/
The Strategy

The Strategy

Reconstructivism is rejecting top-down approaches, and as such, rejecting the deeply ingrained habits and beliefs that we have around strategy.

Our strategy focuses around relational execution, zero-trust security, and maximizing the amount of generally available information and processes.

 

Relational Execution

Rather than building the entire movement around the control of any one individual or collective, reconstructivist strategy seeks to decentralize as much as possible as soon as possible. All centralized organization seeks to enhance operations when possible.

All individuals and organizations that participate still retain full independence and are encouraged to have plans if centralized resources are unavailable.

When making decisions, they should serve and be approved by the most relevant stakeholders. The nuanced relations within any system determine who should be making decisions depending on the decision and the situation.

This is as much art as it is science, and grace is needed while establishing leadership flows in different communities and situations.

We recommend nested management structures that provide familiarity and interoperability regardless of the scale or focus of the entities involved. The easier it is for people to understand your systems and strategy, the easier you are to support.

 

Zero-trust Security

Zero-trust is a concept from cyber security that should be the basis of everything that you do. Not from a place of paranoia or personal distrust of others. But from a place of understanding how any human at any moment can be making mistakes or otherwise out of their minds.

Zero Trust is a security framework requiring all users, whether in or outside the organization's network, to be authenticated, authorized, and continuously validated for security configuration and posture before being granted or keeping access to applications and data.

We apply this framework to all core operations within the reconstructivist movement.

We have core procedures to verify trust and recommend that all individuals and organizations develop their own nuances to protect private information.

A lot of this movement is electronic, and local contacts may be taking on great risk to support their communities and humanity as a whole.

There’s no playing the victim here. Every member is responsible for proper security hygiene and not letting their individual ignorance put the whole at risk.

 

Generalized Systems

Specialization is for discovery. Established knowledge and processes should be generally available and understood.

While we may have any number of specific goals that require their own nuance, working throughout the reconstructivist network should be familiar and accessible.

Security & Safety protocols must be respected, but outside of this, all information and systems should be generally accessible.

Each individual should understand as much as possible. Generalized and redundant understandings prevent corruption and feed innovation through cross-disciplinary insight.

The idea that we should designate individual experts for each subject of our lives is nothing but a divide and conquer strategy.

While the reconstructivist movement does utilize separation for security, we aim to be as transparent as reasonable security management allows.

Related content