Security Handbook
Security isn't optional — it's how we protect each other. This handbook covers the essential practices every participant must follow.
Why Security Matters
The people we protect face real consequences if exposed:
- Detention and deportation
- Family separation
- Job loss
- Harassment and violence
Our security practices exist to prevent these outcomes. When we take security seriously, we protect our most vulnerable community members.
Core Security Principles
1. Assume Compromise is Possible
No system is perfectly secure. We design our structure so that when (not if) something goes wrong, the damage is contained.
2. Minimize What You Know
You can't reveal what you don't know. This is why we compartmentalize.
3. Minimize What You Store
Data that doesn't exist can't be seized. We use disappearing messages and avoid records.
4. Practice Consistently
Security only works if everyone does it, every time. One slip can compromise others.
Security Layers
┌─────────────────────────────────────────────────────────┐
│ STRUCTURAL │
│ Compartmentalization, vouching, cells │
├─────────────────────────────────────────────────────────┤
│ COMMUNICATION │
│ Encrypted messaging, disappearing messages │
├─────────────────────────────────────────────────────────┤
│ DEVICE │
│ Phone locks, encryption, secure apps │
├─────────────────────────────────────────────────────────┤
│ PHYSICAL │
│ Meeting locations, paper records, awareness │
├─────────────────────────────────────────────────────────┤
│ BEHAVIORAL │
│ What you say, what you share, who you trust │
└─────────────────────────────────────────────────────────┘Each layer reinforces the others. Weakness in one can be compensated by strength in others — but all matter.
Minimum Requirements for All Participants
Every person in the network must:
- [ ] Use Signal for all cell communication
- [ ] Configure disappearing messages
- [ ] Lock their phone with PIN/biometric
- [ ] Never discuss cell activities on other platforms
- [ ] Never share information across segments
- [ ] Complete security training before participating
These are not suggestions. They are requirements.
Handbook Sections
| Section | Covers |
|---|---|
| Device Security | Phone setup, encryption, secure practices |
| Communication OpSec | Signal, what to say, what not to say |
| Physical Security | Meetings, locations, awareness |
| If Compromised | What to do when something goes wrong |
Quick Reference: Do's and Don'ts
Do
✓ Use Signal for all cell communication
✓ Lock your phone
✓ Verify safety numbers with important contacts
✓ Use disappearing messages
✓ Trust your instincts about suspicious behavior
✓ Ask questions if something seems off
Don't
✗ Discuss cell activities on social media
✗ Share information across segments
✗ Keep records of activities or members
✗ Use email or SMS for sensitive communication
✗ Take photos at activities without explicit consent
✗ Assume security doesn't apply to you
Continue to detailed sections: