How-To GuideAdvanced

Expulsion Protocol: Removing a Member from Your MAG

How to handle a member who must be removed from your MAG. The process that minimizes damage, what to do about information they hold, and how to preserve group integrity afterward.

Salt & Prepper TeamMarch 30, 20266 min read

Why You Need a Protocol Before You Need It

Removing a member is one of the most difficult things a small, trust-based group does. It involves the conflict of removing someone from a community they invested in, the security concern of someone who leaves with inside knowledge, and the social challenge of doing this in a community small enough that everyone knows everyone.

Groups without a pre-defined protocol for this situation improvise under the worst possible conditions: high emotion, damaged trust, and competing loyalties. The improvised removal is usually messier and more damaging than a process-driven one.

The time to define the expulsion protocol is during group formation, when nobody has any reason to resist clear rules.


Grounds for Removal

Define these explicitly in your group's agreements. Possible framework:

Immediate removal (no warning required):

  • Physical violence or credible threat of violence against a member
  • Theft of group or member property
  • Security breach: sharing group information with outsiders without authorization
  • Discovery of significant deception about identity, background, or resources that materially affects group planning

Removal after documented warning process:

  • Persistent under-contribution after direct conversation and formal warning
  • Persistent behavior that disrupts group function after mediation
  • Repeated violation of group agreements after documented correction

Voluntary departure:

  • Member requests to leave
  • Mutual agreement that the fit isn't working

Each category may trigger different protocols and have different security implications.


The Warning Process (Non-Immediate Cases)

For cases that don't require immediate removal, a formal warning process protects both the group and the member.

Step 1: Direct conversation. The group coordinator (or designated mediator) has a private conversation with the member. The concern is stated clearly, with specific examples. The expected change is stated clearly. A time period for demonstrating change is defined.

"We've noticed [specific behavior]. That's not consistent with what we agreed to. We need to see [specific change] in the next 60 days. If that doesn't happen, we'll need to have a harder conversation about your membership."

This conversation is documented — not formally signed, but the coordinator keeps notes including the date, what was discussed, and what was committed to.

Step 2: Check-in. At the defined interval (30-60 days), the coordinator assesses whether the change has occurred. A follow-up conversation confirms the assessment.

Step 3: Group decision. If change didn't occur, the coordinator brings the situation to the full group (without the member present). The group discusses and decides whether to proceed with removal.

Step 4: Removal conversation. If the group decides on removal, the coordinator (and ideally one other trusted member as a witness) has a direct conversation with the departing member. The decision is stated clearly and calmly. The terms of departure are outlined. The conversation is not an argument — the decision has been made.


The Removal Conversation

This conversation needs to be:

Direct: "The group has decided to end your membership. This is effective immediately."

Calm: Not aggressive, not apologetic, not vacillating. The decision is made. The conversation is informing, not debating.

Clear about next steps: What does the departing member need to return? (Shared equipment, group materials, keys to any shared locations.) What information will no longer be shared with them? What communication channels will they be removed from?

Brief: This is not the time for a full processing of grievances. The mediation phase is over. If the member wants to state their perspective, allow a brief statement without engaging defensively. Then return to the next steps.

In person or by phone: Not by text or email. The seriousness of the decision warrants a direct conversation.


What to Change After a Departure

Conduct a security assessment immediately after any departure, but especially after involuntary removal.

What the departing member knew:

  • Member identities and home addresses
  • Retreat location, access methods, and security setup
  • Supply levels and cache locations
  • Communication frequencies and call signs
  • Meeting times and locations
  • Any specific security vulnerabilities they may have assessed

What can be changed:

  • Access codes to shared locations (change immediately)
  • Communication frequencies and CTCSS tones
  • Meeting locations and times
  • Password and access to any digital communication channels
  • Cache locations, if any can be relocated

What cannot be changed:

  • Member identities and addresses
  • The existence of the group
  • Any information that requires extensive physical changes to address

What to communicate to remaining members:

  • That a departure has occurred (without detailed explanation if the situation requires discretion)
  • What security changes have been made
  • What the remaining threat posture should be

Managing Group Dynamics After a Departure

Involuntary removals affect the whole group. Some members may have been friends with the departing member. Others may have had reservations about the process. Several things help:

Transparency about the process, not the details. "We followed the protocol we agreed on" is reassuring to members who weren't close to the situation. "Here's everything [Member] did wrong" is not necessary and may feel like piling on.

Allow a period of adjustment. The group's social dynamics will shift. Some friendships outside the group may be affected. Give it time without forcing artificial cohesion.

Reaffirm the group's purpose. Departures can leave groups questioning whether they're worth the difficulty. A direct conversation about what the group is trying to accomplish and why it's worth maintaining can help.

Evaluate what the departure revealed about group processes. Was there something in the recruitment or vetting that should have caught this issue earlier? What would the group do differently? Turn the difficult experience into a learning opportunity.


Voluntary Departures

Members who want to leave should be handled with the same deliberateness as removals, just with a different tone.

Exit conversation: What's driving the departure? Is it something addressable? If not, what are the terms of departure?

Knowledge transfer: If the departing member held a specific role, ensure the knowledge is transferred before departure.

Relationship maintenance: In a small community, former MAG members remain neighbors and community members. A departure that's handled with respect preserves the relationship. A departure that becomes adversarial makes the community smaller and more tense.

Security same as involuntary departure: Regardless of the reason for departure, the departing member holds sensitive information. Apply the same security assessment and changes as for involuntary removal.

Sources

  1. Fisher, Roger and Ury, William — Getting to Yes

Frequently Asked Questions

What are the grounds for removing a MAG member?

The most serious grounds: discovery of deception about significant facts (resources, background, capability), a security breach (sharing group information with outsiders without authorization), significant violence or threat of violence, theft of group resources. Secondary grounds: persistent under-contribution after documented direct conversation, chronic creation of conflict that persists after mediation, behavior that makes cooperation impossible.

Do you need unanimous agreement to remove someone?

Consensus removal is ideal but often not achievable — the departing member's allies may not agree. Most groups use a supermajority rule (two-thirds or three-quarters) for removal decisions. The threshold should be set before it's needed. What's not workable: simple majority (too easy to weaponize) or unanimity (one vote blocks necessary action).

How do you handle operational security after a member leaves?

Assume everything the departing member knew is now potentially exposed. That includes: your group's existence, member identities, home addresses, retreat location, supply levels, and operational protocols. Some of this cannot be changed (member addresses). Some can: retreat access codes, communication frequencies, meeting times. Change what you can. Conduct a debrief on what was known and plan accordingly.