Stronger Passwords for the Masses, by Michael Z. Williamson

This article should be of interest to anyone who is cyber security conscious–which should be everyone, in the present era: Kill the Password: Why a String of Characters Can’t Protect Us Anymore. Now consider the pointed lesson of the XKCD site. Are you now concerned? …then use: Diceware and Truecrypt The main features of Truecrypt: Creates a virtual encrypted disk within a file and mounts it as a real disk.  Encrypts an entire partition or storage device such as USB flash drive or hard drive. Encrypts a partition or drive where Windows is installed (pre-boot authentication). Encryption is automatic, real-time …




Letter Re: The Serval Mesh Network

Mr. Rawles, If you have not yet heard of the Serval Project, I would encourage you to check out the web site. This is an Australian based non-profit that is attempting to build the software and hardware for a mesh network that can be erected post-disaster. It is all open-source and there is even a free Serval app available at the Google App Store. For those of you not familiar with the idea, mesh networks are self-contained networks that run off of the same protocols as the internet, using the same hardware, but are not necessarily linked to the actual …




The SurvivalBlog Social Media Glossary

I’m often asked about social media, forums, and meetup/networking web sites as a method for preppers to get together. I generally discourage the use of social media, as a big OPSEC risk. As I’ve warned my readers many times in SurvivalBlog, these sites are intelligence-gathering vacuum cleaners for self-incrimination, plain and simple. It has been well established that the NSA gobbles up as much information as it can and wherever it can. Even if what you mention about your private life in Tweets and Facebook posts is presently legal and commonplace (such as food storage, hunting, and shooting), that doesn’t …




Two Letters Re: Preserving a Digital Library

James, I work for a large, three-letter computer manufacturer with a penchant for Blue. Joe Ax’s comments about the problems with maintaining a digital library are right on the money. When I worked in our Storage Division (hard disks, tapes, etc.), this issue came up during a talk on medical systems’ storage needs. There is a requirement for medical records to be maintained 100 years, and yet no computer data storage system has been designed to do this. So what is the ‘solution’?  It seems that doctor’s offices are cajoled/required/encouraged to upgrade their office systems on average of about every …




Letter Re: Preserving a Digital Library

Dear Mr Rawles, Since I have worked for a few decades now with computers as programmer, installing systems and building/repairing computers, I read last week’s articles/letters on a digital libraries with interest. Though most information provided is correct, some possibilities weren’t discussed, while others may not be entirely clear or confusing to the uninitiated. So, in addition to the previous postings, here is my take on ‘digital libraries for dummies’: Putting together a digital library is a good idea and I have one too. It contains everything from books to reference diagrams, user manuals and SurvivalBlog archives. However it can …




Letter Re: Preserving a Digital Library

JWR: I had to ad my own two cents to the Preserving a Digital Library. As a seasoned IT pro myself (one of my early customers upgraded all the the Windows for Workgroups network I setup for him to Windows 95 himself and called me when he couldn’t get it working) I have reliance on my systems, be it my cache of reference documents and ebooks to documents I’ve written myself to my gear and prep inventory spreadsheets. I see no reason to choose Windows XP over Windows 7 or Windows 2000 or Windows 3.1 when it comes to back …




Interrogation for Preppers, by Tim G.

(Editor’s Introductory Note: The following article is presented as an intellectual exercise, or gedanken. Be forewarned that there are mentions of torture (mental and physical) herein which are of course not conscionable behavior! But this mention is only for the sake of showing the full range of potential interrogation techniques, and as a warning that in the future — under different circumstances — you might have to be prepared to resist interrogation. “Forewarned is fore-armed.” Again, none of the following is intended to encourage any SurvivalBlog readers to do anything immoral, or illegal, or unethical. It is in your own …




Letter Re: New Privacy Service

Mr. Rawles,  I came across this today and thought it might be useful to other SurvivalBlog readers. It is called  JustDelete.me. From the web site: ‘Many companies use dark pattern techniques to make it difficult to find how to delete your account. JustDelete.me aims to be a directory of URLs to enable you to easily delete your account from web services.” Essentially it is a listing of links to various web companies where you can delete your account. Currently 129 companies are listed and the site owner has a method for submitting others for inclusion. – Clark H.




Letter Re: Tor and the Illusion of Privacy

JWR; I had noticed some mention of Tor and I believe there was some mention of alternatives to Tor as well, to better protect one’s privacy on the web.  I really hate to say this, but, anonymity on the net really only exists as fiction these days.  Tor has had problems with it’s exit nodes for a very long time and there was a lot of talk in the “penetration testing” community about the FBI using Tor to set up stings last summer.  One can use a VPN (virtual private network) that claims to keep it’s users secrets secret, but …




Tradecraft: Going Jason Bourne, on a Budget

Hollywood movies often show secret agents tossing cell phones out of car windows, and grabbing new ones to activate. In today’s world of almost universal surveillance and tracking, that is actually fairly good tradecraft. When operating in guerrilla warfare mode, a cell phone that is used more than a few times is a liability. So is a cell phone that is “turned off”, but that still has its battery installed. (They can still be tracked.) In summary, here is some cellular phone tradecraft for times of genuinely deep drama: 1.) Don’t create a paper trail when buying clandestine phones. Pay …




Letter Re: New Jersey Court Upholds Man Arrested for Visible Gun Case

Sir: The situation described in the recently-cited article (New Jersey: Court Upholds Man Arrested For Visible Gun Case In Car) only underlines frequent Rawlesian reminders for maintaining OPSEC at all times.  His arrest might have been avoided had he simply covered the cargo area with a blanket so the cases were not visible.  Hopefully the conviction will be overturned in a higher court under the provisions of the Firearms Owners Protection Act (FOPA).  In general, this states that: “notwithstanding any state or local law, a person is entitled to transport a firearm from any place where he or she may lawfully possess …




Letter Re: Jurisdictional Issues and Modern Statutory Law

Dear Sir: Many are dismayed by the recent Colorado law restricting firearms. But a cursory reading shows that the law only applies to “persons liable” and not the people at large. Regarding any new law, tax or regulation, remember to ask servant government: [ ] Whose endowed rights are being secured by this ? [ ] How and when did I give consent to be bound by this ? [ ] What privilege is the subject of this tax ? Because the Declaration of Independence states that Job #1 = secure rights, and Job #2 = govern those who consent. …




Letter Re: A Privacy Lesson From the Boston Bombing Investigation

Jim. I learned something from the recent Boston terrorist incident….though it passed very quickly in a reporter’s interview – and even though the reporter was interrupted and didn’t get to finish her thought. In regards to one of the bombers, the reporter said something like  “We can tell from the contents of his “Wish List” online, that he”  ……..(not exact quote). so… I was aware that Amazon.com had a “Wish List” that shoppers can create.  I had NOT been aware that you can search for anyone’s “Wish Lists”, but you can. So everybody needs to know that any Wish List …




Letter Re: Ham Radio Standardization for SurvivalBloggers?

Good Day James, I’m a long time fan of your books and your blog thanks for all that you do. There is some great information there. I am interested in finding out if your [local] group or another group has established any ham radio frequencies that may serve as a beacon of information in a SHTF situation or are you totally off the grid when that time comes. I do have your IP written down, but was just curious… Regards, J.M., USMC JWR Replies: The folks at Radio Free Redoubt are already doing a fine job of coordinating communications with their AmRRON …




Pre-TEOTWAWKI OPSEC, by P.J.

Then Isaiah said to Hezekiah, “Hear the word of the Lord of hosts: Behold, the days are coming when all that is in your house, and that which your fathers have stored up till this day, shall be carried to Babylon. Nothing shall be left, says the Lord. And some of your own sons, who will come from you, whom you will father, shall be taken away, and they shall be eunuchs in the palace of the king of Babylon.” Isaiah 39:5-7 God’s word to Hezekiah, king of Judah, through the prophet Isaiah immediately followed a dramatic sequence of events …