FM-R1: FM-R1: Secure Communication Networks for Decentralized Resistance
UNCLASSIFIED

Part I: Foundations of Resistance Security

Overview

Part I establishes the theoretical and practical foundations necessary for all resistance security operations. Before implementing any technical measures or operational procedures, resistance practitioners must understand the fundamental principles that govern security in hostile environments and develop the analytical skills necessary to assess threats and design appropriate countermeasures.

This part addresses the most critical question in resistance security: How do you think about security in a way that leads to effective protection?

Learning Objectives

Upon completing Part I, you will be able to:

Chapter Overview

Chapter 1: Core Security Principles (1-1 to 1-5)

The five fundamental principles that must guide all resistance security decisions:

1-1: Principle of Least Privilege - Limiting access to the minimum necessary for operational effectiveness

1-2: Need-to-Know Basis - Compartmentalizing information to prevent cascade failures

1-3: Compartmentalization and Cell Structure - Organizing resistance networks to contain compromise

1-4: Zero Trust Verification - Assuming compromise and requiring continuous authentication

1-5: Metadata Minimization - Reducing the digital traces that reveal operational patterns

Chapter 2: Threat Assessment and Operational Environment (2-1 to 2-4)

Systematic approaches to understanding and responding to threats:

2-1: Understanding Your Adversary - Analyzing capabilities, motivations, and limitations of hostile forces

2-2: Threat Model Development - Creating structured assessments of risks and vulnerabilities

2-3: Risk Assessment Framework - Quantifying and prioritizing security investments

2-4: Operational Security (OpSec) Fundamentals - Translating threat assessments into practical procedures

The Security Mindset

Before diving into specific principles and procedures, it’s essential to understand the fundamental shift in thinking required for effective resistance security. This shift involves:

From Convenience to Security

In normal life, we optimize for convenience, efficiency, and ease of use. In resistance operations, security becomes the primary consideration, with convenience secondary. This doesn’t mean making things unnecessarily difficult, but rather accepting that some inconvenience is the price of safety.

From Trust to Verification

Normal social and professional relationships operate on trust and good faith. Resistance operations must assume that trust can be compromised, either through infiltration or coercion, and build verification mechanisms into all critical processes.

From Reactive to Proactive

Most people respond to security threats after they become apparent. Resistance operations must anticipate threats and implement countermeasures before they’re needed, because by the time a threat is obvious, it may be too late to respond effectively.

From Individual to Collective

Personal security practices focus on protecting yourself. Resistance security must consider how your actions affect the safety of others in your network, and how their actions affect your safety.

Common Misconceptions

“Encryption Solves Everything”

While encryption is essential, it only protects the content of communications, not the metadata that reveals who is talking to whom, when, and from where. Metadata analysis can reveal network structures and operational patterns even when all communications are encrypted.

“If You Have Nothing to Hide…”

This argument fundamentally misunderstands the nature of authoritarian surveillance. The goal is not just to find evidence of wrongdoing, but to map networks, predict behavior, and suppress dissent before it becomes effective.

“They’re Too Powerful to Resist”

While authoritarian regimes have significant advantages, they also have limitations and vulnerabilities. Understanding both their capabilities and their constraints is essential for developing effective resistance strategies.

“Perfect Security is Possible”

No security system is perfect, and pursuing perfect security often leads to systems so complex and restrictive that they cannot be used effectively. The goal is appropriate security for your specific threat environment and operational requirements.

Integration with Subsequent Parts

The principles and methodologies covered in Part I provide the foundation for all subsequent technical and operational guidance:

Each technical recommendation and operational procedure in later parts derives from the fundamental principles established here. Understanding these foundations is essential for adapting the manual’s guidance to your specific circumstances and for making sound security decisions when facing novel situations.

Study Approach

For Individual Study

  1. Read each section completely before moving to the next
  2. Take notes on how principles apply to your specific situation
  3. Work through examples using scenarios relevant to your operations
  4. Review regularly as these concepts must become second nature

For Group Study

  1. Discuss each principle and its implications for your organization
  2. Develop case studies based on your operational environment
  3. Practice threat modeling for actual or hypothetical operations
  4. Create reference materials summarizing key concepts for quick review

For Training Others

  1. Use concrete examples rather than abstract concepts
  2. Connect principles to practical consequences of security failures
  3. Encourage questions and discussion of edge cases
  4. Provide opportunities to practice threat assessment skills
Foundation First

Do not skip Part I to get to "more practical" technical content. The principles covered here determine whether technical measures will be effective or merely provide a false sense of security. Every security failure can be traced back to a violation of these fundamental principles.


Ready to begin? Start with Chapter 1: Core Security Principles →