FM-R1: FM-R1: Secure Communication Networks for Decentralized Resistance
UNCLASSIFIED

Appendix D: Glossary and References

Overview

This appendix provides a comprehensive glossary of terms used throughout the field guide, along with references to additional resources, organizations, and materials for further study and operational support.


D.1 Glossary of Terms

A

Access Control
Security measures that restrict access to resources, systems, or information based on user identity and authorization levels.
Adversary
Any individual, group, or organization that poses a threat to resistance operations or personnel.
Air Gap
Physical separation between computer systems or networks to prevent unauthorized data transfer.
Anonymity
The state of being unidentifiable within a set of subjects, providing protection against identification.
Authentication
The process of verifying the identity of a user, device, or system before granting access to resources.

B

Backdoor
A hidden method of bypassing normal authentication or security controls in a computer system.
Burner Device
A temporary communication device used for specific operations and then discarded to maintain security.
Burner Identity
A temporary or false identity used for specific operations to protect real identity.

C

Cell Structure
Organizational method using small, independent groups to limit exposure and damage from compromise.
Cipher
An algorithm for performing encryption or decryption of data.
Clearnet
The publicly accessible internet, as opposed to darknets or private networks.
Compartmentalization
Security practice of limiting access to information based on need-to-know principles.
Compromise
The unauthorized disclosure of sensitive information or the loss of security integrity.
Counter-Intelligence
Activities designed to prevent or thwart espionage, intelligence gathering, or sabotage by adversaries.
Counter-Surveillance
Techniques and activities designed to detect, evade, or neutralize surveillance operations.
Cover Story
A false but plausible explanation for activities, presence, or identity used to maintain operational security.
Cryptography
The practice and study of techniques for secure communication in the presence of adversaries.

D

Dark Web
Encrypted online content that requires specific software, configurations, or authorization to access.
Dead Drop
A method of espionage tradecraft used to pass items or information between two individuals without requiring them to meet directly.
Deniability
The ability to deny involvement in or knowledge of particular activities or information.
Digital Footprint
The trail of data created by online activities and digital interactions.
Disinformation
False information deliberately spread to deceive or mislead.

E

Encryption
The process of converting information into a code to prevent unauthorized access.
End-to-End Encryption (E2E)
A system of communication where only the communicating users can read the messages.
Exfiltration
The unauthorized transfer of data from a computer or network.

F

False Flag
An operation designed to deceive by making it appear as though it was carried out by another party.
Firewall
A network security system that monitors and controls incoming and outgoing network traffic.
Forward Secrecy
A feature of specific key agreement protocols that ensures session keys will not be compromised even if private keys are compromised.

G

Gray Literature
Information produced outside traditional commercial or academic publishing channels.

H

Honeypot
A computer security mechanism set to detect, deflect, or counteract unauthorized use of information systems.
HUMINT
Human Intelligence - intelligence gathered by means of interpersonal contact.

I

Identity Management
The security and business discipline that enables the right individuals to access the right resources at the right times.
Infiltration
The practice of entering an organization or group covertly to gather intelligence or influence operations.
Information Security (InfoSec)
The practice of protecting information by mitigating information risks.

J

Jail Support
Organized assistance provided to individuals who have been arrested, including legal, financial, and emotional support.

K

Key Management
The management of cryptographic keys in a cryptosystem, including generation, exchange, storage, use, and replacement.

L

Legal Observer
Trained volunteers who attend public demonstrations to monitor and document police behavior and potential civil rights violations.
Livestreaming
Real-time broadcasting of video content over the internet.

M

Malware
Software designed to disrupt, damage, or gain unauthorized access to computer systems.
Metadata
Data that provides information about other data, such as when a file was created or modified.
Multi-Factor Authentication (MFA)
A security system that requires more than one method of authentication to verify user identity.

N

Network Security
Policies and practices adopted to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network.
Need-to-Know
Security principle that restricts access to information to only those individuals who require it to perform their duties.

O

Operational Security (OPSEC)
A process that identifies critical information and analyzes friendly actions to determine if they can be observed by adversaries.
OSINT
Open Source Intelligence - intelligence collected from publicly available sources.

P

Penetration Testing
Authorized simulated cyberattack on a computer system to evaluate security.
Phishing
Fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity in electronic communication.
Privacy
The right to be free from intrusion or interference in one’s personal life and affairs.
Pseudonym
A fictitious name used to conceal identity.

Q

Quarantine
Isolation of potentially compromised systems or information to prevent spread of security threats.

R

Risk Assessment
The identification and analysis of relevant risks to achieving objectives.
Root Access
Administrative access to a computer system that allows complete control over the system.

S

Safe House
A secure location used for meetings, storage, or temporary shelter during operations.
Security Culture
Shared practices, attitudes, and norms that prioritize security in all activities and communications.
SIGINT
Signals Intelligence - intelligence derived from electronic signals and systems.
Social Engineering
Psychological manipulation of people to perform actions or divulge confidential information.
Steganography
The practice of concealing information within other non-secret text or data.
Surveillance
Close observation of a person or group, especially one under suspicion.

T

Threat Model
A structured representation of all the information that affects the security of an application or system.
Tor
Free and open-source software for enabling anonymous communication by directing internet traffic through a worldwide volunteer overlay network.
Two-Factor Authentication (2FA)
Security process in which users provide two different authentication factors to verify themselves.

U

User Access Control
Security technique that regulates who or what can view or use resources in a computing environment.

V

Virtual Private Network (VPN)
Encrypted connection over the internet from a device to a network to ensure private data transmission.
Vulnerability
A weakness in a system that can be exploited by threats to gain unauthorized access or perform unauthorized actions.

W

Whistleblowing
The activity of a person who exposes information or activity that is deemed illegal, unethical, or not correct within an organization.

Z

Zero-Day
A computer software vulnerability that is unknown to those who should be interested in mitigating the vulnerability.
Zero-Knowledge
A method by which one party can prove to another party that they know a value without conveying any information apart from the fact that they know the value.

D.2 Essential References and Resources

Security and Privacy Guides

Digital Security Resources

Privacy and Anonymity Guides

Know Your Rights

Technical Resources

Cryptography and Security

Network Security

Operational Security Resources

Intelligence and Surveillance

Resistance and Activism

Historical References

Resistance Movements

Intelligence History

Technical Manuals and Standards

Security Standards

Cryptographic Standards


D.3 Organizations and Networks

Digital Rights Organizations

International Organizations

Regional Organizations

Civil Rights Organizations

Security and Privacy Organizations

Security Research Organizations

Privacy Advocacy Organizations

Technical Security Organizations

Open Source Security Projects

Security Training Organizations


D.4 Additional Reading and Study Materials

Essential Books

Security and Privacy

  1. “Data and Goliath” by Bruce Schneier
    • Surveillance capitalism and privacy protection
    • Policy and technical approaches to privacy
  2. “The Age of Surveillance Capitalism” by Shoshana Zuboff
    • Economic analysis of surveillance and data extraction
    • Understanding surveillance business models
  3. “No Place to Hide” by Glenn Greenwald
    • NSA surveillance revelations and implications
    • Government surveillance capabilities and overreach

Resistance and Activism

  1. “From Dictatorship to Democracy” by Gene Sharp
    • Strategic nonviolent resistance theory and practice
    • Political defiance and resistance strategy
  2. “The Politics of Nonviolent Action” by Gene Sharp
    • Comprehensive theory of nonviolent resistance
    • Methods and dynamics of nonviolent struggle
  3. “Direct Action” by L.A. Kauffman
    • History of direct action and civil disobedience
    • Tactical innovation in social movements

Intelligence and Security

  1. “The Art of War” by Sun Tzu
    • Classical strategic thinking and tactical principles
    • Intelligence and strategic planning concepts
  2. “On War” by Carl von Clausewitz
    • Military strategy and tactical theory
    • Understanding conflict and strategic thinking
  3. “The Craft of Intelligence” by Allen Dulles
    • Intelligence operations and analysis principles
    • Understanding intelligence collection and analysis

Academic Journals and Publications

Security and Privacy Research

Social Movement Research

Online Resources and Databases

Security and Privacy Resources

Research and Analysis


Continuous Learning

Security and resistance techniques evolve constantly. Regular study of new resources, techniques, and threat developments is essential for maintaining effective operational security and resistance capabilities.

Knowledge Sharing

Share knowledge and resources with trusted networks while maintaining operational security. Collective learning and skill development strengthen resistance capabilities and improve security for all participants.


End of Field Manual FM-R1

This field manual represents a comprehensive guide to resistance operations and security practices. Regular updates and revisions ensure continued relevance and effectiveness in changing operational environments.