// Resistance Toolkit  ·  Hub

The Resistance Toolkit —
Operational Guides for Nonviolent Resistance

Five structured reference guides covering the practical disciplines of nonviolent resistance — from knowing your legal rights to protecting your identity, communicating securely, countering disinformation, and applying proven nonviolent methods. Built for journalists, civil society workers, activists, and anyone operating under scrutiny.

5 Operational Domains
198 Documented Methods
40+ Primary Source References
Curated by  The Resistance Hub Editorial Team Updated:  February 2026 Sources:  Gene Sharp  ·  RSF  ·  EFF  ·  ICNC  ·  Amnesty International  ·  Albert Einstein Institution Editorial Standards:  Policy →
01
// Domain 01
Digital Security & Privacy

Device security, encrypted communications, secure browsing, and operational security for anyone handling sensitive information. The technical foundation on which all other operational security rests. Draws on EFF Surveillance Self-Defense and Freedom of the Press Foundation guidance.

Device Encryption Secure Messaging VPN & Tor Password Security Metadata
Open
02
// Domain 02
Countering Misinformation

How disinformation campaigns work, how to identify them, and how to counter them without amplifying what you’re opposing. Covers verification methods, source assessment, narrative inoculation, and the mechanics of influence operations. Essential for anyone operating in contested information environments.

Verification Source Assessment Influence Operations Narrative Inoculation OSINT
Open
03
// Domain 03
Street Level Tactics

A curated reference to Gene Sharp’s 198 Methods of Nonviolent Action — the definitive academic taxonomy of proven nonviolent resistance methods, anchored exclusively to Albert Einstein Institution publications. Covers protest and persuasion, noncooperation, and nonviolent intervention, with historical precedents for each category.

198 Methods Gene Sharp Protest & Persuasion Noncooperation Historical Cases
Open
04
// Domain 04
Identity Discipline

Protecting your personal identity, your network, and your sources from surveillance and retaliation. The human behaviour layer on top of digital security — drawn from Reporters Sans Frontières methodology and adapted for civil society workers, journalists, and resistance members operating under scrutiny. Covers threat modelling, digital and physical identity separation, OSINT awareness, and secure communications.

Threat Modelling Digital Separation Physical Discipline OSINT Audit RSF Framework
Open
05
// Domain 05
Know the Law

A country-agnostic framework for understanding your legal rights during nonviolent resistance. Covers the five universal legal principles that appear across democratic systems, the four phases of legal exposure, how to research jurisdiction-specific law, documentation as protection, and how to find legal support wherever you are. Built to be useful in any democratic context.

Universal Principles Four Phases Legal Research Documentation Legal Support
Open

The Resistance Toolkit exists because the information needed to engage safely and effectively in nonviolent resistance is scattered across academic publications, NGO guides, and specialist resources that most people never encounter. The toolkit aggregates, structures, and contextualises that information in one place — referenced, sourced, and editorially accountable.

Every page in this toolkit draws on primary sources from organisations that have spent decades developing this knowledge: the Albert Einstein Institution, Reporters Sans Frontières, the Electronic Frontier Foundation, Amnesty International, the International Center on Nonviolent Conflict. We do not originate tactical instruction. We provide access to the best existing frameworks, clearly organised and ready to use.

Editorial Position

The Resistance Hub takes no position on specific political campaigns or movements. This toolkit is provided for educational purposes. The methods, frameworks, and legal guidance documented here apply to nonviolent resistance in democratic contexts. Nothing in this toolkit constitutes legal advice. Consult a qualified legal professional in your jurisdiction before taking action based on any legal guidance described here.

The five domains are independent — each can be read and applied on its own. For those new to operational security or nonviolent resistance, the following sequence builds from foundational to advanced, with each domain reinforcing the next.

1
Start with Know the Law

Understanding your legal rights and the framework for protecting them is foundational. Before any other preparation, know what you are legally entitled to do and what protections exist for you. Know the Law is country-agnostic and applies in any democratic context.

2
Assess Your Threat Level — Identity Discipline

Use the threat modelling framework in Identity Discipline to assess your specific exposure. This determines how rigorously you need to apply the digital security and physical identity measures in the toolkit. Not everyone needs the same level of protection — but everyone needs to know their level.

3
Secure Your Communications — Digital Security

Apply the technical protections in Digital Security proportionate to your threat level. At minimum: a password manager, Signal for sensitive communications, and full-disk encryption on your devices. These changes address the majority of exposure for most threat environments.

4
Understand the Information Environment — Countering Misinformation

Any active resistance operates in an information environment that will include disinformation — about your movement, your methods, and your intentions. Understanding how influence operations work and how to counter them without amplifying them is an operational requirement, not an optional extra.

5
Apply the Methods — Street Level Tactics

With legal knowledge, identity protection, secure communications, and information resilience in place, Street Level Tactics provides the strategic framework for action. Sharp’s taxonomy gives you a historically grounded, academically rigorous reference for selecting and sequencing nonviolent methods appropriate to your context.

On Operational Security

The domains in this toolkit are interdependent. Legal knowledge without identity discipline creates exposure. Identity discipline without secure communications leaves a gap. Digital security without an understanding of the information environment can be undermined by social engineering. The toolkit works best as a system, not a checklist.

Advertisement