FM-R1: FM-R1: Secure Communication Networks for Decentralized Resistance
UNCLASSIFIED
Section 1-1 to 1-5

Chapter 1: Core Security Principles

Chapter Overview

This chapter establishes the five fundamental principles that must guide all resistance security decisions. These principles, derived from decades of resistance experience and modern security research, provide the conceptual framework for evaluating threats, designing countermeasures, and making operational decisions under pressure.

Sections in this chapter:


Section 1-1: Principle of Least Privilege

Definition

The Principle of Least Privilege states that every person, process, and system should have access only to the minimum resources necessary to perform their legitimate function. In resistance operations, this means limiting access to information, tools, and capabilities to the smallest set required for operational effectiveness.

Application in Resistance Operations

Information Access

System Access

Physical Access

Implementation Guidelines

DO

  • Regularly review and audit access permissions
  • Remove access immediately when roles change
  • Document access decisions and their justifications
  • Use role-based access control when possible
  • Implement time-limited access for temporary needs

DON'T

  • Grant access "just in case" it might be needed
  • Share credentials or allow access sharing
  • Assume that trust equals need for access
  • Delay removing access when it's no longer needed
  • Grant broad access to avoid managing specific permissions

Common Violations and Consequences

Violation: Sharing operational plans with all cell members regardless of their role Consequence: Compromise of one member leads to exposure of entire operation

Violation: Using shared accounts for multiple purposes Consequence: Inability to track access or revoke permissions for specific individuals

Violation: Granting administrative access to avoid permission requests Consequence: Accidental or malicious damage to critical systems


Section 1-2: Need-to-Know Basis

Definition

Need-to-Know is an information security principle that restricts access to sensitive information to only those individuals who require it to perform their duties. Unlike Least Privilege, which focuses on access controls, Need-to-Know addresses the content and scope of information sharing.

Information Classification

Operational Classifications

CRITICAL - Information whose compromise would cause immediate operational failure

SENSITIVE - Information whose compromise would significantly impact operations

RESTRICTED - Information whose compromise would cause limited damage

UNCLASSIFIED - Information that can be shared without operational impact

Information Sharing Protocols

Vertical Information Flow

Horizontal Information Flow

Implementation in Practice

Meeting Protocols

Before sharing information in any meeting:
1. Identify who needs this specific information
2. Determine the minimum detail level required
3. Consider whether the information can be compartmentalized
4. Verify that all attendees have operational need for the information
5. Document what was shared and with whom

Communication Guidelines

Information Discipline

The natural human tendency is to share information to build trust and demonstrate competence. In resistance operations, this tendency must be consciously overcome. Information discipline requires constant vigilance and may feel antisocial, but it is essential for operational security.


Section 1-3: Compartmentalization and Cell Structure

Definition

Compartmentalization is the practice of isolating information, people, and operations into discrete units (cells) that can function independently and have limited knowledge of other units. This structure prevents the compromise of one element from cascading through the entire organization.

Cell Structure Design

Basic Cell Characteristics

Cell Types

Operational Cells

Support Cells

Communication Cells

Leadership Cells

Inter-Cell Communication

Communication Protocols

Information Flow Management

Standard Communication Flow:
Operational Cell → Support Cell → Leadership Cell

Emergency Communication Flow:
Any Cell → Emergency Contact → Leadership Cell

Cross-Cell Coordination:
Cell A → Leadership Cell → Cell B
(Direct cell-to-cell communication only for specific authorized operations)

Security Measures

Compromise Response

Isolation Procedures

When a cell is compromised:

  1. Immediate isolation - Cut all communication with compromised cell
  2. Damage assessment - Determine what information was exposed
  3. Notification protocol - Alert affected cells through secure channels
  4. Operational adjustment - Modify plans based on exposed information
  5. Recovery planning - Develop procedures for reconstituting capabilities

Continuity Planning

Cell Discipline

Effective compartmentalization requires strict discipline from all participants. The temptation to share information across cell boundaries for efficiency or social reasons must be resisted. Remember: the inconvenience of compartmentalization is far less than the consequences of cascade compromise.


Section 1-4: Zero Trust Verification

Definition

Zero Trust is a security model that assumes no user, device, or communication can be trusted by default, even if they are inside the organization’s network or have been previously verified. Every access request must be authenticated, authorized, and continuously validated.

Core Zero Trust Principles

Never Trust, Always Verify

Assume Breach

Verify Explicitly

Implementation in Resistance Operations

Identity Verification

Standard Verification Process:
1. Something you know (password, passphrase, coded response)
2. Something you have (device, token, physical key)
3. Something you are (biometric, behavioral pattern)
4. Somewhere you are (location verification, network analysis)
5. Someone you know (trusted introducer, mutual contact)

Communication Verification

Device Trust

Network Segmentation

Continuous Verification

Behavioral Monitoring

Regular Re-authentication

Paranoia vs. Security

Zero Trust may seem paranoid, but it reflects the reality of operating in a hostile environment where compromise is not a matter of if, but when. The goal is not to prevent all compromise, but to limit its impact and maintain operational capability even under adverse conditions.


Section 1-5: Metadata Minimization

Definition

Metadata is “data about data” - information that describes the characteristics of communications and activities without revealing their content. In resistance operations, metadata analysis can reveal operational patterns, network structures, and behavioral indicators even when all content is encrypted.

Types of Metadata

Communication Metadata

Location Metadata

Behavioral Metadata

Financial Metadata

Metadata Analysis Capabilities

Pattern Recognition

Modern data analysis can identify:

Predictive Analysis

Metadata can be used to:

Minimization Strategies

Communication Minimization

DO

  • Use different communication methods for different purposes
  • Vary timing and frequency of communications
  • Use intermediary systems to break direct connections
  • Employ time-delayed communication when possible
  • Use broadcast methods for one-to-many communication

DON'T

  • Use the same communication channel for all purposes
  • Maintain regular communication schedules
  • Allow direct communication between all network members
  • Use personal devices for resistance communications
  • Ignore the metadata implications of communication choices

Location Minimization

Temporal Minimization

Technical Minimization

Technical Metadata Reduction:
1. Use Tor or similar anonymization networks
2. Employ VPNs with no-logging policies
3. Use disposable email addresses and accounts
4. Regularly change device identifiers when possible
5. Use different devices for different operational purposes

Metadata-Aware Operational Planning

Communication Planning

Activity Planning

Metadata Discipline

Effective metadata minimization requires thinking about the digital traces of every action before taking it. This becomes second nature with practice, but initially requires conscious effort and planning. The investment in metadata discipline pays dividends in operational security and longevity.


Chapter Summary

The five core security principles covered in this chapter provide the foundation for all resistance security operations:

  1. Least Privilege limits access to the minimum necessary for operational effectiveness
  2. Need-to-Know restricts information sharing to operational requirements
  3. Compartmentalization isolates operations to prevent cascade compromise
  4. Zero Trust assumes compromise and requires continuous verification
  5. Metadata Minimization reduces digital traces that reveal operational patterns

These principles must be applied consistently across all aspects of resistance operations, from technical tool selection to operational planning to daily security practices. They are not merely guidelines but operational requirements for survival in a hostile environment.

Integration and Balance

While each principle is important individually, their real power comes from integrated application. Effective resistance security requires balancing these principles against operational requirements and human limitations. Perfect adherence to all principles simultaneously may be impossible, but conscious application of each principle to every security decision will dramatically improve operational security.

Next Steps

Chapter 2 builds on these foundational principles by providing systematic approaches to threat assessment and operational environment analysis. Understanding these principles is essential preparation for the practical threat modeling exercises that follow.


Next: Chapter 2: Threat Assessment and Operational Environment →