Data Collection in Our Lives, by Anonymous in Ohio

With all of the recent discussion of Artificial Intelligence (A.I.) threats in SurvivalBlog, I want to share a recent experience with what I assume was an A.I.-intervened technology. We were recently moving some of our supplies across state in a small cargo trailer to our cabin. We had unloaded the trailer and were returning home when I saw flashing lights in my mirror. I thinking to myself, I can’t be trailer lights, everything is rewired new, new tires, bearings, doors were locked. The State Trooper came up to the window and tells me that my plates on the trailer registration …




SurvivalBlog Readers’ & Editors’ Snippets

Our weekly Snippets column is a collection of short items: responses to posted articles, practical self-sufficiency items, how-tos, lessons learned, tips and tricks, and news items — both from readers and from SurvivalBlog’s editors. Note that we may select some long e-mails for posting as separate letters. — SurvivalBlog’s Editor-at-Large Michael Z. Williamson sent us this first-hand evidence of audio keyword snooping by social media, via a persistently listening smartphone: “I recently drove to Atlanta for a memorial service on aSaturday morning. On the way, I had a phone call with my ex and mentioned a real estate firm, Noble …




Communications Options for the Common Man – Part 1, by Tunnel Rabbit

We live in uncertain times where tens of millions of foreign invaders comprised largely of military-aged males have recently and in organized fashion crossed our borders. They were assisted by U.S. government-funded NGOs south of the border. We certainly should wonder about their intent. And there are many other significant threats that we should be concerned with particularly as the world is rapidly becoming unstable, both economically and geopolitically. At some point in the near future, World War 3 will break out and the economy at home will suffer greatly, causing riots in the streets that would further destabilize this …




The Least Invasive Real ID, by St. Funogas

With the Real ID requirements finally going into effect as of May 7th, a US passport card is the best option for those interested in maintaining as much privacy as possible. A passport card offers more flexibility and maintains your privacy to a higher degree than a driver’s license. For those who consider their home address at the top of their privacy list, nothing beats a passport card. I’m no expert in this field but I’m basing this article on my own personal experiences and testimonies of friends. The reader is strongly advised to do their own research before applying …




Why We Should Dread a Second Civil War

Introductory Note: In a SurvivalBlog essay that I wrote back in January, 2019, I warned that there were signs that a Second Civil War might be brewing. I’d like to update and expand on that theme, in this essay. — The recent release of the first trailer for the scheduled April 2024 release of the A24 Productions movie titled Civil War has prompted considerable conjecture. The film reportedly had a $75 million budget. Commentator Tim Pool posted his thoughts on it, and then followed up with a more in-depth panel discussion, and then another. Dozens of others have also chimed …




A Local Disaster Network – Part 5, by J.M.

(Continued from Part 4. This concludes the article.) Cloud Dancing Next, we’ll set up the Nextcloud application. Assuming your laptop and Raspberry Pi are still connected to your GL.iNet router and it has Internet access, open up a web browser on your laptop and enter the following address: ‘http://nextcloud.local’ – depending on your operating system and browser you may get a warning that says the connection isn’t private – just click to proceed anyway (or click on ‘Advanced’ and then ‘Proceed’). The first screen that will pop up is the following:           You’ll notice that there …




A Local Disaster Network – Part 4, by J.M.

(Continued from Part 3.) Cloud Server Next, we’re going to set up the operating system and Nextcloud cloud application that runs on the Raspberry Pi server. You’ll need to download two or three pieces of software to accomplish this – a utility for loading the Raspberry Pi’s operating system image onto the microSD card, the actual Raspberry Pi operating system/application image file, and a tool for uncompressing the compressed operating system/application image file after downloading it (if you don’t already have something like WinZip or 7-Zip installed). For the Pi’s operating system/application we’re going to use an image called NextCloudPi …







A Local Disaster Network – Part 2, by J.M.

(Continued from Part 1.) There are two additional items required to run a Raspberry Pi – a microSD card for storage and a power supply. I’ve set up, configured and run dozens of Raspberry Pis since they came out in 2012, and 90% of all of the problems I’ve ever encountered with them are the result of either a bad microSD card or inadequate power supply, so you don’t want to cheap out on either. For the microSD card I strongly recommend using a SanDisk MAX ENDURANCE model of at least 64GB, but bigger is always better, so get a …




A Local Disaster Network – Part 1, by J.M.

There have been a number of articles on SurvivalBlog on the use of mobile devices like cell phones and tablets in survival/disaster scenarios (including one I wrote – ‘Tactical Technology for TEOTWAWKI’ parts 1, 2, 3, 4, 5, 6). In that article, I briefly introduced the idea of setting up and using a home server/network infrastructure for a disaster scenario, which can provide you with a lot of options for planning, organizing, coordinating, sharing, and communicating information among your team, family, group, or community. In this article, I’ll discuss one possible approach for configuring such an infrastructure for disaster situations. …




Lessons From A Hard Disk Crash

In place of another feature article that I had planned for today, I’m posting a recap of a recent laptop computer problem, with some lessons learned. To start, I should mention that I’ve been a Macintosh user for my home computers since 1986. My first Mac was a Macintosh Plus, purchased just after I got off of active duty as an Intelligence Corps officer. This was before I was ever married.  I’ve owned a whole succession of improved Macs since then.  Since the turn of the century, most of those have been alloy-case MacBook laptops. I’ve always been fairly good …




Invisibility: Increasing OPSEC – Part 4, by St. Funogas

(Continued from Part 3. This concludes the article.) Computer OPSEC I’ll let the reader research computer, email privacy, and encryption on their own but I do have two things I’ll pass on. When I hover the mouse pointer over a file in one of my computer folders, a box opens above it showing the author, title (which is actually my LibreOffice template name), computer owner, and date among other things. There are two ways to prevent this from exposing personal information about me than I’d prefer when I share documents or photographs. First, when setting up a new computer I …




Invisibility: Increasing OPSEC – Part 3, by St. Funogas

(Continued from Part 2.) Social Security Number It goes without saying that our social security number shouldn’t be given to anyone unless we’re legally required to provide it, and that’s not very often. On the other hand, if it’s a private business they can also deny us service. But there’s a caveat. After selling an item to a business for a large sum of money I went straight to their bank to cash the check. The amount of cash was small enough to avoid government paperwork but the bank demanded I write my social security number below my signature on …




Invisibility: Increasing OPSEC – Part 2, by St. Funogas

(Continued from Part 1.) Using LLCs An anonymous LLC is the most important tool available to ensure no one can connect your name to your physical address and provides other benefits as well. Using an online agent LLC’s are quick and easy to obtain with some starting as low as $99. Don’t be intimidated by “LLC,” it’s something lots of us non-business little guys have and they’re useful in many ways once you understand how they work. Why an LLC? There are many reasons as discussed below but the biggest reason is that all county courthouses in the US maintain …




Invisibility: Increasing OPSEC – Part 1, by St. Funogas

I recently read an article on advances which have been made using ear recognition as one more way to track us and violate our privacy. Since facial recognition systems are sometimes inadequate due to factors such as faces hidden by hair or covid masks, additional recognition technology using our ears is being developed. I don’t need to mention all the other ways modern technology is being used to violate our privacy or that our rights are being eroded by the day. The article brought to mind a book I read while looking for a place to set up my homestead: …