field_guide/preface.md
2025-08-29 16:26:03 -04:00

6.4 KiB

layout title description next_page
default Preface Purpose, scope, and guidance for using the Field Manual for Resistance Operations
title url
Introduction /introduction/

Preface

Purpose

This Field Manual (FM-R1) provides comprehensive guidance for establishing and maintaining secure communication networks within decentralized resistance movements. It is specifically designed for individuals and groups operating under the threat of an authoritarian regime with advanced surveillance capabilities.

The manual combines proven operational security practices, modern cryptographic tools, and time-tested resistance strategies into a comprehensive framework that can be implemented by newcomers to the resistance, but still remaining valuable to experienced dissidents.

Scope

This manual covers:

  • Core security principles fundamental to all resistance operations
  • Threat assessment methodologies for understanding your operational environment
  • Multi-layer communication architectures for different security requirements
  • Specific tool configurations for secure messaging, file sharing, and collaboration
  • Operational security procedures for maintaining security discipline
  • Advanced techniques for network resilience and counter-intelligence

This manual does not cover:

  • Specific tactical operations or direct action planning
  • Legal advice or guidance on laws in specific jurisdictions
  • Physical security beyond basic operational security measures
  • Weapons, explosives, or other kinetic capabilities

Target Audience

Primary Audience

  • Newcomers to resistance operations who need foundational knowledge
  • Cell leaders and coordinators responsible for communication security
  • Technical personnel implementing secure infrastructure
  • Training coordinators developing security education programs

Secondary Audience

  • Experienced activists seeking to improve their security practices
  • Journalists and researchers working in high-risk environments
  • Civil liberties organizations operating under surveillance
  • International solidarity groups supporting resistance movements

How to Use This Manual

For Newcomers

  1. Start with the fundamentals: Read the Introduction and Part I completely before proceeding
  2. Follow the progressive structure: Each chapter builds upon previous knowledge
  3. Practice in safe environments: Test tools and procedures before operational use
  4. Seek mentorship: Connect with experienced practitioners through secure channels
  5. Start simple: Implement basic security measures before advancing to complex systems

For Experienced Practitioners

  • Use as a reference guide for specific tools and procedures
  • Adapt recommendations to your specific threat environment
  • Contribute improvements through secure feedback channels
  • Train others using this manual as a curriculum foundation

For Technical Implementation

  • Follow configuration guides in the appendices exactly
  • Test all systems thoroughly before deployment
  • Maintain operational security during setup and maintenance
  • Document customizations securely for future reference

Security Considerations for This Manual

Operational Security Warning

Accessing, storing, or distributing this manual may be considered suspicious activity by hostile authorities. Take appropriate precautions:

  • Access only through Tails OS, Tor Browser, or similar anonymizing tools
  • Do not store on personal devices connected to your real identity
  • Share only through secure channels with trusted individuals
  • Consider the legal implications in your jurisdiction
  1. Tails OS - Boot from USB for maximum anonymity
  2. Tor Browser - Use on a dedicated, clean device
  3. Public Wi-Fi - Access from locations unconnected to your identity
  4. Printed copies - For offline reference, dispose of securely when no longer needed

Distribution Guidelines

  • Share only with individuals who have demonstrated commitment to resistance operations
  • Use secure communication channels (Signal, Briar, OnionShare) for distribution
  • Verify recipient identity through trusted intermediaries
  • Consider compartmentalization - not everyone needs access to all sections

Acknowledgments

This manual builds upon decades of resistance experience and the work of countless individuals who have risked their freedom and lives for justice. Special recognition goes to:

  • Historical resistance movements whose strategies inform our approach
  • Digital rights organizations developing the tools we depend on
  • Security researchers who identify vulnerabilities and develop countermeasures
  • Current practitioners who provide feedback and real-world testing

Feedback and Updates

This manual is a living document that must evolve with changing threats and technologies. Feedback is essential for maintaining its effectiveness and accuracy.

Secure Feedback Channels

  • Matrix: Contact @sparticus:weresist.is through Element
  • OnionShare: Check resist.is for current feedback drop locations
  • Dead drops: Physical and digital locations announced through secure channels

Update Distribution

  • Primary source: git.hacker.supply/Department_of_Internautics/field_guide
  • Mirror sites: Announced through resistance networks
  • Version control: Each update includes detailed changelog and verification signatures

This manual is provided for educational purposes only. The authors and distributors:

  • Do not advocate for illegal activities in any jurisdiction
  • Cannot be held responsible for how this information is used
  • Recommend consulting legal counsel familiar with your local laws
  • Emphasize that resistance activities carry inherent legal and physical risks

Users are solely responsible for understanding and complying with applicable laws in their jurisdiction and for assessing the risks of their activities.


Getting Started

Ready to begin? Proceed to the Introduction to understand the threat landscape and fundamental security concepts that underpin all resistance operations.

Next: Introduction →