field_guide/_appendices/appendix-a.md
2025-08-29 13:18:53 -04:00

18 KiB

layout title description appendix prev_page next_page
default Appendix A: Essential Tools and Resources Comprehensive directory of tools, software, and resources for resistance operations A
title url
Chapter 12: Direct Action Planning /chapters/chapter-12/
title url
Appendix B: Legal Considerations /appendices/appendix-b/

Appendix A: Essential Tools and Resources

Overview

This appendix provides a comprehensive directory of essential tools, software, hardware, and resources for resistance operations. All recommendations prioritize security, reliability, and operational effectiveness while considering accessibility and cost constraints.


A.1 Secure Communication Tools

Messaging Applications

Signal Private Messenger

  • Purpose: End-to-end encrypted messaging and voice calls
  • Security Features: Perfect forward secrecy, disappearing messages, sealed sender
  • Platform Support: iOS, Android, Desktop (Windows, macOS, Linux)
  • Website: signal.org
  • Operational Notes: Industry standard for secure messaging, regularly audited
  • Setup Guide: Enable disappearing messages, verify safety numbers, use registration lock

Session Messenger

  • Purpose: Decentralized encrypted messaging without phone numbers
  • Security Features: Onion routing, no metadata collection, anonymous accounts
  • Platform Support: iOS, Android, Desktop (Windows, macOS, Linux)
  • Website: getsession.org
  • Operational Notes: No phone number required, routes through Tor-like network
  • Setup Guide: Generate Session ID, configure privacy settings, use disappearing messages

Briar Messenger

  • Purpose: Peer-to-peer encrypted messaging without servers
  • Security Features: Direct device-to-device communication, no central servers
  • Platform Support: Android (primary), desktop versions in development
  • Website: briarproject.org
  • Operational Notes: Works without internet via Bluetooth/WiFi, perfect for protests
  • Setup Guide: Add contacts via QR codes, configure transport settings

Voice Communication

Jami (GNU Ring)

  • Purpose: Distributed voice and video calling
  • Security Features: End-to-end encryption, no central servers, peer-to-peer
  • Platform Support: All major platforms
  • Website: jami.net
  • Operational Notes: No account registration required, works over Tor
  • Setup Guide: Generate account locally, share Jami ID securely

Mumble

  • Purpose: Low-latency voice chat for groups
  • Security Features: Strong encryption, self-hosted servers possible
  • Platform Support: All major platforms
  • Website: mumble.info
  • Operational Notes: Excellent for real-time coordination, can run over Tor
  • Setup Guide: Connect to trusted servers, configure push-to-talk

Email Security

ProtonMail

  • Purpose: End-to-end encrypted email service
  • Security Features: Zero-access encryption, Swiss privacy laws, Tor support
  • Platform Support: Web, iOS, Android, desktop bridge
  • Website: protonmail.com
  • Operational Notes: Free tier available, supports custom domains
  • Setup Guide: Enable two-factor authentication, use Tor browser for access

Tutanota

  • Purpose: Encrypted email with calendar and contacts
  • Security Features: End-to-end encryption, anonymous signup, open source
  • Platform Support: Web, iOS, Android, desktop
  • Website: tutanota.com
  • Operational Notes: Quantum-resistant encryption, German privacy laws
  • Setup Guide: Create account over Tor, enable two-factor authentication

A.2 Privacy and Anonymity Tools

Web Browsers

Tor Browser

  • Purpose: Anonymous web browsing and access to .onion sites
  • Security Features: Onion routing, traffic encryption, fingerprint resistance
  • Platform Support: Windows, macOS, Linux, Android
  • Website: torproject.org
  • Operational Notes: Essential for anonymous research and communication
  • Setup Guide: Download from official site, configure security level, use bridges if needed

Firefox with Privacy Extensions

  • Purpose: Privacy-hardened web browsing
  • Security Features: Tracking protection, fingerprint resistance, extension support
  • Platform Support: All major platforms
  • Website: firefox.com
  • Operational Notes: Highly customizable, good balance of security and usability
  • Setup Guide: Install uBlock Origin, NoScript, ClearURLs, configure about:config

VPN Services

Mullvad VPN

  • Purpose: Anonymous VPN service with strong privacy protections
  • Security Features: No logging, anonymous accounts, WireGuard support
  • Platform Support: All major platforms
  • Website: mullvad.net
  • Operational Notes: Pay with cryptocurrency, no personal information required
  • Setup Guide: Create anonymous account, configure kill switch, use WireGuard

IVPN

  • Purpose: Privacy-focused VPN with transparency reports
  • Security Features: No logging, anonymous accounts, multi-hop connections
  • Platform Support: All major platforms
  • Website: ivpn.net
  • Operational Notes: Regular security audits, supports Tor over VPN
  • Setup Guide: Anonymous signup, enable firewall, configure multi-hop

Operating Systems

Tails (The Amnesic Incognito Live System)

  • Purpose: Amnesic operating system for maximum privacy
  • Security Features: Routes through Tor, leaves no traces, cryptographic tools included
  • Platform Support: Live USB/DVD for any computer
  • Website: tails.boum.org
  • Operational Notes: Essential for high-security operations, resets after each use
  • Setup Guide: Create persistent storage, verify downloads, configure additional software

Qubes OS

  • Purpose: Security through isolation using virtual machines
  • Security Features: Compartmentalized computing, Xen hypervisor, template system
  • Platform Support: x86_64 computers with VT-x/AMD-V
  • Website: qubes-os.org
  • Operational Notes: Steep learning curve but excellent security model
  • Setup Guide: Hardware compatibility check, create security domains, configure templates

A.3 File Security and Storage

Encryption Tools

VeraCrypt

  • Purpose: Full disk and file container encryption
  • Security Features: Strong encryption algorithms, hidden volumes, plausible deniability
  • Platform Support: Windows, macOS, Linux
  • Website: veracrypt.fr
  • Operational Notes: Successor to TrueCrypt, regularly updated
  • Setup Guide: Create encrypted containers, use hidden volumes for sensitive data

7-Zip with Strong Encryption

  • Purpose: File compression and encryption
  • Security Features: AES-256 encryption, open source, command line support
  • Platform Support: Windows, Linux (p7zip), macOS (via Homebrew)
  • Website: 7-zip.org
  • Operational Notes: Simple encryption for individual files and archives
  • Setup Guide: Use strong passwords, enable AES-256 encryption

Secure File Sharing

OnionShare

  • Purpose: Anonymous file sharing over Tor network
  • Security Features: Tor hidden services, no third-party servers, automatic deletion
  • Platform Support: Windows, macOS, Linux
  • Website: onionshare.org
  • Operational Notes: Perfect for one-time secure file transfers
  • Setup Guide: Configure Tor connection, set auto-stop timer, share .onion links securely

SecureDrop

  • Purpose: Anonymous document submission system
  • Security Features: Tor-based, air-gapped servers, journalist verification
  • Platform Support: Web-based (Tor Browser required)
  • Website: securedrop.org
  • Operational Notes: Used by major news organizations for whistleblowing
  • Setup Guide: Access via Tor Browser, follow submission guidelines

Cloud Storage Security

Cryptomator

  • Purpose: Client-side encryption for cloud storage
  • Security Features: Transparent encryption, filename obfuscation, open source
  • Platform Support: Windows, macOS, Linux, iOS, Android
  • Website: cryptomator.org
  • Operational Notes: Works with any cloud provider, zero-knowledge encryption
  • Setup Guide: Create vault, configure cloud sync, use strong vault passwords

A.4 Digital Security Tools

Password Management

Bitwarden

  • Purpose: Open source password manager
  • Security Features: End-to-end encryption, self-hosting option, security audits
  • Platform Support: All major platforms, browser extensions
  • Website: bitwarden.com
  • Operational Notes: Free tier available, can be self-hosted
  • Setup Guide: Enable two-factor authentication, use strong master password, organize with folders

KeePassXC

  • Purpose: Offline password manager
  • Security Features: Local database, strong encryption, no cloud dependency
  • Platform Support: Windows, macOS, Linux
  • Website: keepassxc.org
  • Operational Notes: Completely offline, database can be synced manually
  • Setup Guide: Create strong database password, configure auto-type, backup database

Two-Factor Authentication

Aegis Authenticator (Android)

  • Purpose: Open source TOTP authenticator
  • Security Features: Encrypted vault, biometric unlock, backup/restore
  • Platform Support: Android
  • Website: getaegis.app
  • Operational Notes: No cloud dependency, encrypted local storage
  • Setup Guide: Set vault password, backup vault file, import existing accounts

Tofu (iOS)

  • Purpose: Simple TOTP authenticator for iOS
  • Security Features: Local storage, no cloud sync, open source
  • Platform Support: iOS
  • Website: Available on App Store
  • Operational Notes: Minimal, focused on security and privacy
  • Setup Guide: Add accounts via QR code, enable Face/Touch ID

System Security

ClamAV

  • Purpose: Open source antivirus engine
  • Security Features: Regular signature updates, command line interface, cross-platform
  • Platform Support: Linux, Windows, macOS
  • Website: clamav.net
  • Operational Notes: Lightweight, good for server environments
  • Setup Guide: Install via package manager, configure automatic updates

Lynis

  • Purpose: Security auditing tool for Unix-based systems
  • Security Features: Comprehensive system scanning, hardening suggestions
  • Platform Support: Linux, macOS, Unix variants
  • Website: cisofy.com/lynis
  • Operational Notes: Excellent for hardening systems and finding vulnerabilities
  • Setup Guide: Run security scan, review recommendations, implement hardening

A.5 Research and Investigation Tools

Open Source Intelligence (OSINT)

Maltego

  • Purpose: Link analysis and data visualization for investigations
  • Security Features: Local processing, extensive data sources, relationship mapping
  • Platform Support: Windows, macOS, Linux
  • Website: maltego.com
  • Operational Notes: Community edition available, powerful for network analysis
  • Setup Guide: Create account, install transforms, configure data sources

Shodan

  • Purpose: Search engine for Internet-connected devices
  • Security Features: API access, extensive device database, security research
  • Platform Support: Web-based, API, command line tools
  • Website: shodan.io
  • Operational Notes: Valuable for reconnaissance and security research
  • Setup Guide: Create account, obtain API key, use filters effectively

TheHarvester

  • Purpose: Information gathering tool for penetration testing
  • Security Features: Multiple data sources, email/subdomain enumeration
  • Platform Support: Linux, Python-based
  • Website: github.com/laramies/theHarvester
  • Operational Notes: Command line tool, good for initial reconnaissance
  • Setup Guide: Install via pip, configure API keys, use appropriate data sources

Social Media Analysis

Twint

  • Purpose: Twitter scraping tool without API limitations
  • Security Features: No authentication required, extensive filtering options
  • Platform Support: Python-based, cross-platform
  • Website: github.com/twintproject/twint
  • Operational Notes: Useful for social media intelligence gathering
  • Setup Guide: Install via pip, configure output formats, use search filters

A.6 Hardware Recommendations

Secure Computing Hardware

Laptops for Security Operations

  • Recommended Models: ThinkPad X1 Carbon, System76 laptops, Purism Librem series
  • Key Features: Hardware kill switches, open firmware support, good Linux compatibility
  • Security Considerations: Disable Intel ME/AMD PSP, use full disk encryption
  • Operational Notes: Dedicated hardware for sensitive operations recommended

Mobile Devices

  • Recommended: Google Pixel phones (for GrapheneOS), PinePhone (Linux mobile)
  • Key Features: Unlockable bootloaders, custom ROM support, hardware security features
  • Security Considerations: Install privacy-focused ROMs, disable unnecessary radios
  • Operational Notes: Use separate devices for different operational roles

Networking Hardware

Secure Routers

  • Recommended: Devices supporting OpenWrt, pfSense boxes, GL.iNet travel routers
  • Key Features: Open source firmware, VPN support, advanced firewall capabilities
  • Security Considerations: Change default passwords, disable WPS, use strong encryption
  • Operational Notes: Separate networks for different security levels

USB Security Keys

  • Recommended: YubiKey 5 series, SoloKeys, Nitrokey
  • Key Features: FIDO2/WebAuthn support, OpenPGP compatibility, hardware security
  • Security Considerations: Use for two-factor authentication and encryption keys
  • Operational Notes: Have backup keys stored securely

Electronic Frontier Foundation (EFF)

  • Purpose: Digital rights advocacy and legal support
  • Services: Legal guidance, privacy tools, digital security training
  • Website: eff.org
  • Resources: Surveillance Self-Defense guide, legal observer training

National Lawyers Guild

  • Purpose: Legal support for activists and protesters
  • Services: Legal observers, jail support, know-your-rights training
  • Website: nlg.org
  • Resources: Local chapters, legal hotlines, protest legal support

Digital Security Training

Security Education Companion

  • Purpose: Digital security curriculum for trainers
  • Content: Lesson plans, activities, threat modeling guides
  • Website: securityeducationcompanion.org
  • Resources: Trainer guides, participant handouts, assessment tools

Level Up

  • Purpose: Digital security training resources for civil society
  • Content: Training curricula, facilitation guides, security planning
  • Website: level-up.cc
  • Resources: Holistic security approach, trauma-informed training

A.8 Emergency Resources

Crisis Communication

Bridgefy

  • Purpose: Offline messaging via Bluetooth mesh networks
  • Security Features: End-to-end encryption, no internet required
  • Platform Support: iOS, Android
  • Use Case: Communication during internet shutdowns or emergencies

Amateur Radio

  • Purpose: Emergency communication when other systems fail
  • Requirements: FCC license (in US), appropriate equipment
  • Resources: ARRL.org for licensing, local clubs for training
  • Operational Notes: Legal requirement for licensing, but valuable backup communication

Emergency Contacts

Digital Security Helplines

  • Access Now Digital Security Helpline: accessnow.org/help
  • Rapid Response Network: For urgent digital security incidents
  • Local Legal Hotlines: Research and document local legal support numbers

Medical and Safety

  • Street Medic Training: riotmedicine.net
  • Protest Safety Resources: Know your local legal observers and jail support

A.9 Operational Security Checklists

Pre-Operation Security Checklist

  • Threat model assessment completed
  • Communication security protocols established
  • Equipment security verified and tested
  • Emergency procedures and contacts prepared
  • Legal support and bail fund information available
  • Operational security briefing conducted
  • Counter-surveillance measures planned
  • Information sanitization procedures ready

Post-Operation Security Checklist

  • Secure communication channels used for debriefing
  • Equipment sanitized and secured
  • Information properly compartmentalized and stored
  • Security incidents documented and analyzed
  • Lessons learned captured and shared appropriately
  • Follow-up security measures implemented
  • Next operation security planning initiated

Tool Selection Criteria

When selecting tools for resistance operations, prioritize: 1) Open source software with public security audits, 2) Strong encryption and privacy protections, 3) Decentralized architecture when possible, 4) Active development and security updates, 5) Compatibility with operational security requirements.

Tool Security Warning

No tool provides perfect security. Always use defense in depth with multiple layers of protection, keep software updated, and regularly reassess your security posture. Tools are only as secure as their implementation and operational security practices.