727 lines
36 KiB
HTML
727 lines
36 KiB
HTML
<!DOCTYPE html>
|
|
<html lang="en">
|
|
<head>
|
|
<meta charset="UTF-8">
|
|
<meta name="viewport" content="width=device-width, initial-scale=1.0">
|
|
<title>Appendix A: Essential Tools and Resources - Field Manual for Resistance Operations</title>
|
|
<meta name="description" content="Comprehensive directory of tools, software, and resources for resistance operations">
|
|
|
|
<!-- Favicon -->
|
|
<link rel="icon" type="image/x-icon" href="/assets/images/favicon.ico">
|
|
|
|
<!-- Stylesheets -->
|
|
<link rel="stylesheet" href="/assets/css/main.css">
|
|
|
|
<!-- Security headers -->
|
|
<meta http-equiv="X-Content-Type-Options" content="nosniff">
|
|
<meta http-equiv="X-Frame-Options" content="DENY">
|
|
<meta http-equiv="X-XSS-Protection" content="1; mode=block">
|
|
|
|
<!-- No tracking -->
|
|
<meta name="robots" content="noindex, nofollow">
|
|
<!-- Matomo -->
|
|
<script>
|
|
var _paq = window._paq = window._paq || [];
|
|
/* tracker methods like "setCustomDimension" should be called before "trackPageView" */
|
|
_paq.push(['trackPageView']);
|
|
_paq.push(['enableLinkTracking']);
|
|
(function() {
|
|
var u="//stats.resist.is/";
|
|
_paq.push(['setTrackerUrl', u+'matomo.php']);
|
|
_paq.push(['setSiteId', '4']);
|
|
var d=document, g=d.createElement('script'), s=d.getElementsByTagName('script')[0];
|
|
g.async=true; g.src=u+'matomo.js'; s.parentNode.insertBefore(g,s);
|
|
})();
|
|
</script>
|
|
<!-- End Matomo Code -->
|
|
</head>
|
|
<body>
|
|
<header class="header">
|
|
<div class="container">
|
|
<div class="header-content">
|
|
<div class="logo">
|
|
<span class="omega">Ω</span>
|
|
<span>FM-R1</span>
|
|
</div>
|
|
<button class="nav-toggle" id="nav-toggle" aria-label="Toggle navigation">
|
|
☰
|
|
</button>
|
|
</div>
|
|
</div>
|
|
</header>
|
|
|
|
<div class="main-layout">
|
|
<nav class="sidebar" id="sidebar">
|
|
<nav class="main-navigation">
|
|
<!-- <div class="nav-header">
|
|
<div class="nav-subtitle">Field Manual for Resistance Operations</div>
|
|
</div>
|
|
-->
|
|
<div class="nav-sections">
|
|
<!-- Front Matter -->
|
|
<div class="nav-section">
|
|
<h3>Field Manual</h3>
|
|
<ul>
|
|
<li><a href="/" >Table of Contents</a></li>
|
|
<li><a href="/preface/" >Preface</a></li>
|
|
<li><a href="/introduction/" >Introduction</a></li>
|
|
</ul>
|
|
</div>
|
|
|
|
<!-- Part I: Foundations -->
|
|
<div class="nav-section">
|
|
<h3>Part I: Foundations</h3>
|
|
<ul>
|
|
<li>
|
|
<a href="/parts/part-1/" >Part Overview</a>
|
|
<ul>
|
|
<li><a href="/chapters/chapter-1/" >Ch 1: Core Security Principles</a></li>
|
|
<li><a href="/chapters/chapter-2/" >Ch 2: Threat Assessment</a></li>
|
|
</ul>
|
|
</li>
|
|
</ul>
|
|
</div>
|
|
|
|
<!-- Part II: Communication -->
|
|
<div class="nav-section">
|
|
<h3>Part II: Communication</h3>
|
|
<ul>
|
|
<li>
|
|
<a href="/parts/part-2/" >Part Overview</a>
|
|
<ul>
|
|
<li><a href="/chapters/chapter-3/" >Ch 3: Communication Architecture</a></li>
|
|
<li><a href="/chapters/chapter-4/" >Ch 4: Secure Messaging</a></li>
|
|
<li><a href="/chapters/chapter-5/" >Ch 5: File Sharing</a></li>
|
|
</ul>
|
|
</li>
|
|
</ul>
|
|
</div>
|
|
|
|
<!-- Part III: OpSec -->
|
|
<div class="nav-section">
|
|
<h3>Part III: OpSec</h3>
|
|
<ul>
|
|
<li>
|
|
<a href="/parts/part-3/" >Part Overview</a>
|
|
<ul>
|
|
<li><a href="/chapters/chapter-6/" >Ch 6: Hardware Security</a></li>
|
|
<li><a href="/chapters/chapter-7/" >Ch 7: Digital Hygiene</a></li>
|
|
<li><a href="/chapters/chapter-8/" >Ch 8: Operational Procedures</a></li>
|
|
</ul>
|
|
</li>
|
|
</ul>
|
|
</div>
|
|
|
|
<!-- Part IV: Advanced -->
|
|
<div class="nav-section">
|
|
<h3>Part IV: Advanced</h3>
|
|
<ul>
|
|
<li>
|
|
<a href="/parts/part-4/" >Part Overview</a>
|
|
<ul>
|
|
<li><a href="/chapters/chapter-9/" >Ch 9: Intelligence Gathering</a></li>
|
|
<li><a href="/chapters/chapter-10/" >Ch 10: Counter-Intelligence</a></li>
|
|
</ul>
|
|
</li>
|
|
</ul>
|
|
</div>
|
|
|
|
<!-- Appendices
|
|
<div class="nav-section">
|
|
<h3>Appendices</h3>
|
|
<ul>
|
|
<li><a href="/appendices/" >Appendices Overview</a></li>
|
|
<li><a href="/appendices/appendix-a/" class="active">Appendix A: Essential Tools</a></li>
|
|
<li><a href="/appendices/appendix-b/" >Appendix B: Legal Considerations</a></li>
|
|
<li><a href="/appendices/appendix-c/" >Appendix C: Emergency Procedures</a></li>
|
|
<li><a href="/appendices/appendix-d/" >Appendix D: Glossary & References</a></li>
|
|
</ul>
|
|
</div>
|
|
-->
|
|
|
|
<!-- Quick Access -->
|
|
<div class="nav-section nav-quick-access">
|
|
<h3>Quick Access</h3>
|
|
<ul>
|
|
<li><a href="/appendices/appendix-a/" class="nav-emergency">Essential Tools</a></li>
|
|
<li><a href="/appendices/appendix-b/" class="nav-emergency">Legal Rights</a></li>
|
|
<li><a href="/appendices/appendix-c/" class="nav-emergency">Emergency Procedures</a></li>
|
|
<li><a href="/appendices/appendix-d/" class="nav-emergency">Glossary & References</a></li>
|
|
</ul>
|
|
</div>
|
|
|
|
<!-- External Links -->
|
|
<div class="nav-section">
|
|
<h3>External Links</h3>
|
|
<ul>
|
|
<li><a href="https://resist.is" target="_blank">resist.is</a></li>
|
|
<li><a href="https://activistchecklist.org" target="_blank">Activist Checklist</a></li>
|
|
<li><a href="https://signal.org" target="_blank">Signal</a></li>
|
|
<li><a href="https://briarproject.org" target="_blank">Briar</a></li>
|
|
<li><a href="https://element.io" target="_blank">Element</a></li>
|
|
<li><a href="https://tails.boum.org" target="_blank">Tails OS</a></li>
|
|
<li><a href="https://onionshare.org" target="_blank">OnionShare</a></li>
|
|
</ul>
|
|
</div>
|
|
</div>
|
|
|
|
<!-- Security Notice
|
|
<div class="nav-security-notice">
|
|
<div class="security-warning">
|
|
<strong>OPERATIONAL SECURITY REMINDER</strong><br>
|
|
This manual contains sensitive information. Ensure secure handling and storage. Practice compartmentalization and need-to-know principles.
|
|
</div>
|
|
</div> -->
|
|
|
|
<!-- Footer -->
|
|
<div class="nav-footer">
|
|
<div class="manual-info">
|
|
<div class="classification">FOR RESISTANCE USE ONLY</div>
|
|
<div class="version">Version 1.0 | FM-R1</div>
|
|
<div class="date">2025</div>
|
|
</div>
|
|
</div>
|
|
</nav>
|
|
|
|
|
|
</nav>
|
|
|
|
<main class="content">
|
|
<div class="content-header">
|
|
<div class="manual-designation">FM-R1: FM-R1: Secure Communication Networks for Decentralized Resistance</div>
|
|
<div class="classification">UNCLASSIFIED</div>
|
|
|
|
</div>
|
|
|
|
<h1 id="appendix-a-essential-tools-and-resources">Appendix A: Essential Tools and Resources</h1>
|
|
|
|
<h2 id="overview">Overview</h2>
|
|
|
|
<p>This appendix provides a comprehensive directory of essential tools, software, hardware, and resources for resistance operations. All recommendations prioritize security, reliability, and operational effectiveness while considering accessibility and cost constraints.</p>
|
|
|
|
<hr />
|
|
|
|
<h2 id="a1-secure-communication-tools">A.1 Secure Communication Tools</h2>
|
|
|
|
<h3 id="messaging-applications">Messaging Applications</h3>
|
|
|
|
<h4 id="signal-private-messenger">Signal Private Messenger</h4>
|
|
<ul>
|
|
<li><strong>Purpose</strong>: End-to-end encrypted messaging and voice calls</li>
|
|
<li><strong>Security Features</strong>: Perfect forward secrecy, disappearing messages, sealed sender</li>
|
|
<li><strong>Platform Support</strong>: iOS, Android, Desktop (Windows, macOS, Linux)</li>
|
|
<li><strong>Website</strong>: <a href="https://signal.org">signal.org</a></li>
|
|
<li><strong>Operational Notes</strong>: Industry standard for secure messaging, regularly audited</li>
|
|
<li><strong>Setup Guide</strong>: Enable disappearing messages, verify safety numbers, use registration lock</li>
|
|
</ul>
|
|
|
|
<h4 id="session-messenger">Session Messenger</h4>
|
|
<ul>
|
|
<li><strong>Purpose</strong>: Decentralized encrypted messaging without phone numbers</li>
|
|
<li><strong>Security Features</strong>: Onion routing, no metadata collection, anonymous accounts</li>
|
|
<li><strong>Platform Support</strong>: iOS, Android, Desktop (Windows, macOS, Linux)</li>
|
|
<li><strong>Website</strong>: <a href="https://getsession.org">getsession.org</a></li>
|
|
<li><strong>Operational Notes</strong>: No phone number required, routes through Tor-like network</li>
|
|
<li><strong>Setup Guide</strong>: Generate Session ID, configure privacy settings, use disappearing messages</li>
|
|
</ul>
|
|
|
|
<h4 id="briar-messenger">Briar Messenger</h4>
|
|
<ul>
|
|
<li><strong>Purpose</strong>: Peer-to-peer encrypted messaging without servers</li>
|
|
<li><strong>Security Features</strong>: Direct device-to-device communication, no central servers</li>
|
|
<li><strong>Platform Support</strong>: Android (primary), desktop versions in development</li>
|
|
<li><strong>Website</strong>: <a href="https://briarproject.org">briarproject.org</a></li>
|
|
<li><strong>Operational Notes</strong>: Works without internet via Bluetooth/WiFi, perfect for protests</li>
|
|
<li><strong>Setup Guide</strong>: Add contacts via QR codes, configure transport settings</li>
|
|
</ul>
|
|
|
|
<h3 id="voice-communication">Voice Communication</h3>
|
|
|
|
<h4 id="jami-gnu-ring">Jami (GNU Ring)</h4>
|
|
<ul>
|
|
<li><strong>Purpose</strong>: Distributed voice and video calling</li>
|
|
<li><strong>Security Features</strong>: End-to-end encryption, no central servers, peer-to-peer</li>
|
|
<li><strong>Platform Support</strong>: All major platforms</li>
|
|
<li><strong>Website</strong>: <a href="https://jami.net">jami.net</a></li>
|
|
<li><strong>Operational Notes</strong>: No account registration required, works over Tor</li>
|
|
<li><strong>Setup Guide</strong>: Generate account locally, share Jami ID securely</li>
|
|
</ul>
|
|
|
|
<h4 id="mumble">Mumble</h4>
|
|
<ul>
|
|
<li><strong>Purpose</strong>: Low-latency voice chat for groups</li>
|
|
<li><strong>Security Features</strong>: Strong encryption, self-hosted servers possible</li>
|
|
<li><strong>Platform Support</strong>: All major platforms</li>
|
|
<li><strong>Website</strong>: <a href="https://mumble.info">mumble.info</a></li>
|
|
<li><strong>Operational Notes</strong>: Excellent for real-time coordination, can run over Tor</li>
|
|
<li><strong>Setup Guide</strong>: Connect to trusted servers, configure push-to-talk</li>
|
|
</ul>
|
|
|
|
<h3 id="email-security">Email Security</h3>
|
|
|
|
<h4 id="protonmail">ProtonMail</h4>
|
|
<ul>
|
|
<li><strong>Purpose</strong>: End-to-end encrypted email service</li>
|
|
<li><strong>Security Features</strong>: Zero-access encryption, Swiss privacy laws, Tor support</li>
|
|
<li><strong>Platform Support</strong>: Web, iOS, Android, desktop bridge</li>
|
|
<li><strong>Website</strong>: <a href="https://protonmail.com">protonmail.com</a></li>
|
|
<li><strong>Operational Notes</strong>: Free tier available, supports custom domains</li>
|
|
<li><strong>Setup Guide</strong>: Enable two-factor authentication, use Tor browser for access</li>
|
|
</ul>
|
|
|
|
<h4 id="tutanota">Tutanota</h4>
|
|
<ul>
|
|
<li><strong>Purpose</strong>: Encrypted email with calendar and contacts</li>
|
|
<li><strong>Security Features</strong>: End-to-end encryption, anonymous signup, open source</li>
|
|
<li><strong>Platform Support</strong>: Web, iOS, Android, desktop</li>
|
|
<li><strong>Website</strong>: <a href="https://tutanota.com">tutanota.com</a></li>
|
|
<li><strong>Operational Notes</strong>: Quantum-resistant encryption, German privacy laws</li>
|
|
<li><strong>Setup Guide</strong>: Create account over Tor, enable two-factor authentication</li>
|
|
</ul>
|
|
|
|
<hr />
|
|
|
|
<h2 id="a2-privacy-and-anonymity-tools">A.2 Privacy and Anonymity Tools</h2>
|
|
|
|
<h3 id="web-browsers">Web Browsers</h3>
|
|
|
|
<h4 id="tor-browser">Tor Browser</h4>
|
|
<ul>
|
|
<li><strong>Purpose</strong>: Anonymous web browsing and access to .onion sites</li>
|
|
<li><strong>Security Features</strong>: Onion routing, traffic encryption, fingerprint resistance</li>
|
|
<li><strong>Platform Support</strong>: Windows, macOS, Linux, Android</li>
|
|
<li><strong>Website</strong>: <a href="https://torproject.org">torproject.org</a></li>
|
|
<li><strong>Operational Notes</strong>: Essential for anonymous research and communication</li>
|
|
<li><strong>Setup Guide</strong>: Download from official site, configure security level, use bridges if needed</li>
|
|
</ul>
|
|
|
|
<h4 id="firefox-with-privacy-extensions">Firefox with Privacy Extensions</h4>
|
|
<ul>
|
|
<li><strong>Purpose</strong>: Privacy-hardened web browsing</li>
|
|
<li><strong>Security Features</strong>: Tracking protection, fingerprint resistance, extension support</li>
|
|
<li><strong>Platform Support</strong>: All major platforms</li>
|
|
<li><strong>Website</strong>: <a href="https://firefox.com">firefox.com</a></li>
|
|
<li><strong>Operational Notes</strong>: Highly customizable, good balance of security and usability</li>
|
|
<li><strong>Setup Guide</strong>: Install uBlock Origin, NoScript, ClearURLs, configure about:config</li>
|
|
</ul>
|
|
|
|
<h3 id="vpn-services">VPN Services</h3>
|
|
|
|
<h4 id="mullvad-vpn">Mullvad VPN</h4>
|
|
<ul>
|
|
<li><strong>Purpose</strong>: Anonymous VPN service with strong privacy protections</li>
|
|
<li><strong>Security Features</strong>: No logging, anonymous accounts, WireGuard support</li>
|
|
<li><strong>Platform Support</strong>: All major platforms</li>
|
|
<li><strong>Website</strong>: <a href="https://mullvad.net">mullvad.net</a></li>
|
|
<li><strong>Operational Notes</strong>: Pay with cryptocurrency, no personal information required</li>
|
|
<li><strong>Setup Guide</strong>: Create anonymous account, configure kill switch, use WireGuard</li>
|
|
</ul>
|
|
|
|
<h4 id="ivpn">IVPN</h4>
|
|
<ul>
|
|
<li><strong>Purpose</strong>: Privacy-focused VPN with transparency reports</li>
|
|
<li><strong>Security Features</strong>: No logging, anonymous accounts, multi-hop connections</li>
|
|
<li><strong>Platform Support</strong>: All major platforms</li>
|
|
<li><strong>Website</strong>: <a href="https://ivpn.net">ivpn.net</a></li>
|
|
<li><strong>Operational Notes</strong>: Regular security audits, supports Tor over VPN</li>
|
|
<li><strong>Setup Guide</strong>: Anonymous signup, enable firewall, configure multi-hop</li>
|
|
</ul>
|
|
|
|
<h3 id="operating-systems">Operating Systems</h3>
|
|
|
|
<h4 id="tails-the-amnesic-incognito-live-system">Tails (The Amnesic Incognito Live System)</h4>
|
|
<ul>
|
|
<li><strong>Purpose</strong>: Amnesic operating system for maximum privacy</li>
|
|
<li><strong>Security Features</strong>: Routes through Tor, leaves no traces, cryptographic tools included</li>
|
|
<li><strong>Platform Support</strong>: Live USB/DVD for any computer</li>
|
|
<li><strong>Website</strong>: <a href="https://tails.boum.org">tails.boum.org</a></li>
|
|
<li><strong>Operational Notes</strong>: Essential for high-security operations, resets after each use</li>
|
|
<li><strong>Setup Guide</strong>: Create persistent storage, verify downloads, configure additional software</li>
|
|
</ul>
|
|
|
|
<h4 id="qubes-os">Qubes OS</h4>
|
|
<ul>
|
|
<li><strong>Purpose</strong>: Security through isolation using virtual machines</li>
|
|
<li><strong>Security Features</strong>: Compartmentalized computing, Xen hypervisor, template system</li>
|
|
<li><strong>Platform Support</strong>: x86_64 computers with VT-x/AMD-V</li>
|
|
<li><strong>Website</strong>: <a href="https://qubes-os.org">qubes-os.org</a></li>
|
|
<li><strong>Operational Notes</strong>: Steep learning curve but excellent security model</li>
|
|
<li><strong>Setup Guide</strong>: Hardware compatibility check, create security domains, configure templates</li>
|
|
</ul>
|
|
|
|
<hr />
|
|
|
|
<h2 id="a3-file-security-and-storage">A.3 File Security and Storage</h2>
|
|
|
|
<h3 id="encryption-tools">Encryption Tools</h3>
|
|
|
|
<h4 id="veracrypt">VeraCrypt</h4>
|
|
<ul>
|
|
<li><strong>Purpose</strong>: Full disk and file container encryption</li>
|
|
<li><strong>Security Features</strong>: Strong encryption algorithms, hidden volumes, plausible deniability</li>
|
|
<li><strong>Platform Support</strong>: Windows, macOS, Linux</li>
|
|
<li><strong>Website</strong>: <a href="https://veracrypt.fr">veracrypt.fr</a></li>
|
|
<li><strong>Operational Notes</strong>: Successor to TrueCrypt, regularly updated</li>
|
|
<li><strong>Setup Guide</strong>: Create encrypted containers, use hidden volumes for sensitive data</li>
|
|
</ul>
|
|
|
|
<h4 id="7-zip-with-strong-encryption">7-Zip with Strong Encryption</h4>
|
|
<ul>
|
|
<li><strong>Purpose</strong>: File compression and encryption</li>
|
|
<li><strong>Security Features</strong>: AES-256 encryption, open source, command line support</li>
|
|
<li><strong>Platform Support</strong>: Windows, Linux (p7zip), macOS (via Homebrew)</li>
|
|
<li><strong>Website</strong>: <a href="https://7-zip.org">7-zip.org</a></li>
|
|
<li><strong>Operational Notes</strong>: Simple encryption for individual files and archives</li>
|
|
<li><strong>Setup Guide</strong>: Use strong passwords, enable AES-256 encryption</li>
|
|
</ul>
|
|
|
|
<h3 id="secure-file-sharing">Secure File Sharing</h3>
|
|
|
|
<h4 id="onionshare">OnionShare</h4>
|
|
<ul>
|
|
<li><strong>Purpose</strong>: Anonymous file sharing over Tor network</li>
|
|
<li><strong>Security Features</strong>: Tor hidden services, no third-party servers, automatic deletion</li>
|
|
<li><strong>Platform Support</strong>: Windows, macOS, Linux</li>
|
|
<li><strong>Website</strong>: <a href="https://onionshare.org">onionshare.org</a></li>
|
|
<li><strong>Operational Notes</strong>: Perfect for one-time secure file transfers</li>
|
|
<li><strong>Setup Guide</strong>: Configure Tor connection, set auto-stop timer, share .onion links securely</li>
|
|
</ul>
|
|
|
|
<h4 id="securedrop">SecureDrop</h4>
|
|
<ul>
|
|
<li><strong>Purpose</strong>: Anonymous document submission system</li>
|
|
<li><strong>Security Features</strong>: Tor-based, air-gapped servers, journalist verification</li>
|
|
<li><strong>Platform Support</strong>: Web-based (Tor Browser required)</li>
|
|
<li><strong>Website</strong>: <a href="https://securedrop.org">securedrop.org</a></li>
|
|
<li><strong>Operational Notes</strong>: Used by major news organizations for whistleblowing</li>
|
|
<li><strong>Setup Guide</strong>: Access via Tor Browser, follow submission guidelines</li>
|
|
</ul>
|
|
|
|
<h3 id="cloud-storage-security">Cloud Storage Security</h3>
|
|
|
|
<h4 id="cryptomator">Cryptomator</h4>
|
|
<ul>
|
|
<li><strong>Purpose</strong>: Client-side encryption for cloud storage</li>
|
|
<li><strong>Security Features</strong>: Transparent encryption, filename obfuscation, open source</li>
|
|
<li><strong>Platform Support</strong>: Windows, macOS, Linux, iOS, Android</li>
|
|
<li><strong>Website</strong>: <a href="https://cryptomator.org">cryptomator.org</a></li>
|
|
<li><strong>Operational Notes</strong>: Works with any cloud provider, zero-knowledge encryption</li>
|
|
<li><strong>Setup Guide</strong>: Create vault, configure cloud sync, use strong vault passwords</li>
|
|
</ul>
|
|
|
|
<hr />
|
|
|
|
<h2 id="a4-digital-security-tools">A.4 Digital Security Tools</h2>
|
|
|
|
<h3 id="password-management">Password Management</h3>
|
|
|
|
<h4 id="bitwarden">Bitwarden</h4>
|
|
<ul>
|
|
<li><strong>Purpose</strong>: Open source password manager</li>
|
|
<li><strong>Security Features</strong>: End-to-end encryption, self-hosting option, security audits</li>
|
|
<li><strong>Platform Support</strong>: All major platforms, browser extensions</li>
|
|
<li><strong>Website</strong>: <a href="https://bitwarden.com">bitwarden.com</a></li>
|
|
<li><strong>Operational Notes</strong>: Free tier available, can be self-hosted</li>
|
|
<li><strong>Setup Guide</strong>: Enable two-factor authentication, use strong master password, organize with folders</li>
|
|
</ul>
|
|
|
|
<h4 id="keepassxc">KeePassXC</h4>
|
|
<ul>
|
|
<li><strong>Purpose</strong>: Offline password manager</li>
|
|
<li><strong>Security Features</strong>: Local database, strong encryption, no cloud dependency</li>
|
|
<li><strong>Platform Support</strong>: Windows, macOS, Linux</li>
|
|
<li><strong>Website</strong>: <a href="https://keepassxc.org">keepassxc.org</a></li>
|
|
<li><strong>Operational Notes</strong>: Completely offline, database can be synced manually</li>
|
|
<li><strong>Setup Guide</strong>: Create strong database password, configure auto-type, backup database</li>
|
|
</ul>
|
|
|
|
<h3 id="two-factor-authentication">Two-Factor Authentication</h3>
|
|
|
|
<h4 id="aegis-authenticator-android">Aegis Authenticator (Android)</h4>
|
|
<ul>
|
|
<li><strong>Purpose</strong>: Open source TOTP authenticator</li>
|
|
<li><strong>Security Features</strong>: Encrypted vault, biometric unlock, backup/restore</li>
|
|
<li><strong>Platform Support</strong>: Android</li>
|
|
<li><strong>Website</strong>: <a href="https://getaegis.app">getaegis.app</a></li>
|
|
<li><strong>Operational Notes</strong>: No cloud dependency, encrypted local storage</li>
|
|
<li><strong>Setup Guide</strong>: Set vault password, backup vault file, import existing accounts</li>
|
|
</ul>
|
|
|
|
<h4 id="tofu-ios">Tofu (iOS)</h4>
|
|
<ul>
|
|
<li><strong>Purpose</strong>: Simple TOTP authenticator for iOS</li>
|
|
<li><strong>Security Features</strong>: Local storage, no cloud sync, open source</li>
|
|
<li><strong>Platform Support</strong>: iOS</li>
|
|
<li><strong>Website</strong>: Available on App Store</li>
|
|
<li><strong>Operational Notes</strong>: Minimal, focused on security and privacy</li>
|
|
<li><strong>Setup Guide</strong>: Add accounts via QR code, enable Face/Touch ID</li>
|
|
</ul>
|
|
|
|
<h3 id="system-security">System Security</h3>
|
|
|
|
<h4 id="clamav">ClamAV</h4>
|
|
<ul>
|
|
<li><strong>Purpose</strong>: Open source antivirus engine</li>
|
|
<li><strong>Security Features</strong>: Regular signature updates, command line interface, cross-platform</li>
|
|
<li><strong>Platform Support</strong>: Linux, Windows, macOS</li>
|
|
<li><strong>Website</strong>: <a href="https://clamav.net">clamav.net</a></li>
|
|
<li><strong>Operational Notes</strong>: Lightweight, good for server environments</li>
|
|
<li><strong>Setup Guide</strong>: Install via package manager, configure automatic updates</li>
|
|
</ul>
|
|
|
|
<h4 id="lynis">Lynis</h4>
|
|
<ul>
|
|
<li><strong>Purpose</strong>: Security auditing tool for Unix-based systems</li>
|
|
<li><strong>Security Features</strong>: Comprehensive system scanning, hardening suggestions</li>
|
|
<li><strong>Platform Support</strong>: Linux, macOS, Unix variants</li>
|
|
<li><strong>Website</strong>: <a href="https://cisofy.com/lynis">cisofy.com/lynis</a></li>
|
|
<li><strong>Operational Notes</strong>: Excellent for hardening systems and finding vulnerabilities</li>
|
|
<li><strong>Setup Guide</strong>: Run security scan, review recommendations, implement hardening</li>
|
|
</ul>
|
|
|
|
<hr />
|
|
|
|
<h2 id="a5-research-and-investigation-tools">A.5 Research and Investigation Tools</h2>
|
|
|
|
<h3 id="open-source-intelligence-osint">Open Source Intelligence (OSINT)</h3>
|
|
|
|
<h4 id="maltego">Maltego</h4>
|
|
<ul>
|
|
<li><strong>Purpose</strong>: Link analysis and data visualization for investigations</li>
|
|
<li><strong>Security Features</strong>: Local processing, extensive data sources, relationship mapping</li>
|
|
<li><strong>Platform Support</strong>: Windows, macOS, Linux</li>
|
|
<li><strong>Website</strong>: <a href="https://maltego.com">maltego.com</a></li>
|
|
<li><strong>Operational Notes</strong>: Community edition available, powerful for network analysis</li>
|
|
<li><strong>Setup Guide</strong>: Create account, install transforms, configure data sources</li>
|
|
</ul>
|
|
|
|
<h4 id="shodan">Shodan</h4>
|
|
<ul>
|
|
<li><strong>Purpose</strong>: Search engine for Internet-connected devices</li>
|
|
<li><strong>Security Features</strong>: API access, extensive device database, security research</li>
|
|
<li><strong>Platform Support</strong>: Web-based, API, command line tools</li>
|
|
<li><strong>Website</strong>: <a href="https://shodan.io">shodan.io</a></li>
|
|
<li><strong>Operational Notes</strong>: Valuable for reconnaissance and security research</li>
|
|
<li><strong>Setup Guide</strong>: Create account, obtain API key, use filters effectively</li>
|
|
</ul>
|
|
|
|
<h4 id="theharvester">TheHarvester</h4>
|
|
<ul>
|
|
<li><strong>Purpose</strong>: Information gathering tool for penetration testing</li>
|
|
<li><strong>Security Features</strong>: Multiple data sources, email/subdomain enumeration</li>
|
|
<li><strong>Platform Support</strong>: Linux, Python-based</li>
|
|
<li><strong>Website</strong>: <a href="https://github.com/laramies/theHarvester">github.com/laramies/theHarvester</a></li>
|
|
<li><strong>Operational Notes</strong>: Command line tool, good for initial reconnaissance</li>
|
|
<li><strong>Setup Guide</strong>: Install via pip, configure API keys, use appropriate data sources</li>
|
|
</ul>
|
|
|
|
<h3 id="social-media-analysis">Social Media Analysis</h3>
|
|
|
|
<h4 id="twint">Twint</h4>
|
|
<ul>
|
|
<li><strong>Purpose</strong>: Twitter scraping tool without API limitations</li>
|
|
<li><strong>Security Features</strong>: No authentication required, extensive filtering options</li>
|
|
<li><strong>Platform Support</strong>: Python-based, cross-platform</li>
|
|
<li><strong>Website</strong>: <a href="https://github.com/twintproject/twint">github.com/twintproject/twint</a></li>
|
|
<li><strong>Operational Notes</strong>: Useful for social media intelligence gathering</li>
|
|
<li><strong>Setup Guide</strong>: Install via pip, configure output formats, use search filters</li>
|
|
</ul>
|
|
|
|
<hr />
|
|
|
|
<h2 id="a6-hardware-recommendations">A.6 Hardware Recommendations</h2>
|
|
|
|
<h3 id="secure-computing-hardware">Secure Computing Hardware</h3>
|
|
|
|
<h4 id="laptops-for-security-operations">Laptops for Security Operations</h4>
|
|
<ul>
|
|
<li><strong>Recommended Models</strong>: ThinkPad X1 Carbon, System76 laptops, Purism Librem series</li>
|
|
<li><strong>Key Features</strong>: Hardware kill switches, open firmware support, good Linux compatibility</li>
|
|
<li><strong>Security Considerations</strong>: Disable Intel ME/AMD PSP, use full disk encryption</li>
|
|
<li><strong>Operational Notes</strong>: Dedicated hardware for sensitive operations recommended</li>
|
|
</ul>
|
|
|
|
<h4 id="mobile-devices">Mobile Devices</h4>
|
|
<ul>
|
|
<li><strong>Recommended</strong>: Google Pixel phones (for GrapheneOS), PinePhone (Linux mobile)</li>
|
|
<li><strong>Key Features</strong>: Unlockable bootloaders, custom ROM support, hardware security features</li>
|
|
<li><strong>Security Considerations</strong>: Install privacy-focused ROMs, disable unnecessary radios</li>
|
|
<li><strong>Operational Notes</strong>: Use separate devices for different operational roles</li>
|
|
</ul>
|
|
|
|
<h3 id="networking-hardware">Networking Hardware</h3>
|
|
|
|
<h4 id="secure-routers">Secure Routers</h4>
|
|
<ul>
|
|
<li><strong>Recommended</strong>: Devices supporting OpenWrt, pfSense boxes, GL.iNet travel routers</li>
|
|
<li><strong>Key Features</strong>: Open source firmware, VPN support, advanced firewall capabilities</li>
|
|
<li><strong>Security Considerations</strong>: Change default passwords, disable WPS, use strong encryption</li>
|
|
<li><strong>Operational Notes</strong>: Separate networks for different security levels</li>
|
|
</ul>
|
|
|
|
<h4 id="usb-security-keys">USB Security Keys</h4>
|
|
<ul>
|
|
<li><strong>Recommended</strong>: YubiKey 5 series, SoloKeys, Nitrokey</li>
|
|
<li><strong>Key Features</strong>: FIDO2/WebAuthn support, OpenPGP compatibility, hardware security</li>
|
|
<li><strong>Security Considerations</strong>: Use for two-factor authentication and encryption keys</li>
|
|
<li><strong>Operational Notes</strong>: Have backup keys stored securely</li>
|
|
</ul>
|
|
|
|
<hr />
|
|
|
|
<h2 id="a7-legal-and-safety-resources">A.7 Legal and Safety Resources</h2>
|
|
|
|
<h3 id="legal-support-organizations">Legal Support Organizations</h3>
|
|
|
|
<h4 id="electronic-frontier-foundation-eff">Electronic Frontier Foundation (EFF)</h4>
|
|
<ul>
|
|
<li><strong>Purpose</strong>: Digital rights advocacy and legal support</li>
|
|
<li><strong>Services</strong>: Legal guidance, privacy tools, digital security training</li>
|
|
<li><strong>Website</strong>: <a href="https://eff.org">eff.org</a></li>
|
|
<li><strong>Resources</strong>: Surveillance Self-Defense guide, legal observer training</li>
|
|
</ul>
|
|
|
|
<h4 id="national-lawyers-guild">National Lawyers Guild</h4>
|
|
<ul>
|
|
<li><strong>Purpose</strong>: Legal support for activists and protesters</li>
|
|
<li><strong>Services</strong>: Legal observers, jail support, know-your-rights training</li>
|
|
<li><strong>Website</strong>: <a href="https://nlg.org">nlg.org</a></li>
|
|
<li><strong>Resources</strong>: Local chapters, legal hotlines, protest legal support</li>
|
|
</ul>
|
|
|
|
<h3 id="digital-security-training">Digital Security Training</h3>
|
|
|
|
<h4 id="security-education-companion">Security Education Companion</h4>
|
|
<ul>
|
|
<li><strong>Purpose</strong>: Digital security curriculum for trainers</li>
|
|
<li><strong>Content</strong>: Lesson plans, activities, threat modeling guides</li>
|
|
<li><strong>Website</strong>: <a href="https://securityeducationcompanion.org">securityeducationcompanion.org</a></li>
|
|
<li><strong>Resources</strong>: Trainer guides, participant handouts, assessment tools</li>
|
|
</ul>
|
|
|
|
<h4 id="level-up">Level Up</h4>
|
|
<ul>
|
|
<li><strong>Purpose</strong>: Digital security training resources for civil society</li>
|
|
<li><strong>Content</strong>: Training curricula, facilitation guides, security planning</li>
|
|
<li><strong>Website</strong>: <a href="https://level-up.cc">level-up.cc</a></li>
|
|
<li><strong>Resources</strong>: Holistic security approach, trauma-informed training</li>
|
|
</ul>
|
|
|
|
<hr />
|
|
|
|
<h2 id="a8-emergency-resources">A.8 Emergency Resources</h2>
|
|
|
|
<h3 id="crisis-communication">Crisis Communication</h3>
|
|
|
|
<h4 id="bridgefy">Bridgefy</h4>
|
|
<ul>
|
|
<li><strong>Purpose</strong>: Offline messaging via Bluetooth mesh networks</li>
|
|
<li><strong>Security Features</strong>: End-to-end encryption, no internet required</li>
|
|
<li><strong>Platform Support</strong>: iOS, Android</li>
|
|
<li><strong>Use Case</strong>: Communication during internet shutdowns or emergencies</li>
|
|
</ul>
|
|
|
|
<h4 id="amateur-radio">Amateur Radio</h4>
|
|
<ul>
|
|
<li><strong>Purpose</strong>: Emergency communication when other systems fail</li>
|
|
<li><strong>Requirements</strong>: FCC license (in US), appropriate equipment</li>
|
|
<li><strong>Resources</strong>: ARRL.org for licensing, local clubs for training</li>
|
|
<li><strong>Operational Notes</strong>: Legal requirement for licensing, but valuable backup communication</li>
|
|
</ul>
|
|
|
|
<h3 id="emergency-contacts">Emergency Contacts</h3>
|
|
|
|
<h4 id="digital-security-helplines">Digital Security Helplines</h4>
|
|
<ul>
|
|
<li><strong>Access Now Digital Security Helpline</strong>: <a href="https://accessnow.org/help">accessnow.org/help</a></li>
|
|
<li><strong>Rapid Response Network</strong>: For urgent digital security incidents</li>
|
|
<li><strong>Local Legal Hotlines</strong>: Research and document local legal support numbers</li>
|
|
</ul>
|
|
|
|
<h4 id="medical-and-safety">Medical and Safety</h4>
|
|
<ul>
|
|
<li><strong>Street Medic Training</strong>: <a href="https://riotmedicine.net">riotmedicine.net</a></li>
|
|
<li><strong>Protest Safety Resources</strong>: Know your local legal observers and jail support</li>
|
|
</ul>
|
|
|
|
<hr />
|
|
|
|
<h2 id="a9-operational-security-checklists">A.9 Operational Security Checklists</h2>
|
|
|
|
<h3 id="pre-operation-security-checklist">Pre-Operation Security Checklist</h3>
|
|
<ul class="task-list">
|
|
<li class="task-list-item"><input type="checkbox" class="task-list-item-checkbox" disabled="disabled" />Threat model assessment completed</li>
|
|
<li class="task-list-item"><input type="checkbox" class="task-list-item-checkbox" disabled="disabled" />Communication security protocols established</li>
|
|
<li class="task-list-item"><input type="checkbox" class="task-list-item-checkbox" disabled="disabled" />Equipment security verified and tested</li>
|
|
<li class="task-list-item"><input type="checkbox" class="task-list-item-checkbox" disabled="disabled" />Emergency procedures and contacts prepared</li>
|
|
<li class="task-list-item"><input type="checkbox" class="task-list-item-checkbox" disabled="disabled" />Legal support and bail fund information available</li>
|
|
<li class="task-list-item"><input type="checkbox" class="task-list-item-checkbox" disabled="disabled" />Operational security briefing conducted</li>
|
|
<li class="task-list-item"><input type="checkbox" class="task-list-item-checkbox" disabled="disabled" />Counter-surveillance measures planned</li>
|
|
<li class="task-list-item"><input type="checkbox" class="task-list-item-checkbox" disabled="disabled" />Information sanitization procedures ready</li>
|
|
</ul>
|
|
|
|
<h3 id="post-operation-security-checklist">Post-Operation Security Checklist</h3>
|
|
<ul class="task-list">
|
|
<li class="task-list-item"><input type="checkbox" class="task-list-item-checkbox" disabled="disabled" />Secure communication channels used for debriefing</li>
|
|
<li class="task-list-item"><input type="checkbox" class="task-list-item-checkbox" disabled="disabled" />Equipment sanitized and secured</li>
|
|
<li class="task-list-item"><input type="checkbox" class="task-list-item-checkbox" disabled="disabled" />Information properly compartmentalized and stored</li>
|
|
<li class="task-list-item"><input type="checkbox" class="task-list-item-checkbox" disabled="disabled" />Security incidents documented and analyzed</li>
|
|
<li class="task-list-item"><input type="checkbox" class="task-list-item-checkbox" disabled="disabled" />Lessons learned captured and shared appropriately</li>
|
|
<li class="task-list-item"><input type="checkbox" class="task-list-item-checkbox" disabled="disabled" />Follow-up security measures implemented</li>
|
|
<li class="task-list-item"><input type="checkbox" class="task-list-item-checkbox" disabled="disabled" />Next operation security planning initiated</li>
|
|
</ul>
|
|
|
|
<hr />
|
|
|
|
<div class="info-box">
|
|
<div class="info-title">Tool Selection Criteria</div>
|
|
<p>When selecting tools for resistance operations, prioritize: 1) Open source software with public security audits, 2) Strong encryption and privacy protections, 3) Decentralized architecture when possible, 4) Active development and security updates, 5) Compatibility with operational security requirements.</p>
|
|
</div>
|
|
|
|
<div class="warning-box">
|
|
<div class="warning-title">Tool Security Warning</div>
|
|
<p>No tool provides perfect security. Always use defense in depth with multiple layers of protection, keep software updated, and regularly reassess your security posture. Tools are only as secure as their implementation and operational security practices.</p>
|
|
</div>
|
|
|
|
|
|
|
|
|
|
<nav class="section-nav">
|
|
|
|
<a href="/chapters/chapter-12/" class="nav-link">
|
|
<span class="arrow">←</span>
|
|
<span>Chapter 12: Direct Action Planning</span>
|
|
</a>
|
|
|
|
|
|
|
|
<a href="/appendices/appendix-b/" class="nav-link">
|
|
<span>Appendix B: Legal Considerations</span>
|
|
<span class="arrow">→</span>
|
|
</a>
|
|
|
|
</nav>
|
|
|
|
</main>
|
|
</div>
|
|
|
|
<footer class="footer">
|
|
<div class="container">
|
|
<div class="footer-content">
|
|
<div class="organization">Department of Internautics</div>
|
|
<div>Bureau of Decentralized Resistance</div>
|
|
<div>FM-R1 - Version 1.0 - 2025-08-28</div>
|
|
<div style="margin-top: 1rem;">
|
|
<a href="https://resist.is" target="_blank">resist.is</a> |
|
|
<a href="https://git.hacker.supply/Department_of_Internautics/field_guide" target="_blank">Source Code</a>
|
|
</div>
|
|
</div>
|
|
</div>
|
|
</footer>
|
|
|
|
<!-- JavaScript -->
|
|
<script src="/assets/js/main.js"></script>
|
|
</body>
|
|
</html>
|
|
|