The Resistance Toolkit —
Operational Guides for Nonviolent Resistance
Five structured reference guides covering the practical disciplines of nonviolent resistance — from knowing your legal rights to protecting your identity, communicating securely, countering disinformation, and applying proven nonviolent methods. Built for journalists, civil society workers, activists, and anyone operating under scrutiny.
Device security, encrypted communications, secure browsing, and operational security for anyone handling sensitive information. The technical foundation on which all other operational security rests. Draws on EFF Surveillance Self-Defense and Freedom of the Press Foundation guidance.
How disinformation campaigns work, how to identify them, and how to counter them without amplifying what you’re opposing. Covers verification methods, source assessment, narrative inoculation, and the mechanics of influence operations. Essential for anyone operating in contested information environments.
A curated reference to Gene Sharp’s 198 Methods of Nonviolent Action — the definitive academic taxonomy of proven nonviolent resistance methods, anchored exclusively to Albert Einstein Institution publications. Covers protest and persuasion, noncooperation, and nonviolent intervention, with historical precedents for each category.
Protecting your personal identity, your network, and your sources from surveillance and retaliation. The human behaviour layer on top of digital security — drawn from Reporters Sans Frontières methodology and adapted for civil society workers, journalists, and resistance members operating under scrutiny. Covers threat modelling, digital and physical identity separation, OSINT awareness, and secure communications.
A country-agnostic framework for understanding your legal rights during nonviolent resistance. Covers the five universal legal principles that appear across democratic systems, the four phases of legal exposure, how to research jurisdiction-specific law, documentation as protection, and how to find legal support wherever you are. Built to be useful in any democratic context.
The Resistance Toolkit exists because the information needed to engage safely and effectively in nonviolent resistance is scattered across academic publications, NGO guides, and specialist resources that most people never encounter. The toolkit aggregates, structures, and contextualises that information in one place — referenced, sourced, and editorially accountable.
Every page in this toolkit draws on primary sources from organisations that have spent decades developing this knowledge: the Albert Einstein Institution, Reporters Sans Frontières, the Electronic Frontier Foundation, Amnesty International, the International Center on Nonviolent Conflict. We do not originate tactical instruction. We provide access to the best existing frameworks, clearly organised and ready to use.
The Resistance Hub takes no position on specific political campaigns or movements. This toolkit is provided for educational purposes. The methods, frameworks, and legal guidance documented here apply to nonviolent resistance in democratic contexts. Nothing in this toolkit constitutes legal advice. Consult a qualified legal professional in your jurisdiction before taking action based on any legal guidance described here.
The five domains are independent — each can be read and applied on its own. For those new to operational security or nonviolent resistance, the following sequence builds from foundational to advanced, with each domain reinforcing the next.
Understanding your legal rights and the framework for protecting them is foundational. Before any other preparation, know what you are legally entitled to do and what protections exist for you. Know the Law is country-agnostic and applies in any democratic context.
Use the threat modelling framework in Identity Discipline to assess your specific exposure. This determines how rigorously you need to apply the digital security and physical identity measures in the toolkit. Not everyone needs the same level of protection — but everyone needs to know their level.
Apply the technical protections in Digital Security proportionate to your threat level. At minimum: a password manager, Signal for sensitive communications, and full-disk encryption on your devices. These changes address the majority of exposure for most threat environments.
Any active resistance operates in an information environment that will include disinformation — about your movement, your methods, and your intentions. Understanding how influence operations work and how to counter them without amplifying them is an operational requirement, not an optional extra.
With legal knowledge, identity protection, secure communications, and information resilience in place, Street Level Tactics provides the strategic framework for action. Sharp’s taxonomy gives you a historically grounded, academically rigorous reference for selecting and sequencing nonviolent methods appropriate to your context.
The domains in this toolkit are interdependent. Legal knowledge without identity discipline creates exposure. Identity discipline without secure communications leaves a gap. Digital security without an understanding of the information environment can be undermined by social engineering. The toolkit works best as a system, not a checklist.
