Emergency Hotline: Call 1-844-363-1423 (United We Dream Hotline)
ICE Encounter

Coalition Social Media Strategy

Multi-organization social media coordination amplifies political and narrative power beyond what any single organization can achieve.

Strategic Goals

Goal Approach
Amplification Coordinated posting multiplies reach
Narrative control Consistent messaging prevents confusion
Rapid response Pre-coordinated channels enable speed
Resource efficiency Shared content reduces production burden
Safety Collective security protocols protect all

Coordinated Campaigns

Campaign Components

Element Description
Hashtag Unifying tag across all posts
Messaging guide Core messages, talking points
Visual assets Shared graphics, templates
Posting schedule Synchronized timing
Amplification protocol Who shares whose content
Paid strategy Targeted advertising plan

Hashtag Campaign Checklist

  • [ ] Research existing hashtag usage
  • [ ] Verify no negative associations
  • [ ] Test across platforms (length, readability)
  • [ ] Create in multiple languages
  • [ ] Brief all partner organizations
  • [ ] Prepare monitoring dashboard

Trending Strategies

Platform Trending Factors Strategy
Twitter/X Volume, velocity, engagement Coordinated post timing
Instagram Hashtag consistency, shares Story chains, reels
TikTok Engagement velocity, sounds Challenge formats
Facebook Group engagement, shares Group cross-posting

Cross-Posting Protocol

Lead Org Posts
      │
      ▼ (immediately)
┌─────────────────┐
│ Partner Orgs    │
│ Repost/Quote    │
└────────┬────────┘
         │ (+15 min)
         ▼
┌─────────────────┐
│ Influencer      │
│ Amplification   │
└────────┬────────┘
         │ (+30 min)
         ▼
┌─────────────────┐
│ Individual      │
│ Advocates       │
└─────────────────┘

Influencer Coordination

Tier Reach Engagement Strategy
Macro (100K+) Mass awareness Direct outreach, exclusive content
Mid-tier (10K-100K) Targeted communities Coalition relationship building
Micro (1K-10K) Deep trust Community organizer networks
Nano (<1K) Peer influence Toolkits for self-directed sharing

Monitoring and Response

Social Listening Tools

Tool Features Cost
NewsWhip Trending tracking, velocity analysis $300-1,200/mo
Mention Real-time alerts, sentiment $29-99/mo
Talkwalker Enterprise analytics $$$$
Google Trends Search trending Free
CrowdTangle Facebook/Instagram analysis Research access

Key Monitoring Queries

Type Example Queries
Enforcement activity "ICE raid" + [city], "immigration checkpoint"
Policy changes "immigration executive order", "DACA"
Misinformation "immigration news", viral claims
Community mentions Organization names, hashtags
Threats Organization names + hostile terms

Crisis Monitoring Dashboard

Display real-time metrics:

Widget Data
Mention velocity Spikes indicate emerging stories
Sentiment trend Shift toward negative may indicate attack
Geographic clusters Where conversations are happening
Influencer activity Who's driving narrative
Competitor messaging What opposition is saying

Misinformation Response

The Challenge

False narratives regarding border policies circulate widely, especially on:

  • WhatsApp (closed groups)
  • Facebook (community groups)
  • TikTok (viral misinformation)
  • YouTube (long-form disinfo)

Common Misinformation Types

Type Example Harm
False policy claims "New law exempts families" Dangerous border decisions
Scam promotion "Pay $X for guaranteed asylum" Financial exploitation
Fear amplification "Mass deportations starting tomorrow" Community panic
Rights confusion "You must open door for ICE" Rights violations

Counter-Narrative Framework

Step Action
1. Identify Track false claim through monitoring
2. Assess Gauge spread and potential harm
3. Verify Confirm facts with legal team
4. Respond Deploy fact-based correction
5. Amplify Coordinate coalition sharing
6. Monitor Track if correction is working

Response Principles

Do Don't
State correct information clearly Repeat the false claim
Provide trusted sources Attack those who shared misinfo
Use accessible language Use legal jargon
Translate to all languages Respond only in English
Share visuals Wall of text

Platform-Specific Response

Platform Strategy
Twitter/X Quote-tweet with correction, thread format
Facebook Comment on viral posts, create shareable graphic
Instagram Stories with swipe facts, saved highlights
WhatsApp Broadcast verified info to trusted group admins
TikTok Response video format, duet/stitch

Safety and Security

Threat Landscape

Immigration advocates face:

Threat Source
State surveillance DHS monitoring of activists
Coordinated harassment Organized trolling campaigns
Doxxing Exposure of personal information
Physical threats Based on online information
Account compromise Phishing, credential theft

Account Security Protocols

Measure Implementation
Multi-factor authentication Hardware keys preferred (YubiKey)
Unique passwords Use password manager (Bitwarden, 1Password)
Account separation Personal ≠ organizational accounts
Login alerts Enable all notification options
Trusted devices only No public computers
Recovery codes Store securely offline

Secure Account Setup

Platform Key Settings
Twitter/X Protect tweets option, remove phone from account
Facebook Limit profile visibility, disable face recognition
Instagram Private account option, hide activity status
LinkedIn Disable profile visibility to logged-out users
All Remove location data from posts

Harassment Response

Response Levels

Level Indicators Response
1 - Low Isolated negative comments Ignore or block
2 - Moderate Coordinated negative engagement Mute keywords, limit replies
3 - High Sustained campaign, threats Lock accounts, document, report
4 - Severe Doxxing, credible threats Law enforcement, security measures

Immediate Actions

When harassment begins:

  • [ ] Screenshot everything (with timestamps)
  • [ ] Enable comment filtering/moderation
  • [ ] Limit who can reply/comment
  • [ ] Alert coalition security coordinator
  • [ ] Brief staff on response protocol
  • [ ] Consider temporary account lock

Documentation for Reporting

Element What to Capture
Screenshots Full posts with usernames, timestamps
URLs Direct links to offending content
Patterns Evidence of coordination
Threats Exact language of threats
Personal info exposed What was doxxed
Timeline When harassment started, escalation

Platform Reporting

Platform Report Path Coalition Strategy
Twitter/X Report > Abuse Multiple orgs report same accounts
Facebook Report > Harassment Use trusted partner tools if available
Instagram Report > Bullying Restrict accounts before blocking
YouTube Flag > Harassment Submit detailed context

Anti-Doxxing Protocols

What is Doxxing?

Malicious exposure of private information to:

  • Enable physical harassment
  • Create fear and silence advocacy
  • Coordinate "swatting" attacks
  • Damage professional reputation

Prevention Checklist

For All Coalition Staff:

  • [ ] Google yourself; assess exposed information
  • [ ] Remove personal info from data broker sites
  • [ ] Separate personal and work online presence
  • [ ] Tighten privacy settings on all platforms
  • [ ] Remove home address from public records (if possible)
  • [ ] Use organization address for professional profiles
  • [ ] Enable credit monitoring and fraud alerts
  • [ ] Disable location services except when needed

Data Broker Removal

Service Function Cost
DeleteMe Automated removal from 40+ sites $129/year
Kanary Continuous monitoring + removal $89/year
Privacy Duck Manual removal service $500+ one-time
Manual Submit opt-out requests yourself Free (time-intensive)

Key data brokers to remove from:

  • Spokeo
  • WhitePages
  • BeenVerified
  • PeopleFinder
  • Intelius
  • LexisNexis

If Doxxed

Immediate steps:

  1. Document everything - Screenshots of where info appears
  2. Report to platforms - Request content removal
  3. Alert security - Coalition security coordinator
  4. Contact Access Now - Digital security helpline
  5. Assess physical risk - Consider temporary measures
  6. Legal options - Consult with attorney
  7. Support network - Don't handle alone

Security Resources

Resource Contact Purpose
Access Now Helpline accessnow.org/help 24/7 digital security
EFF eff.org Legal resources
Equality Labs equalitylabs.org Anti-doxxing guide
PEN America pen.org Writer/activist protection
Coalition security Internal contact Organizational response

Platform-Specific Safety

Twitter/X

Setting Recommendation
Protect tweets Enable during harassment
Remove phone number Reduces account recovery risk
Limit replies "Only people you follow" during crisis
Mute keywords Filter out harassment terms
Block lists Share across coalition

Facebook

Setting Recommendation
Profile visibility Friends only
Comment moderation Enable keyword filtering
Login alerts All notification methods
Face recognition Disable
Timeline review Enable for tags

Instagram

Setting Recommendation
Private account Enable during harassment
Restrict accounts Limit without blocking
Hidden words Add harassment terms
Story sharing Limit during crisis
Activity status Disable

Coordinated Posting Tools

Scheduling Platforms

Tool Features Cost
Buffer Simple scheduling, team access $15-99/mo
Hootsuite Multi-platform, analytics $99+/mo
Sprout Social Enterprise features $249+/mo
Later Visual planning, Instagram focus $18-80/mo
Native tools Platform schedulers Free

Workflow for Coalition Posts

Stage Action Timing
Drafting Lead org creates content -48 hours
Review Legal/comms approval -24 hours
Translation All required languages -12 hours
Distribution Share with partners -6 hours
Scheduling All orgs queue posts -2 hours
Launch Coordinated posting 0 hours
Amplification Cross-org engagement +0-2 hours
Monitoring Track performance Ongoing

Analytics & Improvement

Key Metrics

Metric What It Shows Target
Reach Total audience Growth
Engagement rate Content resonance >3%
Share rate Amplification success Track trends
Sentiment Community response Positive trend
Click-through Action conversion >1%

Post-Campaign Review

Question Measurement
Did we reach target audience? Demographics, geography
Was messaging consistent? Audit partner posts
Did we counter misinformation? Claim tracking
Were there security incidents? Harassment reports
What would we do differently? Team debrief

Security & Safety Checklist

Organizational

  • [ ] MFA enabled on all coalition accounts
  • [ ] Password manager deployed
  • [ ] Account access limited to essential staff
  • [ ] Recovery codes stored securely
  • [ ] Incident response plan documented

Individual Staff

  • [ ] Personal accounts separated from work
  • [ ] Privacy settings maximized
  • [ ] Data broker removal requested
  • [ ] Credit monitoring enabled
  • [ ] Security training completed

Ongoing

  • [ ] Monthly security audit
  • [ ] Quarterly password rotation
  • [ ] Regular doxxing vulnerability assessment
  • [ ] Harassment response drills
  • [ ] Security tool updates

Next Steps

  1. Review technical infrastructure for secure hosting
  2. Follow implementation roadmap for timeline
  3. Set up crisis communication for rapid response
Legal Disclaimer

This website does not provide legal advice. The information provided on this site is for general informational and educational purposes only. It does not create an attorney-client relationship.

Information on this website may not be current or accurate. Immigration law is complex and varies by jurisdiction and individual circumstances. Always consult with a qualified immigration attorney for advice specific to your situation.

Neither ICE Encounter, its developers, partners, nor any contributors shall be liable for any actions taken or not taken based on information from this site. Use of this site is subject to our Terms of Use and Privacy Policy.