field_guide/preface.md
2025-08-29 06:58:56 -04:00

139 lines
6.4 KiB
Markdown

---
layout: default
title: "Preface"
description: "Purpose, scope, and guidance for using the Field Manual for Resistance Operations"
next_page:
title: "Introduction"
url: "/introduction/"
---
# Preface
## Purpose
This Field Manual (FM-R1) provides comprehensive guidance for establishing and maintaining secure communication networks within decentralized resistance movements. It is specifically designed for individuals and groups operating under the threat of an authoritarian regime with advanced surveillance capabilities.
The manual synthesizes proven operational security practices, modern cryptographic tools, and time-tested resistance strategies into a coherent framework that can be implemented by newcomers to resistance operations while remaining valuable to experienced practitioners.
## Scope
This manual covers:
- **Core security principles** fundamental to all resistance operations
- **Threat assessment methodologies** for understanding your operational environment
- **Multi-layer communication architectures** for different security requirements
- **Specific tool configurations** for secure messaging, file sharing, and collaboration
- **Operational security procedures** for maintaining security discipline
- **Advanced techniques** for network resilience and counter-intelligence
This manual does **not** cover:
- Specific tactical operations or direct action planning
- Legal advice or guidance on laws in specific jurisdictions
- Physical security beyond basic operational security measures
- Weapons, explosives, or other kinetic capabilities
## Target Audience
### Primary Audience
- **Newcomers to resistance operations** who need foundational knowledge
- **Cell leaders and coordinators** responsible for communication security
- **Technical personnel** implementing secure infrastructure
- **Training coordinators** developing security education programs
### Secondary Audience
- **Experienced activists** seeking to improve their security practices
- **Journalists and researchers** working in high-risk environments
- **Civil liberties organizations** operating under surveillance
- **International solidarity groups** supporting resistance movements
## How to Use This Manual
### For Newcomers
1. **Start with the fundamentals**: Read the Introduction and Part I completely before proceeding
2. **Follow the progressive structure**: Each chapter builds upon previous knowledge
3. **Practice in safe environments**: Test tools and procedures before operational use
4. **Seek mentorship**: Connect with experienced practitioners through secure channels
5. **Start simple**: Implement basic security measures before advancing to complex systems
### For Experienced Practitioners
- Use as a **reference guide** for specific tools and procedures
- **Adapt recommendations** to your specific threat environment
- **Contribute improvements** through secure feedback channels
- **Train others** using this manual as a curriculum foundation
### For Technical Implementation
- Follow **configuration guides** in the appendices exactly
- **Test all systems** thoroughly before deployment
- **Maintain operational security** during setup and maintenance
- **Document customizations** securely for future reference
## Security Considerations for This Manual
<div class="warning-box">
<div class="warning-title">Operational Security Warning</div>
<p>Accessing, storing, or distributing this manual may be considered suspicious activity by hostile authorities. Take appropriate precautions:</p>
<ul>
<li>Access only through Tails OS, Tor Browser, or similar anonymizing tools</li>
<li>Do not store on personal devices connected to your real identity</li>
<li>Share only through secure channels with trusted individuals</li>
<li>Consider the legal implications in your jurisdiction</li>
</ul>
</div>
### Recommended Access Methods
1. **Tails OS** - Boot from USB for maximum anonymity
2. **Tor Browser** - Use on a dedicated, clean device
3. **Public Wi-Fi** - Access from locations unconnected to your identity
4. **Printed copies** - For offline reference, dispose of securely when no longer needed
### Distribution Guidelines
- Share only with individuals who have demonstrated commitment to resistance operations
- Use secure communication channels (Signal, Briar, OnionShare) for distribution
- Verify recipient identity through trusted intermediaries
- Consider compartmentalization - not everyone needs access to all sections
## Acknowledgments
This manual builds upon decades of resistance experience and the work of countless individuals who have risked their freedom and lives for justice. Special recognition goes to:
- **Historical resistance movements** whose strategies inform our approach
- **Digital rights organizations** developing the tools we depend on
- **Security researchers** who identify vulnerabilities and develop countermeasures
- **Current practitioners** who provide feedback and real-world testing
## Feedback and Updates
This manual is a living document that must evolve with changing threats and technologies. Feedback is essential for maintaining its effectiveness and accuracy.
### Secure Feedback Channels
- **Matrix**: Contact @sparticus:weresist.is through Element
- **OnionShare**: Check resist.is for current feedback drop locations
- **Dead drops**: Physical and digital locations announced through secure channels
### Update Distribution
- **Primary source**: git.hacker.supply/Department_of_Internautics/field_guide
- **Mirror sites**: Announced through resistance networks
- **Version control**: Each update includes detailed changelog and verification signatures
## Legal Disclaimer
This manual is provided for educational purposes only. The authors and distributors:
- Do not advocate for illegal activities in any jurisdiction
- Cannot be held responsible for how this information is used
- Recommend consulting legal counsel familiar with your local laws
- Emphasize that resistance activities carry inherent legal and physical risks
Users are solely responsible for understanding and complying with applicable laws in their jurisdiction and for assessing the risks of their activities.
---
<div class="info-box">
<div class="info-title">Getting Started</div>
<p>Ready to begin? Proceed to the <strong>Introduction</strong> to understand the threat landscape and fundamental security concepts that underpin all resistance operations.</p>
</div>
**Next:** [Introduction →](/introduction/)