741 lines
34 KiB
HTML
741 lines
34 KiB
HTML
<!DOCTYPE html>
|
||
<html lang="en">
|
||
<head>
|
||
<meta charset="UTF-8">
|
||
<meta name="viewport" content="width=device-width, initial-scale=1.0">
|
||
<title>Appendix B: Legal Considerations and Rights - Field Manual for Resistance Operations</title>
|
||
<meta name="description" content="Legal framework, rights, and considerations for resistance activities">
|
||
|
||
<!-- Favicon -->
|
||
<link rel="icon" type="image/x-icon" href="/assets/images/favicon.ico">
|
||
|
||
<!-- Stylesheets -->
|
||
<link rel="stylesheet" href="/assets/css/main.css">
|
||
|
||
<!-- Security headers -->
|
||
<meta http-equiv="X-Content-Type-Options" content="nosniff">
|
||
<meta http-equiv="X-Frame-Options" content="DENY">
|
||
<meta http-equiv="X-XSS-Protection" content="1; mode=block">
|
||
|
||
<!-- No tracking -->
|
||
<meta name="robots" content="noindex, nofollow">
|
||
<!-- Matomo -->
|
||
<script>
|
||
var _paq = window._paq = window._paq || [];
|
||
/* tracker methods like "setCustomDimension" should be called before "trackPageView" */
|
||
_paq.push(['trackPageView']);
|
||
_paq.push(['enableLinkTracking']);
|
||
(function() {
|
||
var u="//stats.resist.is/";
|
||
_paq.push(['setTrackerUrl', u+'matomo.php']);
|
||
_paq.push(['setSiteId', '4']);
|
||
var d=document, g=d.createElement('script'), s=d.getElementsByTagName('script')[0];
|
||
g.async=true; g.src=u+'matomo.js'; s.parentNode.insertBefore(g,s);
|
||
})();
|
||
</script>
|
||
<!-- End Matomo Code -->
|
||
</head>
|
||
<body>
|
||
<header class="header">
|
||
<div class="container">
|
||
<div class="header-content">
|
||
<div class="logo">
|
||
<span class="omega">Ω</span>
|
||
<span>FM-R1</span>
|
||
</div>
|
||
<button class="nav-toggle" id="nav-toggle" aria-label="Toggle navigation">
|
||
☰
|
||
</button>
|
||
</div>
|
||
</div>
|
||
</header>
|
||
|
||
<div class="main-layout">
|
||
<nav class="sidebar" id="sidebar">
|
||
<nav class="main-navigation">
|
||
<!-- <div class="nav-header">
|
||
<div class="nav-subtitle">Field Manual for Resistance Operations</div>
|
||
</div>
|
||
-->
|
||
<div class="nav-sections">
|
||
<!-- Front Matter -->
|
||
<div class="nav-section">
|
||
<h3>Field Manual</h3>
|
||
<ul>
|
||
<li><a href="/" >Table of Contents</a></li>
|
||
<li><a href="/preface/" >Preface</a></li>
|
||
<li><a href="/introduction/" >Introduction</a></li>
|
||
</ul>
|
||
</div>
|
||
|
||
<!-- Part I: Foundations -->
|
||
<div class="nav-section">
|
||
<h3>Part I: Foundations</h3>
|
||
<ul>
|
||
<li>
|
||
<a href="/parts/part-1/" >Part Overview</a>
|
||
<ul>
|
||
<li><a href="/chapters/chapter-1/" >Ch 1: Core Security Principles</a></li>
|
||
<li><a href="/chapters/chapter-2/" >Ch 2: Threat Assessment</a></li>
|
||
</ul>
|
||
</li>
|
||
</ul>
|
||
</div>
|
||
|
||
<!-- Part II: Communication -->
|
||
<div class="nav-section">
|
||
<h3>Part II: Communication</h3>
|
||
<ul>
|
||
<li>
|
||
<a href="/parts/part-2/" >Part Overview</a>
|
||
<ul>
|
||
<li><a href="/chapters/chapter-3/" >Ch 3: Communication Architecture</a></li>
|
||
<li><a href="/chapters/chapter-4/" >Ch 4: Secure Messaging</a></li>
|
||
<li><a href="/chapters/chapter-5/" >Ch 5: File Sharing</a></li>
|
||
</ul>
|
||
</li>
|
||
</ul>
|
||
</div>
|
||
|
||
<!-- Part III: OpSec -->
|
||
<div class="nav-section">
|
||
<h3>Part III: OpSec</h3>
|
||
<ul>
|
||
<li>
|
||
<a href="/parts/part-3/" >Part Overview</a>
|
||
<ul>
|
||
<li><a href="/chapters/chapter-6/" >Ch 6: Hardware Security</a></li>
|
||
<li><a href="/chapters/chapter-7/" >Ch 7: Digital Hygiene</a></li>
|
||
<li><a href="/chapters/chapter-8/" >Ch 8: Operational Procedures</a></li>
|
||
</ul>
|
||
</li>
|
||
</ul>
|
||
</div>
|
||
|
||
<!-- Part IV: Advanced -->
|
||
<div class="nav-section">
|
||
<h3>Part IV: Advanced</h3>
|
||
<ul>
|
||
<li>
|
||
<a href="/parts/part-4/" >Part Overview</a>
|
||
<ul>
|
||
<li><a href="/chapters/chapter-9/" >Ch 9: Intelligence Gathering</a></li>
|
||
<li><a href="/chapters/chapter-10/" >Ch 10: Counter-Intelligence</a></li>
|
||
</ul>
|
||
</li>
|
||
</ul>
|
||
</div>
|
||
|
||
<!-- Appendices
|
||
<div class="nav-section">
|
||
<h3>Appendices</h3>
|
||
<ul>
|
||
<li><a href="/appendices/" >Appendices Overview</a></li>
|
||
<li><a href="/appendices/appendix-a/" >Appendix A: Essential Tools</a></li>
|
||
<li><a href="/appendices/appendix-b/" class="active">Appendix B: Legal Considerations</a></li>
|
||
<li><a href="/appendices/appendix-c/" >Appendix C: Emergency Procedures</a></li>
|
||
<li><a href="/appendices/appendix-d/" >Appendix D: Glossary & References</a></li>
|
||
</ul>
|
||
</div>
|
||
-->
|
||
|
||
<!-- Quick Access -->
|
||
<div class="nav-section nav-quick-access">
|
||
<h3>Quick Access</h3>
|
||
<ul>
|
||
<li><a href="/appendices/appendix-a/" class="nav-emergency">Essential Tools</a></li>
|
||
<li><a href="/appendices/appendix-b/" class="nav-emergency">Legal Rights</a></li>
|
||
<li><a href="/appendices/appendix-c/" class="nav-emergency">Emergency Procedures</a></li>
|
||
<li><a href="/appendices/appendix-d/" class="nav-emergency">Glossary & References</a></li>
|
||
</ul>
|
||
</div>
|
||
|
||
<!-- External Links -->
|
||
<div class="nav-section">
|
||
<h3>External Links</h3>
|
||
<ul>
|
||
<li><a href="https://resist.is" target="_blank">resist.is</a></li>
|
||
<li><a href="https://activistchecklist.org" target="_blank">Activist Checklist</a></li>
|
||
<li><a href="https://signal.org" target="_blank">Signal</a></li>
|
||
<li><a href="https://briarproject.org" target="_blank">Briar</a></li>
|
||
<li><a href="https://element.io" target="_blank">Element</a></li>
|
||
<li><a href="https://tails.boum.org" target="_blank">Tails OS</a></li>
|
||
<li><a href="https://onionshare.org" target="_blank">OnionShare</a></li>
|
||
</ul>
|
||
</div>
|
||
</div>
|
||
|
||
<!-- Security Notice
|
||
<div class="nav-security-notice">
|
||
<div class="security-warning">
|
||
<strong>OPERATIONAL SECURITY REMINDER</strong><br>
|
||
This manual contains sensitive information. Ensure secure handling and storage. Practice compartmentalization and need-to-know principles.
|
||
</div>
|
||
</div> -->
|
||
|
||
<!-- Footer -->
|
||
<div class="nav-footer">
|
||
<div class="manual-info">
|
||
<div class="classification">FOR RESISTANCE USE ONLY</div>
|
||
<div class="version">Version 1.0 | FM-R1</div>
|
||
<div class="date">2025</div>
|
||
</div>
|
||
</div>
|
||
</nav>
|
||
|
||
|
||
</nav>
|
||
|
||
<main class="content">
|
||
<div class="content-header">
|
||
<div class="manual-designation">FM-R1: FM-R1: Secure Communication Networks for Decentralized Resistance</div>
|
||
<div class="classification">UNCLASSIFIED</div>
|
||
|
||
</div>
|
||
|
||
<h1 id="appendix-b-legal-considerations-and-rights">Appendix B: Legal Considerations and Rights</h1>
|
||
|
||
<h2 id="overview">Overview</h2>
|
||
|
||
<p>This appendix provides essential legal information for resistance activities, including constitutional rights, legal protections, potential charges, and legal support resources. This information is primarily focused on United States law but includes general principles applicable in other jurisdictions.</p>
|
||
|
||
<p><strong>⚠️ Legal Disclaimer</strong>: This information is for educational purposes only and does not constitute legal advice. Laws vary by jurisdiction and change frequently. Always consult with qualified legal counsel for specific legal situations.</p>
|
||
|
||
<hr />
|
||
|
||
<h2 id="b1-constitutional-rights-and-protections">B.1 Constitutional Rights and Protections</h2>
|
||
|
||
<h3 id="first-amendment-rights-united-states">First Amendment Rights (United States)</h3>
|
||
|
||
<h4 id="freedom-of-speech">Freedom of Speech</h4>
|
||
<ul>
|
||
<li><strong>Protected Activities</strong>: Political expression, criticism of government, symbolic speech</li>
|
||
<li><strong>Limitations</strong>: True threats, incitement to imminent lawless action, fighting words</li>
|
||
<li><strong>Digital Context</strong>: Online speech generally protected, but platform terms of service may apply</li>
|
||
<li><strong>Operational Considerations</strong>: Document violations of speech rights, know local protest ordinances</li>
|
||
</ul>
|
||
|
||
<h4 id="freedom-of-assembly">Freedom of Assembly</h4>
|
||
<ul>
|
||
<li><strong>Protected Activities</strong>: Peaceful protests, demonstrations, rallies, meetings</li>
|
||
<li><strong>Permit Requirements</strong>: May be required for large gatherings or use of public spaces</li>
|
||
<li><strong>Time, Place, Manner Restrictions</strong>: Content-neutral restrictions may be constitutional</li>
|
||
<li><strong>Private Property</strong>: Property owners may restrict assembly on private land</li>
|
||
</ul>
|
||
|
||
<h4 id="freedom-of-association">Freedom of Association</h4>
|
||
<ul>
|
||
<li><strong>Protected Activities</strong>: Joining organizations, political parties, advocacy groups</li>
|
||
<li><strong>Limitations</strong>: Organizations engaged in illegal activities may lose protection</li>
|
||
<li><strong>Surveillance Concerns</strong>: Government monitoring of associations may violate rights</li>
|
||
<li><strong>Operational Security</strong>: Balance association rights with operational security needs</li>
|
||
</ul>
|
||
|
||
<h4 id="right-to-petition-government">Right to Petition Government</h4>
|
||
<ul>
|
||
<li><strong>Protected Activities</strong>: Lobbying, filing complaints, requesting information</li>
|
||
<li><strong>FOIA Rights</strong>: Freedom of Information Act requests for government documents</li>
|
||
<li><strong>Whistleblower Protections</strong>: Limited protections for government employees</li>
|
||
<li><strong>Retaliation Protections</strong>: Illegal for government to retaliate for protected petitioning</li>
|
||
</ul>
|
||
|
||
<h3 id="fourth-amendment-rights">Fourth Amendment Rights</h3>
|
||
|
||
<h4 id="protection-against-unreasonable-searches">Protection Against Unreasonable Searches</h4>
|
||
<ul>
|
||
<li><strong>Warrant Requirements</strong>: Generally required for searches of homes, personal effects</li>
|
||
<li><strong>Exceptions</strong>: Consent, exigent circumstances, plain view, search incident to arrest</li>
|
||
<li><strong>Digital Devices</strong>: Warrant generally required for cell phone searches</li>
|
||
<li><strong>Border Searches</strong>: Reduced protections at international borders</li>
|
||
</ul>
|
||
|
||
<h4 id="electronic-surveillance">Electronic Surveillance</h4>
|
||
<ul>
|
||
<li><strong>Wiretapping</strong>: Warrant required for real-time interception of communications</li>
|
||
<li><strong>Stored Communications</strong>: Different standards for stored vs. real-time communications</li>
|
||
<li><strong>Metadata</strong>: Less protection for metadata than content of communications</li>
|
||
<li><strong>Third-Party Doctrine</strong>: Information shared with third parties may lose protection</li>
|
||
</ul>
|
||
|
||
<h3 id="fifth-amendment-rights">Fifth Amendment Rights</h3>
|
||
|
||
<h4 id="right-against-self-incrimination">Right Against Self-Incrimination</h4>
|
||
<ul>
|
||
<li><strong>Miranda Rights</strong>: Right to remain silent during custodial interrogation</li>
|
||
<li><strong>Testimonial vs. Physical</strong>: Protection applies to testimonial evidence, not physical</li>
|
||
<li><strong>Password Protection</strong>: Uncertain protection for passwords vs. biometric unlocking</li>
|
||
<li><strong>Document Production</strong>: May be required to produce documents under subpoena</li>
|
||
</ul>
|
||
|
||
<h4 id="due-process-rights">Due Process Rights</h4>
|
||
<ul>
|
||
<li><strong>Procedural Due Process</strong>: Right to fair legal procedures</li>
|
||
<li><strong>Substantive Due Process</strong>: Protection of fundamental rights from government interference</li>
|
||
<li><strong>Equal Protection</strong>: Government must treat similarly situated people equally</li>
|
||
<li><strong>Vagueness Doctrine</strong>: Laws must be clear enough for people to understand</li>
|
||
</ul>
|
||
|
||
<h3 id="sixth-amendment-rights">Sixth Amendment Rights</h3>
|
||
|
||
<h4 id="right-to-counsel">Right to Counsel</h4>
|
||
<ul>
|
||
<li><strong>Criminal Proceedings</strong>: Right to attorney in criminal cases</li>
|
||
<li><strong>Custodial Interrogation</strong>: Right to have attorney present during questioning</li>
|
||
<li><strong>Quality of Representation</strong>: Right to effective assistance of counsel</li>
|
||
<li><strong>Self-Representation</strong>: Right to represent yourself (not recommended)</li>
|
||
</ul>
|
||
|
||
<h4 id="right-to-fair-trial">Right to Fair Trial</h4>
|
||
<ul>
|
||
<li><strong>Speedy Trial</strong>: Right to trial without unreasonable delay</li>
|
||
<li><strong>Public Trial</strong>: Generally right to public proceedings</li>
|
||
<li><strong>Impartial Jury</strong>: Right to jury free from bias and prejudice</li>
|
||
<li><strong>Confrontation</strong>: Right to cross-examine witnesses</li>
|
||
</ul>
|
||
|
||
<hr />
|
||
|
||
<h2 id="b2-common-legal-charges-and-penalties">B.2 Common Legal Charges and Penalties</h2>
|
||
|
||
<h3 id="protest-related-charges">Protest-Related Charges</h3>
|
||
|
||
<h4 id="disorderly-conduct">Disorderly Conduct</h4>
|
||
<ul>
|
||
<li><strong>Definition</strong>: Behavior that disturbs public peace or order</li>
|
||
<li><strong>Typical Penalties</strong>: Fines, short jail sentences, community service</li>
|
||
<li><strong>Defense Strategies</strong>: First Amendment protections, vague statute challenges</li>
|
||
<li><strong>Operational Notes</strong>: Often used as catch-all charge for protest activities</li>
|
||
</ul>
|
||
|
||
<h4 id="unlawful-assembly">Unlawful Assembly</h4>
|
||
<ul>
|
||
<li><strong>Definition</strong>: Gathering of people for illegal purpose or in illegal manner</li>
|
||
<li><strong>Typical Penalties</strong>: Misdemeanor charges, fines, possible jail time</li>
|
||
<li><strong>Defense Strategies</strong>: Challenge basis for unlawful determination</li>
|
||
<li><strong>Operational Notes</strong>: May be applied to otherwise legal gatherings</li>
|
||
</ul>
|
||
|
||
<h4 id="trespassing">Trespassing</h4>
|
||
<ul>
|
||
<li><strong>Definition</strong>: Unlawfully entering or remaining on property</li>
|
||
<li><strong>Typical Penalties</strong>: Fines, possible jail time, civil liability</li>
|
||
<li><strong>Defense Strategies</strong>: Lack of notice, public forum doctrine, necessity defense</li>
|
||
<li><strong>Operational Notes</strong>: Know property boundaries and access rights</li>
|
||
</ul>
|
||
|
||
<h4 id="obstruction-of-justice">Obstruction of Justice</h4>
|
||
<ul>
|
||
<li><strong>Definition</strong>: Interfering with law enforcement or judicial proceedings</li>
|
||
<li><strong>Typical Penalties</strong>: Serious misdemeanor or felony charges</li>
|
||
<li><strong>Defense Strategies</strong>: Lack of intent, First Amendment protections</li>
|
||
<li><strong>Operational Notes</strong>: Broad statute often used against activists</li>
|
||
</ul>
|
||
|
||
<h3 id="technology-related-charges">Technology-Related Charges</h3>
|
||
|
||
<h4 id="computer-fraud-and-abuse-act-cfaa-violations">Computer Fraud and Abuse Act (CFAA) Violations</h4>
|
||
<ul>
|
||
<li><strong>Definition</strong>: Unauthorized access to computers or exceeding authorized access</li>
|
||
<li><strong>Typical Penalties</strong>: Significant fines and prison sentences</li>
|
||
<li><strong>Defense Strategies</strong>: Challenge authorization definitions, proportionality arguments</li>
|
||
<li><strong>Operational Notes</strong>: Extremely broad statute with severe penalties</li>
|
||
</ul>
|
||
|
||
<h4 id="wire-fraud">Wire Fraud</h4>
|
||
<ul>
|
||
<li><strong>Definition</strong>: Using electronic communications to commit fraud</li>
|
||
<li><strong>Typical Penalties</strong>: Up to 20 years in prison, significant fines</li>
|
||
<li><strong>Defense Strategies</strong>: Challenge intent element, lack of materiality</li>
|
||
<li><strong>Operational Notes</strong>: Often used in cases involving online activities</li>
|
||
</ul>
|
||
|
||
<h4 id="identity-theft">Identity Theft</h4>
|
||
<ul>
|
||
<li><strong>Definition</strong>: Unlawfully using another person’s identifying information</li>
|
||
<li><strong>Typical Penalties</strong>: Significant fines and prison sentences</li>
|
||
<li><strong>Defense Strategies</strong>: Lack of intent, authorized use</li>
|
||
<li><strong>Operational Notes</strong>: May apply to use of pseudonyms or false information</li>
|
||
</ul>
|
||
|
||
<h3 id="surveillance-and-privacy-charges">Surveillance and Privacy Charges</h3>
|
||
|
||
<h4 id="wiretapping-violations">Wiretapping Violations</h4>
|
||
<ul>
|
||
<li><strong>Definition</strong>: Illegally intercepting communications</li>
|
||
<li><strong>Typical Penalties</strong>: Fines and possible prison time</li>
|
||
<li><strong>Defense Strategies</strong>: Consent of parties, public place exception</li>
|
||
<li><strong>Operational Notes</strong>: Laws vary significantly by state</li>
|
||
</ul>
|
||
|
||
<h4 id="recording-laws">Recording Laws</h4>
|
||
<ul>
|
||
<li><strong>Definition</strong>: Illegally recording conversations or activities</li>
|
||
<li><strong>Typical Penalties</strong>: Varies by jurisdiction, civil and criminal liability</li>
|
||
<li><strong>Defense Strategies</strong>: One-party consent states, public place recordings</li>
|
||
<li><strong>Operational Notes</strong>: Know local recording laws before documenting activities</li>
|
||
</ul>
|
||
|
||
<h3 id="federal-charges">Federal Charges</h3>
|
||
|
||
<h4 id="domestic-terrorism">Domestic Terrorism</h4>
|
||
<ul>
|
||
<li><strong>Definition</strong>: Activities dangerous to human life intended to intimidate or coerce</li>
|
||
<li><strong>Typical Penalties</strong>: Life imprisonment or death penalty in extreme cases</li>
|
||
<li><strong>Defense Strategies</strong>: Challenge intent element, First Amendment protections</li>
|
||
<li><strong>Operational Notes</strong>: Extremely serious charges with severe consequences</li>
|
||
</ul>
|
||
|
||
<h4 id="seditious-conspiracy">Seditious Conspiracy</h4>
|
||
<ul>
|
||
<li><strong>Definition</strong>: Conspiracy to overthrow government or oppose its authority by force</li>
|
||
<li><strong>Typical Penalties</strong>: Up to 20 years in prison</li>
|
||
<li><strong>Defense Strategies</strong>: Challenge conspiracy elements, First Amendment protections</li>
|
||
<li><strong>Operational Notes</strong>: Rarely prosecuted but carries severe penalties</li>
|
||
</ul>
|
||
|
||
<h4 id="rico-violations">RICO Violations</h4>
|
||
<ul>
|
||
<li><strong>Definition</strong>: Racketeering activities as part of ongoing criminal enterprise</li>
|
||
<li><strong>Typical Penalties</strong>: Significant prison sentences and asset forfeiture</li>
|
||
<li><strong>Defense Strategies</strong>: Challenge enterprise element, pattern of activity</li>
|
||
<li><strong>Operational Notes</strong>: May be applied to activist organizations</li>
|
||
</ul>
|
||
|
||
<hr />
|
||
|
||
<h2 id="b3-legal-rights-during-encounters">B.3 Legal Rights During Encounters</h2>
|
||
|
||
<h3 id="police-encounters">Police Encounters</h3>
|
||
|
||
<h4 id="traffic-stops">Traffic Stops</h4>
|
||
<ul>
|
||
<li><strong>Required Actions</strong>: Provide license, registration, insurance if driving</li>
|
||
<li><strong>Optional Actions</strong>: Answering questions beyond identification</li>
|
||
<li><strong>Rights</strong>: Remain silent, refuse consent to search, ask if free to leave</li>
|
||
<li><strong>Operational Notes</strong>: Document interactions, remain calm and respectful</li>
|
||
</ul>
|
||
|
||
<h4 id="street-encounters">Street Encounters</h4>
|
||
<ul>
|
||
<li><strong>Required Actions</strong>: Generally none unless under arrest</li>
|
||
<li><strong>Optional Actions</strong>: Providing identification (varies by state)</li>
|
||
<li><strong>Rights</strong>: Ask if free to leave, remain silent, refuse consent to search</li>
|
||
<li><strong>Operational Notes</strong>: Know local stop-and-identify laws</li>
|
||
</ul>
|
||
|
||
<h4 id="protests-and-demonstrations">Protests and Demonstrations</h4>
|
||
<ul>
|
||
<li><strong>Rights</strong>: First Amendment protections, right to observe and record</li>
|
||
<li><strong>Limitations</strong>: Lawful police orders, permit requirements</li>
|
||
<li><strong>Operational Notes</strong>: Legal observers, know dispersal procedures</li>
|
||
</ul>
|
||
|
||
<h3 id="arrest-procedures">Arrest Procedures</h3>
|
||
|
||
<h4 id="during-arrest">During Arrest</h4>
|
||
<ul>
|
||
<li><strong>Rights</strong>: Remain silent, request attorney, refuse consent to search</li>
|
||
<li><strong>Required Actions</strong>: Comply with physical arrest, provide identification</li>
|
||
<li><strong>Prohibited Actions</strong>: Resisting arrest, providing false information</li>
|
||
<li><strong>Operational Notes</strong>: Document badge numbers, witness information</li>
|
||
</ul>
|
||
|
||
<h4 id="custodial-interrogation">Custodial Interrogation</h4>
|
||
<ul>
|
||
<li><strong>Rights</strong>: Miranda warnings, right to attorney, right to remain silent</li>
|
||
<li><strong>Strategies</strong>: Invoke rights clearly, do not waive rights</li>
|
||
<li><strong>Operational Notes</strong>: Anything said can be used against you</li>
|
||
</ul>
|
||
|
||
<h4 id="booking-and-processing">Booking and Processing</h4>
|
||
<ul>
|
||
<li><strong>Required Actions</strong>: Fingerprinting, photographing, basic information</li>
|
||
<li><strong>Optional Actions</strong>: Answering investigative questions</li>
|
||
<li><strong>Rights</strong>: Medical attention, phone calls, attorney contact</li>
|
||
<li><strong>Operational Notes</strong>: Know jail support procedures</li>
|
||
</ul>
|
||
|
||
<h3 id="search-and-seizure-rights">Search and Seizure Rights</h3>
|
||
|
||
<h4 id="home-searches">Home Searches</h4>
|
||
<ul>
|
||
<li><strong>Warrant Requirements</strong>: Generally required unless exigent circumstances</li>
|
||
<li><strong>Consent</strong>: Can refuse consent to search</li>
|
||
<li><strong>Scope</strong>: Search limited to areas specified in warrant</li>
|
||
<li><strong>Operational Notes</strong>: Request to see warrant, document search</li>
|
||
</ul>
|
||
|
||
<h4 id="vehicle-searches">Vehicle Searches</h4>
|
||
<ul>
|
||
<li><strong>Probable Cause</strong>: Required for search without consent</li>
|
||
<li><strong>Consent</strong>: Can refuse consent to search</li>
|
||
<li><strong>Inventory Searches</strong>: May occur during impoundment</li>
|
||
<li><strong>Operational Notes</strong>: Keep vehicles clean of sensitive materials</li>
|
||
</ul>
|
||
|
||
<h4 id="digital-device-searches">Digital Device Searches</h4>
|
||
<ul>
|
||
<li><strong>Warrant Requirements</strong>: Generally required for cell phone searches</li>
|
||
<li><strong>Border Exceptions</strong>: Reduced protections at international borders</li>
|
||
<li><strong>Consent</strong>: Can refuse consent to unlock devices</li>
|
||
<li><strong>Operational Notes</strong>: Use strong passwords, consider device encryption</li>
|
||
</ul>
|
||
|
||
<hr />
|
||
|
||
<h2 id="b4-legal-support-and-resources">B.4 Legal Support and Resources</h2>
|
||
|
||
<h3 id="finding-legal-representation">Finding Legal Representation</h3>
|
||
|
||
<h4 id="criminal-defense-attorneys">Criminal Defense Attorneys</h4>
|
||
<ul>
|
||
<li><strong>Specializations</strong>: Look for attorneys experienced in protest law, civil rights</li>
|
||
<li><strong>Consultation</strong>: Many offer free initial consultations</li>
|
||
<li><strong>Payment</strong>: Public defenders available for indigent defendants</li>
|
||
<li><strong>Operational Notes</strong>: Establish attorney relationships before needed</li>
|
||
</ul>
|
||
|
||
<h4 id="civil-rights-organizations">Civil Rights Organizations</h4>
|
||
<ul>
|
||
<li><strong>ACLU</strong>: American Civil Liberties Union - <a href="https://aclu.org">aclu.org</a></li>
|
||
<li><strong>EFF</strong>: Electronic Frontier Foundation - <a href="https://eff.org">eff.org</a></li>
|
||
<li><strong>National Lawyers Guild</strong>: <a href="https://nlg.org">nlg.org</a></li>
|
||
<li><strong>Center for Constitutional Rights</strong>: <a href="https://ccrjustice.org">ccrjustice.org</a></li>
|
||
</ul>
|
||
|
||
<h4 id="legal-observers">Legal Observers</h4>
|
||
<ul>
|
||
<li><strong>Training</strong>: Many organizations provide legal observer training</li>
|
||
<li><strong>Role</strong>: Document police behavior, provide witness testimony</li>
|
||
<li><strong>Rights</strong>: Generally same as other protesters, special press protections may apply</li>
|
||
<li><strong>Operational Notes</strong>: Wear identifying clothing, maintain neutrality</li>
|
||
</ul>
|
||
|
||
<h3 id="bail-and-jail-support">Bail and Jail Support</h3>
|
||
|
||
<h4 id="bail-funds">Bail Funds</h4>
|
||
<ul>
|
||
<li><strong>Purpose</strong>: Provide bail money for arrested activists</li>
|
||
<li><strong>Local Funds</strong>: Research local bail funds before actions</li>
|
||
<li><strong>National Funds</strong>: Some organizations provide national support</li>
|
||
<li><strong>Operational Notes</strong>: Know contact information, have emergency contacts</li>
|
||
</ul>
|
||
|
||
<h4 id="jail-support">Jail Support</h4>
|
||
<ul>
|
||
<li><strong>Purpose</strong>: Provide support for people being released from jail</li>
|
||
<li><strong>Services</strong>: Transportation, food, emotional support, legal information</li>
|
||
<li><strong>Organization</strong>: Usually coordinated by local activist groups</li>
|
||
<li><strong>Operational Notes</strong>: Establish jail support before actions</li>
|
||
</ul>
|
||
|
||
<h3 id="know-your-rights-training">Know Your Rights Training</h3>
|
||
|
||
<h4 id="legal-clinics">Legal Clinics</h4>
|
||
<ul>
|
||
<li><strong>Content</strong>: Rights during police encounters, protest law, digital security</li>
|
||
<li><strong>Providers</strong>: Legal organizations, activist groups, law schools</li>
|
||
<li><strong>Format</strong>: Workshops, online resources, printed materials</li>
|
||
<li><strong>Operational Notes</strong>: Regular training updates as laws change</li>
|
||
</ul>
|
||
|
||
<h4 id="digital-security-training">Digital Security Training</h4>
|
||
<ul>
|
||
<li><strong>Content</strong>: Privacy rights, surveillance law, device security</li>
|
||
<li><strong>Providers</strong>: EFF, digital rights organizations, security trainers</li>
|
||
<li><strong>Resources</strong>: Surveillance Self-Defense guide, Security Education Companion</li>
|
||
<li><strong>Operational Notes</strong>: Integrate legal and technical security training</li>
|
||
</ul>
|
||
|
||
<hr />
|
||
|
||
<h2 id="b5-international-considerations">B.5 International Considerations</h2>
|
||
|
||
<h3 id="cross-border-activities">Cross-Border Activities</h3>
|
||
|
||
<h4 id="jurisdiction-issues">Jurisdiction Issues</h4>
|
||
<ul>
|
||
<li><strong>Multiple Laws</strong>: Activities may be subject to laws of multiple countries</li>
|
||
<li><strong>Extradition</strong>: Possibility of extradition for serious crimes</li>
|
||
<li><strong>Diplomatic Immunity</strong>: Limited protections for most activists</li>
|
||
<li><strong>Operational Notes</strong>: Research laws in all relevant jurisdictions</li>
|
||
</ul>
|
||
|
||
<h4 id="travel-considerations">Travel Considerations</h4>
|
||
<ul>
|
||
<li><strong>Border Searches</strong>: Enhanced search powers at international borders</li>
|
||
<li><strong>Visa Requirements</strong>: Political activities may affect visa eligibility</li>
|
||
<li><strong>Surveillance</strong>: Increased surveillance of international travelers</li>
|
||
<li><strong>Operational Notes</strong>: Use clean devices when crossing borders</li>
|
||
</ul>
|
||
|
||
<h3 id="international-law">International Law</h3>
|
||
|
||
<h4 id="human-rights-law">Human Rights Law</h4>
|
||
<ul>
|
||
<li><strong>Universal Declaration</strong>: Fundamental rights recognized internationally</li>
|
||
<li><strong>Regional Systems</strong>: European, Inter-American, African human rights systems</li>
|
||
<li><strong>Enforcement</strong>: Limited enforcement mechanisms for violations</li>
|
||
<li><strong>Operational Notes</strong>: Document human rights violations</li>
|
||
</ul>
|
||
|
||
<h4 id="diplomatic-protections">Diplomatic Protections</h4>
|
||
<ul>
|
||
<li><strong>Consular Services</strong>: Limited assistance from home country consulates</li>
|
||
<li><strong>Political Asylum</strong>: Possible protection for political persecution</li>
|
||
<li><strong>Refugee Status</strong>: Protection for those fleeing persecution</li>
|
||
<li><strong>Operational Notes</strong>: Know consular contact information</li>
|
||
</ul>
|
||
|
||
<hr />
|
||
|
||
<h2 id="b6-legal-risk-assessment">B.6 Legal Risk Assessment</h2>
|
||
|
||
<h3 id="risk-factors">Risk Factors</h3>
|
||
|
||
<h4 id="activity-based-risks">Activity-Based Risks</h4>
|
||
<ul>
|
||
<li><strong>Type of Activity</strong>: Different activities carry different legal risks</li>
|
||
<li><strong>Location</strong>: Laws vary significantly by jurisdiction</li>
|
||
<li><strong>Participants</strong>: Number and background of participants affects risk</li>
|
||
<li><strong>Timing</strong>: Current political climate affects enforcement</li>
|
||
</ul>
|
||
|
||
<h4 id="personal-risk-factors">Personal Risk Factors</h4>
|
||
<ul>
|
||
<li><strong>Criminal History</strong>: Prior arrests may affect treatment and sentencing</li>
|
||
<li><strong>Immigration Status</strong>: Non-citizens face additional risks including deportation</li>
|
||
<li><strong>Employment</strong>: Some jobs may be affected by arrests or convictions</li>
|
||
<li><strong>Family Situation</strong>: Dependents may be affected by legal consequences</li>
|
||
</ul>
|
||
|
||
<h3 id="risk-mitigation-strategies">Risk Mitigation Strategies</h3>
|
||
|
||
<h4 id="legal-preparation">Legal Preparation</h4>
|
||
<ul>
|
||
<li><strong>Know Your Rights</strong>: Understand legal rights and protections</li>
|
||
<li><strong>Legal Contacts</strong>: Establish relationships with attorneys before needed</li>
|
||
<li><strong>Bail Planning</strong>: Arrange bail funds and jail support in advance</li>
|
||
<li><strong>Documentation</strong>: Prepare legal documents and emergency contacts</li>
|
||
</ul>
|
||
|
||
<h4 id="operational-security">Operational Security</h4>
|
||
<ul>
|
||
<li><strong>Compartmentalization</strong>: Limit knowledge of illegal activities</li>
|
||
<li><strong>Communication Security</strong>: Use secure communication methods</li>
|
||
<li><strong>Evidence Management</strong>: Minimize creation and retention of evidence</li>
|
||
<li><strong>Identity Protection</strong>: Protect real identities when possible</li>
|
||
</ul>
|
||
|
||
<hr />
|
||
|
||
<h2 id="b7-post-arrest-procedures">B.7 Post-Arrest Procedures</h2>
|
||
|
||
<h3 id="immediate-actions">Immediate Actions</h3>
|
||
|
||
<h4 id="during-detention">During Detention</h4>
|
||
<ul>
|
||
<li><strong>Invoke Rights</strong>: Clearly invoke right to remain silent and right to attorney</li>
|
||
<li><strong>Document Everything</strong>: Remember details of arrest and treatment</li>
|
||
<li><strong>Medical Attention</strong>: Request medical attention if needed</li>
|
||
<li><strong>Contact Information</strong>: Provide emergency contact information</li>
|
||
</ul>
|
||
|
||
<h4 id="communication-with-outside">Communication with Outside</h4>
|
||
<ul>
|
||
<li><strong>Phone Calls</strong>: Use phone calls to contact attorney and jail support</li>
|
||
<li><strong>Visitors</strong>: Limit visitors to attorney and essential support people</li>
|
||
<li><strong>Mail</strong>: Be aware that jail mail may be monitored</li>
|
||
<li><strong>Operational Notes</strong>: Assume all communications are monitored except attorney calls</li>
|
||
</ul>
|
||
|
||
<h3 id="legal-strategy">Legal Strategy</h3>
|
||
|
||
<h4 id="initial-court-appearance">Initial Court Appearance</h4>
|
||
<ul>
|
||
<li><strong>Arraignment</strong>: First court appearance, charges formally read</li>
|
||
<li><strong>Bail Hearing</strong>: Determination of bail amount and conditions</li>
|
||
<li><strong>Plea</strong>: Generally advisable to plead not guilty initially</li>
|
||
<li><strong>Attorney</strong>: Essential to have attorney representation</li>
|
||
</ul>
|
||
|
||
<h4 id="case-development">Case Development</h4>
|
||
<ul>
|
||
<li><strong>Discovery</strong>: Review evidence against you</li>
|
||
<li><strong>Motions</strong>: Challenge evidence and procedures</li>
|
||
<li><strong>Negotiations</strong>: Possible plea negotiations</li>
|
||
<li><strong>Trial</strong>: Jury trial if case proceeds</li>
|
||
</ul>
|
||
|
||
<h3 id="long-term-considerations">Long-Term Considerations</h3>
|
||
|
||
<h4 id="conviction-consequences">Conviction Consequences</h4>
|
||
<ul>
|
||
<li><strong>Criminal Record</strong>: Permanent criminal record for convictions</li>
|
||
<li><strong>Employment</strong>: May affect current and future employment</li>
|
||
<li><strong>Immigration</strong>: Serious consequences for non-citizens</li>
|
||
<li><strong>Civil Rights</strong>: May lose certain civil rights (voting, gun ownership)</li>
|
||
</ul>
|
||
|
||
<h4 id="appeals-process">Appeals Process</h4>
|
||
<ul>
|
||
<li><strong>Grounds</strong>: Legal errors during trial or sentencing</li>
|
||
<li><strong>Timing</strong>: Strict deadlines for filing appeals</li>
|
||
<li><strong>Representation</strong>: Attorney essential for appeals process</li>
|
||
<li><strong>Success Rates</strong>: Appeals are difficult and rarely successful</li>
|
||
</ul>
|
||
|
||
<hr />
|
||
|
||
<div class="warning-box">
|
||
<div class="warning-title">Legal Risk Warning</div>
|
||
<p>Resistance activities carry significant legal risks including arrest, prosecution, and imprisonment. Laws are complex and change frequently. This information is not a substitute for qualified legal advice. Always consult with an attorney before engaging in activities that may have legal consequences.</p>
|
||
</div>
|
||
|
||
<div class="info-box">
|
||
<div class="info-title">Legal Support Importance</div>
|
||
<p>Establishing relationships with legal support organizations and attorneys before engaging in resistance activities is crucial. Legal preparation and know-your-rights training significantly improve outcomes during legal encounters.</p>
|
||
</div>
|
||
|
||
|
||
|
||
|
||
<nav class="section-nav">
|
||
|
||
<a href="/appendices/appendix-a/" class="nav-link">
|
||
<span class="arrow">←</span>
|
||
<span>Appendix A: Essential Tools</span>
|
||
</a>
|
||
|
||
|
||
|
||
<a href="/appendices/appendix-c/" class="nav-link">
|
||
<span>Appendix C: Emergency Procedures</span>
|
||
<span class="arrow">→</span>
|
||
</a>
|
||
|
||
</nav>
|
||
|
||
</main>
|
||
</div>
|
||
|
||
<footer class="footer">
|
||
<div class="container">
|
||
<div class="footer-content">
|
||
<div class="organization">Department of Internautics</div>
|
||
<div>Bureau of Decentralized Resistance</div>
|
||
<div>FM-R1 - Version 1.0 - 2025-08-28</div>
|
||
<div style="margin-top: 1rem;">
|
||
<a href="https://resist.is" target="_blank">resist.is</a> |
|
||
<a href="https://git.hacker.supply/Department_of_Internautics/field_guide" target="_blank">Source Code</a>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</footer>
|
||
|
||
<!-- JavaScript -->
|
||
<script src="/assets/js/main.js"></script>
|
||
</body>
|
||
</html>
|
||
|