6.6 KiB
layout | title | description |
---|---|---|
default | Table of Contents | Field Manual for Resistance Operations - A comprehensive guide to secure communication and operational security for decentralized resistance movements |
{{ site.title }}
Table of Contents
Front Matter
- Preface - Purpose, scope, and how to use this manual
- Introduction - Threat landscape and security fundamentals
Part I: Foundations of Resistance Security
- Part I Overview - Core principles and threat assessment
- Chapter 1: Core Security Principles (1-1 to 1-5)
- 1-1: Principle of Least Privilege
- 1-2: Need-to-Know Basis
- 1-3: Compartmentalization and Cell Structure
- 1-4: Zero Trust Verification
- 1-5: Metadata Minimization
- Chapter 2: Threat Assessment and Operational Environment (2-1 to 2-4)
- 2-1: Understanding Your Adversary
- 2-2: Threat Model Development
- 2-3: Risk Assessment Framework
- 2-4: Operational Security (OpSec) Fundamentals
- Chapter 1: Core Security Principles (1-1 to 1-5)
Part II: Secure Communication Systems
- Part II Overview - Multi-layer communication architecture
- Chapter 3: Communication Layer Architecture (3-1 to 3-6)
- 3-1: Multi-Layer Communication Strategy
- 3-2: High-Risk Real-Time Communication (Layer 1)
- 3-3: Secure Collaboration Systems (Layer 2)
- 3-4: Failsafe and Offline Methods (Layer 3)
- 3-5: Anonymous Broadcasting (Layer 4)
- 3-6: Communication Protocol Selection
- Chapter 4: Secure Messaging and Voice Communications (4-1 to 4-8)
- 4-1: Session Messenger Configuration
- 4-2: Element/Matrix Self-Hosted Setup
- 4-3: Briar Peer-to-Peer Messaging
- 4-4: Signal Security Best Practices
- 4-5: Voice Communication Security
- 4-6: Group Communication Management
- 4-7: Message Verification and Authentication
- 4-8: Communication Scheduling and Protocols
- Chapter 5: File Sharing and Collaboration (5-1 to 5-6)
- 5-1: CryptPad Secure Document Collaboration
- 5-2: OnionShare Anonymous File Transfer
- 5-3: Encrypted Cloud Storage (Mega/Proton)
- 5-4: Digital Dead Drops
- 5-5: Version Control for Sensitive Documents
- 5-6: Collaborative Security Protocols
- Chapter 3: Communication Layer Architecture (3-1 to 3-6)
Part III: Operational Security Procedures
- Part III Overview - Hardware, digital hygiene, and operational procedures
- Chapter 6: Hardware and Infrastructure Security (6-1 to 6-8)
- 6-1: Untraceable Hardware Acquisition
- 6-2: Tails OS Installation and Configuration
- 6-3: Device Compartmentalization
- 6-4: Physical Security Measures
- 6-5: Network Access Security
- 6-6: Hardware Disposal and Sanitization
- 6-7: Faraday Cage and Signal Blocking
- 6-8: Power and Charging Security
- Chapter 7: Digital Hygiene and Privacy (7-1 to 7-6)
- 7-1: Browser Security Configuration
- 7-2: Search Engine Privacy
- 7-3: VPN and Tor Usage
- 7-4: Social Media Operational Security
- 7-5: Email Security and Anonymous Accounts
- 7-6: Digital Footprint Minimization
- Chapter 8: Operational Procedures (8-1 to 8-8)
- 8-1: Cell Organization and Management
- 8-2: Meeting Security Protocols
- 8-3: Coded Language and Communication
- 8-4: Surveillance Detection and Evasion
- 8-5: Emergency Procedures and Protocols
- 8-6: Information Sanitization
- 8-7: Operational Planning Security
- 8-8: Post-Operation Security Review
- Chapter 6: Hardware and Infrastructure Security (6-1 to 6-8)
Part IV: Advanced Resistance Operations
- Part IV Overview - Network resilience and counter-intelligence
- Chapter 9: Network Resilience and Redundancy (9-1 to 9-5)
- 9-1: Mesh Network Implementation
- 9-2: Offline Communication Systems
- 9-3: Emergency Communication Protocols
- 9-4: Network Failure Recovery
- 9-5: Distributed Infrastructure Planning
- Chapter 10: Counter-Intelligence and Security Culture (10-1 to 10-6)
- 10-1: Infiltration Detection and Prevention
- 10-2: Information Verification Procedures
- 10-3: Security Culture Development
- 10-4: Compartmentalized Knowledge Management
- 10-5: Trust Networks and Verification
- 10-6: Operational Security Training
- Chapter 9: Network Resilience and Redundancy (9-1 to 9-5)
Appendices
- Appendix A: Quick Reference Guides - Emergency checklists and procedures
- Appendix B: Tool Configuration Guides - Step-by-step setup instructions
- Appendix C: External Resources and Links - Recommended tools and organizations
- Appendix D: Glossary of Terms - Definitions and terminology
This manual contains sensitive information about resistance operations and security practices. Ensure you are accessing this content through secure channels (Tails OS, Tor Browser, or other anonymizing tools) and following proper operational security protocols.
If you are new to resistance operations, start with the Preface and Introduction, then proceed through Part I: Foundations before advancing to more technical sections. Each chapter builds upon previous knowledge.
Distribution: This manual is designed for decentralized distribution through secure channels. Share responsibly and only with trusted individuals who have a legitimate need for this information.
Updates: This manual will be updated regularly as new threats emerge and technologies evolve. Check the source repository for the latest version.
Support: For questions or contributions, contact the Bureau of Decentralized Resistance through secure channels only.