Your Best Personal Defense In The Ongoing CyberWar, by AJS

One of claimed “time traveler” John Titor’s most alarming predictions was for a war beginning in 2015 between Russia and the United States. The prediction was made on the old Art Bell Coast-to-Coast AM radio show in the 1999-2000 era. The war would eventually go nuclear and be quite destructive resulting in great loss of life. The good news according to Titor was that the country weathered the physical destruction and came out stronger than ever. With some large cities destroyed it eliminated many governmental sectors and urbanite populations dependent upon government handouts. Now, in retrospect we know the war …




JWR’s Recommendations of the Week:

Here are JWR’s Recommendations of the Week for various media and tools of interest to SurvivalBlog readers. The focus is usually on emergency communications gear, bug out bag gear, books and movies–often with a tie-in to disaster preparedness, and links to “how to” self-sufficiency videos. There are also links to sources for both storage food and storage containers. You will also note an emphasis on history books and historical movies. As an Amazon Associate I earn from qualifying purchases. This week I have a special recommendations column devoted to countersurveillance references and products. Books: Claire Wolfe: The Freedom Outlaw’s Handbook: …




Letter: COMPSEC Warning on Windows 10 Updates

Dear Editor: I used to have respect for Kim Komando, but after reading her article about the recent Windows 10 update, I have moved her to my “don’t trust” list. Let me explain: For my own COMPSEC I only connect to the internet wifi while I am actively using it and even then I monitor the data and CPU usage in real time using task manager. That way I know which program(s) are active. About 10 days ago, I detected the Windows 10 update in progress. It eventually took Four Hours of machine time (6X the usual time) and ate …




Guest Article: Seven People You Don’t Want in Your Group, by Kit Perez

Editor’s Introductory Note: This article first appeared in the American Partisan blog. It is re-posted with permission. I get a lot of questions about recruiting. How to do it, when to do it, when not to. While the best way to answer those questions is in an actual class (and there are still a few spots open in the webinar class I’m teaching on it), there are some hard and fast rules about the type of people you want and don’t want in your group. In fact, there’s a list of automatic disqualifications that I tend to use and teach …




Guest Article: Strategic Relocation: Are You Missing Out? by Kit Perez

This article originally appeared in the American Partisan. The concept of strategic relocation is not new, but it’s recently become more popular, as more and more liberty-loving folks get tired of being crammed into crowded public transportation or spending hours on the road in the daily snail-pace commute. For many, the thought of leaving everything can be a bit terrifying, and if you have a family who doesn’t want to leave, you might be thinking that your Big Move is more of a pipe dream than a real possibility, even though you see the death grip on your everyday freedoms …




Preventing the Statists’ Planned Coup de Maître

For more than a decade I’ve been saying that we are living in the age of deception and betrayal. Recent events here in the United States have now proven that, without any doubt. In July of this year, I warned that a new wave of overt Internet censorship was developing. I did so in an article titled: The Internet Gulag: Demonetization, Demonization, and Deletion. à La Nancy Kerrigan On Monday August 6, 2018, at least a dozen social[ist] media web services launched a coordinated deletion attack on InfoWars.com. Four more followed suit, within a few days. This was no coincidence. For …




Letter: Computer Backup Software

Hello SurvivalBlog Readers I would like to ask what system you would recommend for backing up computers? The reason I ask is that recently I had a hard drive crash in which I almost lost all of my data on my computer- including a couple of novels I had been working on. The crash had happened while backing up the computer to an external hard drive. Luckily it looks like my external hard drive did not die and as I’m writing writing this message it is retrieving the files. In addition to an external hard drive what other things would …




The Internet Gulag: Demonetization, Demonization, and Deletion

A wave of Internet censorship is sweeping the globe. This censorship is no longer just the nefarious work of totalitarian nations. Many western nations are experiencing their own brand of censorship that is being promulgated by ostensibly “private” companies. (Although many of these are near monopoly utilities that could be classified as public accommodations.) The War on Guns Dozens of conservative, pro-gun videobloggers and news outlets have been demonetized by YouTube in the past two years. By flagging these sites as “not family friendly”, viewers must now toggle “Restricted Mode: Off” and even when they do, advertisements are no longer …




PGP for Preppers- Part 2, by Groundhog Gravy

We should be especially careful when communicating electronically: it’s little more than trivial for a government, a corporation, or even a couple of well-equipped criminals to intercept phone calls, emails, or text messages. This article explains how to use simple, secure tools that do only encryption and do it right. These are based upon a tool that is significantly better than the name suggests, Pretty Good Privacy (PGP), and offers excellent communications security for preppers. Part 1 covered PGP and how it is used. Now, we are continuing. Setting an Expiration Date Now that you have created a key, there …




PGP for Preppers- Part 1, by Groundhog Gravy

Introduction We all have a need for private communication. Whether it’s details of our preparations that we want to share with others in a group, discussing tactics, carrying on trade, or any of a hundred other matters, we should be concerned about keeping our communication private. We should be especially careful when communicating electronically: it’s little more than trivial for a government, a corporation, or even a couple of well-equipped criminals to intercept phone calls, emails, or text messages. We can use encryption, which transforms data into a form that can only be read with a secret key, to help …




Remain Anonymous Online and Protect Information- Part 2, by Contributor

I’m going to show you how you can remain anonymous online and protect information and communications. We have already gone through the purchase of a computer and its setup as well as establishing a virtual private network (VPN) and virtual machines. Now, let’s continue on our journey for online anonymity. Firefox Don’t forget to have your VPN up and running as you continue to setup your virtual machine (VM). Now, download and install Firefox from mozilla.org. Open the Options and go to Privacy and Security. Under History, set it to Never remember history, and restart the browser. You’ll probably be …




Remain Anonymous Online and Protect Information- Part 1, by Contributor

Would you like to remain anonymous while online? Would you like to protect your communications and information? Well, I’m going to show you how you can accomplish this. This is intended to be a comprehensive, full paranoid guide. So use everything or just some to get the protection you deem appropriate. It might be best to read through this guide, determine everything you’ll need, and then go step by step. At the end, I’ve provided some resources for additional help, if this doesn’t provide enough in-depth guidance. Start From Nothing, Remove Everything Let’s start from nothing. You need a computer, …




Reducing the Breadcrumbs Produced By Your Digital Life, by P.L.

None of us want to unknowingly share personal information, but it’s happening everyday if you browse the web, use email, or have a mobile phone. You could decide “I’m going off the grid!”. That’s great if you can, but it’s not practical for 99% of us. The Breadcrumbs So, how might you go about reducing the breadcrumbs produced by your digital life? ProtonMail First, consider using ProtonMail for your personal email. There are no ads and no tracking. A basic account is free. I paid for the Plus account, since I wanted more features. I access ProtonMail on my iPhone …




Staying Hidden Online, by Z.M.

We’re being monitored, online. That’s nothing new though. We all know that. In a world that increasingly grows to rely upon technology, and where your individual data points can mean big money for some advertiser somewhere, it should come as no surprise that just about everything that we do online has been recorded and stored on some server somewhere. I’ve grown quite alarmed over this the past few years, but I have never really known where to even start. I just thought “Incognito” mode on Chrome was enough to hide me from all that was happening. I was wrong. After …




A 21st Century Tangibles Investing Rationale

I often have people ask me: “Why do you stress tangibles investing, Mr. Rawles?” In my estimation, tangibles always trump intangibles. I have three primary reasons why I distrust intangibles:: First: Nearly all intangible investments are denominated in fiat currencies. Because of this there is an underlying currency inflation, revaluation, or repudiation risk. Even when buying stock in the safest, most secure and impeccably-managed company it still has some risk when the investment is denominated in Dollars. Ditto for Dollar-denominated bonds. Ditto for redeemable life insurance policies and annuities. Ditto for business investments. Ditto for money market funds. Ditto for certificates …