Stage 1: Starting a Revolution

Starting a Revolution

Starting a revolution is not a thought most people wake up to. Nonetheless, if you decide to throw off the shackles that bind you, it makes sense to learn as much as you can, as quickly as you can. This page and those that follow, hopes to show ways of survival in a world turned upside down. Let there be no illusions. For better of for worse, your life will never be the same.

Revolutions build on momentum, often sparked by a single but insignificant incident. As more people join, they realize that they too are not alone in their resentment. People, who only a few days ago had felt hopeless, start rallying together. It does not take long for the minor incident that started the spark to transform into a list of grievances.

As people on the sidelines join in, some lose the fear they have held their whole lives. Emboldened with a new vision of a future, that only yesterday seemed impossible, they dream of what they want for their futures. Losing this fear causes others to feed off their courage, driving even more out to the streets. Before long critical mass reaches a tipping point – a revolution is born.

As momentum builds, internal or external powers start favoring the protesters. When these powers see the protesters as the future, they start worrying about their own future interests. Protesters must quickly get most of these forces on their side, without alienating dissenting opinions. Their very survival depends on it.

If momentum is lost, the revolution may be as well. It is important to note that once momentum is on the side of the revolution, complacency is no longer an option. To turn momentum into a force to reckon with it must become a 24/7 event. To keep it going it requires stamina and quick thinking by all those involved.

A regime collapses when insiders, such as police, army, and senior officials turn against it. On the other hand, if these insiders think they have more to lose by revolution, even mass protests are in trouble. Protesters, and those who support them, must give insiders a reason to join while at the same time not giving too much. History is full of revolutions that simply replace one dictator with another.

Avoid the censors

Avoiding the censors is probably the first step in planning. Censored words are wasted words, if no one can hear them.

When using the internet, government computers censor key words and phrases. These computers are not as successful at censoring words misspelled intentionally. To avoid censorship you might be successful by simply misspelling words in your message.

Misspellings, and other tricks you might try, may immediately draw a human’s attention. On the other hand, you might fool a computer because they are not interested in investigating further. Be aware, however, that misspellings are a poor substitute to encryption and more secure methods. The government will eventually catch on to misspellings. Use them at your own risk!

The easiest suggestions listed here are simple and probably outdated. If used they might even offer a false sense of security. I am a noob when it comes to censorship, but am hoping that this page will lead someone to help with information that makes this website, and our members, more secure.

We would be appreciative if people who deal with censorship would let us know if the suggestions below work, along with the tricks that they know of. In addition, what other security measures does this website need to protect people from foreign governments and hackers? Please add ideas on censorship, by leaving a comment below.

I have not tried the suggestions provided here mainly because I do not worry about censorship. However, I have done some searches on the internet and have come up with a few hints.

  • Never use your real name
  • Do not make it easy for the censors. If censorship is a concern, find out which words to avoid.
  • Change around the letters of banned words such as (Tree Fibet = Free Tibet)
  • Exchange certain letters for other letters and include a cipher on the page, in a separate email, or regular mail for your intended audience.
    • c=s; b=h
    • Bow san I avoid the sencorc? = How can I avoid the censors?
    • a=o, o=a; i=e, e=i
    • Haw con e ovaed thi cinsars? = How can I avoid the censors?
  • Use advanced encryption and code whenever possible.
  • Are encrypted files automatically flagged in your area?
  • If you know html, try putting your message in the head section, instead of the body.
  • Keep a list of monitored websites, and share lists with your friends.
  • To protect your anonymity and censorship, learn how to use a proxy. See below

Avoid internet blocking

The authorities may block normal internet hyperlinks. Let us know if you cannot access links on our site, or if you know of links we should use.

Read material off-line

Learn how to save what you need on your computer to view off-line later. When you discover a useful website with tips and answers, the government may block these websites the next time you visit. This problem will not exist if you have already saved what you need.

  • Search the internet on how to Save website or webpages offline
  • Internet Explorer 7.0, and older versions, has an option for synchronizing entire web sites for off-line viewing. Unfortunately, this option is no longer available in newer browsers.
  • HTTrack- free synchronizing software
  • SurfOffline- 30-day trial period synchronizing software

Another reason for saving off-line is for the day when the government shuts down the internet entirely. Be ready for this eventuality.


People used to organize with flyers, posters, word of mouth, and other means. These methods still have enormous value, especially once the government shuts down normal communications and the internet. Protesters must expect that eventually all media, cell phones, regular phone lines, and even news services, will become unavailable or sporadic at best. Do not get caught off guard.

Learn about other means of communicating that are available. Some of them have been around for thousands of years just waiting for rediscovery. Ancient means, along with more modern methods like walkie-talkies, two-way radios, semaphore, and Morse code, are just some ways of communicating. Embrace any way of communicating that cannot be turned off simply by flipping a switch.

Social and news media

When speaking to the media do it secretly and anonymously. If the dictator is not overthrown, people who spoke openly to the media will be in great danger for years to come. Once the dictator is overthrown, this may still be an issue because members of the old regime may still seek revenge. Never use your own name. Use a nom de guerre if speaking to the news media. Use a screen name when using social media.

Be aware that dictators have their own reporters secretly seeking you out. For more information, see Reporters and photographers. If you are an amateur reporting on events, see Reporting on protests.

  • Facebook, Myspace, Google Groups, blogging, etc, is invaluable for organizing, but once the government learns who is using them they become vulnerable.
  • Twitter is better suited for coordinating events rapidly. Due to its high use of acronyms and word play, it should get through censorship easier. Its limited text may make it safer as well.
  • YouTube is used to show the world what is happening. A picture is worth a thousand words.
  • Do not take close up photographs of protesters faces.
  • Avoid endangering friends.
  • Learn how to Avoid the censors.
  • Learn how to Avoid internet blocking.
  • Must see Links: Publishing photos and taking pictures


Lines of communications are the lifeblood to every conflict. Without communications reports go unreported, orders unfulfilled, and coordinating large groups is impossible.

Cell phones are good as long as there is service. Social media is good only when it is available.

Ever since hollering went out of fashion, people have found ways of communicating secretly. Guard known communication centers heavily. Alternatively, if centers are secret, only small groups and insiders should know of them. It is imperative that communications stay open, secret, and accurate.

Along with communicating to your own forces, tapping into enemy communications is vital. Just make sure that the enemy does not tap into yours, except when you want them too. See Misinformation and Deception.

Disrupting communications is extremely effective. When done right before a conflict, the enemy will need time to realize their vulnerability and time to repair the damage. Time, in these situations, is not on their side.

Freedom fighters using cell phones, or regular phone service, will find their conversations overheard by the enemy. Newly formed rebel armies need time to learn how to avoid known frequencies or the ability to use scrambled channels. The only option is to use a code worked out well in advance. When lives are at stake, leave nothing to chance.

There are ancient and efficient ways of communicating available to anyone. The key is to learn how to use them before they are needed. When services are disrupted, and they will be, it is imperative to get this service back if possible. Barring that, keep up communications using all other means.

How communication was achieved in the past was due to the genius and imagination of mankind for generations. Below are a few methods to consider. Some are more modern, some are more basic.

  • Walkie-talkies are good for short distances but are prone to eavesdropping.
  • CB Radios are good for short distances, but are especially prone to eavesdropping.
  • Two-way radios are good for medium distances. Better units use scrambling ability. Cheaper units are prone to eavesdropping.
  • Ham Radios are good for longer distances, but again they are prone to eavesdropping.
  • Field phones wired together are not prone to eavesdropping unless someone taps into the wire. The military used them for a long time, but with modern radios, they are now obsolete. They may still be available in some surplus stores. Someone with basic electronics skills could build them from scratch.
  • Semaphore is an ancient technology and uses flags or hand signals to speak over line of sight distances. The larger the flags, the further the distance they can be seen.
  • Morse code can be used when two or more simple electrical telegraph machines are wired together. They are not prone to eavesdropping unless someone taps into the wires.
  • Tin can telephone is a system many of us built as children. It consists of two old tin cans with a hole punched in each bottom. A string strung between the cans, is pulled through each hole and knotted or tied to toothpicks at each end. This system can be used short distances and would come in handy between two buildings facing each other, especially in rooms higher than the first floor. Aluminum cans with mono-filament fishing line make a very good phone.) NOTE: the string has to be tight so that it vibrates properly, it cannot touch anything, and it will not work in high winds.
    To go around corners, rather than using string, use a suitable length of polythene tubing or equivalent, or setup a Speaking tube, which goes a lot farther.
  • Speaking tube can be setup in every room in a house or building. As long as the opposition is not living inside the building, it is difficult to compromise without some kind of bugging device. It is essentially a copper tube between two or more points and can go around corners.
    Some tube systems have a whistle that will sound when someone blows on the other end. When the caller blows into the tube, the receiver end sounds the whistle. Many ocean liners and battleships employed this system. The distances were 300 feet or more between the bridge and an incredibly noisy engine room. Even over the noise of the engines, people could hear clearly.
by Scott M. Eaton
Created: May 20, 2011
Modified: March 25,2013

<< Top of page >>

10 comments on “Stage 1: Starting a Revolution
  1. Asa Bollacker says:

    You made some decent points there. I looked on the internet for the issue and found most individuals will go along with with your website.

  2. Neil Hunter says:

    I’ve learn several good stuff here. Definitely price bookmarking for revisiting. I surprise how so much attempt you put to make this kind of fantastic informative web site.

  3. Alberto Straface says:

    Hello there! I know this is kinda off topic but I was wondering which blog platform are you using for this website? I’m getting sick and tired of WordPress because I’ve had problems with hackers and I’m looking at options for another platform. I would be awesome if you could point me in the direction of a good platform.

  4. Jame Gustaveson says:

    Greetings I am so happy I found your website, I really found you by mistake, while I was browsing on Askjeeve for something else, Anyhow I am here now and would just like to say cheers for a tremendous post and a all round thrilling blog (I also love the theme/design), I don’t have time to read it all at the moment but I have saved it and also included your RSS feeds, so when I have time I will be back to read more, Please do keep up the great work.

  5. Daveigh says:

    That’s going to make tihngs a lot easier from here on out.

  6. Latesha says:

    I could read a book about this without fiinndg such real-world approaches!

  7. Moises Deyarmin says:

    Hi there just wanted to give you a quick heads up. The text in your article seem to be running off the screen in Ie. I’m not sure if this is a formatting issue or something to do with browser compatibility but I figured I’d post to let you know. The style and design look great though! Hope you get the issue solved soon. Many thanks

  8. Ronny Rosky says:

    Nice blog! Is your theme custom made or did you download it from somewhere? A design like yours with a few simple tweeks would really make my blog stand out. Please let me know where you got your theme. Cheers

    • Scott Eaton says:

      I’m using Word Press for the time being. Eventually this site may be designed using Drupal.

      Word Press is easy to start with, and it will work perfectly if blogging is all you need. It is however limited in scope, for what I have planned.

Leave a Reply

Your email address will not be published.

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>