FM-R1: FM-R1: Secure Communication Networks for Decentralized Resistance
UNCLASSIFIED

Part II: Secure Communication Systems

Overview

Part II addresses the critical challenge of maintaining secure communications within resistance networks operating under advanced surveillance. This part provides comprehensive guidance for implementing multi-layer communication architectures that balance security requirements with operational effectiveness.

Communication security is the backbone of resistance operations. Without secure communications, resistance networks cannot coordinate activities, share intelligence, or maintain operational security. However, communication also represents the greatest vulnerability, as every communication creates metadata that can be analyzed to reveal network structures, operational patterns, and individual behaviors.

Learning Objectives

Upon completing Part II, you will be able to:

The Communication Security Challenge

The Metadata Problem

Modern surveillance systems focus less on communication content (which can be encrypted) and more on communication metadata (which reveals patterns even when content is protected). Every digital communication generates metadata including:

This metadata can be analyzed to:

The Usability-Security Tension

Perfect communication security would require:

Perfect operational effectiveness would require:

Practical resistance communications must balance these competing requirements through carefully designed architectures that provide appropriate security for specific use cases while maintaining operational effectiveness.

Multi-Layer Communication Strategy

Part II is organized around a four-layer communication architecture that provides different security levels for different operational requirements:

Layer 1: High-Risk Real-Time Communication

Use Case: Time-sensitive coordination during active operations Security Level: Maximum security, minimal metadata Tools: Session Messenger, Briar mesh networking Characteristics:

Layer 2: Secure Collaboration Systems

Use Case: Planning, document sharing, and ongoing coordination Security Level: High security with collaboration features Tools: Element/Matrix (self-hosted), CryptPad Characteristics:

Layer 3: Failsafe and Offline Methods

Use Case: Emergency communications and backup channels Security Level: Maximum reliability and availability Tools: OnionShare, encrypted email, physical dead drops Characteristics:

Layer 4: Anonymous Broadcasting

Use Case: Public communications and propaganda distribution Security Level: Sender anonymity and censorship resistance Tools: Tor hidden services, distributed publishing platforms Characteristics:

Chapter Overview

Chapter 3: Communication Layer Architecture (3-1 to 3-6)

Establishes the theoretical framework and practical implementation of multi-layer communication systems:

3-1: Multi-Layer Communication Strategy - Overall architecture and layer selection criteria

3-2: High-Risk Real-Time Communication (Layer 1) - Maximum security for time-sensitive operations

3-3: Secure Collaboration Systems (Layer 2) - Balancing security with collaboration needs

3-4: Failsafe and Offline Methods (Layer 3) - Backup and emergency communication channels

3-5: Anonymous Broadcasting (Layer 4) - Public communications and information distribution

3-6: Communication Protocol Selection - Choosing appropriate tools and methods for specific scenarios

Chapter 4: Secure Messaging and Voice Communications (4-1 to 4-8)

Provides detailed configuration and operational guidance for secure messaging systems:

4-1: Session Messenger Configuration - Maximum security messaging with onion routing

4-2: Element/Matrix Self-Hosted Setup - Secure collaboration platform implementation

4-3: Briar Peer-to-Peer Messaging - Decentralized messaging without servers

4-4: Signal Security Best Practices - Operational security for mainstream secure messaging

4-5: Voice Communication Security - Secure voice calls and audio communications

4-6: Group Communication Management - Security protocols for multi-participant communications

4-7: Message Verification and Authentication - Ensuring message integrity and sender verification

4-8: Communication Scheduling and Protocols - Operational procedures for secure communications

Chapter 5: File Sharing and Collaboration (5-1 to 5-6)

Covers secure systems for document collaboration and file sharing:

5-1: CryptPad Secure Document Collaboration - Real-time collaborative editing with encryption

5-2: OnionShare Anonymous File Transfer - Secure file sharing over Tor network

5-3: Encrypted Cloud Storage (Mega/Proton) - Secure cloud storage for resistance operations

5-4: Digital Dead Drops - Asynchronous file sharing without direct contact

5-5: Version Control for Sensitive Documents - Managing document versions and changes securely

5-6: Collaborative Security Protocols - Operational procedures for secure collaboration

Implementation Approach

Progressive Implementation

Part II is designed for progressive implementation, allowing resistance networks to start with basic secure communications and gradually add more sophisticated capabilities:

Phase 1: Basic Secure Messaging

Phase 2: Collaboration Infrastructure

Phase 3: Advanced Architecture

Phase 4: Operational Integration

Security Considerations

Each communication system and protocol covered in Part II includes specific security considerations:

Technical Security:

Operational Security:

Strategic Security:

Communication Discipline

The most sophisticated communication systems are worthless without proper operational discipline. All participants must understand and consistently follow communication protocols, security procedures, and operational security practices.

Integration with Other Parts

Part II builds directly on the foundational principles and threat assessment methodologies covered in Part I:

Part II also provides the foundation for the operational security procedures covered in Part III and the advanced techniques covered in Part IV.

Getting Started

For Technical Implementation

  1. Start with threat assessment to determine appropriate security levels
  2. Begin with basic tools (Signal or Session) before implementing complex systems
  3. Test all systems thoroughly in safe environments before operational use
  4. Implement gradually with proper training and support for all participants

For Operational Planning

  1. Map communication requirements to the four-layer architecture
  2. Develop communication protocols appropriate to your threat environment
  3. Establish training programs for all communication tools and procedures
  4. Plan for contingencies including system compromise and failure scenarios

For Network Leadership

  1. Assess current communication practices against security requirements
  2. Develop implementation timeline for improved communication security
  3. Allocate resources for infrastructure, training, and ongoing maintenance
  4. Establish governance for communication system management and security
Implementation Priority

Focus first on implementing basic secure messaging (Chapter 4) before attempting to deploy complex multi-layer architectures. Solid implementation of fundamental tools is more valuable than poorly implemented advanced systems.


Ready to begin? Start with Chapter 3: Communication Layer Architecture →