Letter: The Global Cyber War and DDOS Ping Attacks

JWR, For some background, I’ve worked as a UNIX systems administrator  for more than 20 years in the financial environment. This background includes working for major bankig and stock mark trading companies. I’m not saying that to impress, I am saying it so you know that I have a good amount of experience in the field. Although logs and paths can be modified, a significant amount of scanning and denial attacks on both commercial and personal computer systems really does seem to come from Russia, China, and the Netherlands. Now a layperson may ask:  “Why does China care about my …




Letter: Understanding Bank Transaction Reporting in the U.S.

Dear SurvivalBlog Readers: I have noticed over the last few weeks a couple of articles discussing banking and transaction reporting etc. I would recommend (if one is having trouble sleeping at night) that everyone who is interested read the audit manuals for the Bank Secrecy Act (BSA), which includes currency transaction reporting (CTR), suspicious activity reporting (SAR), and monetary instrument logs (MIL). Bank’s are required by law to perform these on all customers based on activity and the bank’s teller system analysis. Most people know about CTRs – deposit or withdraw more than $10,000 in cash – but they do …




Terror in Texas: An Active Shooter, by Sophie

This is a wake-up call for all of you who think you’re ready when the Schumer Hits the Fan (SHTF). Whatever trigger may cause the mayhem, you think you’re ready for it because you read all the advice from experts like SurvivalBlog so that your prepared to handle anything thrown at you. Well I’m here to tell you that when it does come your way, either by lack of practice, planning, forgetfulness or not doing what you know you should, life can turn for the worst to immediately change your life and those you love. Yesterday was my day to …




Guest Article: Being (Part 4 in Intelligence for Preparedness), by Samuel Culper

This is the fourth and last article in a series about using intelligence for preparedness. I’m starting from square zero in order to introduce a new crop of Americans to the concept of using intelligence, to prove that there’s a need for intelligence, and to get readers quickly up to speed on how to incorporate it into their security planning. For a better foundation, be sure to read Part One, Part Two, and Part Three. (And check out the Ultimate ACE Startup Guide, too.) Brief recap: In the first article, we established that prepared communities need intelligence because they’re going …




Letter: Using Military Ammo Cans for Faraday Shielding

Dear JWR: The use of military surplus ammo boxes as Faraday shields was recently mentioned again in SurvivalBlog.  But readers should be reminded that these cans will not work in the configuration where they are normally purchased.  This is because the boxes have a rubber gasket to seal the lid from water and that makes the lid not in [electrical] contact with the body of the can, thereby losing the [EMP] shield effect.  Regards, – Dave X. JWR Replies:  You are correct.  As mentioned previously in SurvivalBlog, the best approach is to remove the rubber gasket,  rough up the metal …




Letter Re: Huge Secondary Disaster

Hurricane Matthew, the category 3 or 4 hurricane likely hitting at or near coastal cities like Miami and Jacksonville, each with greater metropolitan areas approaching a million people, will be a huge disaster. The fact that this hurricane looks to stay very strong as it hits every other coastal Florida city in-between Miami and Jacksonville, then weakening to a category 2 before hitting Savannah and all of the coast of Georgia, then hitting Charleston and all of the coast of South Carolina, then hitting Wilmington and all of the coast of North Carolina, will make this a very huge disaster. …




Letter Re: Why a Higher Alert Level Is Appropriate This Fall, by Kass Andrada

Hugh, The scenario discussed of China needing food and invading neighbors to do so is the topic of a Book series, the first of which is called Tomorrow, When the War Began. It was also made into a movie, which removed much of the country specific aspects. The basic premise being that China required farming land to feed its population and so invades Australia, because the rich, greedy, Australians are wasting their territory and the Chinese will show them how to better use their assets. The Chinese Army is greatly supplemented with conscripts and volunteers, who are offered land to …




Live Your Survival and Gain Sufficiency-Part 2, by E.M.

Mental Health Physical health for the mind is equally as important as exercising it. Like our body, if we have an unhealthy mind there will not be much exercise. We must make sure that we are not taking with great excess or frequency those things that alter and damage our mind and cause us to lose focus. There are also foods we can eat daily and place in our preparedness food shelter which will aid the biological make up of our physical mind. This topic is a book in and of itself, and there is a very large selection of …




The Art and Practice of OPSEC, by T.H.

What is it? We often hear the term OPSEC, also know as Operations Security (not Operational Security), but few people actually know what it really means. When asked they often say, “It means not talking about what you are doing.” Or, they may say, “It means staying gray.” This is an extremely simplistic view of the program and fails to incorporate the nuances and methodology of the process. The concept is nothing new. In the fifth century BCE, Sun Tzu wrote, “If I am able to determine the enemy’s dispositions while at the same time I conceal my own, then …




Letter: Use Even More Caution Putting Personal Information Out There

HJL, A study by the RAND Corporation, published in the Journal of Cybersecurity, looked at the frequency and cost of IT security failures in U.S. businesses and found that the cost of a break-in is much lower than thought, typically around $200,000 per case. With top-shelf security systems costing a lot more than that, not beefing up security looks in some ways like a smart business decision. “I’ve spent my life in security and everyone expects firms to invest more and more,” the report’s author Sasha Romanosky told The Reg. “But maybe firms are making rational investments and we shouldn’t …




Making Your Home a Castle Hidden in Plain Sight, by B.T.

Many people do not seek professional advice about home security, because there are many do-it-yourself resources available. This, coupled with a handful of common sense, can get you a long way in home fortification. Let’s talk about how to get these upgrades to work together in a synergistic manner that maintains a low profile but increases your security posture. I have 15 years of military experience, 12 years of law enforcement experience, and four years of experience providing personal security for top U.S. government and foreign officials. I have traveled the world, working with foreign governments, militaries, and police forces. …




Continuity Plan, by E.M.

I guess I have always been a survivalist. As a small child during the Cuban Missile Crisis, I remember bugging out from our house near a SAC bomber base in Florida to a piece of land my dad owned about 70 miles away. I was awakened in the middle of the night by my parents, had a blanket draped over my shoulders, and was carried to my dad’s pickup. I didn’t really know what was going on, but I could tell my parents were scared. My uncle, who was in the military, called my dad in the middle of the …




Taking the Offensive Against ISIS: A Historical View- Part 2, by S.G. in Florida

Bret Stephens in the Wall Street Journal recently identified political beliefs that are endangering Europe.iii Mr. Stephens should have broadened his view to the West in general. Piggybacking on his ideas, the first thing that the West must do is recognize that there is something in the West worth preserving. It requires a great unlearning of the political mythologies on which modern society is ingesting. Among those mythologies: that the relative peace of the post-World War II world is the result of a postwar moral commitment to peace rather than a Paz-Americana; that Christianity is of merely historical importance rather …




Guest Article: Lessons Learned From The Pioneer Fire 2016, by Tanker Jack

This all happened within our first month into our relocation to the Redoubt. To start off correctly, we must give you a little background on our family. I was a retired Army tanker ( for 20 years), then in 2009 we started our next career as a government employee with Corp of Engineers and the Navy. Chasing promotions had us moving every two years, taking several jobs with the purpose of climbing the corporate ladder as fast as possible. Then the “come to Jesus” moment” that turned us into the preppers we are today happened. The Kentucky ice storm of …




Letter Re: EMP Telltale

Hugh, Whenever the power goes out wherever I am, the first thing I do is see if my battery-operated watch is still working. I suspect one of these times, the screen will be blank or just chaos. – Sid, too near Niagara Falls HJL Comments: As technology advances, the gate sizes grow smaller making such electronics more susceptible, but at the same time manufacturers recognize that they are more susceptible to static electricity as well. As a result, manufacturers almost always include some basic protection in the on-board circuits. Add to that the concept that the amount of energy absorbed …