These people may not know how to fight. Lots of right-wingers don’t know how, either, including those who have been to a lot of spray-and-pray classes. The point is, when the fighting starts, you either learn how to fight or die, or find a way to escape from the front line. The thing to remember is that none other than Karl Marx called for the “universal armament of the proletariat.” The point being, that once the “proletariat” do the job of massacring the right-wingers, they can easily be disarmed. Europe has demonstrated that. Remember that the leftists are most decidedly of the “gimme” persuasion, and the Marxists are happy to “give them” the guns and ammo they need to wreak havoc. That is why reports keep drifting in of semi-loads of AK’s going to the street gangs and similar conveyances. On the right-wing side, the real strength is in the geographic distribution and in industrial and agricultural power. Pull the power grid or the financial grid, and the leftists will starve. Everybody will starve, but they will starve better. I wish I could boast of the moral power of the right-wing, but I can’t. It is probably a modicum better … Continue reading
In 2015, with the rollout of Operational Camouflage Pattern (OCP)—a slight variation of the Crye Multicam pattern, the U.S. Army announced that it is nearing the end of issuing the much-hated Universal Camouflage Pattern (UCP, also known as the Army Combat Uniform or ACU), a conspicuous grayish blob pattern that is actually prominent against most natural backgrounds. The transition from the UCP to OCP Multicam is taking four years. The last day that the UCP uniforms are still authorized for wear for the U.S. Army will be September 30th, 2019. All that I can say is, good riddance to the blob! In my estimation, the UCP is about the worst uniform issued since the French used sky blue tunics and pants in World War I. In the context of survivalism, the grayish UCP utility uniform is suitable for use perhaps only in sagebrush country. Because UCP uniforms and packs will be hitting the surplus market in huge numbers in the next two years, they will be bargain priced. I fear that some preppers might be tempted to buy them, just to “look military.” But unless you live in a region that is dominated by sagebrush, I must warn you: Don’t … Continue reading
Our family lives near the Texas border and must pass border patrol check points periodically when traveling the state. This gives us a front row seat to see what is happening along the southern border. We have noticed recent border patrol changes and wanted to give your readers an update. In the past few years, we have been through many different border patrol check points. For those not familiar with border patrol checkpoints, there are U.S. border stations immediately upon entering from Mexico. There are also border patrol stations located along the Texas border as you drive nearby the border. When we visit the popular tourist destination of South Padre Island, our family in west Texas, or travel along the highway near our home, we are routinely subject to questioning at each check point. Multiple cameras take pictures of your vehicle and everyone inside, while dogs sniff for drugs during questioning by border agents. While going through a border patrol station last weekend we noticed an attitude change of the Border Patrol agents that was worth mentioning. In the past several years, as you entered the single file car line to be stopped and checked for questioning, the border agent … Continue reading
I have had many of my consulting clients ask me for advice about how to maintain their privacy. One of their greatest concerns is the interception of e-mails in the now ubiquitous global Surveillance State. The sad truth is there is now no such thing as “secure” e-mail, even when using high level encryption. If a government wants to know what you are communicating and they are willing to invest sufficient time and energy, then they will eventually be able to read your encrypted e-mail. This is known as brute force decryption, wherein massive computing power is dedicated to breaking an encryption scheme. It also goes without saying that telephones, faxes, radio communications, and in fact virtually all other electronic communications systems are vulnerable to interception, decryption, monitoring, and long-term database archiving. With those capabilities in mind, this leaves us very few options other than traditional face-to-face meetings, mailing well-sealed hardcopy letters, or handing off USB memory sticks via live drops (couriers) or dead drops. (For the sake of brevity, I won’t describe live drop and dead drop methodologies in this article. Those are both Old School tradecraft tricks that have been well described in books and web articles on … Continue reading
Everyone has a plan to “Get Out of Dodge” in an emergency. As I teach my self defense and firearms classes, I ask people and they all say, “I’d head up to my cabin” or “I’ll head out west”. The problem is, have you actually considered how you will leave the immediate area of your home or work? Most of the people I hear begin their plan ambiguously. They say, just simply, “I’d leave town”, but they have never done any reconnaissance or real-life consideration of their route. As humans, we are creatures of habit. If I want to leave my house in Metro Detroit and head to my cabin, I just jump on the freeway two blocks from home and take it most of the way, right? Well, on a normal weekend, without any unrest or an emergency, that’s very simple. These basic plans fall apart once we consider the effects of a large civil disturbance, a disaster, or simply a large-scale long-term blackout. With the increasing trend of protesters blocking the freeways and major streets, these issues must be taken into consideration. As the crisis unfolds, people will take to the streets in many ways. Protesters who may … Continue reading
Mr. Latimer: Simply as a departure point for thought: I placed my wife’s cell phone inside an empty metal coffee can and covered the open top with aluminum foil. I secured that by overlaying the plastic lid. The phone did not ring, nor would it receive a text. Outside of the can, both calls and texts went through. Should you (we) have a cell phone that has a integrated battery, this may make tracking or malicious communications more difficult. – Skyrat
Hi James, For people with cell phones having non-removable batteries, I have wondered if cell phone tracking could be blocked by removing the sim card. I have such a phone, and although removing the battery is not an option, removing the sim card is pretty straightforward. – B.G. o o o Dear Editor, I work exclusively with cell phone RF protocols (4G/LTE, Bluetooth) and can say this “evidence bag” does the trick. http://a.co/7z56VAh In a separate item please let SurvivalBlog readers know that Polar Pure is back on the shelves in the USA after resolving its conflict with the geniuses at the DEA. This is year-old news, but somehow I missed it. – D2 in AZ HJL’s Comment: Just make sure you’re turning your cell phone off when you place it in an RF shield. Without that, the phone will continue to search for service, shortening your battery life.
HJL and JWR, In reference to the article on SurvivalBlog concerning the South African Government’s confiscation of white owned land, I thought you may like to know about a group of Protestant White Christian South Africans known as the Suidlanders, who foresaw the coming storm in 2006. They have developed and put in place a detailed evacuation plan that could be adapted for those in Deep Blue States. BTW, these are refugees I wouldn’t mind having in the Redoubt. – J.M.
Learn the Why and How The election of Donald Trump is beginning to show concrete steps toward dialing back the Obama administration’s numerous efforts to undermine our Second Amendment rights. How that will continue to play out remains to be seen. Surprisingly though, even on Obama’s watch there were several pro-2nd Amendment (2A) court and legislative victories, including expansion of concealed carry in many states. Another thing that occurred while Obama was in office was an unexpected but welcome surprise from the ATF. Several years ago, a well-known AR-15 parts manufacturer requested and received the ATF’s formal approval to manufacture and sell, without restriction, a partially-finished AR-15 lower receiver. This receiver would only be legal for unrestricted sale if the ATF approved the exact design where several very specific features remained un-machined or marked in a way that would aid in its completion. This partially-complete receiver (now commonly called an “80% receiver”) required that the through holes for the trigger and hammer pins be omitted and that solid material must remain where the cavity for all of the trigger components would normally be milled out. This new approach was clearly designed to attract buyers who would then complete the steps … Continue reading
Hugh, The article “Proposed Executive Order Designating Certain Rifles for ‘Militia Purposes’ – G.G” is a big truckload of B.S. We, the people, don’t need an Executive Order. We have a Constitution that reads, “A well regulated militia being necessary to the security of a free state, the right of the people to keep and bear arms shall not be infringed.” That part of our sacred document does not limit the militia to Made in USA AR-15’s! If you think that we will give up our imported firearms, then you are crazy! It is just another communist utopian gun control trick. Beware of wolves in sheep’s clothing! – Big D o o o HJL, I’m not particularly convinced of the authenticity of this purported draft of an EO. That said, the United States Code does provide an extension of the age to 65 for honorably discharged members of the Armed Forces. Title 10 of the USC does not supersede the U.S. Constitution, which does not specify limits to membership of the well regulated militia (or, for that matter, bayonet lugs, magazine capacities, et cetera). A law that contradicts the U.S. Constitution is unconstitutional at its inception. Let your conscience be … Continue reading
Gentlemen, The problem with this proposed executive order is that it refers to members of the “militia” rather than the citizenry. The militia is defined under law as follows: (a)The militia of the United States consists of all able-bodied males at least 17 years of age and, except as provided in section 313 of title 32, under 45 years of age who are, or who have made a declaration of intention to become, citizens of the United States and of female citizens of the United States who are members of the National Guard. (b) The classes of the militia are— (1) the organized militia, which consists of the National Guard and the Naval Militia; and (2) the unorganized militia, which consists of the members of the militia who are not members of the National Guard or the Naval Militia. Could this not be used to restrict ownership of arms (by some weasel) based on a person being over 45 years of age? Perhaps a lawyer could weigh in?
One advantage that we all now have in addressing a cyber attack is awareness. During heightened tensions with other countries, you will be aware of the potential risk that these devices may pose and utilize your electronic equipment sparingly. Knowledge is power. Defensive measures have two considerations. The first thing to ask is, how should I protect myself. The second is, how should I ensure my equipment and my property is not causing damage to my country or the general population. The best defense is to eliminate dependency. Minimizing or reducing our need for electronic devices is the most practical and cost effective way to mitigate this risk. For me (and I assume most of you as well, since you are reading a blog site), these modern tools provide advantages that allow us to produce, perform, and recreate easier and faster and provide greater returns for the effort. I know I utilize my computers for work and play and do not look forward to a day where I may have to give them up. Still, it should be strongly considered, and minimizing devices as much as possible provides protection. If you have such devices, you may be relying on your … Continue reading