Coalition Social Media Strategy
Multi-organization social media coordination amplifies political and narrative power beyond what any single organization can achieve.
Strategic Goals
| Goal | Approach |
|---|---|
| Amplification | Coordinated posting multiplies reach |
| Narrative control | Consistent messaging prevents confusion |
| Rapid response | Pre-coordinated channels enable speed |
| Resource efficiency | Shared content reduces production burden |
| Safety | Collective security protocols protect all |
Coordinated Campaigns
Campaign Components
| Element | Description |
|---|---|
| Hashtag | Unifying tag across all posts |
| Messaging guide | Core messages, talking points |
| Visual assets | Shared graphics, templates |
| Posting schedule | Synchronized timing |
| Amplification protocol | Who shares whose content |
| Paid strategy | Targeted advertising plan |
Hashtag Campaign Checklist
- [ ] Research existing hashtag usage
- [ ] Verify no negative associations
- [ ] Test across platforms (length, readability)
- [ ] Create in multiple languages
- [ ] Brief all partner organizations
- [ ] Prepare monitoring dashboard
Trending Strategies
| Platform | Trending Factors | Strategy |
|---|---|---|
| Twitter/X | Volume, velocity, engagement | Coordinated post timing |
| Hashtag consistency, shares | Story chains, reels | |
| TikTok | Engagement velocity, sounds | Challenge formats |
| Group engagement, shares | Group cross-posting |
Cross-Posting Protocol
Lead Org Posts
│
▼ (immediately)
┌─────────────────┐
│ Partner Orgs │
│ Repost/Quote │
└────────┬────────┘
│ (+15 min)
▼
┌─────────────────┐
│ Influencer │
│ Amplification │
└────────┬────────┘
│ (+30 min)
▼
┌─────────────────┐
│ Individual │
│ Advocates │
└─────────────────┘
Influencer Coordination
| Tier | Reach | Engagement Strategy |
|---|---|---|
| Macro (100K+) | Mass awareness | Direct outreach, exclusive content |
| Mid-tier (10K-100K) | Targeted communities | Coalition relationship building |
| Micro (1K-10K) | Deep trust | Community organizer networks |
| Nano (<1K) | Peer influence | Toolkits for self-directed sharing |
Monitoring and Response
Social Listening Tools
| Tool | Features | Cost |
|---|---|---|
| NewsWhip | Trending tracking, velocity analysis | $300-1,200/mo |
| Mention | Real-time alerts, sentiment | $29-99/mo |
| Talkwalker | Enterprise analytics | $$$$ |
| Google Trends | Search trending | Free |
| CrowdTangle | Facebook/Instagram analysis | Research access |
Key Monitoring Queries
| Type | Example Queries |
|---|---|
| Enforcement activity | "ICE raid" + [city], "immigration checkpoint" |
| Policy changes | "immigration executive order", "DACA" |
| Misinformation | "immigration news", viral claims |
| Community mentions | Organization names, hashtags |
| Threats | Organization names + hostile terms |
Crisis Monitoring Dashboard
Display real-time metrics:
| Widget | Data |
|---|---|
| Mention velocity | Spikes indicate emerging stories |
| Sentiment trend | Shift toward negative may indicate attack |
| Geographic clusters | Where conversations are happening |
| Influencer activity | Who's driving narrative |
| Competitor messaging | What opposition is saying |
Misinformation Response
The Challenge
False narratives regarding border policies circulate widely, especially on:
- WhatsApp (closed groups)
- Facebook (community groups)
- TikTok (viral misinformation)
- YouTube (long-form disinfo)
Common Misinformation Types
| Type | Example | Harm |
|---|---|---|
| False policy claims | "New law exempts families" | Dangerous border decisions |
| Scam promotion | "Pay $X for guaranteed asylum" | Financial exploitation |
| Fear amplification | "Mass deportations starting tomorrow" | Community panic |
| Rights confusion | "You must open door for ICE" | Rights violations |
Counter-Narrative Framework
| Step | Action |
|---|---|
| 1. Identify | Track false claim through monitoring |
| 2. Assess | Gauge spread and potential harm |
| 3. Verify | Confirm facts with legal team |
| 4. Respond | Deploy fact-based correction |
| 5. Amplify | Coordinate coalition sharing |
| 6. Monitor | Track if correction is working |
Response Principles
| Do | Don't |
|---|---|
| State correct information clearly | Repeat the false claim |
| Provide trusted sources | Attack those who shared misinfo |
| Use accessible language | Use legal jargon |
| Translate to all languages | Respond only in English |
| Share visuals | Wall of text |
Platform-Specific Response
| Platform | Strategy |
|---|---|
| Twitter/X | Quote-tweet with correction, thread format |
| Comment on viral posts, create shareable graphic | |
| Stories with swipe facts, saved highlights | |
| Broadcast verified info to trusted group admins | |
| TikTok | Response video format, duet/stitch |
Safety and Security
Threat Landscape
Immigration advocates face:
| Threat | Source |
|---|---|
| State surveillance | DHS monitoring of activists |
| Coordinated harassment | Organized trolling campaigns |
| Doxxing | Exposure of personal information |
| Physical threats | Based on online information |
| Account compromise | Phishing, credential theft |
Account Security Protocols
| Measure | Implementation |
|---|---|
| Multi-factor authentication | Hardware keys preferred (YubiKey) |
| Unique passwords | Use password manager (Bitwarden, 1Password) |
| Account separation | Personal ≠ organizational accounts |
| Login alerts | Enable all notification options |
| Trusted devices only | No public computers |
| Recovery codes | Store securely offline |
Secure Account Setup
| Platform | Key Settings |
|---|---|
| Twitter/X | Protect tweets option, remove phone from account |
| Limit profile visibility, disable face recognition | |
| Private account option, hide activity status | |
| Disable profile visibility to logged-out users | |
| All | Remove location data from posts |
Harassment Response
Response Levels
| Level | Indicators | Response |
|---|---|---|
| 1 - Low | Isolated negative comments | Ignore or block |
| 2 - Moderate | Coordinated negative engagement | Mute keywords, limit replies |
| 3 - High | Sustained campaign, threats | Lock accounts, document, report |
| 4 - Severe | Doxxing, credible threats | Law enforcement, security measures |
Immediate Actions
When harassment begins:
- [ ] Screenshot everything (with timestamps)
- [ ] Enable comment filtering/moderation
- [ ] Limit who can reply/comment
- [ ] Alert coalition security coordinator
- [ ] Brief staff on response protocol
- [ ] Consider temporary account lock
Documentation for Reporting
| Element | What to Capture |
|---|---|
| Screenshots | Full posts with usernames, timestamps |
| URLs | Direct links to offending content |
| Patterns | Evidence of coordination |
| Threats | Exact language of threats |
| Personal info exposed | What was doxxed |
| Timeline | When harassment started, escalation |
Platform Reporting
| Platform | Report Path | Coalition Strategy |
|---|---|---|
| Twitter/X | Report > Abuse | Multiple orgs report same accounts |
| Report > Harassment | Use trusted partner tools if available | |
| Report > Bullying | Restrict accounts before blocking | |
| YouTube | Flag > Harassment | Submit detailed context |
Anti-Doxxing Protocols
What is Doxxing?
Malicious exposure of private information to:
- Enable physical harassment
- Create fear and silence advocacy
- Coordinate "swatting" attacks
- Damage professional reputation
Prevention Checklist
For All Coalition Staff:
- [ ] Google yourself; assess exposed information
- [ ] Remove personal info from data broker sites
- [ ] Separate personal and work online presence
- [ ] Tighten privacy settings on all platforms
- [ ] Remove home address from public records (if possible)
- [ ] Use organization address for professional profiles
- [ ] Enable credit monitoring and fraud alerts
- [ ] Disable location services except when needed
Data Broker Removal
| Service | Function | Cost |
|---|---|---|
| DeleteMe | Automated removal from 40+ sites | $129/year |
| Kanary | Continuous monitoring + removal | $89/year |
| Privacy Duck | Manual removal service | $500+ one-time |
| Manual | Submit opt-out requests yourself | Free (time-intensive) |
Key data brokers to remove from:
- Spokeo
- WhitePages
- BeenVerified
- PeopleFinder
- Intelius
- LexisNexis
If Doxxed
Immediate steps:
- Document everything - Screenshots of where info appears
- Report to platforms - Request content removal
- Alert security - Coalition security coordinator
- Contact Access Now - Digital security helpline
- Assess physical risk - Consider temporary measures
- Legal options - Consult with attorney
- Support network - Don't handle alone
Security Resources
| Resource | Contact | Purpose |
|---|---|---|
| Access Now Helpline | accessnow.org/help | 24/7 digital security |
| EFF | eff.org | Legal resources |
| Equality Labs | equalitylabs.org | Anti-doxxing guide |
| PEN America | pen.org | Writer/activist protection |
| Coalition security | Internal contact | Organizational response |
Platform-Specific Safety
Twitter/X
| Setting | Recommendation |
|---|---|
| Protect tweets | Enable during harassment |
| Remove phone number | Reduces account recovery risk |
| Limit replies | "Only people you follow" during crisis |
| Mute keywords | Filter out harassment terms |
| Block lists | Share across coalition |
| Setting | Recommendation |
|---|---|
| Profile visibility | Friends only |
| Comment moderation | Enable keyword filtering |
| Login alerts | All notification methods |
| Face recognition | Disable |
| Timeline review | Enable for tags |
| Setting | Recommendation |
|---|---|
| Private account | Enable during harassment |
| Restrict accounts | Limit without blocking |
| Hidden words | Add harassment terms |
| Story sharing | Limit during crisis |
| Activity status | Disable |
Coordinated Posting Tools
Scheduling Platforms
| Tool | Features | Cost |
|---|---|---|
| Buffer | Simple scheduling, team access | $15-99/mo |
| Hootsuite | Multi-platform, analytics | $99+/mo |
| Sprout Social | Enterprise features | $249+/mo |
| Later | Visual planning, Instagram focus | $18-80/mo |
| Native tools | Platform schedulers | Free |
Workflow for Coalition Posts
| Stage | Action | Timing |
|---|---|---|
| Drafting | Lead org creates content | -48 hours |
| Review | Legal/comms approval | -24 hours |
| Translation | All required languages | -12 hours |
| Distribution | Share with partners | -6 hours |
| Scheduling | All orgs queue posts | -2 hours |
| Launch | Coordinated posting | 0 hours |
| Amplification | Cross-org engagement | +0-2 hours |
| Monitoring | Track performance | Ongoing |
Analytics & Improvement
Key Metrics
| Metric | What It Shows | Target |
|---|---|---|
| Reach | Total audience | Growth |
| Engagement rate | Content resonance | >3% |
| Share rate | Amplification success | Track trends |
| Sentiment | Community response | Positive trend |
| Click-through | Action conversion | >1% |
Post-Campaign Review
| Question | Measurement |
|---|---|
| Did we reach target audience? | Demographics, geography |
| Was messaging consistent? | Audit partner posts |
| Did we counter misinformation? | Claim tracking |
| Were there security incidents? | Harassment reports |
| What would we do differently? | Team debrief |
Security & Safety Checklist
Organizational
- [ ] MFA enabled on all coalition accounts
- [ ] Password manager deployed
- [ ] Account access limited to essential staff
- [ ] Recovery codes stored securely
- [ ] Incident response plan documented
Individual Staff
- [ ] Personal accounts separated from work
- [ ] Privacy settings maximized
- [ ] Data broker removal requested
- [ ] Credit monitoring enabled
- [ ] Security training completed
Ongoing
- [ ] Monthly security audit
- [ ] Quarterly password rotation
- [ ] Regular doxxing vulnerability assessment
- [ ] Harassment response drills
- [ ] Security tool updates
Next Steps
- Review technical infrastructure for secure hosting
- Follow implementation roadmap for timeline
- Set up crisis communication for rapid response