A Brief Guide for Sharing Reports of Raids on Social Media


from DRUM: Desis Rising Up and Moving (original graphic)

Context: Immigration raids are happening across the country. It is important to responsibly report and share verified information so that we can be organized and help communities best protect themselves. Misinformation are harmful to communities, amplify fear and strain limited resources.

Common Types of Law Enforcement Activity (And how long such activity usually lasts):

  • Police Activity: Local police regularly engage in abusive policing which can put immigrants at risk of detentions and deportations (Usually ongoing)
  • Checkpoints or Stops: Regular police, ICE, CBP, or DHS asking for immigration papers or targeting immigrants on roads, transit points, outside of schools, etc. (May last for many hours)
  • Immigration Arrests: When ICE/CBP/DHS is searching for a particular individual at their home or workplace; They can and will arrest other immigrants they encounter in the same area (Often lasts less than an hour)
  • Immigration Raids: ICE/CBP/DHS officers swarming a neighborhood, workplace, event or public space and arresting large numbers of immigrants (May last couple of hours)

If you witness an immigration raid, arrest or related activity:

  1. Take a picture or a video (not the people being targeted) while ensuring your safety and safety of others around you. 
  2. Take note exact date, time & location 
  3. Take note of the type of law enforcement agency, vehicles and activities. 
  4. Share on social media with the above details

If it is not a first-hand report:

  1. Do not share it publicly on social media if it is not verified (i.e. not from someone who witnessed it) 
  2. Reach out directly to organizations or in area who are trained to go out, document and verify the report 
  3. If you know directly affected people in the area, notify them to be aware of the possibility of ICE/CBP/DHS/police in the area. Clarify that the report is unverified. Be prepared to provide emotional support. 
  4. If you see others sharing unverified reports, refer them to these guidelines.

If a report is verified: 

  1. Prioritize notifying directly affected people you who know in that area. Be prepared to provide emotional support. 
  2. Connect people to organizations that they can join for community-based defense. 
  3. Notify Legal Aid Society hotline: 844-955-3425 
  4. Share appropriate Know Your Rights materials 

How to support verification efforts: 

  1. Directly share them so people know the original source of reports to trace, confirm, correct, or retract; and to minimize those intentionally spreading misinformation. 
  2. Do not screenshot other people’s reports 
  3. Do not copy and paste reports

What are dangers of unverified reporting? 

  1. Trust is broken between affected communities, organizations and well-intentioned bystanders. 
  2. People’s existing fears and traumas are further amplified. This results in further isolation of marginalized communities and prevent clear, rational thinking. 
  3. Spreads fear and paranoia in targeted communities, without offering any actual safety: People stop going to work, sending their children to school, or leaving their homes. 
  4. Rather than having an organized and discipline anti-raids response, we end up not being able to allocate resources towards having an effective community defense.

Please boost.

lovesjustachemical: the-future-now: Using a series of sensors,…



Using a series of sensors, Dua’s bot detects when a person is about to run into something and beeps to them. The project took her a total of four days to build. Her prize is every Marvel fan’s dream.

Follow @the-future-now

!!!!! Get this out there. Make sure she’s not shut down because existing industries are greedy.

mykidsgay: 🎉 My Kid Is Gay Is Mobile-Ready! 🎉 You may have…


🎉 My Kid Is Gay Is Mobile-Ready! 🎉

You may have noticed that our site is looking a little different these days! We are so thankful that we were able to start the new year off with some much-needed updates to our site. Mainly, our site is now mobile-ready, so you can read MKIG on the go! Hooray!!

These updates would not have been possible without your donations, so thank you, thank you, THANK YOU for your generosity! 

We have a lot of exciting new resources and projects planned for 2017, and your continued support is crucial. If you are able, please support My Kid Is Gay by giving a tax-deductible donation through our fiscal sponsor, Fractured Atlas, or by donting monthly on Patreon.

“Nazis are [recruiting] gamers. It is a medium that is filled with socially reclusive men that are…”

“Nazis are [recruiting] gamers. It is a medium that is filled with socially reclusive men that are receptive their message.
Have you ever seen the movie Fight Club? You know how everyone who joins the fight club is this super sad dude looking for meaning and belonging? You show that to anyone who lived through WW2 and they straight up tell you, ‘That is how the Nazis recruited people. That is how they turned normal men into Nazis. They found them when they are weak, made them feel worthless and built them back up.’ That movie spoke to every single one of my 20 year old friends when they saw it. It’s hard to watch now, almost terrifying.
Now think of your group of gamer friends. How many people did you know growing up who were desperate to belong to something? To feel worthwhile? Because over the last 5 years I’ve watched a whole bunch of people from my competitive gaming community turn into full blown white nationalists. An alarming number.”

- comment on a Polygon article about PewDiepie’s antisemitic jokes by user
Fkeefe4th  (via theroguefeminist)

TSA site pwned by identity thieves #5yrsago


The TSA’s website was hacked, seemingly by identity thieves who used the “Click here if you’re on a no-fly list” to harvest personal information. Lots of sites get pwned by hackers. Most of those sites aren’t run by entities who claim that they’re keeping the skies safe by taking away our toothpaste. Is it any wonder that an organization that thinks flip-flops are made safer by passing through the X-ray machine is incapable of managing to secure its own servers?


It’s very hard to maintain an anonymous Twitter account that can withstand government-level attempts to de-anonymize it


It’s one thing to set up an “anonymous” Twitter Hulk account whose anonymity your friends and colleagues can’t pierce, because the combination of your care not to tweet identifying details, the stilted Hulk syntax, and your friends’ inability to surveil the global internet and compel phone companies to give up their caller records suffice for that purpose.

But as government whistleblowers set up “rogue” agency accounts that send out information that the Trump administration has told them to keep confidential, the scope of the tasks necessary to maintain anonymity in the event that a state-level actor wants to unmask them widens significantly.

Just to get started, you must have both an untraceable email account and phone number. The Intercept’s Micah Lee steps through the process to acquire both. You can get an email address from the likes of Sigaint or Riseup and only access them via Tor browser, ideally after booting up into a secure OS like Qubes, Tails or Whonix (note that merely searching for information on running these OSes and browser can flag you as a suspicious individual, meaning all your communication will be intercepted and retained indefinitely).

But it’s a lot harder to get an anonymous phone number. You need to buy a burner phone and SIM for cash, wait two weeks for the CCTV system in the store to overwrite the video of the transaction, then activate your phone far from home. Once you’ve used it to get a Twitter account-creation authentication SMS (again, nowhere near your home or office, and nowhere where there’s a record of you having traveled to), you need to destroy both the phone and the SIM.

That’s just to set up the account! Once you’ve got an account up and running, you need to prevent yourself from being identified by the quirks of your writing-style, by being phished through links, by tweeting information that only you know (possibly information that was selectively provided to you in order to test whether you are the leak in the system), by logging in without Tor browser, by uploading photos or other metadata-rich media, etc.

Anonymity is hard, and when your adversary is a large, powerful government, it’s even harder.


The previous owners of used “smart” cars can still control them via the cars’ apps (not just cars!)


It’s not just that smart cars’ Android apps are sloppily designed and thus horribly insecure; they are also deliberately designed with extremely poor security choices: even if you factory-reset a car after it is sold as used, the original owner can still locate it, honk its horn, and unlock its doors.

Again, this is by design: because auto-makers are worried about lockout and hacks (for example, a valet resetting your car to lock out your app), only the original dealer can sever the car’s connection with the cloud accounts of the original owner.

Charles Henderson, the leader of IBM’s X-Force Red security division presented on this risk at last week’s RSA conference in San Francisco (you can read his essay on the subject here). His ultimate recommendation is this counsel of despair: unless you are very technologically savvy, you should only buy new cars, not used ones.

It’s not just cars, either – the problem extends to smart appliances, thermostats, and other devices. Renting a house, staying in a hotel room, or buying a house without replacing its appliances and HVAC systems also exposes you to risks from the previous users of the devices in it.