FM-R1: FM-R1: Secure Communication Networks for Decentralized Resistance
UNCLASSIFIED
Section 3-1 to 3-6

Chapter 3: Communication Layer Architecture

Chapter Overview

This chapter establishes the multi-layer communication architecture that forms the backbone of secure resistance communications. Rather than relying on a single communication method, effective resistance networks employ multiple complementary systems, each optimized for specific security requirements and operational scenarios.

Sections in this chapter:


Section 3-1: Multi-Layer Communication Strategy

Architectural Principles

The multi-layer communication architecture is based on several key principles derived from both historical resistance experience and modern security research:

Defense in Depth

No single communication system can address all security requirements and operational scenarios. Multiple layers provide redundancy and ensure that compromise of one system does not eliminate all communication capabilities.

Appropriate Security

Different communications require different security levels. Using maximum security for all communications is both unnecessary and operationally ineffective, while using insufficient security for critical communications is dangerous.

Operational Effectiveness

Communication systems must support actual operational requirements. Systems that are too complex, slow, or unreliable will be abandoned in favor of less secure but more usable alternatives.

Metadata Minimization

Each layer employs different strategies for minimizing metadata exposure, from onion routing to time delays to broadcast methods that eliminate recipient identification.

Layer Selection Criteria

Security Requirements

Security Level Assessment:
1. Content Sensitivity
   - Public information (low security)
   - Internal coordination (medium security)
   - Operational details (high security)
   - Critical intelligence (maximum security)

2. Participant Risk
   - Public supporters (low risk)
   - Active participants (medium risk)
   - Cell leaders (high risk)
   - Key operatives (maximum risk)

3. Adversary Capabilities
   - Local law enforcement (basic capabilities)
   - Federal agencies (advanced capabilities)
   - Intelligence services (sophisticated capabilities)
   - Authoritarian regimes (comprehensive capabilities)

Operational Requirements

Resource Constraints

Layer Architecture Overview

Layer 1: High-Risk Real-Time Communication

Primary Tools: Session Messenger, Briar Security Features:

Use Cases:

Layer 2: Secure Collaboration Systems

Primary Tools: Element/Matrix (self-hosted), CryptPad Security Features:

Use Cases:

Layer 3: Failsafe and Offline Methods

Primary Tools: OnionShare, encrypted email, physical methods Security Features:

Use Cases:

Layer 4: Anonymous Broadcasting

Primary Tools: Tor hidden services, distributed platforms Security Features:

Use Cases:

Implementation Strategy

Phased Deployment

Phase 1: Foundation (Weeks 1-4)
- Implement basic secure messaging (Signal/Session)
- Establish fundamental security procedures
- Train core participants in basic tools

Phase 2: Collaboration (Weeks 5-8)
- Deploy self-hosted Matrix server
- Implement CryptPad for document collaboration
- Establish group communication protocols

Phase 3: Advanced Security (Weeks 9-12)
- Implement Briar for high-risk scenarios
- Establish OnionShare for file transfers
- Deploy emergency communication channels

Phase 4: Full Architecture (Weeks 13-16)
- Integrate all layers into coherent system
- Implement advanced security protocols
- Establish training and support systems

Integration Planning

Layer Coordination

The four layers are designed to work together, not in isolation. Effective implementation requires clear protocols for when to use each layer and how to coordinate between them while maintaining security.


Section 3-2: High-Risk Real-Time Communication (Layer 1)

Purpose and Requirements

Layer 1 provides maximum security for time-sensitive communications during high-risk operations. This layer prioritizes security and anonymity over convenience and features, making it suitable for:

Technical Architecture

Onion Routing

Layer 1 systems use onion routing (similar to Tor) to protect communication metadata:

Communication Path:
User A → Entry Node → Middle Node → Exit Node → User B

Each hop only knows:
- Entry Node: User A's identity, Middle Node's identity
- Middle Node: Entry Node's identity, Exit Node's identity  
- Exit Node: Middle Node's identity, User B's identity

No single node knows both sender and recipient

Peer-to-Peer Architecture

Ephemeral Messaging

Primary Tools

Session Messenger

Strengths:

Configuration:

Security Settings:
- Enable disappearing messages (shortest duration)
- Disable read receipts and typing indicators
- Use random Session ID, not linked to identity
- Enable onion routing for all communications
- Disable message notifications and previews

Operational Procedures:

Briar Messenger

Strengths:

Configuration:

Network Settings:
- Enable Tor for internet connections
- Enable Bluetooth for local mesh networking
- Enable WiFi for local area networking
- Disable location services and contact access

Operational Procedures:

Security Protocols

Identity Management

Communication Protocols

Standard Communication Protocol:
1. Verify recipient identity through out-of-band channel
2. Establish secure session using verified identity
3. Communicate using coded language even in encrypted channels
4. Confirm message receipt through separate channel if critical
5. Delete conversation and rotate identity if compromised

Emergency Procedures

Operational Considerations

Performance Limitations

Training Requirements

Use Case Guidelines

DO Use Layer 1 For:

  • Time-sensitive operational coordination
  • Communications during active surveillance
  • High-risk participant communications
  • Emergency situations requiring maximum security
  • Coordination of sensitive operations

DON'T Use Layer 1 For:

  • Routine administrative communications
  • Large file transfers or media sharing
  • Group discussions with many participants
  • Long-term document storage or collaboration
  • Public or semi-public communications

Section 3-3: Secure Collaboration Systems (Layer 2)

Purpose and Requirements

Layer 2 balances security with collaboration functionality, providing encrypted group communications, file sharing, and document collaboration while maintaining strong security protections. This layer supports:

Technical Architecture

Self-Hosted Infrastructure

Layer 2 systems use self-hosted infrastructure to maintain control over security and data:

Infrastructure Components:
- Matrix Homeserver (Element/Synapse)
- CryptPad Collaboration Server
- File Storage Server (Nextcloud/ownCloud)
- VPN Server for secure access
- Backup and Recovery Systems

End-to-End Encryption

Access Control

Primary Tools

Element/Matrix (Self-Hosted)

Capabilities:

Server Setup:

Synapse Server Configuration:
- Deploy on dedicated server with full disk encryption
- Configure behind VPN with restricted access
- Enable end-to-end encryption for all rooms
- Disable federation with public Matrix servers
- Implement strong authentication and access controls

Client Configuration:

Element Security Settings:
- Enable cross-signing for device verification
- Verify all room participants and their devices
- Enable secure backup for encryption keys
- Disable read receipts and typing notifications
- Use strong, unique passwords with 2FA

CryptPad Collaboration Platform

Capabilities:

Server Setup:

CryptPad Configuration:
- Self-host on secure server infrastructure
- Configure with strong encryption settings
- Disable analytics and external connections
- Implement access controls and user limits
- Regular security updates and monitoring

Usage Protocols:

Document Security Procedures:
1. Create documents only on self-hosted instance
2. Use strong passwords for document protection
3. Share access links only through secure channels
4. Regularly review and revoke document access
5. Export and backup important documents securely

Security Protocols

Server Security

Operational Security

Communication Security Procedures:
1. Verify participant identities before adding to groups
2. Use coded language for sensitive topics
3. Regularly rotate encryption keys and passwords
4. Monitor for unusual activity or access patterns
5. Implement incident response procedures for compromise

Data Management

Operational Procedures

Group Management

Secure Group Creation Process:
1. Define group purpose and security requirements
2. Identify necessary participants and their roles
3. Create encrypted room/channel with appropriate settings
4. Invite participants through secure out-of-band verification
5. Establish group communication protocols and procedures
6. Regular review of membership and access permissions

Document Collaboration

File Sharing

Server Compromise

Self-hosted infrastructure requires ongoing security maintenance and monitoring. Server compromise can expose all communications and files, making proper security hardening and incident response planning essential.


Section 3-4: Failsafe and Offline Methods (Layer 3)

Purpose and Requirements

Layer 3 provides backup communication channels that function independently of internet infrastructure and resist network disruption, censorship, and surveillance. This layer ensures communication capability when other systems fail and provides:

Technical Architecture

Asynchronous Communication

Layer 3 systems use store-and-forward methods that don’t require simultaneous online presence:

Asynchronous Communication Flow:
Sender → Intermediate Storage → Recipient

Benefits:
- No real-time correlation between sender and recipient
- Resistance to network timing analysis
- Functionality during partial network outages
- Time delays that complicate surveillance

Multiple Transport Methods

Redundant Channels

Primary Tools and Methods

OnionShare

Capabilities:

Configuration:

OnionShare Security Settings:
- Use Tor Browser for all access
- Enable automatic shutdown after download
- Set short expiration times for shared files
- Use strong passwords for protected shares
- Access only from secure, anonymous devices

Operational Procedures:

Secure File Transfer Process:
1. Create encrypted archive of files to share
2. Generate OnionShare link with password protection
3. Share link and password through separate secure channels
4. Monitor for successful download and automatic shutdown
5. Verify receipt through separate communication channel

Encrypted Email Systems

Recommended Services:

Security Configuration:

Email Security Setup:
- Create accounts using Tor and anonymous information
- Use strong, unique passwords with 2FA when available
- Enable PGP encryption for all sensitive communications
- Configure automatic message deletion
- Access only through Tor or secure VPN

Physical Dead Drops

Digital Dead Drops:

Physical Dead Drops:

Security Protocols

Time Delay Security

Operational Time Delays:
- Minimum 24-hour delay between message creation and pickup
- Random additional delays to prevent pattern analysis
- Staggered access times to avoid correlation
- Multiple intermediate steps to break timing chains

Channel Separation

Verification Procedures

Message Verification Process:
1. Cryptographic signatures to verify sender authenticity
2. Predetermined code words or phrases for verification
3. Separate channel confirmation of message receipt
4. Cross-reference with other intelligence sources
5. Verification of message integrity and completeness

Operational Procedures

Emergency Communication Protocols

Emergency Communication Sequence:
1. Attempt primary communication channels (Layers 1-2)
2. If primary channels fail, activate Layer 3 protocols
3. Use predetermined emergency contact methods
4. Implement duress codes if under coercion
5. Activate backup communication networks
6. Establish new primary channels when possible

Dead Drop Management

Long-Term Storage

Resilience Planning

Layer 3 methods require advance planning and preparation. Emergency communication channels must be established and tested before they are needed, as crisis situations provide no time for setup and configuration.


Section 3-5: Anonymous Broadcasting (Layer 4)

Purpose and Requirements

Layer 4 provides one-to-many communication capabilities with strong sender anonymity and censorship resistance. This layer supports public-facing communications while protecting the identity and location of the sender:

Technical Architecture

Anonymity Networks

Layer 4 systems use anonymity networks to protect sender identity:

Tor Hidden Services Architecture:
Publisher → Tor Network → Hidden Service → Public Access

Anonymity Features:
- Publisher identity hidden from readers
- Publisher location hidden from network operators
- Content hosted on distributed network
- Censorship resistance through multiple access points

Content Distribution Networks

Censorship Resistance

Primary Tools and Platforms

Tor Hidden Services

Capabilities:

Setup Procedures:

Hidden Service Configuration:
1. Install and configure Tor on secure server
2. Generate .onion address and private keys
3. Configure web server to serve content locally
4. Test access through Tor Browser
5. Implement security hardening and monitoring

Distributed Publishing Platforms

IPFS (InterPlanetary File System):

Blockchain Platforms:

Social Media Automation

Multi-Platform Publishing:

Account Management:

Anonymous Account Creation:
1. Use Tor Browser for all account creation
2. Use temporary email addresses for registration
3. Provide minimal or false personal information
4. Use VPN or proxy for additional protection
5. Maintain separate identities for different purposes

Security Protocols

Publisher Anonymity

Content Security

Content Publication Security:
1. Remove metadata from all files before publication
2. Use generic writing style to avoid stylometric analysis
3. Avoid revealing specific knowledge or experiences
4. Use stock images or create original graphics
5. Review content for operational security implications

Platform Security

Operational Procedures

Content Planning

Publication Planning Process:
1. Define target audience and communication objectives
2. Develop content calendar and publication schedule
3. Create content following security and anonymity guidelines
4. Review content for operational security implications
5. Coordinate publication across multiple platforms
6. Monitor engagement and adjust strategy as needed

Crisis Communication

Audience Engagement

Attribution Risk

Even with strong technical anonymity, writing style, content knowledge, and publication patterns can potentially identify authors. Careful attention to operational security is essential for maintaining publisher anonymity.


Section 3-6: Communication Protocol Selection

Decision Framework

Selecting appropriate communication protocols requires systematic evaluation of security requirements, operational needs, and available resources. This section provides frameworks for making these decisions systematically rather than ad hoc.

Security Requirements Assessment

Threat Level Analysis

Threat Level Matrix:
                Low    Medium   High    Critical
Content Risk    L1-4   L1-3     L1-2    L1 Only
Participant     L2-4   L1-3     L1-2    L1 Only
Timing Risk     L2-4   L1-3     L1-2    L1 Only
Network Risk    L3-4   L2-4     L1-3    L1-2

Legend: L1=Layer 1, L2=Layer 2, etc.

Risk Factor Evaluation

Content Sensitivity:

Participant Risk Level:

Timing Sensitivity:

Operational Requirements Assessment

Communication Characteristics

Requirement Assessment:
1. Participants
   - One-to-one communication
   - Small group (3-10 participants)
   - Large group (10+ participants)
   - Broadcast (one-to-many)

2. Content Type
   - Text messages only
   - File sharing required
   - Voice/video communication
   - Collaborative editing

3. Timing Requirements
   - Real-time communication required
   - Near real-time acceptable (minutes)
   - Asynchronous acceptable (hours)
   - Delayed acceptable (days)

4. Reliability Requirements
   - Mission-critical (must not fail)
   - Important (failure causes problems)
   - Useful (failure is inconvenient)
   - Optional (failure is acceptable)

Technical Constraints

Protocol Selection Matrix

Layer 1 Selection Criteria

Use Layer 1 When:

Layer 1 Tool Selection:

Session Messenger:
- Best for: Routine high-security communications
- Strengths: Easy to use, good mobile support
- Limitations: Requires internet connection

Briar:
- Best for: Offline and mesh networking scenarios
- Strengths: No servers, offline capability
- Limitations: More complex setup and usage

Layer 2 Selection Criteria

Use Layer 2 When:

Layer 2 Tool Selection:

Element/Matrix:
- Best for: Group communications and coordination
- Strengths: Rich features, federation capability
- Limitations: Requires server infrastructure

CryptPad:
- Best for: Document collaboration and editing
- Strengths: Real-time collaboration, no accounts required
- Limitations: Limited to document-based collaboration

Layer 3 Selection Criteria

Use Layer 3 When:

Layer 4 Selection Criteria

Use Layer 4 When:

Implementation Guidelines

Protocol Transition Procedures

Escalation Procedures:
Normal Operations → Layer 2 (Collaboration)
Increased Surveillance → Layer 1 (High Security)
Network Disruption → Layer 3 (Failsafe)
Public Communications → Layer 4 (Broadcasting)

De-escalation Procedures:
Emergency → Layer 3 → Layer 1 → Layer 2
Crisis → Layer 1 → Layer 2 → Normal Operations

Multi-Layer Coordination

Training and Adoption

Protocol Evolution

Communication protocols must evolve as threats change, technology advances, and operational requirements shift. Regular review and updating of protocol selection criteria ensures continued effectiveness and security.


Chapter Summary

Chapter 3 has established the multi-layer communication architecture that provides the foundation for secure resistance communications:

Section 3-1 introduced the strategic framework and principles underlying the multi-layer approach to communication security.

Section 3-2 detailed Layer 1 systems for high-risk real-time communication with maximum security and anonymity protection.

Section 3-3 covered Layer 2 systems that balance security with collaboration functionality for ongoing operational coordination.

Section 3-4 described Layer 3 failsafe and offline methods that provide backup communication capabilities independent of internet infrastructure.

Section 3-5 explained Layer 4 anonymous broadcasting systems for public communications with sender anonymity and censorship resistance.

Section 3-6 provided systematic frameworks for selecting appropriate communication protocols based on security requirements and operational needs.

Integration and Implementation

The multi-layer architecture provides a comprehensive framework for resistance communications, but effective implementation requires:

Next Steps

Chapter 4 builds on this architectural foundation by providing detailed configuration and operational guidance for the secure messaging systems that form the core of Layers 1 and 2. Understanding the architectural principles covered in this chapter is essential preparation for the practical implementation guidance that follows.


Next: Chapter 4: Secure Messaging and Voice Communications →