Letter Re: Preparedness for Martial Law–Finding Gaps in Bilateral Rendition Treaties

James; This might seem like an odd [question], but have you given any thought to the [possible] aftermath of a major WMD terrorist attack, in which martial law is clamped down on the USofA? In times like that, political freedom might just evaporate. For [those of] us that have been [politically] outspoken–(I’m one of those cranky old guys with hundreds of published Letters To The Editor, and with one of those big Ron Paul [campaign] signs in my front yard)–where could we go in the event of some sort of round up? Now, in peril of sounding even more odd: …




Letter Re: Keeping a Low Profile is Crucial for Preparedness

Hi Jim, I agree with you that you shouldn’t “get so paranoid that you withdraw to hide under a rock” when using the Internet. Take precautions, certainly, but strike a balance. To illustrate why total privacy is practically impossible while making use of the Internet, here’s a discussion about recent work done with “de-anonymize” algorithms. In short, the researchers were able to identify 99% of anonymous users by comparing different datasets, one anonymous, and one not. Further, there have been studies with publicly available census data that show a person can be reasonably identified by all sorts of seemingly innocuous …




Identity Theft–The Jury Duty Scam

The following is one of those items that widely gets circulated via e-mail, but this one is legitimate and I think that warrants posting to the blog: “Be prepared should you get this call. Most of us take those summonses for jury duty seriously, but enough people skip out on their civic duty, that a new and ominous kind of fraud has surfaced. The caller claims to be a jury coordinator. If you protest that you never received a summons for jury duty, the scammer asks you for your Social Security number and date of birth so he or she …




Letter Re: Keeping a Low Profile is Crucial for Preparedness

James, I have to disagree with some of C.D.’s measures listed in his letter (i.e. using Scroogle and Zone Alarm) and refer your readership to the best article I’ve yet seen on the great difficulty in online anonymity: The Ugly Truth About Online Anonymity Also note comment on the linked article 12 – even if all else could be secured, the moment you behave according to your established surfing profile, you’ll be spotted. Kind Regards, – J. in Kyrgyzstan JWR Replies: I have my own perspective about online activities: Do the best that you can to cover your cyber trail, …




Letter Re: Keeping a Low Profile is Crucial for Preparedness

Jim, My missus and I have been into “prepping” for about 15 years. Our house has a basement and it is practically wall-to-wall and floor-to-ceiling with shelves–with just narrow aisles in between. The shelves are chockablock with storage food (all labeled and organized “FIFO“-style), medical supplies, assorted “field” type gear, tools, barter/charity stuff, ammo cans, propane cylinders (that fit our camp stove and camping lantern), reels of field phone wire, paper products, and so forth. Following the example of Mr. Whiskey (from your “Profiles“) we have recently built up 27 sets of designated “charity duffles”, each packed in a cheap …




Your Life in Your Pocket by John T.

A significant part of being prepared and being able to weather a crisis is having information. Remember, those in charge now will make it their first priority after TSHTF to return to the status quo. Banks and mortgage companies will do everything possible to continue banking and lending. Landlords will do whatever it takes to make sure they continue to collect rent from their tenants, and any police or military personnel you come into contact with will be very unhappy if you cannot prove who you are or otherwise deflect suspicion. You can call having critical information available during and …




Letter Re: Digitized Data for Your Bug-Out Bag

James: JN is absolutely right about TrueCrypt, it’s an excellent tool. Be aware, however, that you can be compelled to disclose your encryption keys in the UK legally, and you can always be compelled to do so via extra-legal means. If you have any data that you truly wish to keep secret, a good start is to use a second TrueCrypt volume containing important data inside the primary volume which contains data that is less crucial. Regards, – PH




Letter Re: Privacy from Google’s Prying Eyes

Hi It may be an interest to readers who use the Firefox browser, there is an extension call “Track Me Not“. [Here is a description I found on the web:] “TrackMeNot is a lightweight browser extension that helps protect web searchers from surveillance and data-profiling by search engines. It does so not by means of concealment or encryption (i.e. covering one’s tracks), but instead, paradoxically, by the opposite strategy: noise and obfuscation. With TrackMeNot, actual web searches, lost in a cloud of false leads, are essentially hidden in plain view. User-installed TrackMeNot works with the Firefox Browser and popular search …




Letter Re: Privacy from Google’s Prying Eyes

Dear Jim: You don’t have to be a “Secret Squirrel” to be concerned about Google tracking your online searching. Here is a quick and easy way to use Google but not get tracked: http://www.scroogle.org/cgi-bin/scraper.htm The following is a quote from their site: “Not only does Google scrape much of the web, but they keep records of who searches for what. If information about your searching is accessible by cookie ID or by your IP address, it is subject to subpoena. This is a violation of your privacy. Someday Google’s data retention practices will be regulated, because Google is too arrogant …




Letter Re: Rootkit Protection for Your Computer

Jim, Here is some info on what is presently a freeware application which I can quite-honestly classify as in the “Save Your Bacon” category. (it sure saved my rump, on at least one very significant occasion.) It does its’ job, it is small, and it is freeware. My conscience would bother me no end if I kept this gem to myself; perhaps you and/or the blog might benefit from this goody. – Ben L.




Letter Re: Anonymous Web Surfing Resources

Dear Jim, Tor (“The Onion Router”) has been up and running for some time. It’s a free and highly secure system for anonymous browsing. It requires installation of free, open source software on the host machine. Also of potential interest is the current release of Freenet, which supports a “scalable darknet:” A freeware, open source distribution of PGP (named, appropriately, GPG). A GPG for Windows front end. TrueCrypt (a freeware/open source hard drive encryption/steganography program) The Electronic Privacy Information Center (EPIC) tools page Hushmail: secure, free web mail Secure, free hard drive/file erasure Disclaimer and warning: Strong cryptography isn’t legal …




Keeping Your Preparations Low Profile

Of all of the aspects of preparing a survival retreat, perhaps the most overlooked in survivalist literature are privacy and operational security (OPSEC). Your preparations must be kept secret from all but your most trusted friends. All of your expensive logistics could disappear in a few hours soon after TEOTWAWKI. Your “hidey hole” could be stripped clean by looters or overzealous government agents wielding “emergency powers.” You must absolutely resist the urge to mention your preparations to anyone who does not have a need to know about them. I am not suggesting that you lie to anyone. That would be …




Letter Re: Preparedness Lessons Learned from The K.T. Ordnance BATFE Raid

Jim, I thought I would give you an up-date on my raid. First, I’m not in jail, nor have I been charged with any crime. Everything that can be written has been written at this time.[JWR Adds: For example, see the discussions at the AR15.com Forums, at LibertyPost.org, 1911Forum.com, et cetera. ] In retrospect, there are some things I should have done, but that I didn’t. (I pooh-poohed some of your preparedness ideas, shame on me. Learn from my mistakes.) 1) Did not stash my extra arms and ammo, and now I don’t have them. 2) Should not have been …




Two Letters Re: Cell Phone E-911 Tracking

I’m an engineer working on E911 systems and I’d like to correct this whole post. I’ve included some references so all your readers can peer review. > #1 The chip does not function unless you either… Incorrect. The requirements typically state for Public Safety and in support of local laws, the mobile station (cell phone) has to handle all network requests for location. > #2 Its not real GPS. There are two separate systems that can be hybridized together. First is the network based system described above that works great in urban areas with lots of compatible cell towers. It …




Letter Re: Cell Phone E-911 Tracking

Dear Jim, Someone wrote about E911 phones and GPS tracking. I worked in that industry, with that specific issue and I can provide some facts. #1 The chip does not function unless you either Dial 911 or turn it to Location On, which shows a circle with a plus sign through it and two end parentheses to its right. It is common to see the circle-plus sign without the parentheses. Check your manual to verify this. It will list this under “icons” or E911. Phones come with them preset to “911 only”, not “on”. Phones from Nextel/Sprint or using location …