404 lines
17 KiB
HTML
404 lines
17 KiB
HTML
<!DOCTYPE html>
|
|
<html lang="en">
|
|
<head>
|
|
<meta charset="UTF-8">
|
|
<meta name="viewport" content="width=device-width, initial-scale=1.0">
|
|
<title>Table of Contents - Field Manual for Resistance Operations</title>
|
|
<meta name="description" content="Field Manual for Resistance Operations - A comprehensive guide to secure communication and operational security for decentralized resistance movements">
|
|
|
|
<!-- Favicon -->
|
|
<link rel="icon" type="image/x-icon" href="/assets/images/favicon.ico">
|
|
|
|
<!-- Stylesheets -->
|
|
<link rel="stylesheet" href="/assets/css/main.css">
|
|
|
|
<!-- Security headers -->
|
|
<meta http-equiv="X-Content-Type-Options" content="nosniff">
|
|
<meta http-equiv="X-Frame-Options" content="DENY">
|
|
<meta http-equiv="X-XSS-Protection" content="1; mode=block">
|
|
|
|
<!-- No tracking -->
|
|
<meta name="robots" content="noindex, nofollow">
|
|
<!-- Matomo -->
|
|
<script>
|
|
var _paq = window._paq = window._paq || [];
|
|
/* tracker methods like "setCustomDimension" should be called before "trackPageView" */
|
|
_paq.push(['trackPageView']);
|
|
_paq.push(['enableLinkTracking']);
|
|
(function() {
|
|
var u="//stats.resist.is/";
|
|
_paq.push(['setTrackerUrl', u+'matomo.php']);
|
|
_paq.push(['setSiteId', '4']);
|
|
var d=document, g=d.createElement('script'), s=d.getElementsByTagName('script')[0];
|
|
g.async=true; g.src=u+'matomo.js'; s.parentNode.insertBefore(g,s);
|
|
})();
|
|
</script>
|
|
<!-- End Matomo Code -->
|
|
</head>
|
|
<body>
|
|
<header class="header">
|
|
<div class="container">
|
|
<div class="header-content">
|
|
<div class="logo">
|
|
<span class="omega">Ω</span>
|
|
<span>FM-R1</span>
|
|
</div>
|
|
<button class="nav-toggle" id="nav-toggle" aria-label="Toggle navigation">
|
|
☰
|
|
</button>
|
|
</div>
|
|
</div>
|
|
</header>
|
|
|
|
<div class="main-layout">
|
|
<nav class="sidebar" id="sidebar">
|
|
<nav class="main-navigation">
|
|
<!-- <div class="nav-header">
|
|
<div class="nav-subtitle">Field Manual for Resistance Operations</div>
|
|
</div>
|
|
-->
|
|
<div class="nav-sections">
|
|
<!-- Front Matter -->
|
|
<div class="nav-section">
|
|
<h3>Field Manual</h3>
|
|
<ul>
|
|
<li><a href="/" class="active">Table of Contents</a></li>
|
|
<li><a href="/preface/" >Preface</a></li>
|
|
<li><a href="/introduction/" >Introduction</a></li>
|
|
</ul>
|
|
</div>
|
|
|
|
<!-- Part I: Foundations -->
|
|
<div class="nav-section">
|
|
<h3>Part I: Foundations</h3>
|
|
<ul>
|
|
<li>
|
|
<a href="/parts/part-1/" >Part Overview</a>
|
|
<ul>
|
|
<li><a href="/chapters/chapter-1/" >Ch 1: Core Security Principles</a></li>
|
|
<li><a href="/chapters/chapter-2/" >Ch 2: Threat Assessment</a></li>
|
|
</ul>
|
|
</li>
|
|
</ul>
|
|
</div>
|
|
|
|
<!-- Part II: Communication -->
|
|
<div class="nav-section">
|
|
<h3>Part II: Communication</h3>
|
|
<ul>
|
|
<li>
|
|
<a href="/parts/part-2/" >Part Overview</a>
|
|
<ul>
|
|
<li><a href="/chapters/chapter-3/" >Ch 3: Communication Architecture</a></li>
|
|
<li><a href="/chapters/chapter-4/" >Ch 4: Secure Messaging</a></li>
|
|
<li><a href="/chapters/chapter-5/" >Ch 5: File Sharing</a></li>
|
|
</ul>
|
|
</li>
|
|
</ul>
|
|
</div>
|
|
|
|
<!-- Part III: OpSec -->
|
|
<div class="nav-section">
|
|
<h3>Part III: OpSec</h3>
|
|
<ul>
|
|
<li>
|
|
<a href="/parts/part-3/" >Part Overview</a>
|
|
<ul>
|
|
<li><a href="/chapters/chapter-6/" >Ch 6: Hardware Security</a></li>
|
|
<li><a href="/chapters/chapter-7/" >Ch 7: Digital Hygiene</a></li>
|
|
<li><a href="/chapters/chapter-8/" >Ch 8: Operational Procedures</a></li>
|
|
</ul>
|
|
</li>
|
|
</ul>
|
|
</div>
|
|
|
|
<!-- Part IV: Advanced -->
|
|
<div class="nav-section">
|
|
<h3>Part IV: Advanced</h3>
|
|
<ul>
|
|
<li>
|
|
<a href="/parts/part-4/" >Part Overview</a>
|
|
<ul>
|
|
<li><a href="/chapters/chapter-9/" >Ch 9: Intelligence Gathering</a></li>
|
|
<li><a href="/chapters/chapter-10/" >Ch 10: Counter-Intelligence</a></li>
|
|
</ul>
|
|
</li>
|
|
</ul>
|
|
</div>
|
|
|
|
<!-- Appendices
|
|
<div class="nav-section">
|
|
<h3>Appendices</h3>
|
|
<ul>
|
|
<li><a href="/appendices/" >Appendices Overview</a></li>
|
|
<li><a href="/appendices/appendix-a/" >Appendix A: Essential Tools</a></li>
|
|
<li><a href="/appendices/appendix-b/" >Appendix B: Legal Considerations</a></li>
|
|
<li><a href="/appendices/appendix-c/" >Appendix C: Emergency Procedures</a></li>
|
|
<li><a href="/appendices/appendix-d/" >Appendix D: Glossary & References</a></li>
|
|
</ul>
|
|
</div>
|
|
-->
|
|
|
|
<!-- Quick Access -->
|
|
<div class="nav-section nav-quick-access">
|
|
<h3>Quick Access</h3>
|
|
<ul>
|
|
<li><a href="/appendices/appendix-a/" class="nav-emergency">Essential Tools</a></li>
|
|
<li><a href="/appendices/appendix-b/" class="nav-emergency">Legal Rights</a></li>
|
|
<li><a href="/appendices/appendix-c/" class="nav-emergency">Emergency Procedures</a></li>
|
|
<li><a href="/appendices/appendix-d/" class="nav-emergency">Glossary & References</a></li>
|
|
</ul>
|
|
</div>
|
|
|
|
<!-- External Links -->
|
|
<div class="nav-section">
|
|
<h3>External Links</h3>
|
|
<ul>
|
|
<li><a href="https://resist.is" target="_blank">resist.is</a></li>
|
|
<li><a href="https://activistchecklist.org" target="_blank">Activist Checklist</a></li>
|
|
<li><a href="https://signal.org" target="_blank">Signal</a></li>
|
|
<li><a href="https://briarproject.org" target="_blank">Briar</a></li>
|
|
<li><a href="https://element.io" target="_blank">Element</a></li>
|
|
<li><a href="https://tails.boum.org" target="_blank">Tails OS</a></li>
|
|
<li><a href="https://onionshare.org" target="_blank">OnionShare</a></li>
|
|
</ul>
|
|
</div>
|
|
</div>
|
|
|
|
<!-- Security Notice
|
|
<div class="nav-security-notice">
|
|
<div class="security-warning">
|
|
<strong>OPERATIONAL SECURITY REMINDER</strong><br>
|
|
This manual contains sensitive information. Ensure secure handling and storage. Practice compartmentalization and need-to-know principles.
|
|
</div>
|
|
</div> -->
|
|
|
|
<!-- Footer -->
|
|
<div class="nav-footer">
|
|
<div class="manual-info">
|
|
<div class="classification">FOR RESISTANCE USE ONLY</div>
|
|
<div class="version">Version 1.0 | FM-R1</div>
|
|
<div class="date">2025</div>
|
|
</div>
|
|
</div>
|
|
</nav>
|
|
|
|
|
|
</nav>
|
|
|
|
<main class="content">
|
|
<div class="content-header">
|
|
<div class="manual-designation">FM-R1: FM-R1: Secure Communication Networks for Decentralized Resistance</div>
|
|
<div class="classification">UNCLASSIFIED</div>
|
|
|
|
</div>
|
|
|
|
<h1 id="field-manual-for-resistance-operations">Field Manual for Resistance Operations</h1>
|
|
|
|
<div class="manual-designation" style="text-align: center; margin-bottom: 2rem;">
|
|
<div style="font-size: 1.2rem; color: #00ff00;">FM-R1</div>
|
|
<div style="font-size: 1rem; color: #ffffff;">FM-R1: Secure Communication Networks for Decentralized Resistance</div>
|
|
<div style="font-size: 0.9rem; color: #0066ff; margin-top: 1rem;">Department of Internautics</div>
|
|
<div style="font-size: 0.9rem; color: #0066ff;">Bureau of Decentralized Resistance</div>
|
|
<div style="font-size: 0.8rem; color: #ffaa00; margin-top: 1rem;">UNCLASSIFIED</div>
|
|
<div style="font-size: 0.8rem; color: #ffffff;">Version 1.0 - 2025-08-28</div>
|
|
</div>
|
|
|
|
<hr />
|
|
|
|
<h2 id="table-of-contents">Table of Contents</h2>
|
|
|
|
<h3 id="front-matter">Front Matter</h3>
|
|
<ul>
|
|
<li><strong><a href="/preface/">Preface</a></strong> - Purpose, scope, and how to use this manual</li>
|
|
<li><strong><a href="/introduction/">Introduction</a></strong> - Threat landscape and security fundamentals</li>
|
|
</ul>
|
|
|
|
<h3 id="part-i-foundations-of-resistance-security">Part I: Foundations of Resistance Security</h3>
|
|
<ul>
|
|
<li><strong><a href="/parts/part-1/">Part I Overview</a></strong> - Core principles and threat assessment
|
|
<ul>
|
|
<li><strong><a href="/chapters/chapter-1/">Chapter 1: Core Security Principles</a></strong> (1-1 to 1-5)
|
|
<ul>
|
|
<li>1-1: Principle of Least Privilege</li>
|
|
<li>1-2: Need-to-Know Basis</li>
|
|
<li>1-3: Compartmentalization and Cell Structure</li>
|
|
<li>1-4: Zero Trust Verification</li>
|
|
<li>1-5: Metadata Minimization</li>
|
|
</ul>
|
|
</li>
|
|
<li><strong><a href="/chapters/chapter-2/">Chapter 2: Threat Assessment and Operational Environment</a></strong> (2-1 to 2-4)
|
|
<ul>
|
|
<li>2-1: Understanding Your Adversary</li>
|
|
<li>2-2: Threat Model Development</li>
|
|
<li>2-3: Risk Assessment Framework</li>
|
|
<li>2-4: Operational Security (OpSec) Fundamentals</li>
|
|
</ul>
|
|
</li>
|
|
</ul>
|
|
</li>
|
|
</ul>
|
|
|
|
<h3 id="part-ii-secure-communication-systems">Part II: Secure Communication Systems</h3>
|
|
<ul>
|
|
<li><strong><a href="/parts/part-2/">Part II Overview</a></strong> - Multi-layer communication architecture
|
|
<ul>
|
|
<li><strong><a href="/chapters/chapter-3/">Chapter 3: Communication Layer Architecture</a></strong> (3-1 to 3-6)
|
|
<ul>
|
|
<li>3-1: Multi-Layer Communication Strategy</li>
|
|
<li>3-2: High-Risk Real-Time Communication (Layer 1)</li>
|
|
<li>3-3: Secure Collaboration Systems (Layer 2)</li>
|
|
<li>3-4: Failsafe and Offline Methods (Layer 3)</li>
|
|
<li>3-5: Anonymous Broadcasting (Layer 4)</li>
|
|
<li>3-6: Communication Protocol Selection</li>
|
|
</ul>
|
|
</li>
|
|
<li><strong><a href="/chapters/chapter-4/">Chapter 4: Secure Messaging and Voice Communications</a></strong> (4-1 to 4-8)
|
|
<ul>
|
|
<li>4-1: Session Messenger Configuration</li>
|
|
<li>4-2: Element/Matrix Self-Hosted Setup</li>
|
|
<li>4-3: Briar Peer-to-Peer Messaging</li>
|
|
<li>4-4: Signal Security Best Practices</li>
|
|
<li>4-5: Voice Communication Security</li>
|
|
<li>4-6: Group Communication Management</li>
|
|
<li>4-7: Message Verification and Authentication</li>
|
|
<li>4-8: Communication Scheduling and Protocols</li>
|
|
</ul>
|
|
</li>
|
|
<li><strong><a href="/chapters/chapter-5/">Chapter 5: File Sharing and Collaboration</a></strong> (5-1 to 5-6)
|
|
<ul>
|
|
<li>5-1: CryptPad Secure Document Collaboration</li>
|
|
<li>5-2: OnionShare Anonymous File Transfer</li>
|
|
<li>5-3: Encrypted Cloud Storage (Mega/Proton)</li>
|
|
<li>5-4: Digital Dead Drops</li>
|
|
<li>5-5: Version Control for Sensitive Documents</li>
|
|
<li>5-6: Collaborative Security Protocols</li>
|
|
</ul>
|
|
</li>
|
|
</ul>
|
|
</li>
|
|
</ul>
|
|
|
|
<h3 id="part-iii-operational-security-procedures">Part III: Operational Security Procedures</h3>
|
|
<ul>
|
|
<li><strong><a href="/parts/part-3/">Part III Overview</a></strong> - Hardware, digital hygiene, and operational procedures
|
|
<ul>
|
|
<li><strong><a href="/chapters/chapter-6/">Chapter 6: Hardware and Infrastructure Security</a></strong> (6-1 to 6-8)
|
|
<ul>
|
|
<li>6-1: Untraceable Hardware Acquisition</li>
|
|
<li>6-2: Tails OS Installation and Configuration</li>
|
|
<li>6-3: Device Compartmentalization</li>
|
|
<li>6-4: Physical Security Measures</li>
|
|
<li>6-5: Network Access Security</li>
|
|
<li>6-6: Hardware Disposal and Sanitization</li>
|
|
<li>6-7: Faraday Cage and Signal Blocking</li>
|
|
<li>6-8: Power and Charging Security</li>
|
|
</ul>
|
|
</li>
|
|
<li><strong><a href="/chapters/chapter-7/">Chapter 7: Digital Hygiene and Privacy</a></strong> (7-1 to 7-6)
|
|
<ul>
|
|
<li>7-1: Browser Security Configuration</li>
|
|
<li>7-2: Search Engine Privacy</li>
|
|
<li>7-3: VPN and Tor Usage</li>
|
|
<li>7-4: Social Media Operational Security</li>
|
|
<li>7-5: Email Security and Anonymous Accounts</li>
|
|
<li>7-6: Digital Footprint Minimization</li>
|
|
</ul>
|
|
</li>
|
|
<li><strong><a href="/chapters/chapter-8/">Chapter 8: Operational Procedures</a></strong> (8-1 to 8-8)
|
|
<ul>
|
|
<li>8-1: Cell Organization and Management</li>
|
|
<li>8-2: Meeting Security Protocols</li>
|
|
<li>8-3: Coded Language and Communication</li>
|
|
<li>8-4: Surveillance Detection and Evasion</li>
|
|
<li>8-5: Emergency Procedures and Protocols</li>
|
|
<li>8-6: Information Sanitization</li>
|
|
<li>8-7: Operational Planning Security</li>
|
|
<li>8-8: Post-Operation Security Review</li>
|
|
</ul>
|
|
</li>
|
|
</ul>
|
|
</li>
|
|
</ul>
|
|
|
|
<h3 id="part-iv-advanced-resistance-operations">Part IV: Advanced Resistance Operations</h3>
|
|
<ul>
|
|
<li><strong><a href="/parts/part-4/">Part IV Overview</a></strong> - Network resilience and counter-intelligence
|
|
<ul>
|
|
<li><strong><a href="/chapters/chapter-9/">Chapter 9: Network Resilience and Redundancy</a></strong> (9-1 to 9-5)
|
|
<ul>
|
|
<li>9-1: Mesh Network Implementation</li>
|
|
<li>9-2: Offline Communication Systems</li>
|
|
<li>9-3: Emergency Communication Protocols</li>
|
|
<li>9-4: Network Failure Recovery</li>
|
|
<li>9-5: Distributed Infrastructure Planning</li>
|
|
</ul>
|
|
</li>
|
|
<li><strong><a href="/chapters/chapter-10/">Chapter 10: Counter-Intelligence and Security Culture</a></strong> (10-1 to 10-6)
|
|
<ul>
|
|
<li>10-1: Infiltration Detection and Prevention</li>
|
|
<li>10-2: Information Verification Procedures</li>
|
|
<li>10-3: Security Culture Development</li>
|
|
<li>10-4: Compartmentalized Knowledge Management</li>
|
|
<li>10-5: Trust Networks and Verification</li>
|
|
<li>10-6: Operational Security Training</li>
|
|
</ul>
|
|
</li>
|
|
</ul>
|
|
</li>
|
|
</ul>
|
|
|
|
<h3 id="appendices">Appendices</h3>
|
|
<ul>
|
|
<li><strong><a href="/appendices/">Appendix A: Quick Reference Guides</a></strong> - Emergency checklists and procedures</li>
|
|
<li><strong><a href="/appendices/tools/">Appendix B: Tool Configuration Guides</a></strong> - Step-by-step setup instructions</li>
|
|
<li><strong><a href="/appendices/resources/">Appendix C: External Resources and Links</a></strong> - Recommended tools and organizations</li>
|
|
<li><strong><a href="/appendices/glossary/">Appendix D: Glossary of Terms</a></strong> - Definitions and terminology</li>
|
|
</ul>
|
|
|
|
<hr />
|
|
|
|
<div class="warning-box">
|
|
<div class="warning-title">Security Notice</div>
|
|
<p>This manual contains sensitive information about resistance operations and security practices. Ensure you are accessing this content through secure channels (Tails OS, Tor Browser, or other anonymizing tools) and following proper operational security protocols.</p>
|
|
</div>
|
|
|
|
<div class="info-box">
|
|
<div class="info-title">For Newcomers</div>
|
|
<p>If you are new to resistance operations, start with the <strong>Preface</strong> and <strong>Introduction</strong>, then proceed through <strong>Part I: Foundations</strong> before advancing to more technical sections. Each chapter builds upon previous knowledge.</p>
|
|
</div>
|
|
|
|
<hr />
|
|
|
|
<p><strong>Distribution:</strong> This manual is designed for decentralized distribution through secure channels. Share responsibly and only with trusted individuals who have a legitimate need for this information.</p>
|
|
|
|
<p><strong>Updates:</strong> This manual will be updated regularly as new threats emerge and technologies evolve. Check the source repository for the latest version.</p>
|
|
|
|
<p><strong>Support:</strong> For questions or contributions, contact the Bureau of Decentralized Resistance through secure channels only.</p>
|
|
|
|
|
|
|
|
|
|
</main>
|
|
</div>
|
|
|
|
<footer class="footer">
|
|
<div class="container">
|
|
<div class="footer-content">
|
|
<div class="organization">Department of Internautics</div>
|
|
<div>Bureau of Decentralized Resistance</div>
|
|
<div>FM-R1 - Version 1.0 - 2025-08-28</div>
|
|
<div style="margin-top: 1rem;">
|
|
<a href="https://resist.is" target="_blank">resist.is</a> |
|
|
<a href="https://git.hacker.supply/Department_of_Internautics/field_guide" target="_blank">Source Code</a>
|
|
</div>
|
|
</div>
|
|
</div>
|
|
</footer>
|
|
|
|
<!-- JavaScript -->
|
|
<script src="/assets/js/main.js"></script>
|
|
</body>
|
|
</html>
|
|
|