Skip to content Skip to footer

Blocking of lines of command and information

This is part of a series on nonviolent protest methods, which explains approaches and provides inspirational examples from history. For additional resources, please explore the Museum of Protest’s activist guides and view items in the collection.

When protesters cut telephone wires on the night before D-Day, they weren’t just sabotaging infrastructure—they were severing the nervous system of Nazi occupation.

Method #143 in Gene Sharp’s framework of nonviolent action, blocking lines of command and information targets the communications that allow power to function. Without the ability to issue orders, coordinate responses, or control information, even the most repressive systems become paralyzed. From French Resistance fighters severing over 1,000 communication cables in a single night to telegram operators organizing strikes via the very telegraph lines they controlled, this tactic has proven remarkably effective across vastly different contexts.

This method belongs to Sharp’s category of “Political Noncooperation—Action by Government Personnel,” which means its power comes primarily from insiders withdrawing cooperation rather than outsiders attacking systems. The distinction matters enormously for both effectiveness and ethics. When communication workers refuse to transmit orders, when bureaucrats withhold information, when soldiers refuse to relay commands—the apparatus of control breaks down from within.

Why communication systems are the nervous system of power

Every organization depends on information flowing between decision-makers and those who carry out decisions. Cut that flow, and the organization cannot function. Military analysts have long recognized this vulnerability—disrupting command-and-control capabilities is a fundamental objective in warfare because it prevents coordinated response.

Centralized, hierarchical systems are far more vulnerable than decentralized ones. A dictatorship that funnels all decisions through a small group creates natural chokepoints. When German coastal batteries lost contact with headquarters on D-Day night, they had to operate independently, unable to coordinate their defense. The 716th Infantry Division lost contact with forward positions for over 12 hours—an eternity during an invasion.

The most effective chokepoints to target include communication nodes where multiple lines converge, decision-making bottlenecks requiring specific approvals, documentation chains where records must be created and transmitted, and translation points where information changes format. Identifying these chokepoints requires careful analysis of how an opponent’s organization actually functions, not just how it appears on paper.

The French Resistance’s systematic communication warfare

The French Resistance didn’t improvise their D-Day sabotage—they planned it for years through seven coordinated operations. Plan Violet specifically targeted telephone and telegraph lines, while Plans Vert, Bleu, Tortue, Rouge, Noir, and Jaune attacked railways, power lines, roads, ammunition dumps, fuel depots, and command posts respectively. This systematic approach ensured comprehensive disruption rather than scattered pinpricks.

The first Frenchman executed for resistance activities was Pierre Roche, just 19 years old, caught cutting telephone lines between Royan and La Rochelle in September 1940. Etienne Achavanne destroyed telephone cables connecting the Boos aerodrome to German headquarters in Rouen even earlier, in June 1940. These early martyrs established that communication sabotage was recognized as a serious threat from the very beginning of occupation.

The results were dramatic. On D-Day night, coordinated Resistance strikes severed over 1,000 communication cables throughout Normandy. German commanders were forced onto radio communications—which the Allies could intercept thanks to Enigma decryption. The 2nd SS Panzer Division “Das Reich” took days longer than planned to reach Normandy, with German troop movements slowed to approximately 25% of potential speed. Plan Vert alone destroyed 577 railroad lines and 1,500 locomotives.

Virginia Hall, an American SOE agent who had lost her leg in a hunting accident, organized airdrops and directed resistance fighters to cut rail, telephone, and telegraph lines preventing German reinforcements from reaching the invasion front. Simone Michel Lévy, codenamed “Emma,” used her position in the French postal and telegraph service to obtain intelligence and transmit it to London—she was later executed at Ravensbrück concentration camp. These examples show both the effectiveness and the mortal risks of this tactic under occupation.

Polish resistance operations and the power of organized sabotage

The Polish Home Army (Armia Krajowa) built one of the most sophisticated resistance operations in occupied Europe. Their statistics are staggering: over 7,000 German trains destroyed, 5,000 vehicles destroyed, 6,930 locomotives disabled, and 732 train derailments. Critically, they provided 43% of all intelligence reports from occupied Europe to British agencies—demonstrating how blocking enemy communications often combines with gathering and transmitting information to allies.

Named operations illustrate their organizational sophistication. Operation Wieniec (Wreath) in October 1942 coordinated attacks on railroads, bridges, and supply depots near Warsaw and Lublin—the first major coordinated sabotage action. Operation N, led by Tadeusz Żenczykowski from April 1941, conducted psychological warfare by creating German-language publications that appeared to come from within Germany, sowing confusion about who was loyal to Hitler.

The Cichociemni (“Silent Unseen”) were 606 elite special operations soldiers trained by SOE in England, then parachuted into Poland. Their training included wireless operation, micro-photography, and cryptography—skills specifically designed for maintaining secret communications while disrupting enemy ones. This investment in specialized communication capabilities shows that effective blocking requires building alternative channels simultaneously.

When civil servants became the resistance in Denmark

Denmark’s resistance took a different form—working within the system rather than conducting armed operations. “The Princes” were intelligence officers from the Danish Army who began channeling reports to London just four days after occupation began on April 13, 1940. They used their positions of trust to extract and transmit information the Germans thought was secure.

The most dramatic example of civil servants blocking information flow came in September 1943. German diplomat Georg Ferdinand Duckwitz learned of Hitler’s plans to deport Danish Jews. Rather than stay silent, he leaked the information to Hans Hedtoft, chairman of the Danish Social Democratic Party. The information chain continued: Hedtoft to the Danish Resistance to C.B. Henriques, head of the Jewish community, to Rabbi Marcus Melchior. The result: 7,500 of 8,000 Danish Jews escaped to Sweden. The entire Danish resistance is now honored collectively as “Righteous Among the Nations” at Yad Vashem.

This illustrates a crucial point about blocking information flows: sometimes the most powerful action is passing information through unofficial channels rather than allowing it to remain in official ones. Duckwitz used his position not to stop information entirely, but to redirect it where it could save lives.

How telegram operators organized using their own system

The 1908 Indian Telegraph General Strike demonstrated a paradox: communication workers can use the very systems they control to organize against their employers. Telegraph operators across British India—from Rangoon to Calcutta, Bombay to Lahore—used their own network to coordinate resistance. They sent code signals like “Diabolic 15,” meaning “general strike at 3 pm.”

Their tactics went beyond simply refusing to work. They engaged in go-slow actions, deliberately reducing transmission speeds. They caused “engineering faults,” fusing wires and rendering systems dysfunctional. They organized mass sick-outs using medical certificates. In a single day, 116 identical memorials flooded the Viceroy’s office from Bombay alone.

The impact was severe. Over 8,000 messages accumulated and were delayed. The government stopped accepting ordinary telegrams, allowing only urgent messages at double price. Trade across India was paralyzed. When the government deployed military telegraphers as replacements, they couldn’t operate the new high-speed “Baudot” instruments—showing that specialized workers possess irreplaceable knowledge.

The 12-day strike won a roughly 20% pay increase and official recognition of the Telegraph Association. Leader Henry Barton met with government representatives as the head of a recognized organization. This success established a model that would be repeated: communication workers have unique leverage because they control the infrastructure their employers depend on.

The 1970 postal strike that shook American government

In March 1970, postal workers earning $6,176 per year—low enough that many qualified for welfare—watched Congress give itself a 41% raise while offering them 5.4%. The response was the largest wildcat strike in American history, starting in New York City and spreading to 200 cities across 13 states.

The postal workers defied federal law prohibiting strikes by government workers. They ignored court injunctions. When their national union leadership tried to end the walkout, rank-and-file members refused to comply. The strike demonstrated that when workers who handle communications decide to stop, there’s often no effective way to force them to continue.

The impact was immediate and comprehensive. The stock market fell amid concerns about whether it would have to close. Vietnam draft notices couldn’t be delivered. Financial documents froze in transit. President Nixon deployed 23,000 National Guard and military personnel to New York City, but they were ineffective—they simply didn’t know how to sort mail.

The outcome was victory: collective bargaining rights (though not the right to strike), a 14% wage increase, and creation of the US Postal Service as an independent agency. The strike showed that blocking information flows doesn’t require sabotage—it can be achieved simply by workers declining to perform their normal duties.

Irish communication warfare during the independence struggle

During Ireland’s War of Independence (1919-1921), the IRA systematically targeted British communication infrastructure. Sabotage hit railways, telegraph lines, and government buildings. But some of the most effective disruption came from workers who stayed at their posts.

Post office workers diverted letters intended for the British administration. They decoded military communications and forwarded copies to the IRA. They used post office safes for safekeeping of republican documents. Envelopes marked “O.H.M.S.” (On His Majesty’s Service) were repurposed to signify republican dispatches. Postmen recruited telegraph boys to send messages secretly.

Michael Collins built an intelligence network that infiltrated British communications so thoroughly that the IRA held “the upper hand” in intelligence—reversing the usual advantage that states have over insurgencies. As domestic telephone exchanges came under attack, many were destroyed and miles of cable knocked out. After the Civil War, the British diverted their submarine cables from Ireland to Penzance to reduce vulnerability.

This campaign illustrates how blocking enemy communications can combine with building one’s own alternative channels. The Irish didn’t just disrupt British information flows—they created parallel systems that served the independence movement.

From fax machines to Telegram: how technology shapes the tactic

Technology constantly reshapes how this tactic operates. During the 1989 Tiananmen Square protests, Hong Kong students organized a crowd-faxing campaign, recruiting over 500 corporate partners to send daily news digests to fax numbers across China. This broke through the government’s news blockade before the internet existed. Taiwanese reporter Hsieh San-tai used special photo fax machines to transmit images back to Taiwan, moving between hotels to avoid surveillance.

By 2020 in Belarus, the tactic had evolved to Telegram channels. The NEXTA channel grew from 300,000 to 2 million subscribers in just one week after disputed elections. At peak protests, it processed up to 10,000 messages per hour. When the government shut down the internet using Deep Packet Inspection, Telegram’s built-in blocking-bypass mechanism and proxy servers kept it functional. NEXTA published identities of security officials engaging in repression—a “deanonymization” strategy that created personal accountability.

Hong Kong protesters in 2019 developed even more sophisticated digital tactics. They used AirDrop to distribute information peer-to-peer via Bluetooth and WiFi without creating traceable connections. They sent messages in simplified Chinese specifically to target mainland visitors. They adopted a “no central stage” philosophy—leaderless, horizontal organization that made the movement impossible to decapitate by arresting leaders.

The evolution shows a consistent pattern: each new communication technology creates both new vulnerabilities for authorities and new possibilities for movements. The activists who adapt fastest gain significant advantages.

When soldiers refused to fight: fragging and military breakdown

The Vietnam War produced the most dramatic example of command structure breakdown in American military history. Between 1969 and 1972, there were 800-900+ documented incidents of “fragging”—attacks on officers using fragmentation grenades that destroyed evidence and made attribution difficult. 99 deaths were confirmed, with hundreds more injuries.

In 1971, Colonel Robert D. Heinl wrote that “Our Army that now remains in Vietnam is in a state approaching collapse, with individual units avoiding or having refused combat, murdering their officers.” Soldiers developed “bounty” systems, pooling money to reward killing of unpopular officers. Some units placed grenade pins on officers’ beds as warnings.

The response shows how command authority erodes when it loses legitimacy. Officers began sleeping in different locations nightly—Colin Powell reportedly moved his cot every night. In May 1971, the Army temporarily halted grenade issuance and confiscated weapons. The end of the military draft in 1973 was partly attributed to these discipline problems. When those expected to follow orders decide collectively to refuse, the chain of command ceases to function regardless of formal authority.

Whistleblowing as strategic information disruption

Sometimes blocking lines of command means redirecting information rather than stopping it entirely. Daniel Ellsberg’s leak of the Pentagon Papers in 1971 revealed that four administrations had “systematically lied” about Vietnam. The leak didn’t stop government communications—it exposed what was being communicated privately while very different messages went to the public.

The consequences rippled far beyond the immediate revelations. The Nixon administration’s response—creating the “White House Plumbers” who conducted burglaries including at the Watergate complex—ultimately led to Nixon’s resignation. The Supreme Court’s decision in New York Times Co. v. United States established landmark First Amendment protections for press publication of leaked material.

Chelsea Manning’s 2010 release of 750,000 classified documents to WikiLeaks included the “Collateral Murder” video showing a U.S. helicopter attack on civilians, war logs from Iraq and Afghanistan, and diplomatic cables. Edward Snowden’s 2013 revelations about NSA mass surveillance led to the USA FREEDOM Act rolling back PATRIOT Act provisions. In 2020, a U.S. Court of Appeals ruled the NSA program Snowden exposed had been illegal.

These cases illustrate that information leaks serve as a form of blocking—they prevent authorities from controlling the narrative and force public accountability for actions meant to remain hidden.

What makes communication systems vulnerable

Understanding vulnerability helps movements choose effective targets. Centralized systems create single points of failure—if one node goes down, the entire system can be paralyzed. Hierarchical structures depend on information flowing through specific chokepoints. When German coastal batteries lost their command links on D-Day night, they couldn’t coordinate with each other or headquarters.

Modern movements have learned to exploit different vulnerabilities. Internet shutdowns, while damaging, often backfire by creating economic harm that turns business communities against regimes. When Egypt blocked Facebook and Twitter, then cut all internet access, it accelerated rather than suppressed the uprising. Movements that have prepared alternative communication methods—mesh networks, satellite phones, physical distribution networks—can continue operating while the shutdown delegitimizes the government.

Digital systems create new vulnerabilities. DDoS attacks can temporarily disable websites. Hacking can expose private communications. But these carry significant legal risks and often fall outside what most practitioners consider nonviolent civil resistance. The most effective digital disruption often involves using platforms in ways authorities didn’t anticipate rather than attacking the platforms themselves.

Building the capacity to disrupt command structures

Effective use of this tactic requires extensive preparation. Movements need to identify sympathetic insiders within institutions—bureaucrats, military personnel, communication workers who might be willing to refuse cooperation. This requires long-term relationship building before any high-risk actions.

Cell-based organizational structures protect movements when some members are compromised. The Polish resistance’s Kedyw units organized weapon factories, military schools, intelligence networks, and communication networks while maintaining enough separation that capturing one cell didn’t expose others. Trust builds slowly but can be destroyed instantly by poor operational security.

Training matters enormously. The Cichociemni didn’t just parachute into Poland with enthusiasm—they received specialized training in wireless operation, cryptography, and micro-photography. Modern movements need equivalent preparation for digital security: encrypted messaging, VPN usage, counter-surveillance awareness, device security, and recognizing social engineering attacks.

Alternative institutions must be built alongside capacity to disrupt official ones. The Montgomery Bus Boycott didn’t just stop people from riding buses—it created an alternative transportation system with 200+ volunteer vehicles and approximately 100 pickup stations. When you block official channels, you need to ensure legitimate functions can continue through alternatives you control.

Understanding legal risks and ethical boundaries

Legal risks vary enormously by method. Slow compliance and procedural insistence—following rules exactly while creating delays—carry minimal legal risk beyond potential career consequences. Documenting concerns through proper channels benefits from whistleblower protections in many jurisdictions. But leaking classified information can result in federal prosecution and prison sentences, as Manning, Snowden, and Reality Winner discovered.

Physical infrastructure disruption risks criminal charges including sabotage and trespassing. Digital attacks face severe penalties under computer fraud laws worldwide. Movements must weigh these risks against potential impact, and individuals must make informed decisions about what they’re willing to risk.

Ethical boundaries are clear and non-negotiable. Emergency services—police response to actual crimes, fire departments, medical emergencies—must never be blocked. Healthcare system communications are off-limits. Basic utilities like power grid coordination and water systems cannot be targeted. Transportation safety systems including air traffic control and rail signaling are protected categories.

The ethical principle is straightforward: target the regime’s capacity to oppress, not society’s capacity to function. French Resistance fighters cut military communication lines, not hospital telephone systems. Postal workers striking to improve conditions still allowed emergency mail through. The goal is forcing change in power relationships, not causing indiscriminate harm.

How authorities respond and adapt

Regimes facing communication disruption typically respond with purges of suspected sympathizers, restructuring to reduce individual discretionary power, increased surveillance, legal threats, and delegitimization campaigns labeling resisters as saboteurs or enemies.

Research from Brazil shows administrations can overcome bureaucratic resistance by “recalibrating strategies, ultimately dominating many key sectors of the bureaucracy” through regulatory changes and targeting individual employees. Movements must anticipate these responses and build resilience—networks that can survive losing individual members, documented proof of principled rather than corrupt motives, public support that makes crackdowns politically costly.

The most successful movements combine insider noncooperation with mass public participation. When bureaucrats slow-walk orders while protesters fill the streets, the combined pressure becomes difficult to resist. Neither tactic alone is as effective as both together. The 3.5% rule from Chenoweth’s research suggests that movements achieving active participation from 3.5% of the population have historically never failed—but that participation takes many forms, and insider resistance amplifies the impact of public action.

Combining blocking with other nonviolent methods

Blocking command and information flows works best as part of a comprehensive campaign. The French Resistance didn’t just cut communication lines—they simultaneously sabotaged railways, provided intelligence to the Allies, organized partisan forces, and published underground newspapers maintaining civilian morale.

Economic boycotts combined with administrative slowdowns create comprehensive system strain. When Montgomery’s African Americans stopped riding buses while black-owned taxi services provided alternatives, they didn’t just refuse participation—they demonstrated capacity for self-organization. Alternative communication systems (Sharp’s Method #180) allow movements to coordinate while blocking official channels prevents opponents from doing the same.

The sequence matters. Movements typically start with lower-risk actions—public demonstrations, symbolic protests, economic pressure—before escalating to higher-risk tactics like blocking communications. This escalation ladder builds capacity, tests commitment, and maintains legitimacy by demonstrating that more aggressive tactics come only after peaceful options have been exhausted.

Lessons from movements that succeeded and failed

The East German Stasi had 91,015 full-time employees and 173,081 informants—one for every 6.5 citizens—yet failed to predict or prevent the 1989 revolution. Citizens created private spheres of communication, organized through churches, and eventually stormed Stasi offices throughout the country. Overwhelming surveillance can still be defeated by determined populations creating alternative spaces.

The Solidarity movement in Poland survived martial law that arrested over 1,700 leaders and caused 800,000 job losses. Despite communication and transportation restrictions, underground networks distributed newspapers, leaflets, and posters. Radio Solidarity began illegal broadcasts in April 1982. By December 1989, Solidarity won 99 of 100 Senate seats. The lesson: movements that build robust alternative communication infrastructure can survive suppression and eventually prevail.

But not all movements succeed. The Tiananmen Square protests were ultimately crushed despite sophisticated use of fax machines and coordination. The difference often comes down to whether security forces remain loyal. Chenoweth’s research shows nonviolent campaigns succeed partly because they can prompt “disobedience and defections by members of the opponent’s security forces”—armed insurgencies make such defections less likely because security forces fear personal consequences from violent opponents.

Practical considerations for activists today

Start by mapping how your target organization’s communications actually function. Where are the chokepoints? Who has discretionary authority? Which employees might be sympathetic? This analysis should inform all subsequent tactical decisions.

Build relationships before you need them. Insider cooperation comes from trust developed over time, not cold recruitment during crises. Create spaces where employees of target institutions can discuss concerns safely without immediate pressure to act.

Invest in communication security before you need it. Encrypted messaging, device security, operational security practices—these must become habits, not emergency measures. Assume adversaries may be monitoring communications and plan accordingly.

Prepare alternatives for any official function you plan to disrupt. If you block one information channel, what legitimate needs must still be met? How will you meet them? This both protects innocent parties and demonstrates your capacity for responsible governance.

Document everything. Records of principled intent, attempts to work through official channels, proportionate response to genuine harms—these provide both legal protection and legitimacy in the court of public opinion.

Finally, maintain nonviolent discipline. The tactical advantages of nonviolent resistance—greater public sympathy, higher likelihood of security force defection, international support, broader participation—all depend on maintaining that discipline even under severe pressure. The moment a movement becomes violent, it loses most of these advantages and faces a much harder path to success.

Made in protest in Los Angeles.

Museum of Protest © 2026. All rights reserved.