6.4 KiB
layout | title | description | next_page | ||||
---|---|---|---|---|---|---|---|
default | Preface | Purpose, scope, and guidance for using the Field Manual for Resistance Operations |
|
Preface
Purpose
This Field Manual (FM-R1) provides comprehensive guidance for establishing and maintaining secure communication networks within decentralized resistance movements. It is specifically designed for individuals and groups operating under the threat of an authoritarian regime with advanced surveillance capabilities.
The manual combines proven operational security practices, modern cryptographic tools, and time-tested resistance strategies into a comprehensive framework that can be implemented by newcomers to the resistance, but still remaining valuable to experienced dissidents.
Scope
This manual covers:
- Core security principles fundamental to all resistance operations
- Threat assessment methodologies for understanding your operational environment
- Multi-layer communication architectures for different security requirements
- Specific tool configurations for secure messaging, file sharing, and collaboration
- Operational security procedures for maintaining security discipline
- Advanced techniques for network resilience and counter-intelligence
This manual does not cover:
- Specific tactical operations or direct action planning
- Legal advice or guidance on laws in specific jurisdictions
- Physical security beyond basic operational security measures
- Weapons, explosives, or other kinetic capabilities
Target Audience
Primary Audience
- Newcomers to resistance operations who need foundational knowledge
- Cell leaders and coordinators responsible for communication security
- Technical personnel implementing secure infrastructure
- Training coordinators developing security education programs
Secondary Audience
- Experienced activists seeking to improve their security practices
- Journalists and researchers working in high-risk environments
- Civil liberties organizations operating under surveillance
- International solidarity groups supporting resistance movements
How to Use This Manual
For Newcomers
- Start with the fundamentals: Read the Introduction and Part I completely before proceeding
- Follow the progressive structure: Each chapter builds upon previous knowledge
- Practice in safe environments: Test tools and procedures before operational use
- Seek mentorship: Connect with experienced practitioners through secure channels
- Start simple: Implement basic security measures before advancing to complex systems
For Experienced Practitioners
- Use as a reference guide for specific tools and procedures
- Adapt recommendations to your specific threat environment
- Contribute improvements through secure feedback channels
- Train others using this manual as a curriculum foundation
For Technical Implementation
- Follow configuration guides in the appendices exactly
- Test all systems thoroughly before deployment
- Maintain operational security during setup and maintenance
- Document customizations securely for future reference
Security Considerations for This Manual
Accessing, storing, or distributing this manual may be considered suspicious activity by hostile authorities. Take appropriate precautions:
- Access only through Tails OS, Tor Browser, or similar anonymizing tools
- Do not store on personal devices connected to your real identity
- Share only through secure channels with trusted individuals
- Consider the legal implications in your jurisdiction
Recommended Access Methods
- Tails OS - Boot from USB for maximum anonymity
- Tor Browser - Use on a dedicated, clean device
- Public Wi-Fi - Access from locations unconnected to your identity
- Printed copies - For offline reference, dispose of securely when no longer needed
Distribution Guidelines
- Share only with individuals who have demonstrated commitment to resistance operations
- Use secure communication channels (Signal, Briar, OnionShare) for distribution
- Verify recipient identity through trusted intermediaries
- Consider compartmentalization - not everyone needs access to all sections
Acknowledgments
This manual builds upon decades of resistance experience and the work of countless individuals who have risked their freedom and lives for justice. Special recognition goes to:
- Historical resistance movements whose strategies inform our approach
- Digital rights organizations developing the tools we depend on
- Security researchers who identify vulnerabilities and develop countermeasures
- Current practitioners who provide feedback and real-world testing
Feedback and Updates
This manual is a living document that must evolve with changing threats and technologies. Feedback is essential for maintaining its effectiveness and accuracy.
Secure Feedback Channels
- Matrix: Contact @sparticus:weresist.is through Element
- OnionShare: Check resist.is for current feedback drop locations
- Dead drops: Physical and digital locations announced through secure channels
Update Distribution
- Primary source: git.hacker.supply/Department_of_Internautics/field_guide
- Mirror sites: Announced through resistance networks
- Version control: Each update includes detailed changelog and verification signatures
Legal Disclaimer
This manual is provided for educational purposes only. The authors and distributors:
- Do not advocate for illegal activities in any jurisdiction
- Cannot be held responsible for how this information is used
- Recommend consulting legal counsel familiar with your local laws
- Emphasize that resistance activities carry inherent legal and physical risks
Users are solely responsible for understanding and complying with applicable laws in their jurisdiction and for assessing the risks of their activities.
Ready to begin? Proceed to the Introduction to understand the threat landscape and fundamental security concepts that underpin all resistance operations.
Next: Introduction →