Letter Re: David in Israel on Secure Personal Computers

James, Here’s a follow-up to David from Israel’s article on Linux. I encourage your readers to heed David’s advice and wean themselves off the MicroSoft Windows operating system ASAP. Linux Mint Debian is a good OS option. See the Linux Mint Debian tutorial. Here is a description: “This tutorial shows how you can set up a Linux Mint Debian 201009 desktop that is a full-fledged replacement for a Windows desktop, i.e. that has all the software that people need to do the things they do on their Windows desktops” According to this article, the the Chinese military have already removed …




Letter Re: Preppers as Foster Parents

Dear Mr. Rawles:   Thank you for your dedication to the survivalist movement.  As a Ten Cent Challenge subscriber, I appreciate being able to read many of the posts and comments on your web site.  I am hoping to pose a question to you and your readers about becoming foster parents as survivalists.    First, I little about us:We live in a small suburban community in Ohio.  Because of several issues, we have decided to retreat in place.  With a little land, we have created a suburban homestead with a large garden and a small chicken flock.  We have also …




Letter Re: What Your Cell Phone Could Be Telling the Government

James Wesley: Regarding the recent article at the Time magazine web site that has been forwarded far and wide: What Your Cell Phone Could Be Telling the Government. Remember, this is America. While there is no better place on earth to live, you are never any more free than They allow you to believe you are at any given moment. All you can do is live out your life, raise your family, eke out some happiness, and try to affect the change that is important to you in the short time you are here. It is certainly worthwhile (and patriotic) …




Letter Re: How to Bypass Blocked Web Sites

My Dear Mr. Rawles, I am writing in regards to Tamara W.’s letter. I am an IT manager tasked with keeping data and people secure – in that order. As a prepper with an enlightened self interest for the well being of my fellow preppers, I would strongly encourage your readers to not necessarily follow all of Tamara’s W. advice. When your readers are at work, they should understand that the IT Department has full access to their PCs and all their records and e-mails. Your readers are playing on the IT Departments’ networks and the IT Departments literally make …




Letter Re: How to Bypass Blocked Web Sites

Dear JWR: In response to the posting by Tamara W., I would like like to furnish an addendum. The post references an “Internet Kill Switch” which has recently been signed into law. As I am sure that you and most of your Internet savvy readers are aware, there are two distinct ways that the PTB (Powers That Be) can “kill” the Internet. The first is relatively trivial. This is by corrupting or otherwise disabling the DNS (Domain Name Server) system where human readable URL’s (Universal Resource Locator) such as SurvivalBlog.com are translated into computer readable IP (Internet Protocol) addresses such …




Two Letters Re: How to Bypass Blocked Web Sites

Sir: I have several friends in China under different guises, work or school visas for instance, but their main purpose is evangelism. When we e-mail them we have to be very careful about what we say because the Chinese government reads incoming e-mails. For instance “I’m praying for you” would be written as “I talked to Dad about you”. Just so we aren’t thinking all our e-mails are secure. – Richard C. Mr. Rawles, I would like to say the article “How to Bypass Blocked Web Sites, by Tamara W.” was technically correct, and I will not question the legality …




How to Bypass Blocked Web Sites, by Tamara W.

Web sites can be blocked for many reasons. Employers block web sites to protect productivity. Parents block web sites with violence, pornography and illegal activities to protect to their children. Internet Service providers block web sites with child pornography because of the law. Some nations block certain web sites with opinions that dissent from those of the predominant political powers. Unfortunately, whether it is through the proposed “Internet kill switch” that the federal government has proposed or a deployment of government Internet censorship as China and Iran already employ, there is a possibility that those in the “free” world will …




Letter Re: OPSEC and Pattern Analysis

Dear SurvivalBloggers: The concept of operational security (OPSEC) is simple. You conduct yourself in a way that doesn’t give anyone the impression that you’re doing anything out of the ordinary. Sounds simple, doesn’t it? It’s not. Everything you do and say is an indication of the things that are going on in your life. Most importantly, people tend to operate in predictable patterns. It’s called a rut. When you get into one, you define who and what you are. If someone has an interest in you, all they have to do is watch and establish that pattern. If you make …




Letter Re: The A.N.T.S Network– Institutionalized OPSEC Naivete

James Wesley: Do you want to see a serious breach of operational security (OPSEC)? Then go to the “ANTS Group” web site and click on their map. Zoom in on some of the names and addresses of folks with supplies just waiting to help others. I’m glad to see folks (“ants”) ants willing to help [others], but I’m sorry to see folks getting setting themselves up [as targets] for the [the depredations of the] not so trustworthy or “Golden Horde” (a.k.a. Grasshoppers)! Regards, – M.T. JWR Replies: Thanks for sending that illustration of how not to keep a low profile. …




Limiting Your Carbon-Copy Footprint, by Matthew S.

Most of us that live in the post-modern era have undoubtedly heard the term “carbon footprint.” This is a term that has come to the forefront of most of our daily lives due to a streamlined and tenacious push to increase the green mentality. We have seen posters, commercials, testimonials, political rants and even legislation on this topic. The idea is to keep your impact on your local environment small so that you minimally affect the “worsening global condition.” I will not go on any type of tirade about how those that impose these ideas don’t follow it themselves (multiple …




Service Recommendation from JWR: Mara Helland

You might have noticed that a CPA service advertising on SurvivalBlog. Her name is Mara Helland. Since it is now tax season, I thought that it would be appropriate to give my personal recommendation, and let you know what services she offers. Like many other CPAs, Mara mainly does tax accounting. But what sets her apart from other CPA firms is absolute privacy. I know that this is crucial for a lot of people, especially fellow SurvivalBlog readers. I don’t know what privacy issues are like in the big cities, but I do know that in small towns, people who …




Letter Re: Nefarious Uses of Google Earth

Howdy Mr. Rawles, I had two comments to add to the conversation about thieves using Google Earth to steal koi. First, when we typed our address into Google Earth, it popped to a house about a 1/4 mile from us (we checked that fact many times, not just once, so it was not a typo on our part). That was just ducky with the family, as it helped our farm stay invisible. After reading about the koi thefts, I decided to check on Google Earth again. I was so disappointed when it popped right to the farm this time! The …




Letter Re: Cuban Spy Ring Arrests Raises Concern of Ham Radio Restrictions

Jim: This article concerns me: Cuban spies’ shortwave radios go undetected: Low-tech transmissions no big deal for U.S. intelligence. The journalist mentions: “The International Amateur Radio Union said there are more than 700,000 amateur radio operators in the United States.” I hope the governmental paranoia does not try to constrain the best method of rural emergency communications. – KAF JWR Replies: Without mentioning anything classified, I can safely say that they are describing clandestine operatives in in the US. receiving the old-fashioned HF “Numbers” broadcasts from Cuba. These are typically code groups of five numbers, read aloud by a woman, …




Four Letters Re: Firewalls, Anonymity, and SurvivalBlog

Two notes about Some Call Me Tim’s excellent recommendation of JanusVM: 1) Use Decloak.net to verify that you’ve done everything right. It uses a whole host of very strong tests to attempt to locate your computer and will find out if you’ve slipped up somewhere. The place you’ve slipped up is almost always DNS but cookies and other things can give you away too. 2) Be aware that this encrypts the traffic you’re sending and receiving, it doesn’t make it go away. Someone listening in can tell when you’re sending/receiving and how much, they just can’t read it. Timing and …




Two Letters Re: Firewalls, Anonymity, and SurvivalBlog

Dear Mr. Rawles As a network administrator, I spend a fair amount of time making sure my end users cannot access certain web sites from company computers and data lines. I try to make sure we don’t get too draconian in our filtering practices, I do my best to make sure that not streaming audio or video, social networking sites, or other time killers make their way through the network. Recently, a friend of mine told me about a tool called JanusVM, a combination of Internet anonymity tools (TOR, PRIVoxy, Squid, and VPN) that runs in a virtual machine. You …