--- layout: default title: "Preface" description: "Purpose, scope, and guidance for using the Field Manual for Resistance Operations" next_page: title: "Introduction" url: "/introduction/" --- # Preface ## Purpose This Field Manual (FM-R1) provides comprehensive guidance for establishing and maintaining secure communication networks within decentralized resistance movements. It is specifically designed for individuals and groups operating under the threat of an authoritarian regime with advanced surveillance capabilities. The manual combines proven operational security practices, modern cryptographic tools, and time-tested resistance strategies into a comprehensive framework that can be implemented by newcomers to the resistance, but still remaining valuable to experienced dissidents. ## Scope This manual covers: - **Core security principles** fundamental to all resistance operations - **Threat assessment methodologies** for understanding your operational environment - **Multi-layer communication architectures** for different security requirements - **Specific tool configurations** for secure messaging, file sharing, and collaboration - **Operational security procedures** for maintaining security discipline - **Advanced techniques** for network resilience and counter-intelligence This manual does **not** cover: - Specific tactical operations or direct action planning - Legal advice or guidance on laws in specific jurisdictions - Physical security beyond basic operational security measures - Weapons, explosives, or other kinetic capabilities ## Target Audience ### Primary Audience - **Newcomers to resistance operations** who need foundational knowledge - **Cell leaders and coordinators** responsible for communication security - **Technical personnel** implementing secure infrastructure - **Training coordinators** developing security education programs ### Secondary Audience - **Experienced activists** seeking to improve their security practices - **Journalists and researchers** working in high-risk environments - **Civil liberties organizations** operating under surveillance - **International solidarity groups** supporting resistance movements ## How to Use This Manual ### For Newcomers 1. **Start with the fundamentals**: Read the Introduction and Part I completely before proceeding 2. **Follow the progressive structure**: Each chapter builds upon previous knowledge 3. **Practice in safe environments**: Test tools and procedures before operational use 4. **Seek mentorship**: Connect with experienced practitioners through secure channels 5. **Start simple**: Implement basic security measures before advancing to complex systems ### For Experienced Practitioners - Use as a **reference guide** for specific tools and procedures - **Adapt recommendations** to your specific threat environment - **Contribute improvements** through secure feedback channels - **Train others** using this manual as a curriculum foundation ### For Technical Implementation - Follow **configuration guides** in the appendices exactly - **Test all systems** thoroughly before deployment - **Maintain operational security** during setup and maintenance - **Document customizations** securely for future reference ## Security Considerations for This Manual
Accessing, storing, or distributing this manual may be considered suspicious activity by hostile authorities. Take appropriate precautions:
Ready to begin? Proceed to the Introduction to understand the threat landscape and fundamental security concepts that underpin all resistance operations.