373 lines
17 KiB
HTML
373 lines
17 KiB
HTML
<!DOCTYPE html>
|
||
<html lang="en">
|
||
<head>
|
||
<meta charset="UTF-8">
|
||
<meta name="viewport" content="width=device-width, initial-scale=1.0">
|
||
<title>Part I: Foundations of Resistance Security - Field Manual for Resistance Operations</title>
|
||
<meta name="description" content="Core security principles and threat assessment methodologies for resistance operations">
|
||
|
||
<!-- Favicon -->
|
||
<link rel="icon" type="image/x-icon" href="/assets/images/favicon.ico">
|
||
|
||
<!-- Stylesheets -->
|
||
<link rel="stylesheet" href="/assets/css/main.css">
|
||
|
||
<!-- Security headers -->
|
||
<meta http-equiv="X-Content-Type-Options" content="nosniff">
|
||
<meta http-equiv="X-Frame-Options" content="DENY">
|
||
<meta http-equiv="X-XSS-Protection" content="1; mode=block">
|
||
|
||
<!-- No tracking -->
|
||
<meta name="robots" content="noindex, nofollow">
|
||
<!-- Matomo
|
||
<script>
|
||
var _paq = window._paq = window._paq || [];
|
||
/* tracker methods like "setCustomDimension" should be called before "trackPageView" */
|
||
_paq.push(['trackPageView']);
|
||
_paq.push(['enableLinkTracking']);
|
||
(function() {
|
||
var u="//stats.resist.is/";
|
||
_paq.push(['setTrackerUrl', u+'matomo.php']);
|
||
_paq.push(['setSiteId', '4']);
|
||
var d=document, g=d.createElement('script'), s=d.getElementsByTagName('script')[0];
|
||
g.async=true; g.src=u+'matomo.js'; s.parentNode.insertBefore(g,s);
|
||
})();
|
||
</script>
|
||
End Matomo Code -->
|
||
</head>
|
||
<body>
|
||
<header class="header">
|
||
<div class="container">
|
||
<div class="header-content">
|
||
<div class="logo">
|
||
<span class="omega">Ω</span>
|
||
<span>FM-R1</span>
|
||
</div>
|
||
<button class="nav-toggle" id="nav-toggle" aria-label="Toggle navigation">
|
||
☰
|
||
</button>
|
||
</div>
|
||
</div>
|
||
</header>
|
||
|
||
<div class="main-layout">
|
||
<nav class="sidebar" id="sidebar">
|
||
<nav class="main-navigation">
|
||
<!-- <div class="nav-header">
|
||
<div class="nav-subtitle">Field Manual for Resistance Operations</div>
|
||
</div>
|
||
-->
|
||
<div class="nav-sections">
|
||
<!-- Front Matter -->
|
||
<div class="nav-section">
|
||
<h3>Field Manual</h3>
|
||
<ul>
|
||
<li><a href="/" >Table of Contents</a></li>
|
||
<li><a href="/preface/" >Preface</a></li>
|
||
<li><a href="/introduction/" >Introduction</a></li>
|
||
</ul>
|
||
</div>
|
||
|
||
<!-- Part I: Foundations -->
|
||
<div class="nav-section">
|
||
<h3>Part I: Foundations</h3>
|
||
<ul>
|
||
<li>
|
||
<a href="/parts/part-1/" class="active">Part Overview</a>
|
||
<ul>
|
||
<li><a href="/chapters/chapter-1/" >Ch 1: Core Security Principles</a></li>
|
||
<li><a href="/chapters/chapter-2/" >Ch 2: Threat Assessment</a></li>
|
||
</ul>
|
||
</li>
|
||
</ul>
|
||
</div>
|
||
|
||
<!-- Part II: Communication -->
|
||
<div class="nav-section">
|
||
<h3>Part II: Communication</h3>
|
||
<ul>
|
||
<li>
|
||
<a href="/parts/part-2/" >Part Overview</a>
|
||
<ul>
|
||
<li><a href="/chapters/chapter-3/" >Ch 3: Communication Architecture</a></li>
|
||
<li><a href="/chapters/chapter-4/" >Ch 4: Secure Messaging</a></li>
|
||
<li><a href="/chapters/chapter-5/" >Ch 5: File Sharing</a></li>
|
||
</ul>
|
||
</li>
|
||
</ul>
|
||
</div>
|
||
|
||
<!-- Part III: OpSec -->
|
||
<div class="nav-section">
|
||
<h3>Part III: OpSec</h3>
|
||
<ul>
|
||
<li>
|
||
<a href="/parts/part-3/" >Part Overview</a>
|
||
<ul>
|
||
<li><a href="/chapters/chapter-6/" >Ch 6: Hardware Security</a></li>
|
||
<li><a href="/chapters/chapter-7/" >Ch 7: Digital Hygiene</a></li>
|
||
<li><a href="/chapters/chapter-8/" >Ch 8: Operational Procedures</a></li>
|
||
</ul>
|
||
</li>
|
||
</ul>
|
||
</div>
|
||
|
||
<!-- Part IV: Advanced -->
|
||
<div class="nav-section">
|
||
<h3>Part IV: Advanced</h3>
|
||
<ul>
|
||
<li>
|
||
<a href="/parts/part-4/" >Part Overview</a>
|
||
<ul>
|
||
<li><a href="/chapters/chapter-9/" >Ch 9: Intelligence Gathering</a></li>
|
||
<li><a href="/chapters/chapter-10/" >Ch 10: Counter-Intelligence</a></li>
|
||
</ul>
|
||
</li>
|
||
</ul>
|
||
</div>
|
||
|
||
<!-- Appendices
|
||
<div class="nav-section">
|
||
<h3>Appendices</h3>
|
||
<ul>
|
||
<li><a href="/appendices/" >Appendices Overview</a></li>
|
||
<li><a href="/appendices/appendix-a/" >Appendix A: Essential Tools</a></li>
|
||
<li><a href="/appendices/appendix-b/" >Appendix B: Legal Considerations</a></li>
|
||
<li><a href="/appendices/appendix-c/" >Appendix C: Emergency Procedures</a></li>
|
||
<li><a href="/appendices/appendix-d/" >Appendix D: Glossary & References</a></li>
|
||
</ul>
|
||
</div>
|
||
-->
|
||
|
||
<!-- Quick Access -->
|
||
<div class="nav-section nav-quick-access">
|
||
<h3>Quick Access</h3>
|
||
<ul>
|
||
<li><a href="/appendices/appendix-a/" class="nav-emergency">Essential Tools</a></li>
|
||
<li><a href="/appendices/appendix-b/" class="nav-emergency">Legal Rights</a></li>
|
||
<li><a href="/appendices/appendix-c/" class="nav-emergency">Emergency Procedures</a></li>
|
||
<li><a href="/appendices/appendix-d/" class="nav-emergency">Glossary & References</a></li>
|
||
</ul>
|
||
</div>
|
||
|
||
<!-- External Links -->
|
||
<div class="nav-section">
|
||
<h3>External Links</h3>
|
||
<ul>
|
||
<li><a href="https://resist.is" target="_blank">resist.is</a></li>
|
||
<li><a href="https://activistchecklist.org" target="_blank">Activist Checklist</a></li>
|
||
<li><a href="https://signal.org" target="_blank">Signal</a></li>
|
||
<li><a href="https://briarproject.org" target="_blank">Briar</a></li>
|
||
<li><a href="https://element.io" target="_blank">Element</a></li>
|
||
<li><a href="https://tails.boum.org" target="_blank">Tails OS</a></li>
|
||
<li><a href="https://onionshare.org" target="_blank">OnionShare</a></li>
|
||
</ul>
|
||
</div>
|
||
</div>
|
||
|
||
<!-- Security Notice
|
||
<div class="nav-security-notice">
|
||
<div class="security-warning">
|
||
<strong>OPERATIONAL SECURITY REMINDER</strong><br>
|
||
This manual contains sensitive information. Ensure secure handling and storage. Practice compartmentalization and need-to-know principles.
|
||
</div>
|
||
</div> -->
|
||
|
||
<!-- Footer -->
|
||
<div class="nav-footer">
|
||
<div class="manual-info">
|
||
<div class="classification">FOR RESISTANCE USE ONLY</div>
|
||
<div class="version">Version 1.0 | FM-R1</div>
|
||
<div class="date">2025</div>
|
||
</div>
|
||
</div>
|
||
</nav>
|
||
|
||
|
||
</nav>
|
||
|
||
<main class="content">
|
||
<div class="content-header">
|
||
<div class="manual-designation">FM-R1: FM-R1: Secure Communication Networks for Decentralized Resistance</div>
|
||
<div class="classification">UNCLASSIFIED</div>
|
||
|
||
</div>
|
||
|
||
<h1 id="part-i-foundations-of-resistance-security">Part I: Foundations of Resistance Security</h1>
|
||
|
||
<h2 id="overview">Overview</h2>
|
||
|
||
<p>Part I establishes the theoretical and practical foundations necessary for all resistance security operations. Before implementing any technical measures or operational procedures, resistance practitioners must understand the fundamental principles that govern security in hostile environments and develop the analytical skills necessary to assess threats and design appropriate countermeasures.</p>
|
||
|
||
<p>This part addresses the most critical question in resistance security: <strong>How do you think about security in a way that leads to effective protection?</strong></p>
|
||
|
||
<h2 id="learning-objectives">Learning Objectives</h2>
|
||
|
||
<p>Upon completing Part I, you will be able to:</p>
|
||
|
||
<ul>
|
||
<li>Apply core security principles to evaluate and design resistance operations</li>
|
||
<li>Conduct systematic threat assessments for your specific operational environment</li>
|
||
<li>Develop risk management strategies appropriate to your threat level</li>
|
||
<li>Understand the relationship between security measures and operational effectiveness</li>
|
||
<li>Recognize common security failures and their underlying causes</li>
|
||
</ul>
|
||
|
||
<h2 id="chapter-overview">Chapter Overview</h2>
|
||
|
||
<h3 id="chapter-1-core-security-principles-1-1-to-1-5">Chapter 1: Core Security Principles (1-1 to 1-5)</h3>
|
||
|
||
<p>The five fundamental principles that must guide all resistance security decisions:</p>
|
||
|
||
<p><strong>1-1: Principle of Least Privilege</strong> - Limiting access to the minimum necessary for operational effectiveness</p>
|
||
|
||
<p><strong>1-2: Need-to-Know Basis</strong> - Compartmentalizing information to prevent cascade failures</p>
|
||
|
||
<p><strong>1-3: Compartmentalization and Cell Structure</strong> - Organizing resistance networks to contain compromise</p>
|
||
|
||
<p><strong>1-4: Zero Trust Verification</strong> - Assuming compromise and requiring continuous authentication</p>
|
||
|
||
<p><strong>1-5: Metadata Minimization</strong> - Reducing the digital traces that reveal operational patterns</p>
|
||
|
||
<h3 id="chapter-2-threat-assessment-and-operational-environment-2-1-to-2-4">Chapter 2: Threat Assessment and Operational Environment (2-1 to 2-4)</h3>
|
||
|
||
<p>Systematic approaches to understanding and responding to threats:</p>
|
||
|
||
<p><strong>2-1: Understanding Your Adversary</strong> - Analyzing capabilities, motivations, and limitations of hostile forces</p>
|
||
|
||
<p><strong>2-2: Threat Model Development</strong> - Creating structured assessments of risks and vulnerabilities</p>
|
||
|
||
<p><strong>2-3: Risk Assessment Framework</strong> - Quantifying and prioritizing security investments</p>
|
||
|
||
<p><strong>2-4: Operational Security (OpSec) Fundamentals</strong> - Translating threat assessments into practical procedures</p>
|
||
|
||
<h2 id="the-security-mindset">The Security Mindset</h2>
|
||
|
||
<p>Before diving into specific principles and procedures, it’s essential to understand the fundamental shift in thinking required for effective resistance security. This shift involves:</p>
|
||
|
||
<h3 id="from-convenience-to-security">From Convenience to Security</h3>
|
||
|
||
<p>In normal life, we optimize for convenience, efficiency, and ease of use. In resistance operations, security becomes the primary consideration, with convenience secondary. This doesn’t mean making things unnecessarily difficult, but rather accepting that some inconvenience is the price of safety.</p>
|
||
|
||
<h3 id="from-trust-to-verification">From Trust to Verification</h3>
|
||
|
||
<p>Normal social and professional relationships operate on trust and good faith. Resistance operations must assume that trust can be compromised, either through infiltration or coercion, and build verification mechanisms into all critical processes.</p>
|
||
|
||
<h3 id="from-reactive-to-proactive">From Reactive to Proactive</h3>
|
||
|
||
<p>Most people respond to security threats after they become apparent. Resistance operations must anticipate threats and implement countermeasures before they’re needed, because by the time a threat is obvious, it may be too late to respond effectively.</p>
|
||
|
||
<h3 id="from-individual-to-collective">From Individual to Collective</h3>
|
||
|
||
<p>Personal security practices focus on protecting yourself. Resistance security must consider how your actions affect the safety of others in your network, and how their actions affect your safety.</p>
|
||
|
||
<h2 id="common-misconceptions">Common Misconceptions</h2>
|
||
|
||
<h3 id="encryption-solves-everything">“Encryption Solves Everything”</h3>
|
||
|
||
<p>While encryption is essential, it only protects the content of communications, not the metadata that reveals who is talking to whom, when, and from where. Metadata analysis can reveal network structures and operational patterns even when all communications are encrypted.</p>
|
||
|
||
<h3 id="if-you-have-nothing-to-hide">“If You Have Nothing to Hide…”</h3>
|
||
|
||
<p>This argument fundamentally misunderstands the nature of authoritarian surveillance. The goal is not just to find evidence of wrongdoing, but to map networks, predict behavior, and suppress dissent before it becomes effective.</p>
|
||
|
||
<h3 id="theyre-too-powerful-to-resist">“They’re Too Powerful to Resist”</h3>
|
||
|
||
<p>While authoritarian regimes have significant advantages, they also have limitations and vulnerabilities. Understanding both their capabilities and their constraints is essential for developing effective resistance strategies.</p>
|
||
|
||
<h3 id="perfect-security-is-possible">“Perfect Security is Possible”</h3>
|
||
|
||
<p>No security system is perfect, and pursuing perfect security often leads to systems so complex and restrictive that they cannot be used effectively. The goal is appropriate security for your specific threat environment and operational requirements.</p>
|
||
|
||
<h2 id="integration-with-subsequent-parts">Integration with Subsequent Parts</h2>
|
||
|
||
<p>The principles and methodologies covered in Part I provide the foundation for all subsequent technical and operational guidance:</p>
|
||
|
||
<ul>
|
||
<li><strong>Part II</strong> applies these principles to design secure communication systems</li>
|
||
<li><strong>Part III</strong> translates them into practical operational security procedures</li>
|
||
<li><strong>Part IV</strong> extends them to advanced scenarios and specialized threats</li>
|
||
</ul>
|
||
|
||
<p>Each technical recommendation and operational procedure in later parts derives from the fundamental principles established here. Understanding these foundations is essential for adapting the manual’s guidance to your specific circumstances and for making sound security decisions when facing novel situations.</p>
|
||
|
||
<h2 id="study-approach">Study Approach</h2>
|
||
|
||
<h3 id="for-individual-study">For Individual Study</h3>
|
||
|
||
<ol>
|
||
<li><strong>Read each section completely</strong> before moving to the next</li>
|
||
<li><strong>Take notes</strong> on how principles apply to your specific situation</li>
|
||
<li><strong>Work through examples</strong> using scenarios relevant to your operations</li>
|
||
<li><strong>Review regularly</strong> as these concepts must become second nature</li>
|
||
</ol>
|
||
|
||
<h3 id="for-group-study">For Group Study</h3>
|
||
|
||
<ol>
|
||
<li><strong>Discuss each principle</strong> and its implications for your organization</li>
|
||
<li><strong>Develop case studies</strong> based on your operational environment</li>
|
||
<li><strong>Practice threat modeling</strong> for actual or hypothetical operations</li>
|
||
<li><strong>Create reference materials</strong> summarizing key concepts for quick review</li>
|
||
</ol>
|
||
|
||
<h3 id="for-training-others">For Training Others</h3>
|
||
|
||
<ol>
|
||
<li><strong>Use concrete examples</strong> rather than abstract concepts</li>
|
||
<li><strong>Connect principles to practical consequences</strong> of security failures</li>
|
||
<li><strong>Encourage questions</strong> and discussion of edge cases</li>
|
||
<li><strong>Provide opportunities to practice</strong> threat assessment skills</li>
|
||
</ol>
|
||
|
||
<div class="warning-box">
|
||
<div class="warning-title">Foundation First</div>
|
||
<p>Do not skip Part I to get to "more practical" technical content. The principles covered here determine whether technical measures will be effective or merely provide a false sense of security. Every security failure can be traced back to a violation of these fundamental principles.</p>
|
||
</div>
|
||
|
||
<hr />
|
||
|
||
<p><strong>Ready to begin?</strong> Start with <a href="/chapters/chapter-1/">Chapter 1: Core Security Principles →</a></p>
|
||
|
||
|
||
|
||
|
||
<nav class="section-nav">
|
||
|
||
<a href="/introduction/" class="nav-link">
|
||
<span class="arrow">←</span>
|
||
<span>Introduction</span>
|
||
</a>
|
||
|
||
|
||
|
||
<a href="/chapters/chapter-1/" class="nav-link">
|
||
<span>Chapter 1: Core Security Principles</span>
|
||
<span class="arrow">→</span>
|
||
</a>
|
||
|
||
</nav>
|
||
|
||
</main>
|
||
</div>
|
||
|
||
<footer class="footer">
|
||
<div class="container">
|
||
<div class="footer-content">
|
||
<div class="organization">Department of Internautics</div>
|
||
<div>Bureau of Decentralized Resistance</div>
|
||
<div>FM-R1 - Version 1.0 - 2025-08-28</div>
|
||
<div style="margin-top: 1rem;">
|
||
<a href="https://resist.is" target="_blank">resist.is</a> |
|
||
<a href="https://git.hacker.supply/Department_of_Internautics/field_guide" target="_blank">Source Code</a>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</footer>
|
||
|
||
<!-- JavaScript -->
|
||
<script src="/assets/js/main.js"></script>
|
||
</body>
|
||
</html>
|
||
|