Templates
Downloadable templates and checklists to help you start and run your cell.
CUSTOMIZE
These are starting points. Adapt them to your community's needs, language, and context.
Checklists
Founding Team Checklist
FOUNDING TEAM STARTUP CHECKLIST
Before Launch:
[ ] 3-5 founders identified and committed
[ ] All founders deeply trust each other
[ ] Core Principles reviewed and agreed
[ ] Security training completed together
[ ] Signal infrastructure set up
[ ] Steward roles assigned
[ ] Decision-making process agreed
[ ] Meeting schedule established
First Month:
[ ] Initial segments defined
[ ] Onboarding process documented
[ ] First members identified for vouching
[ ] First activities planned
[ ] Emergency protocols establishedNew Member Onboarding Checklist
ONBOARDING CHECKLIST
Vouching:
[ ] Voucher confirms they trust prospect
[ ] Onboarding Steward notified
[ ] Initial conversation scheduled
Initial Conversation:
[ ] Steward, voucher, and prospect meet
[ ] Cell explained, questions answered
[ ] Commitment and expectations clear
[ ] Decision made to proceed (or not)
Security Training:
[ ] Signal installed and configured
[ ] Screen Lock enabled
[ ] Registration Lock enabled
[ ] Disappearing messages explained
[ ] Device security reviewed
[ ] Compartmentalization explained
[ ] What NOT to share reviewed
[ ] Compromise protocol reviewed
Probation Start:
[ ] Added to one segment group
[ ] Voucher and segment lead notified
[ ] First activities assigned
[ ] Check-in schedule set
Probation Complete:
[ ] Segment lead assessment
[ ] Voucher feedback
[ ] Trusted status confirmed
[ ] Full segment access grantedSecurity Audit Checklist
MONTHLY SECURITY AUDIT
For All Members:
[ ] Signal still configured correctly
[ ] Phone lock enabled
[ ] No unnecessary data stored
[ ] Disappearing messages active in all groups
For Stewards:
[ ] Group membership reviewed
[ ] Former members removed
[ ] Admin list current
[ ] No unnecessary message history
For the Cell:
[ ] Any security concerns from past month?
[ ] Anyone need retraining?
[ ] Any process improvements needed?
[ ] Compromise protocol still known by all?Role Cards
Segment Lead Role Card
SEGMENT LEAD
Responsibilities:
• Manage segment Signal group
• Coordinate segment activities
• Onboard new members to segment (after vetting)
• Ensure security practices followed
• Report capacity to Logistics Coordinator
You Know:
• Your segment members
• Other segment leads
• Logistics Coordinator
You Don't Know:
• Members of other segments
• Operational details of other segments
• Locations of vulnerable individuals
Security Reminders:
• Strongest device security required
• Regular group membership review
• Succession plan in placeSample Role Cards for Other Positions
You can create similar cards for:
- Onboarding Steward
- Communications Steward
- Logistics Coordinator
- Segment Members
Signal Group Templates
Group Description Template
[NEUTRAL GROUP NAME]
Disappearing: 1 week
Members: Approved by admin only
Purpose: [Internal reference only]
Remember: Nothing specific about locations or identities.Welcome Message Template
Welcome to [Group Name]!
Before participating:
✓ Verify Signal is configured (disappearing messages, screen lock)
✓ Read Security Handbook: [link]
✓ Know: What we discuss here, stays here
Questions? Contact [Segment Lead role, not name]Emergency Protocols
If Someone is Detained
DETENTION RESPONSE
Immediately:
1. Confirm detention (who, when, where, by whom)
2. Alert Legal Observers segment
3. Contact immigration attorney
4. Alert family emergency contact
Do NOT:
• Post on social media
• Discuss details in large groups
• Speculate about reasons
Document:
• Time and location
• Agency involved
• Names/badge numbers if known
• WitnessesIf Compromise Suspected
COMPROMISE PROTOCOL
If you suspect a security breach:
1. PAUSE all activities
2. ALERT Stewards through separate channel
3. ASSESS what information may be compromised
4. CONTAIN — who needs to know?
5. DECIDE response based on severity
Levels:
• Device lost/stolen → Member changes accounts, removed from groups
• Member compromised → Revoke access, assess exposure
• Segment compromised → Stand down segment, assess
• Active threat → Full stand-down, in-person coordination only