field_guide/index.md
2025-08-29 06:58:56 -04:00

6.6 KiB

layout title description
default Table of Contents Field Manual for Resistance Operations - A comprehensive guide to secure communication and operational security for decentralized resistance movements

{{ site.title }}

{{ site.manual_designation }}
{{ site.subtitle }}
{{ site.organization }}
{{ site.bureau }}
{{ site.classification }}
Version {{ site.version }} - {{ site.date }}

Table of Contents

Front Matter

  • Preface - Purpose, scope, and how to use this manual
  • Introduction - Threat landscape and security fundamentals

Part I: Foundations of Resistance Security

Part II: Secure Communication Systems

  • Part II Overview - Multi-layer communication architecture
    • Chapter 3: Communication Layer Architecture (3-1 to 3-6)
      • 3-1: Multi-Layer Communication Strategy
      • 3-2: High-Risk Real-Time Communication (Layer 1)
      • 3-3: Secure Collaboration Systems (Layer 2)
      • 3-4: Failsafe and Offline Methods (Layer 3)
      • 3-5: Anonymous Broadcasting (Layer 4)
      • 3-6: Communication Protocol Selection
    • Chapter 4: Secure Messaging and Voice Communications (4-1 to 4-8)
      • 4-1: Session Messenger Configuration
      • 4-2: Element/Matrix Self-Hosted Setup
      • 4-3: Briar Peer-to-Peer Messaging
      • 4-4: Signal Security Best Practices
      • 4-5: Voice Communication Security
      • 4-6: Group Communication Management
      • 4-7: Message Verification and Authentication
      • 4-8: Communication Scheduling and Protocols
    • Chapter 5: File Sharing and Collaboration (5-1 to 5-6)
      • 5-1: CryptPad Secure Document Collaboration
      • 5-2: OnionShare Anonymous File Transfer
      • 5-3: Encrypted Cloud Storage (Mega/Proton)
      • 5-4: Digital Dead Drops
      • 5-5: Version Control for Sensitive Documents
      • 5-6: Collaborative Security Protocols

Part III: Operational Security Procedures

  • Part III Overview - Hardware, digital hygiene, and operational procedures
    • Chapter 6: Hardware and Infrastructure Security (6-1 to 6-8)
      • 6-1: Untraceable Hardware Acquisition
      • 6-2: Tails OS Installation and Configuration
      • 6-3: Device Compartmentalization
      • 6-4: Physical Security Measures
      • 6-5: Network Access Security
      • 6-6: Hardware Disposal and Sanitization
      • 6-7: Faraday Cage and Signal Blocking
      • 6-8: Power and Charging Security
    • Chapter 7: Digital Hygiene and Privacy (7-1 to 7-6)
      • 7-1: Browser Security Configuration
      • 7-2: Search Engine Privacy
      • 7-3: VPN and Tor Usage
      • 7-4: Social Media Operational Security
      • 7-5: Email Security and Anonymous Accounts
      • 7-6: Digital Footprint Minimization
    • Chapter 8: Operational Procedures (8-1 to 8-8)
      • 8-1: Cell Organization and Management
      • 8-2: Meeting Security Protocols
      • 8-3: Coded Language and Communication
      • 8-4: Surveillance Detection and Evasion
      • 8-5: Emergency Procedures and Protocols
      • 8-6: Information Sanitization
      • 8-7: Operational Planning Security
      • 8-8: Post-Operation Security Review

Part IV: Advanced Resistance Operations

  • Part IV Overview - Network resilience and counter-intelligence
    • Chapter 9: Network Resilience and Redundancy (9-1 to 9-5)
      • 9-1: Mesh Network Implementation
      • 9-2: Offline Communication Systems
      • 9-3: Emergency Communication Protocols
      • 9-4: Network Failure Recovery
      • 9-5: Distributed Infrastructure Planning
    • Chapter 10: Counter-Intelligence and Security Culture (10-1 to 10-6)
      • 10-1: Infiltration Detection and Prevention
      • 10-2: Information Verification Procedures
      • 10-3: Security Culture Development
      • 10-4: Compartmentalized Knowledge Management
      • 10-5: Trust Networks and Verification
      • 10-6: Operational Security Training

Appendices


Security Notice

This manual contains sensitive information about resistance operations and security practices. Ensure you are accessing this content through secure channels (Tails OS, Tor Browser, or other anonymizing tools) and following proper operational security protocols.

For Newcomers

If you are new to resistance operations, start with the Preface and Introduction, then proceed through Part I: Foundations before advancing to more technical sections. Each chapter builds upon previous knowledge.


Distribution: This manual is designed for decentralized distribution through secure channels. Share responsibly and only with trusted individuals who have a legitimate need for this information.

Updates: This manual will be updated regularly as new threats emerge and technologies evolve. Check the source repository for the latest version.

Support: For questions or contributions, contact the Bureau of Decentralized Resistance through secure channels only.