field_guide/_site/preface/index.html
2025-09-01 02:23:51 -04:00

389 lines
16 KiB
HTML

<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="UTF-8">
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<title>Preface - Field Manual for Resistance Operations</title>
<meta name="description" content="Purpose, scope, and guidance for using the Field Manual for Resistance Operations">
<!-- Favicon -->
<link rel="icon" type="image/x-icon" href="/assets/images/favicon.ico">
<!-- Stylesheets -->
<link rel="stylesheet" href="/assets/css/main.css">
<!-- Security headers -->
<meta http-equiv="X-Content-Type-Options" content="nosniff">
<meta http-equiv="X-Frame-Options" content="DENY">
<meta http-equiv="X-XSS-Protection" content="1; mode=block">
<!-- No tracking -->
<meta name="robots" content="noindex, nofollow">
<!-- Matomo -->
<script>
var _paq = window._paq = window._paq || [];
/* tracker methods like "setCustomDimension" should be called before "trackPageView" */
_paq.push(['trackPageView']);
_paq.push(['enableLinkTracking']);
(function() {
var u="//stats.resist.is/";
_paq.push(['setTrackerUrl', u+'matomo.php']);
_paq.push(['setSiteId', '4']);
var d=document, g=d.createElement('script'), s=d.getElementsByTagName('script')[0];
g.async=true; g.src=u+'matomo.js'; s.parentNode.insertBefore(g,s);
})();
</script>
<!-- End Matomo Code -->
</head>
<body>
<header class="header">
<div class="container">
<div class="header-content">
<div class="logo">
<span class="omega">Ω</span>
<span>FM-R1</span>
</div>
<button class="nav-toggle" id="nav-toggle" aria-label="Toggle navigation">
</button>
</div>
</div>
</header>
<div class="main-layout">
<nav class="sidebar" id="sidebar">
<nav class="main-navigation">
<!-- <div class="nav-header">
<div class="nav-subtitle">Field Manual for Resistance Operations</div>
</div>
-->
<div class="nav-sections">
<!-- Front Matter -->
<div class="nav-section">
<h3>Field Manual</h3>
<ul>
<li><a href="/" >Table of Contents</a></li>
<li><a href="/preface/" class="active">Preface</a></li>
<li><a href="/introduction/" >Introduction</a></li>
</ul>
</div>
<!-- Part I: Foundations -->
<div class="nav-section">
<h3>Part I: Foundations</h3>
<ul>
<li>
<a href="/parts/part-1/" >Part Overview</a>
<ul>
<li><a href="/chapters/chapter-1/" >Ch 1: Core Security Principles</a></li>
<li><a href="/chapters/chapter-2/" >Ch 2: Threat Assessment</a></li>
</ul>
</li>
</ul>
</div>
<!-- Part II: Communication -->
<div class="nav-section">
<h3>Part II: Communication</h3>
<ul>
<li>
<a href="/parts/part-2/" >Part Overview</a>
<ul>
<li><a href="/chapters/chapter-3/" >Ch 3: Communication Architecture</a></li>
<li><a href="/chapters/chapter-4/" >Ch 4: Secure Messaging</a></li>
<li><a href="/chapters/chapter-5/" >Ch 5: File Sharing</a></li>
</ul>
</li>
</ul>
</div>
<!-- Part III: OpSec -->
<div class="nav-section">
<h3>Part III: OpSec</h3>
<ul>
<li>
<a href="/parts/part-3/" >Part Overview</a>
<ul>
<li><a href="/chapters/chapter-6/" >Ch 6: Hardware Security</a></li>
<li><a href="/chapters/chapter-7/" >Ch 7: Digital Hygiene</a></li>
<li><a href="/chapters/chapter-8/" >Ch 8: Operational Procedures</a></li>
</ul>
</li>
</ul>
</div>
<!-- Part IV: Advanced -->
<div class="nav-section">
<h3>Part IV: Advanced</h3>
<ul>
<li>
<a href="/parts/part-4/" >Part Overview</a>
<ul>
<li><a href="/chapters/chapter-9/" >Ch 9: Intelligence Gathering</a></li>
<li><a href="/chapters/chapter-10/" >Ch 10: Counter-Intelligence</a></li>
</ul>
</li>
</ul>
</div>
<!-- Appendices
<div class="nav-section">
<h3>Appendices</h3>
<ul>
<li><a href="/appendices/" >Appendices Overview</a></li>
<li><a href="/appendices/appendix-a/" >Appendix A: Essential Tools</a></li>
<li><a href="/appendices/appendix-b/" >Appendix B: Legal Considerations</a></li>
<li><a href="/appendices/appendix-c/" >Appendix C: Emergency Procedures</a></li>
<li><a href="/appendices/appendix-d/" >Appendix D: Glossary & References</a></li>
</ul>
</div>
-->
<!-- Quick Access -->
<div class="nav-section nav-quick-access">
<h3>Quick Access</h3>
<ul>
<li><a href="/appendices/appendix-a/" class="nav-emergency">Essential Tools</a></li>
<li><a href="/appendices/appendix-b/" class="nav-emergency">Legal Rights</a></li>
<li><a href="/appendices/appendix-c/" class="nav-emergency">Emergency Procedures</a></li>
<li><a href="/appendices/appendix-d/" class="nav-emergency">Glossary & References</a></li>
</ul>
</div>
<!-- External Links -->
<div class="nav-section">
<h3>External Links</h3>
<ul>
<li><a href="https://resist.is" target="_blank">resist.is</a></li>
<li><a href="https://activistchecklist.org" target="_blank">Activist Checklist</a></li>
<li><a href="https://signal.org" target="_blank">Signal</a></li>
<li><a href="https://briarproject.org" target="_blank">Briar</a></li>
<li><a href="https://element.io" target="_blank">Element</a></li>
<li><a href="https://tails.boum.org" target="_blank">Tails OS</a></li>
<li><a href="https://onionshare.org" target="_blank">OnionShare</a></li>
</ul>
</div>
</div>
<!-- Security Notice
<div class="nav-security-notice">
<div class="security-warning">
<strong>OPERATIONAL SECURITY REMINDER</strong><br>
This manual contains sensitive information. Ensure secure handling and storage. Practice compartmentalization and need-to-know principles.
</div>
</div> -->
<!-- Footer -->
<div class="nav-footer">
<div class="manual-info">
<div class="classification">FOR RESISTANCE USE ONLY</div>
<div class="version">Version 1.0 | FM-R1</div>
<div class="date">2025</div>
</div>
</div>
</nav>
</nav>
<main class="content">
<div class="content-header">
<div class="manual-designation">FM-R1: FM-R1: Secure Communication Networks for Decentralized Resistance</div>
<div class="classification">UNCLASSIFIED</div>
</div>
<h1 id="preface">Preface</h1>
<h2 id="purpose">Purpose</h2>
<p>This Field Manual (FM-R1) provides comprehensive guidance for establishing and maintaining secure communication networks within decentralized resistance movements. It is specifically designed for individuals and groups operating under the threat of an authoritarian regime with advanced surveillance capabilities.</p>
<p>The manual combines proven operational security practices, modern cryptographic tools, and time-tested resistance strategies into a comprehensive framework that can be implemented by newcomers to the resistance, but still remaining valuable to experienced dissidents.</p>
<h2 id="scope">Scope</h2>
<p>This manual covers:</p>
<ul>
<li><strong>Core security principles</strong> fundamental to all resistance operations</li>
<li><strong>Threat assessment methodologies</strong> for understanding your operational environment</li>
<li><strong>Multi-layer communication architectures</strong> for different security requirements</li>
<li><strong>Specific tool configurations</strong> for secure messaging, file sharing, and collaboration</li>
<li><strong>Operational security procedures</strong> for maintaining security discipline</li>
<li><strong>Advanced techniques</strong> for network resilience and counter-intelligence</li>
</ul>
<p>This manual does <strong>not</strong> cover:</p>
<ul>
<li>Specific tactical operations or direct action planning</li>
<li>Legal advice or guidance on laws in specific jurisdictions</li>
<li>Physical security beyond basic operational security measures</li>
<li>Weapons, explosives, or other kinetic capabilities</li>
</ul>
<h2 id="target-audience">Target Audience</h2>
<h3 id="primary-audience">Primary Audience</h3>
<ul>
<li><strong>Newcomers to resistance operations</strong> who need foundational knowledge</li>
<li><strong>Cell leaders and coordinators</strong> responsible for communication security</li>
<li><strong>Technical personnel</strong> implementing secure infrastructure</li>
<li><strong>Training coordinators</strong> developing security education programs</li>
</ul>
<h3 id="secondary-audience">Secondary Audience</h3>
<ul>
<li><strong>Experienced activists</strong> seeking to improve their security practices</li>
<li><strong>Journalists and researchers</strong> working in high-risk environments</li>
<li><strong>Civil liberties organizations</strong> operating under surveillance</li>
<li><strong>International solidarity groups</strong> supporting resistance movements</li>
</ul>
<h2 id="how-to-use-this-manual">How to Use This Manual</h2>
<h3 id="for-newcomers">For Newcomers</h3>
<ol>
<li><strong>Start with the fundamentals</strong>: Read the Introduction and Part I completely before proceeding</li>
<li><strong>Follow the progressive structure</strong>: Each chapter builds upon previous knowledge</li>
<li><strong>Practice in safe environments</strong>: Test tools and procedures before operational use</li>
<li><strong>Seek mentorship</strong>: Connect with experienced practitioners through secure channels</li>
<li><strong>Start simple</strong>: Implement basic security measures before advancing to complex systems</li>
</ol>
<h3 id="for-experienced-practitioners">For Experienced Practitioners</h3>
<ul>
<li>Use as a <strong>reference guide</strong> for specific tools and procedures</li>
<li><strong>Adapt recommendations</strong> to your specific threat environment</li>
<li><strong>Contribute improvements</strong> through secure feedback channels</li>
<li><strong>Train others</strong> using this manual as a curriculum foundation</li>
</ul>
<h3 id="for-technical-implementation">For Technical Implementation</h3>
<ul>
<li>Follow <strong>configuration guides</strong> in the appendices exactly</li>
<li><strong>Test all systems</strong> thoroughly before deployment</li>
<li><strong>Maintain operational security</strong> during setup and maintenance</li>
<li><strong>Document customizations</strong> securely for future reference</li>
</ul>
<h2 id="security-considerations-for-this-manual">Security Considerations for This Manual</h2>
<div class="warning-box">
<div class="warning-title">Operational Security Warning</div>
<p>Accessing, storing, or distributing this manual may be considered suspicious activity by hostile authorities. Take appropriate precautions:</p>
<ul>
<li>Access only through Tails OS, Tor Browser, or similar anonymizing tools</li>
<li>Do not store on personal devices connected to your real identity</li>
<li>Share only through secure channels with trusted individuals</li>
<li>Consider the legal implications in your jurisdiction</li>
</ul>
</div>
<h3 id="recommended-access-methods">Recommended Access Methods</h3>
<ol>
<li><strong>Tails OS</strong> - Boot from USB for maximum anonymity</li>
<li><strong>Tor Browser</strong> - Use on a dedicated, clean device</li>
<li><strong>Public Wi-Fi</strong> - Access from locations unconnected to your identity</li>
<li><strong>Printed copies</strong> - For offline reference, dispose of securely when no longer needed</li>
</ol>
<h3 id="distribution-guidelines">Distribution Guidelines</h3>
<ul>
<li>Share only with individuals who have demonstrated commitment to resistance operations</li>
<li>Use secure communication channels (Signal, Briar, OnionShare) for distribution</li>
<li>Verify recipient identity through trusted intermediaries</li>
<li>Consider compartmentalization - not everyone needs access to all sections</li>
</ul>
<h2 id="acknowledgments">Acknowledgments</h2>
<p>This manual builds upon decades of resistance experience and the work of countless individuals who have risked their freedom and lives for justice. Special recognition goes to:</p>
<ul>
<li><strong>Historical resistance movements</strong> whose strategies inform our approach</li>
<li><strong>Digital rights organizations</strong> developing the tools we depend on</li>
<li><strong>Security researchers</strong> who identify vulnerabilities and develop countermeasures</li>
<li><strong>Current practitioners</strong> who provide feedback and real-world testing</li>
</ul>
<h2 id="feedback-and-updates">Feedback and Updates</h2>
<p>This manual is a living document that must evolve with changing threats and technologies. Feedback is essential for maintaining its effectiveness and accuracy.</p>
<h3 id="secure-feedback-channels">Secure Feedback Channels</h3>
<ul>
<li><strong>Matrix</strong>: Contact @sparticus:weresist.is through Element</li>
<li><strong>OnionShare</strong>: Check resist.is for current feedback drop locations</li>
<li><strong>Dead drops</strong>: Physical and digital locations announced through secure channels</li>
</ul>
<h3 id="update-distribution">Update Distribution</h3>
<ul>
<li><strong>Primary source</strong>: git.hacker.supply/Department_of_Internautics/field_guide</li>
<li><strong>Mirror sites</strong>: Announced through resistance networks</li>
<li><strong>Version control</strong>: Each update includes detailed changelog and verification signatures</li>
</ul>
<h2 id="legal-disclaimer">Legal Disclaimer</h2>
<p>This manual is provided for educational purposes only. The authors and distributors:</p>
<ul>
<li>Do not advocate for illegal activities in any jurisdiction</li>
<li>Cannot be held responsible for how this information is used</li>
<li>Recommend consulting legal counsel familiar with your local laws</li>
<li>Emphasize that resistance activities carry inherent legal and physical risks</li>
</ul>
<p>Users are solely responsible for understanding and complying with applicable laws in their jurisdiction and for assessing the risks of their activities.</p>
<hr />
<div class="info-box">
<div class="info-title">Getting Started</div>
<p>Ready to begin? Proceed to the <strong>Introduction</strong> to understand the threat landscape and fundamental security concepts that underpin all resistance operations.</p>
</div>
<p><strong>Next:</strong> <a href="/introduction/">Introduction →</a></p>
<nav class="section-nav">
<div></div>
<a href="/introduction/" class="nav-link">
<span>Introduction</span>
<span class="arrow"></span>
</a>
</nav>
</main>
</div>
<footer class="footer">
<div class="container">
<div class="footer-content">
<div class="organization">Department of Internautics</div>
<div>Bureau of Decentralized Resistance</div>
<div>FM-R1 - Version 1.0 - 2025-08-28</div>
<div style="margin-top: 1rem;">
<a href="https://resist.is" target="_blank">resist.is</a> |
<a href="https://git.hacker.supply/Department_of_Internautics/field_guide" target="_blank">Source Code</a>
</div>
</div>
</div>
</footer>
<!-- JavaScript -->
<script src="/assets/js/main.js"></script>
</body>
</html>