How to prevent giving the Social Injustice Warrior access to your network
Blocking access to network infiltration
I’ve been interested in the reporting about the attempt to dismantle DEI initiatives from higher education institutions, such as Ivy league universities, from both the political left and right perspectives.
I came across work from James Lindsay about spotting the pattern of Woke infiltration on X and saw parallels between his description and my description of how bullies come into and stay in power because of their active and passive enablers.
I appreciate frameworks that describe a recurring pattern in different social spheres even if I’m uninterested in the author’s politics. Before some of you run for the hills because you’re not a fan of his work and political views (or even you are a fan), this piece is inspired by his framework based on entryism and not an analysis of his work.
I have witnessed and heard testimonies about this process of leadership replacement in friend groups, social media/audio groups, spiritual communities, gaming communities (h/t Sasha V) non-profit organisations, in academic departments and Zimbabwe (described by Yuri Bezmenov) by individuals/group who forced their way in, diverted the group’s direction, overthrew leadership and destroyed what took years to build in a short period of time.
Unless you’re new to my work, you already know I like to describe the seemingly invisible, subtle interpersonal dynamics and domination tactics that precede power struggles. If you’re looking for writers on mostly overt narcissistic behaviours in individuals, I recommend writersJosh Slocum Ginger Coy Dr Marcus Morris Sam Ray Jordan Schaul PhD and Rob Hendersonon this platform.
This piece is going to focus on STEP 1 - Demand Access of the infiltration process whereby an individual with a need for power gains access to a social group, community or an institution without force to produce a similar outcome as described above in your community, organisation or institution.


