately. The verifier checks local reporting and community contacts. No confirmation appears. The group delays action. The event never occurs. By following process instead of emotion, members avoided unnecessary travel, panic, and potential harm.

Required Reading

Learn the basics of information verification and media literacy:

  • National Association for Media Literacy Education — https://namle.org/resources/media-literacy-defined/
  • First Draft News verification techniques — https://firstdraftnews.org/articles/verification-quick-guide/
  • Cybersecurity & Infrastructure Security Agency rumor control methods — https://www.cisa.gov/rumorcontrol
  • Electronic Frontier Foundation surveillance self-defense basics — https://ssd.eff.org/

Conclusion

Communities rarely collapse from a single external threat. They collapse from accumulated confusion and emotional escalation. Groups that slow down, verify information, and keep communication respectful remain stable even during stress. You are not trying to win arguments online. You are preserving the group’s ability to function in the real world. Stability is resilience.


R – Cats Against Fascism Dark Style Unisex Long Sleeve Tee
Resistance Survival Guide Tags:avoid disinformation, blackout communication, cats, community protection, crisis coordination, crisis response training, detention preparedness, digital evidence preservation, documentation standards, emergency communication plan, EpsteinWiki, evidence authentication, evidence numbers, fascism, mutual aid organizing, protest, Resistance Kitty

Post navigation

Previous Post: February 13, 2026 Day Comic 399
Next Post: Day 399 Resistance Agenda

Related Posts

  • #172 Follow the Money (and Expose the Grift) Resistance Survival Guide
  • #128 Preparing for the Big Peaceful Protest Resistance Survival Guide
  • #45 How to Disrupt ICE Without Getting Nabbed Resistance Survival Guide
  • #39 How to Build a Repair Crew and Wreck the Waste Machine Resistance Survival Guide
  • #80 How to Build a Secure Protest Communication Network Resistance Survival Guide
  • # 102 They Ban People, Not Guns Resistance Survival Guide

More Related Articles

#38 How to Hack a Surveillance State with Stickers, Mirrors, and Tinfoil Resistance Survival Guide
#40 How to Weaponize Your Burner Phone Without Getting Burned Resistance Survival Guide
#25 How to Build a Secret Library Before They Ban Every Book Resistance Survival Guide
#92 How to Expose Local Corruption Without Getting Scratched Resistance Survival Guide
#5 How to Make a Fascist’s Day Just a Little Bit Worse Resistance Survival Guide
#172 Follow the Money (and Expose the Grift) Resistance Survival Guide

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Shop For
Resistance Kitty Gear!
Sign Up To Get Resistance Kitty in your inbox!

We don’t spam! Read our privacy policy for more info.

Check your inbox or spam folder to confirm your subscription.

Categories

  • Call to Action
  • Comics
  • Executive Orders
  • Featured Resisters
  • Knives Out Activities
  • Resistance Survival Guide
  • Resistance Wins

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
RSS FEED

Recent Posts

  • Day 399 Resistance Agenda
  • Resistance Survival Guide #201 — How to Recognize Online Manipulation, Bots, and Infiltrators in Local Groups
  • February 13, 2026 Day Comic 399
  • Day 398 Agenda
  • February 12, 2026 Day Comic 398

Recent Comments

  1. Dr. Harmony on Day 391 Agenda
  2. Remy Schneider (Scott) on Day 391 Agenda
  3. Dr. Harmony on #184 Surviving the Authoritarian News Cycle Without Burning Out
  4. LegumesBeans on #184 Surviving the Authoritarian News Cycle Without Burning Out
  5. Dr. Harmony on Day 367 Agenda

Support Resistance Kitty

Categories

  • Call to Action
  • Comics
  • Executive Orders
  • Featured Resisters
  • Knives Out Activities
  • Resistance Survival Guide
  • Resistance Wins

Find Your Collective

Revolution 2025

  • Resistance Directory
  • EpsteinWiki
  • Protest Gear
  • Revolution 2025
  • Alchemist Artist
  • The Domain Authority
  • Event Center Tickets
  • Mail
  • Link
  • YouTube
  • Instagram
  • Bluesky
  • X
  • Facebook
  • Reddit
  • Mastodon
  • Tumblr
  • Threads
  • Twitch

Copyright © 2026 Resistance Kitty.