998 lines
36 KiB
HTML
998 lines
36 KiB
HTML
<!DOCTYPE html>
|
||
<html lang="en">
|
||
<head>
|
||
<meta charset="UTF-8">
|
||
<meta name="viewport" content="width=device-width, initial-scale=1.0">
|
||
<title>Appendix D: Glossary and References - Field Manual for Resistance Operations</title>
|
||
<meta name="description" content="Comprehensive glossary of terms and reference materials">
|
||
|
||
<!-- Favicon -->
|
||
<link rel="icon" type="image/x-icon" href="/assets/images/favicon.ico">
|
||
|
||
<!-- Stylesheets -->
|
||
<link rel="stylesheet" href="/assets/css/main.css">
|
||
|
||
<!-- Security headers -->
|
||
<meta http-equiv="X-Content-Type-Options" content="nosniff">
|
||
<meta http-equiv="X-Frame-Options" content="DENY">
|
||
<meta http-equiv="X-XSS-Protection" content="1; mode=block">
|
||
|
||
<!-- No tracking -->
|
||
<meta name="robots" content="noindex, nofollow">
|
||
</head>
|
||
<body>
|
||
<header class="header">
|
||
<div class="container">
|
||
<div class="header-content">
|
||
<div class="logo">
|
||
<span class="omega">Ω</span>
|
||
<span>FM-R1</span>
|
||
</div>
|
||
<button class="nav-toggle" id="nav-toggle" aria-label="Toggle navigation">
|
||
☰
|
||
</button>
|
||
</div>
|
||
</div>
|
||
</header>
|
||
|
||
<div class="main-layout">
|
||
<nav class="sidebar" id="sidebar">
|
||
<div class="nav-section">
|
||
<h3>Field Manual</h3>
|
||
<ul>
|
||
<li><a href="/" >Table of Contents</a></li>
|
||
<li><a href="/preface/" >Preface</a></li>
|
||
<li><a href="/introduction/" >Introduction</a></li>
|
||
</ul>
|
||
</div>
|
||
|
||
<div class="nav-section">
|
||
<h3>Part I: Foundations</h3>
|
||
<ul>
|
||
<li>
|
||
<a href="/parts/part-1/" >Part Overview</a>
|
||
<ul>
|
||
<li><a href="/chapters/chapter-1/" >Ch 1: Core Security Principles</a></li>
|
||
<li><a href="/chapters/chapter-2/" >Ch 2: Threat Assessment</a></li>
|
||
</ul>
|
||
</li>
|
||
</ul>
|
||
</div>
|
||
|
||
<div class="nav-section">
|
||
<h3>Part II: Communication</h3>
|
||
<ul>
|
||
<li>
|
||
<a href="/parts/part-2/" >Part Overview</a>
|
||
<ul>
|
||
<li><a href="/chapters/chapter-3/" >Ch 3: Communication Architecture</a></li>
|
||
<li><a href="/chapters/chapter-4/" >Ch 4: Secure Messaging</a></li>
|
||
<li><a href="/chapters/chapter-5/" >Ch 5: File Sharing</a></li>
|
||
</ul>
|
||
</li>
|
||
</ul>
|
||
</div>
|
||
|
||
<div class="nav-section">
|
||
<h3>Part III: OpSec</h3>
|
||
<ul>
|
||
<li>
|
||
<a href="/parts/part-3/" >Part Overview</a>
|
||
<ul>
|
||
<li><a href="/chapters/chapter-6/" >Ch 6: Hardware Security</a></li>
|
||
<li><a href="/chapters/chapter-7/" >Ch 7: Digital Hygiene</a></li>
|
||
<li><a href="/chapters/chapter-8/" >Ch 8: Operational Procedures</a></li>
|
||
</ul>
|
||
</li>
|
||
</ul>
|
||
</div>
|
||
|
||
<div class="nav-section">
|
||
<h3>Part IV: Advanced</h3>
|
||
<ul>
|
||
<li>
|
||
<a href="/parts/part-4/" >Part Overview</a>
|
||
<ul>
|
||
<li><a href="/chapters/chapter-9/" >Ch 9: Network Resilience</a></li>
|
||
<li><a href="/chapters/chapter-10/" >Ch 10: Counter-Intelligence</a></li>
|
||
</ul>
|
||
</li>
|
||
</ul>
|
||
</div>
|
||
|
||
<div class="nav-section">
|
||
<h3>Appendices</h3>
|
||
<ul>
|
||
<li><a href="/appendices/" class="active">Quick Reference</a></li>
|
||
<li><a href="/appendices/tools/" >Tool Guides</a></li>
|
||
<li><a href="/appendices/resources/" >External Resources</a></li>
|
||
<li><a href="/appendices/glossary/" >Glossary</a></li>
|
||
</ul>
|
||
</div>
|
||
|
||
<div class="nav-section">
|
||
<h3>External Links</h3>
|
||
<ul>
|
||
<li><a href="https://resist.is" target="_blank">resist.is</a></li>
|
||
<li><a href="https://activistchecklist.org" target="_blank">Activist Checklist</a></li>
|
||
<li><a href="https://signal.org" target="_blank">Signal</a></li>
|
||
<li><a href="https://briarproject.org" target="_blank">Briar</a></li>
|
||
<li><a href="https://element.io" target="_blank">Element</a></li>
|
||
<li><a href="https://tails.boum.org" target="_blank">Tails OS</a></li>
|
||
<li><a href="https://onionshare.org" target="_blank">OnionShare</a></li>
|
||
</ul>
|
||
</div>
|
||
|
||
|
||
</nav>
|
||
|
||
<main class="content">
|
||
<div class="content-header">
|
||
<div class="manual-designation">FM-R1: FM-R1: Secure Communication Networks for Decentralized Resistance</div>
|
||
<div class="classification">UNCLASSIFIED</div>
|
||
|
||
</div>
|
||
|
||
<h1 id="appendix-d-glossary-and-references">Appendix D: Glossary and References</h1>
|
||
|
||
<h2 id="overview">Overview</h2>
|
||
|
||
<p>This appendix provides a comprehensive glossary of terms used throughout the field guide, along with references to additional resources, organizations, and materials for further study and operational support.</p>
|
||
|
||
<hr />
|
||
|
||
<h2 id="d1-glossary-of-terms">D.1 Glossary of Terms</h2>
|
||
|
||
<h3 id="a">A</h3>
|
||
|
||
<dl>
|
||
<dt><strong>Access Control</strong></dt>
|
||
<dd>Security measures that restrict access to resources, systems, or information based on user identity and authorization levels.</dd>
|
||
<dt><strong>Adversary</strong></dt>
|
||
<dd>Any individual, group, or organization that poses a threat to resistance operations or personnel.</dd>
|
||
<dt><strong>Air Gap</strong></dt>
|
||
<dd>Physical separation between computer systems or networks to prevent unauthorized data transfer.</dd>
|
||
<dt><strong>Anonymity</strong></dt>
|
||
<dd>The state of being unidentifiable within a set of subjects, providing protection against identification.</dd>
|
||
<dt><strong>Authentication</strong></dt>
|
||
<dd>The process of verifying the identity of a user, device, or system before granting access to resources.</dd>
|
||
</dl>
|
||
|
||
<h3 id="b">B</h3>
|
||
|
||
<dl>
|
||
<dt><strong>Backdoor</strong></dt>
|
||
<dd>A hidden method of bypassing normal authentication or security controls in a computer system.</dd>
|
||
<dt><strong>Burner Device</strong></dt>
|
||
<dd>A temporary communication device used for specific operations and then discarded to maintain security.</dd>
|
||
<dt><strong>Burner Identity</strong></dt>
|
||
<dd>A temporary or false identity used for specific operations to protect real identity.</dd>
|
||
</dl>
|
||
|
||
<h3 id="c">C</h3>
|
||
|
||
<dl>
|
||
<dt><strong>Cell Structure</strong></dt>
|
||
<dd>Organizational method using small, independent groups to limit exposure and damage from compromise.</dd>
|
||
<dt><strong>Cipher</strong></dt>
|
||
<dd>An algorithm for performing encryption or decryption of data.</dd>
|
||
<dt><strong>Clearnet</strong></dt>
|
||
<dd>The publicly accessible internet, as opposed to darknets or private networks.</dd>
|
||
<dt><strong>Compartmentalization</strong></dt>
|
||
<dd>Security practice of limiting access to information based on need-to-know principles.</dd>
|
||
<dt><strong>Compromise</strong></dt>
|
||
<dd>The unauthorized disclosure of sensitive information or the loss of security integrity.</dd>
|
||
<dt><strong>Counter-Intelligence</strong></dt>
|
||
<dd>Activities designed to prevent or thwart espionage, intelligence gathering, or sabotage by adversaries.</dd>
|
||
<dt><strong>Counter-Surveillance</strong></dt>
|
||
<dd>Techniques and activities designed to detect, evade, or neutralize surveillance operations.</dd>
|
||
<dt><strong>Cover Story</strong></dt>
|
||
<dd>A false but plausible explanation for activities, presence, or identity used to maintain operational security.</dd>
|
||
<dt><strong>Cryptography</strong></dt>
|
||
<dd>The practice and study of techniques for secure communication in the presence of adversaries.</dd>
|
||
</dl>
|
||
|
||
<h3 id="d">D</h3>
|
||
|
||
<dl>
|
||
<dt><strong>Dark Web</strong></dt>
|
||
<dd>Encrypted online content that requires specific software, configurations, or authorization to access.</dd>
|
||
<dt><strong>Dead Drop</strong></dt>
|
||
<dd>A method of espionage tradecraft used to pass items or information between two individuals without requiring them to meet directly.</dd>
|
||
<dt><strong>Deniability</strong></dt>
|
||
<dd>The ability to deny involvement in or knowledge of particular activities or information.</dd>
|
||
<dt><strong>Digital Footprint</strong></dt>
|
||
<dd>The trail of data created by online activities and digital interactions.</dd>
|
||
<dt><strong>Disinformation</strong></dt>
|
||
<dd>False information deliberately spread to deceive or mislead.</dd>
|
||
</dl>
|
||
|
||
<h3 id="e">E</h3>
|
||
|
||
<dl>
|
||
<dt><strong>Encryption</strong></dt>
|
||
<dd>The process of converting information into a code to prevent unauthorized access.</dd>
|
||
<dt><strong>End-to-End Encryption (E2E)</strong></dt>
|
||
<dd>A system of communication where only the communicating users can read the messages.</dd>
|
||
<dt><strong>Exfiltration</strong></dt>
|
||
<dd>The unauthorized transfer of data from a computer or network.</dd>
|
||
</dl>
|
||
|
||
<h3 id="f">F</h3>
|
||
|
||
<dl>
|
||
<dt><strong>False Flag</strong></dt>
|
||
<dd>An operation designed to deceive by making it appear as though it was carried out by another party.</dd>
|
||
<dt><strong>Firewall</strong></dt>
|
||
<dd>A network security system that monitors and controls incoming and outgoing network traffic.</dd>
|
||
<dt><strong>Forward Secrecy</strong></dt>
|
||
<dd>A feature of specific key agreement protocols that ensures session keys will not be compromised even if private keys are compromised.</dd>
|
||
</dl>
|
||
|
||
<h3 id="g">G</h3>
|
||
|
||
<dl>
|
||
<dt><strong>Gray Literature</strong></dt>
|
||
<dd>Information produced outside traditional commercial or academic publishing channels.</dd>
|
||
</dl>
|
||
|
||
<h3 id="h">H</h3>
|
||
|
||
<dl>
|
||
<dt><strong>Honeypot</strong></dt>
|
||
<dd>A computer security mechanism set to detect, deflect, or counteract unauthorized use of information systems.</dd>
|
||
<dt><strong>HUMINT</strong></dt>
|
||
<dd>Human Intelligence - intelligence gathered by means of interpersonal contact.</dd>
|
||
</dl>
|
||
|
||
<h3 id="i">I</h3>
|
||
|
||
<dl>
|
||
<dt><strong>Identity Management</strong></dt>
|
||
<dd>The security and business discipline that enables the right individuals to access the right resources at the right times.</dd>
|
||
<dt><strong>Infiltration</strong></dt>
|
||
<dd>The practice of entering an organization or group covertly to gather intelligence or influence operations.</dd>
|
||
<dt><strong>Information Security (InfoSec)</strong></dt>
|
||
<dd>The practice of protecting information by mitigating information risks.</dd>
|
||
</dl>
|
||
|
||
<h3 id="j">J</h3>
|
||
|
||
<dl>
|
||
<dt><strong>Jail Support</strong></dt>
|
||
<dd>Organized assistance provided to individuals who have been arrested, including legal, financial, and emotional support.</dd>
|
||
</dl>
|
||
|
||
<h3 id="k">K</h3>
|
||
|
||
<dl>
|
||
<dt><strong>Key Management</strong></dt>
|
||
<dd>The management of cryptographic keys in a cryptosystem, including generation, exchange, storage, use, and replacement.</dd>
|
||
</dl>
|
||
|
||
<h3 id="l">L</h3>
|
||
|
||
<dl>
|
||
<dt><strong>Legal Observer</strong></dt>
|
||
<dd>Trained volunteers who attend public demonstrations to monitor and document police behavior and potential civil rights violations.</dd>
|
||
<dt><strong>Livestreaming</strong></dt>
|
||
<dd>Real-time broadcasting of video content over the internet.</dd>
|
||
</dl>
|
||
|
||
<h3 id="m">M</h3>
|
||
|
||
<dl>
|
||
<dt><strong>Malware</strong></dt>
|
||
<dd>Software designed to disrupt, damage, or gain unauthorized access to computer systems.</dd>
|
||
<dt><strong>Metadata</strong></dt>
|
||
<dd>Data that provides information about other data, such as when a file was created or modified.</dd>
|
||
<dt><strong>Multi-Factor Authentication (MFA)</strong></dt>
|
||
<dd>A security system that requires more than one method of authentication to verify user identity.</dd>
|
||
</dl>
|
||
|
||
<h3 id="n">N</h3>
|
||
|
||
<dl>
|
||
<dt><strong>Network Security</strong></dt>
|
||
<dd>Policies and practices adopted to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network.</dd>
|
||
<dt><strong>Need-to-Know</strong></dt>
|
||
<dd>Security principle that restricts access to information to only those individuals who require it to perform their duties.</dd>
|
||
</dl>
|
||
|
||
<h3 id="o">O</h3>
|
||
|
||
<dl>
|
||
<dt><strong>Operational Security (OPSEC)</strong></dt>
|
||
<dd>A process that identifies critical information and analyzes friendly actions to determine if they can be observed by adversaries.</dd>
|
||
<dt><strong>OSINT</strong></dt>
|
||
<dd>Open Source Intelligence - intelligence collected from publicly available sources.</dd>
|
||
</dl>
|
||
|
||
<h3 id="p">P</h3>
|
||
|
||
<dl>
|
||
<dt><strong>Penetration Testing</strong></dt>
|
||
<dd>Authorized simulated cyberattack on a computer system to evaluate security.</dd>
|
||
<dt><strong>Phishing</strong></dt>
|
||
<dd>Fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity in electronic communication.</dd>
|
||
<dt><strong>Privacy</strong></dt>
|
||
<dd>The right to be free from intrusion or interference in one’s personal life and affairs.</dd>
|
||
<dt><strong>Pseudonym</strong></dt>
|
||
<dd>A fictitious name used to conceal identity.</dd>
|
||
</dl>
|
||
|
||
<h3 id="q">Q</h3>
|
||
|
||
<dl>
|
||
<dt><strong>Quarantine</strong></dt>
|
||
<dd>Isolation of potentially compromised systems or information to prevent spread of security threats.</dd>
|
||
</dl>
|
||
|
||
<h3 id="r">R</h3>
|
||
|
||
<dl>
|
||
<dt><strong>Risk Assessment</strong></dt>
|
||
<dd>The identification and analysis of relevant risks to achieving objectives.</dd>
|
||
<dt><strong>Root Access</strong></dt>
|
||
<dd>Administrative access to a computer system that allows complete control over the system.</dd>
|
||
</dl>
|
||
|
||
<h3 id="s">S</h3>
|
||
|
||
<dl>
|
||
<dt><strong>Safe House</strong></dt>
|
||
<dd>A secure location used for meetings, storage, or temporary shelter during operations.</dd>
|
||
<dt><strong>Security Culture</strong></dt>
|
||
<dd>Shared practices, attitudes, and norms that prioritize security in all activities and communications.</dd>
|
||
<dt><strong>SIGINT</strong></dt>
|
||
<dd>Signals Intelligence - intelligence derived from electronic signals and systems.</dd>
|
||
<dt><strong>Social Engineering</strong></dt>
|
||
<dd>Psychological manipulation of people to perform actions or divulge confidential information.</dd>
|
||
<dt><strong>Steganography</strong></dt>
|
||
<dd>The practice of concealing information within other non-secret text or data.</dd>
|
||
<dt><strong>Surveillance</strong></dt>
|
||
<dd>Close observation of a person or group, especially one under suspicion.</dd>
|
||
</dl>
|
||
|
||
<h3 id="t">T</h3>
|
||
|
||
<dl>
|
||
<dt><strong>Threat Model</strong></dt>
|
||
<dd>A structured representation of all the information that affects the security of an application or system.</dd>
|
||
<dt><strong>Tor</strong></dt>
|
||
<dd>Free and open-source software for enabling anonymous communication by directing internet traffic through a worldwide volunteer overlay network.</dd>
|
||
<dt><strong>Two-Factor Authentication (2FA)</strong></dt>
|
||
<dd>Security process in which users provide two different authentication factors to verify themselves.</dd>
|
||
</dl>
|
||
|
||
<h3 id="u">U</h3>
|
||
|
||
<dl>
|
||
<dt><strong>User Access Control</strong></dt>
|
||
<dd>Security technique that regulates who or what can view or use resources in a computing environment.</dd>
|
||
</dl>
|
||
|
||
<h3 id="v">V</h3>
|
||
|
||
<dl>
|
||
<dt><strong>Virtual Private Network (VPN)</strong></dt>
|
||
<dd>Encrypted connection over the internet from a device to a network to ensure private data transmission.</dd>
|
||
<dt><strong>Vulnerability</strong></dt>
|
||
<dd>A weakness in a system that can be exploited by threats to gain unauthorized access or perform unauthorized actions.</dd>
|
||
</dl>
|
||
|
||
<h3 id="w">W</h3>
|
||
|
||
<dl>
|
||
<dt><strong>Whistleblowing</strong></dt>
|
||
<dd>The activity of a person who exposes information or activity that is deemed illegal, unethical, or not correct within an organization.</dd>
|
||
</dl>
|
||
|
||
<h3 id="z">Z</h3>
|
||
|
||
<dl>
|
||
<dt><strong>Zero-Day</strong></dt>
|
||
<dd>A computer software vulnerability that is unknown to those who should be interested in mitigating the vulnerability.</dd>
|
||
<dt><strong>Zero-Knowledge</strong></dt>
|
||
<dd>A method by which one party can prove to another party that they know a value without conveying any information apart from the fact that they know the value.</dd>
|
||
</dl>
|
||
|
||
<hr />
|
||
|
||
<h2 id="d2-essential-references-and-resources">D.2 Essential References and Resources</h2>
|
||
|
||
<h3 id="security-and-privacy-guides">Security and Privacy Guides</h3>
|
||
|
||
<h4 id="digital-security-resources">Digital Security Resources</h4>
|
||
<ul>
|
||
<li><strong>Surveillance Self-Defense (EFF)</strong>: <a href="https://ssd.eff.org">ssd.eff.org</a>
|
||
<ul>
|
||
<li>Comprehensive digital security guide for activists and journalists</li>
|
||
<li>Threat modeling, secure communications, device security</li>
|
||
</ul>
|
||
</li>
|
||
<li><strong>Security Education Companion</strong>: <a href="https://securityeducationcompanion.org">securityeducationcompanion.org</a>
|
||
<ul>
|
||
<li>Digital security training curricula and resources</li>
|
||
<li>Trainer guides and participant materials</li>
|
||
</ul>
|
||
</li>
|
||
<li><strong>Level Up</strong>: <a href="https://level-up.cc">level-up.cc</a>
|
||
<ul>
|
||
<li>Holistic security training resources for civil society</li>
|
||
<li>Trauma-informed security training approaches</li>
|
||
</ul>
|
||
</li>
|
||
<li><strong>Tactical Technology Collective</strong>: <a href="https://tacticaltech.org">tacticaltech.org</a>
|
||
<ul>
|
||
<li>Digital security and privacy tools for activists</li>
|
||
<li>Research on surveillance and digital rights</li>
|
||
</ul>
|
||
</li>
|
||
</ul>
|
||
|
||
<h4 id="privacy-and-anonymity-guides">Privacy and Anonymity Guides</h4>
|
||
<ul>
|
||
<li><strong>Tor Project Documentation</strong>: <a href="https://tb-manual.torproject.org">tb-manual.torproject.org</a>
|
||
<ul>
|
||
<li>Official Tor Browser user manual and security guidance</li>
|
||
<li>Anonymity and privacy protection techniques</li>
|
||
</ul>
|
||
</li>
|
||
<li><strong>Tails Documentation</strong>: <a href="https://tails.boum.org/doc">tails.boum.org/doc</a>
|
||
<ul>
|
||
<li>Comprehensive guide to using Tails operating system</li>
|
||
<li>Amnesic and anonymous computing practices</li>
|
||
</ul>
|
||
</li>
|
||
<li><strong>Privacy International</strong>: <a href="https://privacyinternational.org">privacyinternational.org</a>
|
||
<ul>
|
||
<li>Global privacy rights advocacy and research</li>
|
||
<li>Surveillance technology analysis and countermeasures</li>
|
||
</ul>
|
||
</li>
|
||
</ul>
|
||
|
||
<h3 id="legal-resources">Legal Resources</h3>
|
||
|
||
<h4 id="know-your-rights">Know Your Rights</h4>
|
||
<ul>
|
||
<li><strong>ACLU Know Your Rights</strong>: <a href="https://aclu.org/know-your-rights">aclu.org/know-your-rights</a>
|
||
<ul>
|
||
<li>Constitutional rights during police encounters</li>
|
||
<li>Protest rights and legal protections</li>
|
||
</ul>
|
||
</li>
|
||
<li><strong>National Lawyers Guild Legal Observer Manual</strong>: <a href="https://nlg.org">nlg.org</a>
|
||
<ul>
|
||
<li>Legal observer training and procedures</li>
|
||
<li>Protest law and civil rights documentation</li>
|
||
</ul>
|
||
</li>
|
||
<li><strong>Electronic Frontier Foundation</strong>: <a href="https://eff.org">eff.org</a>
|
||
<ul>
|
||
<li>Digital rights and privacy law resources</li>
|
||
<li>Legal guides for technology users and activists</li>
|
||
</ul>
|
||
</li>
|
||
</ul>
|
||
|
||
<h4 id="legal-support-organizations">Legal Support Organizations</h4>
|
||
<ul>
|
||
<li><strong>Center for Constitutional Rights</strong>: <a href="https://ccrjustice.org">ccrjustice.org</a>
|
||
<ul>
|
||
<li>Civil rights litigation and advocacy</li>
|
||
<li>Legal support for social justice movements</li>
|
||
</ul>
|
||
</li>
|
||
<li><strong>National Police Accountability Project</strong>: <a href="https://nlg-npap.org">nlg-npap.org</a>
|
||
<ul>
|
||
<li>Police misconduct litigation and advocacy</li>
|
||
<li>Legal resources for police accountability</li>
|
||
</ul>
|
||
</li>
|
||
</ul>
|
||
|
||
<h3 id="technical-resources">Technical Resources</h3>
|
||
|
||
<h4 id="cryptography-and-security">Cryptography and Security</h4>
|
||
<ul>
|
||
<li><strong>Applied Cryptography by Bruce Schneier</strong>
|
||
<ul>
|
||
<li>Comprehensive guide to cryptographic protocols and algorithms</li>
|
||
<li>Practical cryptography implementation guidance</li>
|
||
</ul>
|
||
</li>
|
||
<li><strong>The Codebreakers by David Kahn</strong>
|
||
<ul>
|
||
<li>Historical perspective on cryptography and codebreaking</li>
|
||
<li>Understanding cryptographic principles and applications</li>
|
||
</ul>
|
||
</li>
|
||
<li><strong>Computer Security: Art and Science by Matt Bishop</strong>
|
||
<ul>
|
||
<li>Academic treatment of computer security principles</li>
|
||
<li>Comprehensive security theory and practice</li>
|
||
</ul>
|
||
</li>
|
||
</ul>
|
||
|
||
<h4 id="network-security">Network Security</h4>
|
||
<ul>
|
||
<li><strong>Wireshark Documentation</strong>: <a href="https://wireshark.org/docs">wireshark.org/docs</a>
|
||
<ul>
|
||
<li>Network protocol analysis and security monitoring</li>
|
||
<li>Traffic analysis and network security assessment</li>
|
||
</ul>
|
||
</li>
|
||
<li><strong>Nmap Documentation</strong>: <a href="https://nmap.org/docs.html">nmap.org/docs.html</a>
|
||
<ul>
|
||
<li>Network discovery and security auditing</li>
|
||
<li>Network mapping and vulnerability assessment</li>
|
||
</ul>
|
||
</li>
|
||
</ul>
|
||
|
||
<h3 id="operational-security-resources">Operational Security Resources</h3>
|
||
|
||
<h4 id="intelligence-and-surveillance">Intelligence and Surveillance</h4>
|
||
<ul>
|
||
<li><strong>The Art of Intelligence by Henry A. Crumpton</strong>
|
||
<ul>
|
||
<li>Intelligence operations and analysis principles</li>
|
||
<li>Understanding intelligence collection and analysis</li>
|
||
</ul>
|
||
</li>
|
||
<li><strong>Surveillance Countermeasures by Peter Jenkins</strong>
|
||
<ul>
|
||
<li>Practical surveillance detection and evasion techniques</li>
|
||
<li>Counter-surveillance operations and procedures</li>
|
||
</ul>
|
||
</li>
|
||
</ul>
|
||
|
||
<h4 id="resistance-and-activism">Resistance and Activism</h4>
|
||
<ul>
|
||
<li><strong>Rules for Radicals by Saul Alinsky</strong>
|
||
<ul>
|
||
<li>Community organizing and activism strategies</li>
|
||
<li>Tactical approaches to social change</li>
|
||
</ul>
|
||
</li>
|
||
<li><strong>The Activist’s Handbook by Randy Shaw</strong>
|
||
<ul>
|
||
<li>Practical guide to effective activism and organizing</li>
|
||
<li>Campaign strategy and tactical planning</li>
|
||
</ul>
|
||
</li>
|
||
</ul>
|
||
|
||
<h3 id="historical-references">Historical References</h3>
|
||
|
||
<h4 id="resistance-movements">Resistance Movements</h4>
|
||
<ul>
|
||
<li><strong>The Resistance by Matthew Cobb</strong>
|
||
<ul>
|
||
<li>French Resistance during World War II</li>
|
||
<li>Organizational structures and operational security</li>
|
||
</ul>
|
||
</li>
|
||
<li><strong>A Force More Powerful by Peter Ackerman and Jack DuVall</strong>
|
||
<ul>
|
||
<li>Nonviolent resistance movements throughout history</li>
|
||
<li>Strategic nonviolent action and civil resistance</li>
|
||
</ul>
|
||
</li>
|
||
</ul>
|
||
|
||
<h4 id="intelligence-history">Intelligence History</h4>
|
||
<ul>
|
||
<li><strong>Legacy of Ashes by Tim Weiner</strong>
|
||
<ul>
|
||
<li>History of the CIA and intelligence operations</li>
|
||
<li>Understanding intelligence capabilities and limitations</li>
|
||
</ul>
|
||
</li>
|
||
<li><strong>The Puzzle Palace by James Bamford</strong>
|
||
<ul>
|
||
<li>History and operations of the National Security Agency</li>
|
||
<li>Electronic surveillance and signals intelligence</li>
|
||
</ul>
|
||
</li>
|
||
</ul>
|
||
|
||
<h3 id="technical-manuals-and-standards">Technical Manuals and Standards</h3>
|
||
|
||
<h4 id="security-standards">Security Standards</h4>
|
||
<ul>
|
||
<li><strong>NIST Cybersecurity Framework</strong>: <a href="https://nist.gov/cyberframework">nist.gov/cyberframework</a>
|
||
<ul>
|
||
<li>Cybersecurity risk management framework</li>
|
||
<li>Security controls and implementation guidance</li>
|
||
</ul>
|
||
</li>
|
||
<li><strong>ISO 27001/27002 Information Security Standards</strong>
|
||
<ul>
|
||
<li>International information security management standards</li>
|
||
<li>Security controls and risk management frameworks</li>
|
||
</ul>
|
||
</li>
|
||
</ul>
|
||
|
||
<h4 id="cryptographic-standards">Cryptographic Standards</h4>
|
||
<ul>
|
||
<li><strong>FIPS 140-2 Security Requirements for Cryptographic Modules</strong>
|
||
<ul>
|
||
<li>Federal standard for cryptographic module security</li>
|
||
<li>Hardware and software security requirements</li>
|
||
</ul>
|
||
</li>
|
||
<li><strong>RFC Cryptographic Standards</strong>: <a href="https://tools.ietf.org/rfc">tools.ietf.org/rfc</a>
|
||
<ul>
|
||
<li>Internet Engineering Task Force cryptographic protocols</li>
|
||
<li>Standard cryptographic algorithms and implementations</li>
|
||
</ul>
|
||
</li>
|
||
</ul>
|
||
|
||
<hr />
|
||
|
||
<h2 id="d3-organizations-and-networks">D.3 Organizations and Networks</h2>
|
||
|
||
<h3 id="digital-rights-organizations">Digital Rights Organizations</h3>
|
||
|
||
<h4 id="international-organizations">International Organizations</h4>
|
||
<ul>
|
||
<li><strong>Electronic Frontier Foundation (EFF)</strong>: <a href="https://eff.org">eff.org</a>
|
||
<ul>
|
||
<li>Digital rights advocacy and legal support</li>
|
||
<li>Privacy tools and digital security resources</li>
|
||
</ul>
|
||
</li>
|
||
<li><strong>Privacy International</strong>: <a href="https://privacyinternational.org">privacyinternational.org</a>
|
||
<ul>
|
||
<li>Global privacy rights advocacy and research</li>
|
||
<li>Surveillance technology analysis and policy advocacy</li>
|
||
</ul>
|
||
</li>
|
||
<li><strong>Access Now</strong>: <a href="https://accessnow.org">accessnow.org</a>
|
||
<ul>
|
||
<li>Digital rights advocacy and emergency support</li>
|
||
<li>Digital security helpline and rapid response</li>
|
||
</ul>
|
||
</li>
|
||
<li><strong>Article 19</strong>: <a href="https://article19.org">article19.org</a>
|
||
<ul>
|
||
<li>Freedom of expression and information advocacy</li>
|
||
<li>Digital rights and online freedom of expression</li>
|
||
</ul>
|
||
</li>
|
||
</ul>
|
||
|
||
<h4 id="regional-organizations">Regional Organizations</h4>
|
||
<ul>
|
||
<li><strong>European Digital Rights (EDRi)</strong>: <a href="https://edri.org">edri.org</a>
|
||
<ul>
|
||
<li>European digital rights advocacy network</li>
|
||
<li>Privacy and digital rights policy advocacy</li>
|
||
</ul>
|
||
</li>
|
||
<li><strong>Derechos Digitales</strong>: <a href="https://derechosdigitales.org">derechosdigitales.org</a>
|
||
<ul>
|
||
<li>Latin American digital rights advocacy</li>
|
||
<li>Privacy and surveillance policy research</li>
|
||
</ul>
|
||
</li>
|
||
</ul>
|
||
|
||
<h3 id="legal-support-organizations-1">Legal Support Organizations</h3>
|
||
|
||
<h4 id="civil-rights-organizations">Civil Rights Organizations</h4>
|
||
<ul>
|
||
<li><strong>American Civil Liberties Union (ACLU)</strong>: <a href="https://aclu.org">aclu.org</a>
|
||
<ul>
|
||
<li>Constitutional rights advocacy and litigation</li>
|
||
<li>Know your rights resources and legal support</li>
|
||
</ul>
|
||
</li>
|
||
<li><strong>Center for Constitutional Rights</strong>: <a href="https://ccrjustice.org">ccrjustice.org</a>
|
||
<ul>
|
||
<li>Civil rights litigation and advocacy</li>
|
||
<li>Legal support for social justice movements</li>
|
||
</ul>
|
||
</li>
|
||
<li><strong>National Lawyers Guild</strong>: <a href="https://nlg.org">nlg.org</a>
|
||
<ul>
|
||
<li>Legal support for activists and protesters</li>
|
||
<li>Legal observer training and jail support</li>
|
||
</ul>
|
||
</li>
|
||
</ul>
|
||
|
||
<h4 id="international-legal-support">International Legal Support</h4>
|
||
<ul>
|
||
<li><strong>Amnesty International</strong>: <a href="https://amnesty.org">amnesty.org</a>
|
||
<ul>
|
||
<li>Human rights advocacy and legal support</li>
|
||
<li>International human rights monitoring and advocacy</li>
|
||
</ul>
|
||
</li>
|
||
<li><strong>Human Rights Watch</strong>: <a href="https://hrw.org">hrw.org</a>
|
||
<ul>
|
||
<li>Human rights research and advocacy</li>
|
||
<li>International human rights monitoring and reporting</li>
|
||
</ul>
|
||
</li>
|
||
</ul>
|
||
|
||
<h3 id="security-and-privacy-organizations">Security and Privacy Organizations</h3>
|
||
|
||
<h4 id="security-research-organizations">Security Research Organizations</h4>
|
||
<ul>
|
||
<li><strong>Citizen Lab</strong>: <a href="https://citizenlab.ca">citizenlab.ca</a>
|
||
<ul>
|
||
<li>Digital surveillance and security research</li>
|
||
<li>Targeted surveillance and digital espionage research</li>
|
||
</ul>
|
||
</li>
|
||
<li><strong>Tactical Technology Collective</strong>: <a href="https://tacticaltech.org">tacticaltech.org</a>
|
||
<ul>
|
||
<li>Digital security tools and training for activists</li>
|
||
<li>Surveillance and privacy research and advocacy</li>
|
||
</ul>
|
||
</li>
|
||
</ul>
|
||
|
||
<h4 id="privacy-advocacy-organizations">Privacy Advocacy Organizations</h4>
|
||
<ul>
|
||
<li><strong>Electronic Privacy Information Center (EPIC)</strong>: <a href="https://epic.org">epic.org</a>
|
||
<ul>
|
||
<li>Privacy rights advocacy and policy research</li>
|
||
<li>Government surveillance and privacy policy advocacy</li>
|
||
</ul>
|
||
</li>
|
||
<li><strong>Fight for the Future</strong>: <a href="https://fightforthefuture.org">fightforthefuture.org</a>
|
||
<ul>
|
||
<li>Digital rights activism and campaign organization</li>
|
||
<li>Internet freedom and privacy advocacy campaigns</li>
|
||
</ul>
|
||
</li>
|
||
</ul>
|
||
|
||
<h3 id="technical-security-organizations">Technical Security Organizations</h3>
|
||
|
||
<h4 id="open-source-security-projects">Open Source Security Projects</h4>
|
||
<ul>
|
||
<li><strong>Tor Project</strong>: <a href="https://torproject.org">torproject.org</a>
|
||
<ul>
|
||
<li>Anonymous communication software and research</li>
|
||
<li>Privacy and anonymity technology development</li>
|
||
</ul>
|
||
</li>
|
||
<li><strong>Guardian Project</strong>: <a href="https://guardianproject.info">guardianproject.info</a>
|
||
<ul>
|
||
<li>Open source security and privacy tools for mobile devices</li>
|
||
<li>Secure communication and privacy applications</li>
|
||
</ul>
|
||
</li>
|
||
<li><strong>Open Technology Fund</strong>: <a href="https://opentech.fund">opentech.fund</a>
|
||
<ul>
|
||
<li>Internet freedom technology development and support</li>
|
||
<li>Digital security and privacy tool funding and development</li>
|
||
</ul>
|
||
</li>
|
||
</ul>
|
||
|
||
<h4 id="security-training-organizations">Security Training Organizations</h4>
|
||
<ul>
|
||
<li><strong>Security Education Companion</strong>: <a href="https://securityeducationcompanion.org">securityeducationcompanion.org</a>
|
||
<ul>
|
||
<li>Digital security training curricula and resources</li>
|
||
<li>Security trainer development and support</li>
|
||
</ul>
|
||
</li>
|
||
<li><strong>Level Up</strong>: <a href="https://level-up.cc">level-up.cc</a>
|
||
<ul>
|
||
<li>Holistic security training for civil society</li>
|
||
<li>Trauma-informed security training and resources</li>
|
||
</ul>
|
||
</li>
|
||
</ul>
|
||
|
||
<hr />
|
||
|
||
<h2 id="d4-additional-reading-and-study-materials">D.4 Additional Reading and Study Materials</h2>
|
||
|
||
<h3 id="essential-books">Essential Books</h3>
|
||
|
||
<h4 id="security-and-privacy">Security and Privacy</h4>
|
||
<ol>
|
||
<li><strong>“Data and Goliath” by Bruce Schneier</strong>
|
||
<ul>
|
||
<li>Surveillance capitalism and privacy protection</li>
|
||
<li>Policy and technical approaches to privacy</li>
|
||
</ul>
|
||
</li>
|
||
<li><strong>“The Age of Surveillance Capitalism” by Shoshana Zuboff</strong>
|
||
<ul>
|
||
<li>Economic analysis of surveillance and data extraction</li>
|
||
<li>Understanding surveillance business models</li>
|
||
</ul>
|
||
</li>
|
||
<li><strong>“No Place to Hide” by Glenn Greenwald</strong>
|
||
<ul>
|
||
<li>NSA surveillance revelations and implications</li>
|
||
<li>Government surveillance capabilities and overreach</li>
|
||
</ul>
|
||
</li>
|
||
</ol>
|
||
|
||
<h4 id="resistance-and-activism-1">Resistance and Activism</h4>
|
||
<ol>
|
||
<li><strong>“From Dictatorship to Democracy” by Gene Sharp</strong>
|
||
<ul>
|
||
<li>Strategic nonviolent resistance theory and practice</li>
|
||
<li>Political defiance and resistance strategy</li>
|
||
</ul>
|
||
</li>
|
||
<li><strong>“The Politics of Nonviolent Action” by Gene Sharp</strong>
|
||
<ul>
|
||
<li>Comprehensive theory of nonviolent resistance</li>
|
||
<li>Methods and dynamics of nonviolent struggle</li>
|
||
</ul>
|
||
</li>
|
||
<li><strong>“Direct Action” by L.A. Kauffman</strong>
|
||
<ul>
|
||
<li>History of direct action and civil disobedience</li>
|
||
<li>Tactical innovation in social movements</li>
|
||
</ul>
|
||
</li>
|
||
</ol>
|
||
|
||
<h4 id="intelligence-and-security">Intelligence and Security</h4>
|
||
<ol>
|
||
<li><strong>“The Art of War” by Sun Tzu</strong>
|
||
<ul>
|
||
<li>Classical strategic thinking and tactical principles</li>
|
||
<li>Intelligence and strategic planning concepts</li>
|
||
</ul>
|
||
</li>
|
||
<li><strong>“On War” by Carl von Clausewitz</strong>
|
||
<ul>
|
||
<li>Military strategy and tactical theory</li>
|
||
<li>Understanding conflict and strategic thinking</li>
|
||
</ul>
|
||
</li>
|
||
<li><strong>“The Craft of Intelligence” by Allen Dulles</strong>
|
||
<ul>
|
||
<li>Intelligence operations and analysis principles</li>
|
||
<li>Understanding intelligence collection and analysis</li>
|
||
</ul>
|
||
</li>
|
||
</ol>
|
||
|
||
<h3 id="academic-journals-and-publications">Academic Journals and Publications</h3>
|
||
|
||
<h4 id="security-and-privacy-research">Security and Privacy Research</h4>
|
||
<ul>
|
||
<li><strong>IEEE Security & Privacy Magazine</strong>
|
||
<ul>
|
||
<li>Academic research on security and privacy topics</li>
|
||
<li>Technical and policy analysis of security issues</li>
|
||
</ul>
|
||
</li>
|
||
<li><strong>ACM Transactions on Privacy and Security</strong>
|
||
<ul>
|
||
<li>Peer-reviewed research on privacy and security</li>
|
||
<li>Technical advances in privacy and security technology</li>
|
||
</ul>
|
||
</li>
|
||
</ul>
|
||
|
||
<h4 id="social-movement-research">Social Movement Research</h4>
|
||
<ul>
|
||
<li><strong>Social Movement Studies</strong>
|
||
<ul>
|
||
<li>Academic research on social movements and activism</li>
|
||
<li>Theoretical and empirical analysis of resistance movements</li>
|
||
</ul>
|
||
</li>
|
||
<li><strong>Mobilization: An International Quarterly</strong>
|
||
<ul>
|
||
<li>Social movement theory and research</li>
|
||
<li>Comparative analysis of social movements and activism</li>
|
||
</ul>
|
||
</li>
|
||
</ul>
|
||
|
||
<h3 id="online-resources-and-databases">Online Resources and Databases</h3>
|
||
|
||
<h4 id="security-and-privacy-resources">Security and Privacy Resources</h4>
|
||
<ul>
|
||
<li><strong>OWASP (Open Web Application Security Project)</strong>: <a href="https://owasp.org">owasp.org</a>
|
||
<ul>
|
||
<li>Web application security resources and tools</li>
|
||
<li>Security testing and vulnerability assessment</li>
|
||
</ul>
|
||
</li>
|
||
<li><strong>SANS Institute</strong>: <a href="https://sans.org">sans.org</a>
|
||
<ul>
|
||
<li>Information security training and certification</li>
|
||
<li>Security research and threat intelligence</li>
|
||
</ul>
|
||
</li>
|
||
</ul>
|
||
|
||
<h4 id="research-and-analysis">Research and Analysis</h4>
|
||
<ul>
|
||
<li><strong>Bellingcat</strong>: <a href="https://bellingcat.com">bellingcat.com</a>
|
||
<ul>
|
||
<li>Open source investigation techniques and case studies</li>
|
||
<li>Digital forensics and online investigation methods</li>
|
||
</ul>
|
||
</li>
|
||
<li><strong>Exposing the Invisible</strong>: <a href="https://exposingtheinvisible.org">exposingtheinvisible.org</a>
|
||
<ul>
|
||
<li>Investigation techniques and tools for activists</li>
|
||
<li>Digital security for investigators and researchers</li>
|
||
</ul>
|
||
</li>
|
||
</ul>
|
||
|
||
<hr />
|
||
|
||
<div class="info-box">
|
||
<div class="info-title">Continuous Learning</div>
|
||
<p>Security and resistance techniques evolve constantly. Regular study of new resources, techniques, and threat developments is essential for maintaining effective operational security and resistance capabilities.</p>
|
||
</div>
|
||
|
||
<div class="success-box">
|
||
<div class="success-title">Knowledge Sharing</div>
|
||
<p>Share knowledge and resources with trusted networks while maintaining operational security. Collective learning and skill development strengthen resistance capabilities and improve security for all participants.</p>
|
||
</div>
|
||
|
||
<hr />
|
||
|
||
<p><strong>End of Field Manual FM-R1</strong></p>
|
||
|
||
<p><em>This field manual represents a comprehensive guide to resistance operations and security practices. Regular updates and revisions ensure continued relevance and effectiveness in changing operational environments.</em></p>
|
||
|
||
|
||
|
||
|
||
<nav class="section-nav">
|
||
|
||
<a href="/appendices/appendix-c/" class="nav-link">
|
||
<span class="arrow">←</span>
|
||
<span>Appendix C: Emergency Procedures</span>
|
||
</a>
|
||
|
||
|
||
|
||
<div></div>
|
||
|
||
</nav>
|
||
|
||
</main>
|
||
</div>
|
||
|
||
<footer class="footer">
|
||
<div class="container">
|
||
<div class="footer-content">
|
||
<div class="organization">Department of Internautics</div>
|
||
<div>Bureau of Decentralized Resistance</div>
|
||
<div>FM-R1 - Version 1.0 - 2025-08-28</div>
|
||
<div style="margin-top: 1rem;">
|
||
<a href="https://resist.is" target="_blank">resist.is</a> |
|
||
<a href="https://git.hacker.supply/Department_of_Internautics/field_guide" target="_blank">Source Code</a>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</footer>
|
||
|
||
<!-- JavaScript -->
|
||
<script src="/assets/js/main.js"></script>
|
||
</body>
|
||
</html>
|
||
|