draft of field manua
This commit is contained in:
@@ -0,0 +1,312 @@
|
||||
<!DOCTYPE html>
|
||||
<html lang="en">
|
||||
<head>
|
||||
<meta charset="UTF-8">
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1.0">
|
||||
<title>Part I: Foundations of Resistance Security - Field Manual for Resistance Operations</title>
|
||||
<meta name="description" content="Core security principles and threat assessment methodologies for resistance operations">
|
||||
|
||||
<!-- Favicon -->
|
||||
<link rel="icon" type="image/x-icon" href="/assets/images/favicon.ico">
|
||||
|
||||
<!-- Stylesheets -->
|
||||
<link rel="stylesheet" href="/assets/css/main.css">
|
||||
|
||||
<!-- Security headers -->
|
||||
<meta http-equiv="X-Content-Type-Options" content="nosniff">
|
||||
<meta http-equiv="X-Frame-Options" content="DENY">
|
||||
<meta http-equiv="X-XSS-Protection" content="1; mode=block">
|
||||
|
||||
<!-- No tracking -->
|
||||
<meta name="robots" content="noindex, nofollow">
|
||||
</head>
|
||||
<body>
|
||||
<header class="header">
|
||||
<div class="container">
|
||||
<div class="header-content">
|
||||
<div class="logo">
|
||||
<span class="omega">Ω</span>
|
||||
<span>FM-R1</span>
|
||||
</div>
|
||||
<button class="nav-toggle" id="nav-toggle" aria-label="Toggle navigation">
|
||||
☰
|
||||
</button>
|
||||
</div>
|
||||
</div>
|
||||
</header>
|
||||
|
||||
<div class="main-layout">
|
||||
<nav class="sidebar" id="sidebar">
|
||||
<div class="nav-section">
|
||||
<h3>Field Manual</h3>
|
||||
<ul>
|
||||
<li><a href="/" >Table of Contents</a></li>
|
||||
<li><a href="/preface/" >Preface</a></li>
|
||||
<li><a href="/introduction/" >Introduction</a></li>
|
||||
</ul>
|
||||
</div>
|
||||
|
||||
<div class="nav-section">
|
||||
<h3>Part I: Foundations</h3>
|
||||
<ul>
|
||||
<li>
|
||||
<a href="/parts/part-1/" class="active">Part Overview</a>
|
||||
<ul>
|
||||
<li><a href="/chapters/chapter-1/" >Ch 1: Core Security Principles</a></li>
|
||||
<li><a href="/chapters/chapter-2/" >Ch 2: Threat Assessment</a></li>
|
||||
</ul>
|
||||
</li>
|
||||
</ul>
|
||||
</div>
|
||||
|
||||
<div class="nav-section">
|
||||
<h3>Part II: Communication</h3>
|
||||
<ul>
|
||||
<li>
|
||||
<a href="/parts/part-2/" >Part Overview</a>
|
||||
<ul>
|
||||
<li><a href="/chapters/chapter-3/" >Ch 3: Communication Architecture</a></li>
|
||||
<li><a href="/chapters/chapter-4/" >Ch 4: Secure Messaging</a></li>
|
||||
<li><a href="/chapters/chapter-5/" >Ch 5: File Sharing</a></li>
|
||||
</ul>
|
||||
</li>
|
||||
</ul>
|
||||
</div>
|
||||
|
||||
<div class="nav-section">
|
||||
<h3>Part III: OpSec</h3>
|
||||
<ul>
|
||||
<li>
|
||||
<a href="/parts/part-3/" >Part Overview</a>
|
||||
<ul>
|
||||
<li><a href="/chapters/chapter-6/" >Ch 6: Hardware Security</a></li>
|
||||
<li><a href="/chapters/chapter-7/" >Ch 7: Digital Hygiene</a></li>
|
||||
<li><a href="/chapters/chapter-8/" >Ch 8: Operational Procedures</a></li>
|
||||
</ul>
|
||||
</li>
|
||||
</ul>
|
||||
</div>
|
||||
|
||||
<div class="nav-section">
|
||||
<h3>Part IV: Advanced</h3>
|
||||
<ul>
|
||||
<li>
|
||||
<a href="/parts/part-4/" >Part Overview</a>
|
||||
<ul>
|
||||
<li><a href="/chapters/chapter-9/" >Ch 9: Network Resilience</a></li>
|
||||
<li><a href="/chapters/chapter-10/" >Ch 10: Counter-Intelligence</a></li>
|
||||
</ul>
|
||||
</li>
|
||||
</ul>
|
||||
</div>
|
||||
|
||||
<div class="nav-section">
|
||||
<h3>Appendices</h3>
|
||||
<ul>
|
||||
<li><a href="/appendices/" >Quick Reference</a></li>
|
||||
<li><a href="/appendices/tools/" >Tool Guides</a></li>
|
||||
<li><a href="/appendices/resources/" >External Resources</a></li>
|
||||
<li><a href="/appendices/glossary/" >Glossary</a></li>
|
||||
</ul>
|
||||
</div>
|
||||
|
||||
<div class="nav-section">
|
||||
<h3>External Links</h3>
|
||||
<ul>
|
||||
<li><a href="https://resist.is" target="_blank">resist.is</a></li>
|
||||
<li><a href="https://activistchecklist.org" target="_blank">Activist Checklist</a></li>
|
||||
<li><a href="https://signal.org" target="_blank">Signal</a></li>
|
||||
<li><a href="https://briarproject.org" target="_blank">Briar</a></li>
|
||||
<li><a href="https://element.io" target="_blank">Element</a></li>
|
||||
<li><a href="https://tails.boum.org" target="_blank">Tails OS</a></li>
|
||||
<li><a href="https://onionshare.org" target="_blank">OnionShare</a></li>
|
||||
</ul>
|
||||
</div>
|
||||
|
||||
|
||||
</nav>
|
||||
|
||||
<main class="content">
|
||||
<div class="content-header">
|
||||
<div class="manual-designation">FM-R1: FM-R1: Secure Communication Networks for Decentralized Resistance</div>
|
||||
<div class="classification">UNCLASSIFIED</div>
|
||||
|
||||
</div>
|
||||
|
||||
<h1 id="part-i-foundations-of-resistance-security">Part I: Foundations of Resistance Security</h1>
|
||||
|
||||
<h2 id="overview">Overview</h2>
|
||||
|
||||
<p>Part I establishes the theoretical and practical foundations necessary for all resistance security operations. Before implementing any technical measures or operational procedures, resistance practitioners must understand the fundamental principles that govern security in hostile environments and develop the analytical skills necessary to assess threats and design appropriate countermeasures.</p>
|
||||
|
||||
<p>This part addresses the most critical question in resistance security: <strong>How do you think about security in a way that leads to effective protection?</strong></p>
|
||||
|
||||
<h2 id="learning-objectives">Learning Objectives</h2>
|
||||
|
||||
<p>Upon completing Part I, you will be able to:</p>
|
||||
|
||||
<ul>
|
||||
<li>Apply core security principles to evaluate and design resistance operations</li>
|
||||
<li>Conduct systematic threat assessments for your specific operational environment</li>
|
||||
<li>Develop risk management strategies appropriate to your threat level</li>
|
||||
<li>Understand the relationship between security measures and operational effectiveness</li>
|
||||
<li>Recognize common security failures and their underlying causes</li>
|
||||
</ul>
|
||||
|
||||
<h2 id="chapter-overview">Chapter Overview</h2>
|
||||
|
||||
<h3 id="chapter-1-core-security-principles-1-1-to-1-5">Chapter 1: Core Security Principles (1-1 to 1-5)</h3>
|
||||
|
||||
<p>The five fundamental principles that must guide all resistance security decisions:</p>
|
||||
|
||||
<p><strong>1-1: Principle of Least Privilege</strong> - Limiting access to the minimum necessary for operational effectiveness</p>
|
||||
|
||||
<p><strong>1-2: Need-to-Know Basis</strong> - Compartmentalizing information to prevent cascade failures</p>
|
||||
|
||||
<p><strong>1-3: Compartmentalization and Cell Structure</strong> - Organizing resistance networks to contain compromise</p>
|
||||
|
||||
<p><strong>1-4: Zero Trust Verification</strong> - Assuming compromise and requiring continuous authentication</p>
|
||||
|
||||
<p><strong>1-5: Metadata Minimization</strong> - Reducing the digital traces that reveal operational patterns</p>
|
||||
|
||||
<h3 id="chapter-2-threat-assessment-and-operational-environment-2-1-to-2-4">Chapter 2: Threat Assessment and Operational Environment (2-1 to 2-4)</h3>
|
||||
|
||||
<p>Systematic approaches to understanding and responding to threats:</p>
|
||||
|
||||
<p><strong>2-1: Understanding Your Adversary</strong> - Analyzing capabilities, motivations, and limitations of hostile forces</p>
|
||||
|
||||
<p><strong>2-2: Threat Model Development</strong> - Creating structured assessments of risks and vulnerabilities</p>
|
||||
|
||||
<p><strong>2-3: Risk Assessment Framework</strong> - Quantifying and prioritizing security investments</p>
|
||||
|
||||
<p><strong>2-4: Operational Security (OpSec) Fundamentals</strong> - Translating threat assessments into practical procedures</p>
|
||||
|
||||
<h2 id="the-security-mindset">The Security Mindset</h2>
|
||||
|
||||
<p>Before diving into specific principles and procedures, it’s essential to understand the fundamental shift in thinking required for effective resistance security. This shift involves:</p>
|
||||
|
||||
<h3 id="from-convenience-to-security">From Convenience to Security</h3>
|
||||
|
||||
<p>In normal life, we optimize for convenience, efficiency, and ease of use. In resistance operations, security becomes the primary consideration, with convenience secondary. This doesn’t mean making things unnecessarily difficult, but rather accepting that some inconvenience is the price of safety.</p>
|
||||
|
||||
<h3 id="from-trust-to-verification">From Trust to Verification</h3>
|
||||
|
||||
<p>Normal social and professional relationships operate on trust and good faith. Resistance operations must assume that trust can be compromised, either through infiltration or coercion, and build verification mechanisms into all critical processes.</p>
|
||||
|
||||
<h3 id="from-reactive-to-proactive">From Reactive to Proactive</h3>
|
||||
|
||||
<p>Most people respond to security threats after they become apparent. Resistance operations must anticipate threats and implement countermeasures before they’re needed, because by the time a threat is obvious, it may be too late to respond effectively.</p>
|
||||
|
||||
<h3 id="from-individual-to-collective">From Individual to Collective</h3>
|
||||
|
||||
<p>Personal security practices focus on protecting yourself. Resistance security must consider how your actions affect the safety of others in your network, and how their actions affect your safety.</p>
|
||||
|
||||
<h2 id="common-misconceptions">Common Misconceptions</h2>
|
||||
|
||||
<h3 id="encryption-solves-everything">“Encryption Solves Everything”</h3>
|
||||
|
||||
<p>While encryption is essential, it only protects the content of communications, not the metadata that reveals who is talking to whom, when, and from where. Metadata analysis can reveal network structures and operational patterns even when all communications are encrypted.</p>
|
||||
|
||||
<h3 id="if-you-have-nothing-to-hide">“If You Have Nothing to Hide…”</h3>
|
||||
|
||||
<p>This argument fundamentally misunderstands the nature of authoritarian surveillance. The goal is not just to find evidence of wrongdoing, but to map networks, predict behavior, and suppress dissent before it becomes effective.</p>
|
||||
|
||||
<h3 id="theyre-too-powerful-to-resist">“They’re Too Powerful to Resist”</h3>
|
||||
|
||||
<p>While authoritarian regimes have significant advantages, they also have limitations and vulnerabilities. Understanding both their capabilities and their constraints is essential for developing effective resistance strategies.</p>
|
||||
|
||||
<h3 id="perfect-security-is-possible">“Perfect Security is Possible”</h3>
|
||||
|
||||
<p>No security system is perfect, and pursuing perfect security often leads to systems so complex and restrictive that they cannot be used effectively. The goal is appropriate security for your specific threat environment and operational requirements.</p>
|
||||
|
||||
<h2 id="integration-with-subsequent-parts">Integration with Subsequent Parts</h2>
|
||||
|
||||
<p>The principles and methodologies covered in Part I provide the foundation for all subsequent technical and operational guidance:</p>
|
||||
|
||||
<ul>
|
||||
<li><strong>Part II</strong> applies these principles to design secure communication systems</li>
|
||||
<li><strong>Part III</strong> translates them into practical operational security procedures</li>
|
||||
<li><strong>Part IV</strong> extends them to advanced scenarios and specialized threats</li>
|
||||
</ul>
|
||||
|
||||
<p>Each technical recommendation and operational procedure in later parts derives from the fundamental principles established here. Understanding these foundations is essential for adapting the manual’s guidance to your specific circumstances and for making sound security decisions when facing novel situations.</p>
|
||||
|
||||
<h2 id="study-approach">Study Approach</h2>
|
||||
|
||||
<h3 id="for-individual-study">For Individual Study</h3>
|
||||
|
||||
<ol>
|
||||
<li><strong>Read each section completely</strong> before moving to the next</li>
|
||||
<li><strong>Take notes</strong> on how principles apply to your specific situation</li>
|
||||
<li><strong>Work through examples</strong> using scenarios relevant to your operations</li>
|
||||
<li><strong>Review regularly</strong> as these concepts must become second nature</li>
|
||||
</ol>
|
||||
|
||||
<h3 id="for-group-study">For Group Study</h3>
|
||||
|
||||
<ol>
|
||||
<li><strong>Discuss each principle</strong> and its implications for your organization</li>
|
||||
<li><strong>Develop case studies</strong> based on your operational environment</li>
|
||||
<li><strong>Practice threat modeling</strong> for actual or hypothetical operations</li>
|
||||
<li><strong>Create reference materials</strong> summarizing key concepts for quick review</li>
|
||||
</ol>
|
||||
|
||||
<h3 id="for-training-others">For Training Others</h3>
|
||||
|
||||
<ol>
|
||||
<li><strong>Use concrete examples</strong> rather than abstract concepts</li>
|
||||
<li><strong>Connect principles to practical consequences</strong> of security failures</li>
|
||||
<li><strong>Encourage questions</strong> and discussion of edge cases</li>
|
||||
<li><strong>Provide opportunities to practice</strong> threat assessment skills</li>
|
||||
</ol>
|
||||
|
||||
<div class="warning-box">
|
||||
<div class="warning-title">Foundation First</div>
|
||||
<p>Do not skip Part I to get to "more practical" technical content. The principles covered here determine whether technical measures will be effective or merely provide a false sense of security. Every security failure can be traced back to a violation of these fundamental principles.</p>
|
||||
</div>
|
||||
|
||||
<hr />
|
||||
|
||||
<p><strong>Ready to begin?</strong> Start with <a href="/chapters/chapter-1/">Chapter 1: Core Security Principles →</a></p>
|
||||
|
||||
|
||||
|
||||
|
||||
<nav class="section-nav">
|
||||
|
||||
<a href="/introduction/" class="nav-link">
|
||||
<span class="arrow">←</span>
|
||||
<span>Introduction</span>
|
||||
</a>
|
||||
|
||||
|
||||
|
||||
<a href="/chapters/chapter-1/" class="nav-link">
|
||||
<span>Chapter 1: Core Security Principles</span>
|
||||
<span class="arrow">→</span>
|
||||
</a>
|
||||
|
||||
</nav>
|
||||
|
||||
</main>
|
||||
</div>
|
||||
|
||||
<footer class="footer">
|
||||
<div class="container">
|
||||
<div class="footer-content">
|
||||
<div class="organization">Department of Internautics</div>
|
||||
<div>Bureau of Decentralized Resistance</div>
|
||||
<div>FM-R1 - Version 1.0 - 2025-08-28</div>
|
||||
<div style="margin-top: 1rem;">
|
||||
<a href="https://resist.is" target="_blank">resist.is</a> |
|
||||
<a href="https://git.hacker.supply/Department_of_Internautics/field_guide" target="_blank">Source Code</a>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
</footer>
|
||||
|
||||
<!-- JavaScript -->
|
||||
<script src="/assets/js/main.js"></script>
|
||||
</body>
|
||||
</html>
|
||||
|
||||
@@ -0,0 +1,462 @@
|
||||
<!DOCTYPE html>
|
||||
<html lang="en">
|
||||
<head>
|
||||
<meta charset="UTF-8">
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1.0">
|
||||
<title>Part II: Secure Communication Systems - Field Manual for Resistance Operations</title>
|
||||
<meta name="description" content="Multi-layer communication architectures and secure messaging systems for resistance operations">
|
||||
|
||||
<!-- Favicon -->
|
||||
<link rel="icon" type="image/x-icon" href="/assets/images/favicon.ico">
|
||||
|
||||
<!-- Stylesheets -->
|
||||
<link rel="stylesheet" href="/assets/css/main.css">
|
||||
|
||||
<!-- Security headers -->
|
||||
<meta http-equiv="X-Content-Type-Options" content="nosniff">
|
||||
<meta http-equiv="X-Frame-Options" content="DENY">
|
||||
<meta http-equiv="X-XSS-Protection" content="1; mode=block">
|
||||
|
||||
<!-- No tracking -->
|
||||
<meta name="robots" content="noindex, nofollow">
|
||||
</head>
|
||||
<body>
|
||||
<header class="header">
|
||||
<div class="container">
|
||||
<div class="header-content">
|
||||
<div class="logo">
|
||||
<span class="omega">Ω</span>
|
||||
<span>FM-R1</span>
|
||||
</div>
|
||||
<button class="nav-toggle" id="nav-toggle" aria-label="Toggle navigation">
|
||||
☰
|
||||
</button>
|
||||
</div>
|
||||
</div>
|
||||
</header>
|
||||
|
||||
<div class="main-layout">
|
||||
<nav class="sidebar" id="sidebar">
|
||||
<div class="nav-section">
|
||||
<h3>Field Manual</h3>
|
||||
<ul>
|
||||
<li><a href="/" >Table of Contents</a></li>
|
||||
<li><a href="/preface/" >Preface</a></li>
|
||||
<li><a href="/introduction/" >Introduction</a></li>
|
||||
</ul>
|
||||
</div>
|
||||
|
||||
<div class="nav-section">
|
||||
<h3>Part I: Foundations</h3>
|
||||
<ul>
|
||||
<li>
|
||||
<a href="/parts/part-1/" >Part Overview</a>
|
||||
<ul>
|
||||
<li><a href="/chapters/chapter-1/" >Ch 1: Core Security Principles</a></li>
|
||||
<li><a href="/chapters/chapter-2/" >Ch 2: Threat Assessment</a></li>
|
||||
</ul>
|
||||
</li>
|
||||
</ul>
|
||||
</div>
|
||||
|
||||
<div class="nav-section">
|
||||
<h3>Part II: Communication</h3>
|
||||
<ul>
|
||||
<li>
|
||||
<a href="/parts/part-2/" class="active">Part Overview</a>
|
||||
<ul>
|
||||
<li><a href="/chapters/chapter-3/" >Ch 3: Communication Architecture</a></li>
|
||||
<li><a href="/chapters/chapter-4/" >Ch 4: Secure Messaging</a></li>
|
||||
<li><a href="/chapters/chapter-5/" >Ch 5: File Sharing</a></li>
|
||||
</ul>
|
||||
</li>
|
||||
</ul>
|
||||
</div>
|
||||
|
||||
<div class="nav-section">
|
||||
<h3>Part III: OpSec</h3>
|
||||
<ul>
|
||||
<li>
|
||||
<a href="/parts/part-3/" >Part Overview</a>
|
||||
<ul>
|
||||
<li><a href="/chapters/chapter-6/" >Ch 6: Hardware Security</a></li>
|
||||
<li><a href="/chapters/chapter-7/" >Ch 7: Digital Hygiene</a></li>
|
||||
<li><a href="/chapters/chapter-8/" >Ch 8: Operational Procedures</a></li>
|
||||
</ul>
|
||||
</li>
|
||||
</ul>
|
||||
</div>
|
||||
|
||||
<div class="nav-section">
|
||||
<h3>Part IV: Advanced</h3>
|
||||
<ul>
|
||||
<li>
|
||||
<a href="/parts/part-4/" >Part Overview</a>
|
||||
<ul>
|
||||
<li><a href="/chapters/chapter-9/" >Ch 9: Network Resilience</a></li>
|
||||
<li><a href="/chapters/chapter-10/" >Ch 10: Counter-Intelligence</a></li>
|
||||
</ul>
|
||||
</li>
|
||||
</ul>
|
||||
</div>
|
||||
|
||||
<div class="nav-section">
|
||||
<h3>Appendices</h3>
|
||||
<ul>
|
||||
<li><a href="/appendices/" >Quick Reference</a></li>
|
||||
<li><a href="/appendices/tools/" >Tool Guides</a></li>
|
||||
<li><a href="/appendices/resources/" >External Resources</a></li>
|
||||
<li><a href="/appendices/glossary/" >Glossary</a></li>
|
||||
</ul>
|
||||
</div>
|
||||
|
||||
<div class="nav-section">
|
||||
<h3>External Links</h3>
|
||||
<ul>
|
||||
<li><a href="https://resist.is" target="_blank">resist.is</a></li>
|
||||
<li><a href="https://activistchecklist.org" target="_blank">Activist Checklist</a></li>
|
||||
<li><a href="https://signal.org" target="_blank">Signal</a></li>
|
||||
<li><a href="https://briarproject.org" target="_blank">Briar</a></li>
|
||||
<li><a href="https://element.io" target="_blank">Element</a></li>
|
||||
<li><a href="https://tails.boum.org" target="_blank">Tails OS</a></li>
|
||||
<li><a href="https://onionshare.org" target="_blank">OnionShare</a></li>
|
||||
</ul>
|
||||
</div>
|
||||
|
||||
|
||||
</nav>
|
||||
|
||||
<main class="content">
|
||||
<div class="content-header">
|
||||
<div class="manual-designation">FM-R1: FM-R1: Secure Communication Networks for Decentralized Resistance</div>
|
||||
<div class="classification">UNCLASSIFIED</div>
|
||||
|
||||
</div>
|
||||
|
||||
<h1 id="part-ii-secure-communication-systems">Part II: Secure Communication Systems</h1>
|
||||
|
||||
<h2 id="overview">Overview</h2>
|
||||
|
||||
<p>Part II addresses the critical challenge of maintaining secure communications within resistance networks operating under advanced surveillance. This part provides comprehensive guidance for implementing multi-layer communication architectures that balance security requirements with operational effectiveness.</p>
|
||||
|
||||
<p>Communication security is the backbone of resistance operations. Without secure communications, resistance networks cannot coordinate activities, share intelligence, or maintain operational security. However, communication also represents the greatest vulnerability, as every communication creates metadata that can be analyzed to reveal network structures, operational patterns, and individual behaviors.</p>
|
||||
|
||||
<h2 id="learning-objectives">Learning Objectives</h2>
|
||||
|
||||
<p>Upon completing Part II, you will be able to:</p>
|
||||
|
||||
<ul>
|
||||
<li>Design and implement multi-layer communication architectures appropriate to your threat environment</li>
|
||||
<li>Configure and operate secure messaging systems including Session, Element/Matrix, Briar, and Signal</li>
|
||||
<li>Establish secure file sharing and collaboration systems using CryptPad, OnionShare, and encrypted cloud storage</li>
|
||||
<li>Implement communication protocols that minimize metadata exposure and maximize operational security</li>
|
||||
<li>Develop contingency communication plans for various compromise and failure scenarios</li>
|
||||
</ul>
|
||||
|
||||
<h2 id="the-communication-security-challenge">The Communication Security Challenge</h2>
|
||||
|
||||
<h3 id="the-metadata-problem">The Metadata Problem</h3>
|
||||
|
||||
<p>Modern surveillance systems focus less on communication content (which can be encrypted) and more on communication metadata (which reveals patterns even when content is protected). Every digital communication generates metadata including:</p>
|
||||
|
||||
<ul>
|
||||
<li><strong>Sender and recipient identities</strong> and network addresses</li>
|
||||
<li><strong>Timing information</strong> including send/receive timestamps</li>
|
||||
<li><strong>Location data</strong> from device GPS and network connections</li>
|
||||
<li><strong>Communication patterns</strong> including frequency and duration</li>
|
||||
<li><strong>Device information</strong> including hardware and software details</li>
|
||||
</ul>
|
||||
|
||||
<p>This metadata can be analyzed to:</p>
|
||||
<ul>
|
||||
<li>Map network structures and identify key participants</li>
|
||||
<li>Predict operational activities and timing</li>
|
||||
<li>Locate physical meetings and safe houses</li>
|
||||
<li>Identify behavioral patterns and vulnerabilities</li>
|
||||
</ul>
|
||||
|
||||
<h3 id="the-usability-security-tension">The Usability-Security Tension</h3>
|
||||
|
||||
<p>Perfect communication security would require:</p>
|
||||
<ul>
|
||||
<li>No digital communications whatsoever</li>
|
||||
<li>Face-to-face meetings only in secure locations</li>
|
||||
<li>Perfect operational security from all participants</li>
|
||||
<li>No time-sensitive coordination requirements</li>
|
||||
</ul>
|
||||
|
||||
<p>Perfect operational effectiveness would require:</p>
|
||||
<ul>
|
||||
<li>Instant communication between all participants</li>
|
||||
<li>Rich multimedia sharing and collaboration</li>
|
||||
<li>Real-time coordination and decision-making</li>
|
||||
<li>Seamless integration with existing tools and workflows</li>
|
||||
</ul>
|
||||
|
||||
<p>Practical resistance communications must balance these competing requirements through carefully designed architectures that provide appropriate security for specific use cases while maintaining operational effectiveness.</p>
|
||||
|
||||
<h2 id="multi-layer-communication-strategy">Multi-Layer Communication Strategy</h2>
|
||||
|
||||
<p>Part II is organized around a four-layer communication architecture that provides different security levels for different operational requirements:</p>
|
||||
|
||||
<h3 id="layer-1-high-risk-real-time-communication">Layer 1: High-Risk Real-Time Communication</h3>
|
||||
<p><strong>Use Case:</strong> Time-sensitive coordination during active operations
|
||||
<strong>Security Level:</strong> Maximum security, minimal metadata
|
||||
<strong>Tools:</strong> Session Messenger, Briar mesh networking
|
||||
<strong>Characteristics:</strong></p>
|
||||
<ul>
|
||||
<li>Onion routing and metadata protection</li>
|
||||
<li>Peer-to-peer architecture with no central servers</li>
|
||||
<li>Ephemeral messaging with automatic deletion</li>
|
||||
<li>Offline capability and mesh networking</li>
|
||||
</ul>
|
||||
|
||||
<h3 id="layer-2-secure-collaboration-systems">Layer 2: Secure Collaboration Systems</h3>
|
||||
<p><strong>Use Case:</strong> Planning, document sharing, and ongoing coordination
|
||||
<strong>Security Level:</strong> High security with collaboration features
|
||||
<strong>Tools:</strong> Element/Matrix (self-hosted), CryptPad
|
||||
<strong>Characteristics:</strong></p>
|
||||
<ul>
|
||||
<li>End-to-end encryption with forward secrecy</li>
|
||||
<li>Self-hosted infrastructure under resistance control</li>
|
||||
<li>Rich collaboration features including file sharing</li>
|
||||
<li>Persistent storage with secure access controls</li>
|
||||
</ul>
|
||||
|
||||
<h3 id="layer-3-failsafe-and-offline-methods">Layer 3: Failsafe and Offline Methods</h3>
|
||||
<p><strong>Use Case:</strong> Emergency communications and backup channels
|
||||
<strong>Security Level:</strong> Maximum reliability and availability
|
||||
<strong>Tools:</strong> OnionShare, encrypted email, physical dead drops
|
||||
<strong>Characteristics:</strong></p>
|
||||
<ul>
|
||||
<li>No dependence on internet infrastructure</li>
|
||||
<li>Asynchronous communication with time delays</li>
|
||||
<li>Multiple redundant channels and methods</li>
|
||||
<li>Resistance to network disruption and censorship</li>
|
||||
</ul>
|
||||
|
||||
<h3 id="layer-4-anonymous-broadcasting">Layer 4: Anonymous Broadcasting</h3>
|
||||
<p><strong>Use Case:</strong> Public communications and propaganda distribution
|
||||
<strong>Security Level:</strong> Sender anonymity and censorship resistance
|
||||
<strong>Tools:</strong> Tor hidden services, distributed publishing platforms
|
||||
<strong>Characteristics:</strong></p>
|
||||
<ul>
|
||||
<li>One-to-many communication model</li>
|
||||
<li>Strong sender anonymity protection</li>
|
||||
<li>Censorship resistance and availability</li>
|
||||
<li>Public accessibility without authentication</li>
|
||||
</ul>
|
||||
|
||||
<h2 id="chapter-overview">Chapter Overview</h2>
|
||||
|
||||
<h3 id="chapter-3-communication-layer-architecture-3-1-to-3-6">Chapter 3: Communication Layer Architecture (3-1 to 3-6)</h3>
|
||||
|
||||
<p>Establishes the theoretical framework and practical implementation of multi-layer communication systems:</p>
|
||||
|
||||
<p><strong>3-1: Multi-Layer Communication Strategy</strong> - Overall architecture and layer selection criteria</p>
|
||||
|
||||
<p><strong>3-2: High-Risk Real-Time Communication (Layer 1)</strong> - Maximum security for time-sensitive operations</p>
|
||||
|
||||
<p><strong>3-3: Secure Collaboration Systems (Layer 2)</strong> - Balancing security with collaboration needs</p>
|
||||
|
||||
<p><strong>3-4: Failsafe and Offline Methods (Layer 3)</strong> - Backup and emergency communication channels</p>
|
||||
|
||||
<p><strong>3-5: Anonymous Broadcasting (Layer 4)</strong> - Public communications and information distribution</p>
|
||||
|
||||
<p><strong>3-6: Communication Protocol Selection</strong> - Choosing appropriate tools and methods for specific scenarios</p>
|
||||
|
||||
<h3 id="chapter-4-secure-messaging-and-voice-communications-4-1-to-4-8">Chapter 4: Secure Messaging and Voice Communications (4-1 to 4-8)</h3>
|
||||
|
||||
<p>Provides detailed configuration and operational guidance for secure messaging systems:</p>
|
||||
|
||||
<p><strong>4-1: Session Messenger Configuration</strong> - Maximum security messaging with onion routing</p>
|
||||
|
||||
<p><strong>4-2: Element/Matrix Self-Hosted Setup</strong> - Secure collaboration platform implementation</p>
|
||||
|
||||
<p><strong>4-3: Briar Peer-to-Peer Messaging</strong> - Decentralized messaging without servers</p>
|
||||
|
||||
<p><strong>4-4: Signal Security Best Practices</strong> - Operational security for mainstream secure messaging</p>
|
||||
|
||||
<p><strong>4-5: Voice Communication Security</strong> - Secure voice calls and audio communications</p>
|
||||
|
||||
<p><strong>4-6: Group Communication Management</strong> - Security protocols for multi-participant communications</p>
|
||||
|
||||
<p><strong>4-7: Message Verification and Authentication</strong> - Ensuring message integrity and sender verification</p>
|
||||
|
||||
<p><strong>4-8: Communication Scheduling and Protocols</strong> - Operational procedures for secure communications</p>
|
||||
|
||||
<h3 id="chapter-5-file-sharing-and-collaboration-5-1-to-5-6">Chapter 5: File Sharing and Collaboration (5-1 to 5-6)</h3>
|
||||
|
||||
<p>Covers secure systems for document collaboration and file sharing:</p>
|
||||
|
||||
<p><strong>5-1: CryptPad Secure Document Collaboration</strong> - Real-time collaborative editing with encryption</p>
|
||||
|
||||
<p><strong>5-2: OnionShare Anonymous File Transfer</strong> - Secure file sharing over Tor network</p>
|
||||
|
||||
<p><strong>5-3: Encrypted Cloud Storage (Mega/Proton)</strong> - Secure cloud storage for resistance operations</p>
|
||||
|
||||
<p><strong>5-4: Digital Dead Drops</strong> - Asynchronous file sharing without direct contact</p>
|
||||
|
||||
<p><strong>5-5: Version Control for Sensitive Documents</strong> - Managing document versions and changes securely</p>
|
||||
|
||||
<p><strong>5-6: Collaborative Security Protocols</strong> - Operational procedures for secure collaboration</p>
|
||||
|
||||
<h2 id="implementation-approach">Implementation Approach</h2>
|
||||
|
||||
<h3 id="progressive-implementation">Progressive Implementation</h3>
|
||||
|
||||
<p>Part II is designed for progressive implementation, allowing resistance networks to start with basic secure communications and gradually add more sophisticated capabilities:</p>
|
||||
|
||||
<p><strong>Phase 1: Basic Secure Messaging</strong></p>
|
||||
<ul>
|
||||
<li>Implement Signal or Session for basic communications</li>
|
||||
<li>Establish basic operational security procedures</li>
|
||||
<li>Train participants in secure communication practices</li>
|
||||
</ul>
|
||||
|
||||
<p><strong>Phase 2: Collaboration Infrastructure</strong></p>
|
||||
<ul>
|
||||
<li>Deploy self-hosted Matrix server for group communications</li>
|
||||
<li>Implement CryptPad for document collaboration</li>
|
||||
<li>Establish file sharing protocols using OnionShare</li>
|
||||
</ul>
|
||||
|
||||
<p><strong>Phase 3: Advanced Architecture</strong></p>
|
||||
<ul>
|
||||
<li>Implement full multi-layer communication strategy</li>
|
||||
<li>Deploy Briar for high-security scenarios</li>
|
||||
<li>Establish emergency and backup communication channels</li>
|
||||
</ul>
|
||||
|
||||
<p><strong>Phase 4: Operational Integration</strong></p>
|
||||
<ul>
|
||||
<li>Integrate communication systems with operational planning</li>
|
||||
<li>Implement advanced security protocols and procedures</li>
|
||||
<li>Establish training and support systems for network participants</li>
|
||||
</ul>
|
||||
|
||||
<h3 id="security-considerations">Security Considerations</h3>
|
||||
|
||||
<p>Each communication system and protocol covered in Part II includes specific security considerations:</p>
|
||||
|
||||
<p><strong>Technical Security:</strong></p>
|
||||
<ul>
|
||||
<li>Encryption strength and implementation quality</li>
|
||||
<li>Metadata protection and anonymity features</li>
|
||||
<li>Infrastructure security and server hardening</li>
|
||||
<li>Software updates and vulnerability management</li>
|
||||
</ul>
|
||||
|
||||
<p><strong>Operational Security:</strong></p>
|
||||
<ul>
|
||||
<li>User authentication and access control</li>
|
||||
<li>Communication protocols and procedures</li>
|
||||
<li>Incident response and compromise recovery</li>
|
||||
<li>Training and security awareness</li>
|
||||
</ul>
|
||||
|
||||
<p><strong>Strategic Security:</strong></p>
|
||||
<ul>
|
||||
<li>Threat model alignment and risk assessment</li>
|
||||
<li>Backup and redundancy planning</li>
|
||||
<li>Legal considerations and jurisdiction issues</li>
|
||||
<li>Long-term sustainability and maintenance</li>
|
||||
</ul>
|
||||
|
||||
<div class="warning-box">
|
||||
<div class="warning-title">Communication Discipline</div>
|
||||
<p>The most sophisticated communication systems are worthless without proper operational discipline. All participants must understand and consistently follow communication protocols, security procedures, and operational security practices.</p>
|
||||
</div>
|
||||
|
||||
<h2 id="integration-with-other-parts">Integration with Other Parts</h2>
|
||||
|
||||
<p>Part II builds directly on the foundational principles and threat assessment methodologies covered in Part I:</p>
|
||||
|
||||
<ul>
|
||||
<li><strong>Core Security Principles</strong> guide the selection and configuration of communication systems</li>
|
||||
<li><strong>Threat Assessment</strong> determines appropriate security levels and tool selection</li>
|
||||
<li><strong>Risk Assessment</strong> informs decisions about acceptable trade-offs between security and usability</li>
|
||||
<li><strong>OpSec Fundamentals</strong> provide the procedural framework for secure communication operations</li>
|
||||
</ul>
|
||||
|
||||
<p>Part II also provides the foundation for the operational security procedures covered in Part III and the advanced techniques covered in Part IV.</p>
|
||||
|
||||
<h2 id="getting-started">Getting Started</h2>
|
||||
|
||||
<h3 id="for-technical-implementation">For Technical Implementation</h3>
|
||||
|
||||
<ol>
|
||||
<li><strong>Start with threat assessment</strong> to determine appropriate security levels</li>
|
||||
<li><strong>Begin with basic tools</strong> (Signal or Session) before implementing complex systems</li>
|
||||
<li><strong>Test all systems thoroughly</strong> in safe environments before operational use</li>
|
||||
<li><strong>Implement gradually</strong> with proper training and support for all participants</li>
|
||||
</ol>
|
||||
|
||||
<h3 id="for-operational-planning">For Operational Planning</h3>
|
||||
|
||||
<ol>
|
||||
<li><strong>Map communication requirements</strong> to the four-layer architecture</li>
|
||||
<li><strong>Develop communication protocols</strong> appropriate to your threat environment</li>
|
||||
<li><strong>Establish training programs</strong> for all communication tools and procedures</li>
|
||||
<li><strong>Plan for contingencies</strong> including system compromise and failure scenarios</li>
|
||||
</ol>
|
||||
|
||||
<h3 id="for-network-leadership">For Network Leadership</h3>
|
||||
|
||||
<ol>
|
||||
<li><strong>Assess current communication practices</strong> against security requirements</li>
|
||||
<li><strong>Develop implementation timeline</strong> for improved communication security</li>
|
||||
<li><strong>Allocate resources</strong> for infrastructure, training, and ongoing maintenance</li>
|
||||
<li><strong>Establish governance</strong> for communication system management and security</li>
|
||||
</ol>
|
||||
|
||||
<div class="info-box">
|
||||
<div class="info-title">Implementation Priority</div>
|
||||
<p>Focus first on implementing basic secure messaging (Chapter 4) before attempting to deploy complex multi-layer architectures. Solid implementation of fundamental tools is more valuable than poorly implemented advanced systems.</p>
|
||||
</div>
|
||||
|
||||
<hr />
|
||||
|
||||
<p><strong>Ready to begin?</strong> Start with <a href="/chapters/chapter-3/">Chapter 3: Communication Layer Architecture →</a></p>
|
||||
|
||||
|
||||
|
||||
|
||||
<nav class="section-nav">
|
||||
|
||||
<a href="/chapters/chapter-2/" class="nav-link">
|
||||
<span class="arrow">←</span>
|
||||
<span>Chapter 2: Threat Assessment</span>
|
||||
</a>
|
||||
|
||||
|
||||
|
||||
<a href="/chapters/chapter-3/" class="nav-link">
|
||||
<span>Chapter 3: Communication Architecture</span>
|
||||
<span class="arrow">→</span>
|
||||
</a>
|
||||
|
||||
</nav>
|
||||
|
||||
</main>
|
||||
</div>
|
||||
|
||||
<footer class="footer">
|
||||
<div class="container">
|
||||
<div class="footer-content">
|
||||
<div class="organization">Department of Internautics</div>
|
||||
<div>Bureau of Decentralized Resistance</div>
|
||||
<div>FM-R1 - Version 1.0 - 2025-08-28</div>
|
||||
<div style="margin-top: 1rem;">
|
||||
<a href="https://resist.is" target="_blank">resist.is</a> |
|
||||
<a href="https://git.hacker.supply/Department_of_Internautics/field_guide" target="_blank">Source Code</a>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
</footer>
|
||||
|
||||
<!-- JavaScript -->
|
||||
<script src="/assets/js/main.js"></script>
|
||||
</body>
|
||||
</html>
|
||||
|
||||
Reference in New Issue
Block a user