FM-R1: FM-R1: Secure Communication Networks for Decentralized Resistance
UNCLASSIFIED

Part III: Operational Security Procedures

Overview

Part III addresses the critical operational security (OpSec) procedures that protect resistance operations from detection, infiltration, and compromise. This part moves beyond communication systems to cover the broader operational environment, including hardware security, digital hygiene, and operational procedures that ensure resistance activities remain secure and effective.

Operational security is the discipline of protecting critical information and activities through systematic procedures and practices. Unlike technical security measures that rely on cryptography and secure systems, operational security focuses on human behavior, physical security, and procedural controls that prevent adversaries from gathering intelligence about resistance operations.

Learning Objectives

Upon completing Part III, you will be able to:

The Operational Security Challenge

The Human Factor

Technical security systems are only as strong as the humans who operate them. The most sophisticated encryption and anonymity tools can be rendered useless by poor operational security practices. Common operational security failures include:

The Surveillance Environment

Modern resistance operations occur within a comprehensive surveillance environment that includes:

Technical Surveillance:

Human Surveillance:

Physical Surveillance:

The Compartmentalization Imperative

Effective operational security requires strict compartmentalization of information, activities, and identities. This includes:

Information Compartmentalization:

Identity Compartmentalization:

Activity Compartmentalization:

Multi-Domain Security Strategy

Part III is organized around a three-domain security strategy that addresses different aspects of operational security:

Domain 1: Hardware and Infrastructure Security

Focus: Physical devices, systems, and infrastructure Security Level: Foundation-level security for all operations Tools: Tails OS, hardware compartmentalization, secure disposal Characteristics:

Domain 2: Digital Hygiene and Privacy

Focus: Online activities and digital footprint management Security Level: Comprehensive privacy protection Tools: Tor Browser, VPNs, anonymous accounts, search privacy Characteristics:

Domain 3: Operational Procedures

Focus: Human behavior and procedural controls Security Level: Comprehensive operational discipline Tools: Cell organization, meeting protocols, surveillance detection Characteristics:

Chapter Overview

Chapter 6: Hardware and Infrastructure Security (6-1 to 6-8)

Establishes the foundation of physical security for resistance operations:

6-1: Untraceable Hardware Acquisition - Methods for obtaining devices without creating paper trails

6-2: Tails OS Installation and Configuration - Complete setup guide for the amnesic operating system

6-3: Device Compartmentalization - Strategies for separating different operational roles across devices

6-4: Physical Security Measures - Protecting devices, locations, and operations from physical compromise

6-5: Network Access Security - Secure methods for accessing internet and communication networks

6-6: Hardware Disposal and Sanitization - Proper destruction and disposal of compromised or obsolete equipment

6-7: Faraday Cage and Signal Blocking - Techniques for preventing electronic surveillance and tracking

6-8: Power and Charging Security - Secure power management and charging procedures

Chapter 7: Digital Hygiene and Privacy (7-1 to 7-6)

Covers comprehensive digital privacy and footprint management:

7-1: Browser Security Configuration - Hardening browsers for maximum privacy and security

7-2: Search Engine Privacy - Anonymous information gathering and research techniques

7-3: VPN and Tor Usage - Comprehensive guide to anonymity networks and VPN services

7-4: Social Media Operational Security - Managing online presence and social media security

7-5: Email Security and Anonymous Accounts - Creating and managing secure email and online accounts

7-6: Digital Footprint Minimization - Reducing and managing online traces and data exposure

Chapter 8: Operational Procedures (8-1 to 8-8)

Provides comprehensive operational discipline and procedures:

8-1: Cell Organization and Management - Structures and procedures for resistance cell operations

8-2: Meeting Security Protocols - Secure procedures for in-person and virtual meetings

8-3: Coded Language and Communication - Development and use of coded communication systems

8-4: Surveillance Detection and Evasion - Techniques for detecting and avoiding surveillance

8-5: Emergency Procedures and Protocols - Crisis response and emergency security procedures

8-6: Information Sanitization - Procedures for protecting and sanitizing sensitive information

8-7: Operational Planning Security - Secure planning and coordination procedures

8-8: Post-Operation Security Review - Assessment and improvement procedures after operations

Implementation Approach

Progressive Implementation

Part III is designed for progressive implementation, building operational security capabilities systematically:

Phase 1: Hardware Foundation

Phase 2: Digital Hygiene

Phase 3: Operational Procedures

Phase 4: Advanced Operations

Security Integration

Each operational security domain integrates with the communication systems from Part II:

Hardware Security Integration:

Digital Hygiene Integration:

Operational Procedures Integration:

Risk Management Framework

Part III employs a comprehensive risk management framework that addresses operational security risks:

Risk Categories

Technical Risks:

Physical Risks:

Human Risks:

Operational Risks:

Risk Mitigation Strategies

Preventive Measures:

Detective Measures:

Corrective Measures:

Operational Security Discipline

Operational security requires consistent discipline and attention to detail. A single procedural violation can compromise an entire operation and endanger all participants. All resistance practitioners must understand and consistently apply operational security principles.

Integration with Other Parts

Part III builds directly on the foundational principles from Part I and the communication systems from Part II:

Getting Started

For New Practitioners

  1. Begin with hardware security to establish a secure operational foundation
  2. Implement basic digital hygiene practices before engaging in resistance activities
  3. Study operational procedures thoroughly before participating in resistance operations
  4. Practice all procedures in safe environments before operational implementation

For Experienced Practitioners

  1. Assess current operational security practices against the standards in this part
  2. Identify gaps and vulnerabilities in existing procedures and practices
  3. Implement improvements systematically with proper training and support
  4. Establish ongoing assessment and improvement procedures

For Network Leadership

  1. Develop comprehensive operational security policies and procedures
  2. Establish training programs for all operational security domains
  3. Implement assessment and compliance monitoring systems
  4. Plan for continuous improvement and adaptation to evolving threats
Implementation Priority

Focus first on hardware security (Chapter 6) as the foundation for all other operational security measures. Secure hardware and operating systems are prerequisites for effective digital hygiene and operational procedures.


Ready to begin? Start with Chapter 6: Hardware and Infrastructure Security →