Single Scope Tyranny

I recently heard from one of my readers who holds a Top Secret clearance and who has SCI access. His clearance was up for a Single-Scope Background Investigation (SSBI) periodic reinvestigation (PR). These SSBI-PRs are standard practice for anyone who holds a Top Secret clearance with access to Special Access Programs (SAPs), Sensitive Compartmented Information (SCI), or nuclear (“Q Access”) programs. He told me that he was the subject of an “Expanded Reinvestigation” and in the course of that investigation he was challenged by investigators about his loyalty. The challenges, he discovered,were based upon his e-mail history and the assortment …




Living a Double Life, by Sara Sue

The biggest threat to this country right now is the Socialist/Progressive movement that includes the belief that we should not be “America the great, the free”; that we must take our appropriate place among the world leaders as equals, and that we must “spread the wealth” to ensure “social justice”.  In the end, this type of thinking leads to a one-world government under the leadership of a “benevolent” governing body who controls our every move.  This belief has undermined the security of this country and exposed us to those who would have us dead – the external threats.  The internal …




How to Thwart Nigerian Scammers: Demand Proof of Life

SurvivalBlog readers often buy gear for their retreats using Craigslist and Internet message boards such as Buddy’s Board and eHam to buy equipment. There are some genuine bargains out there, but be advised that these web sites have become the favorite hunting grounds of Nigerian Scammers. They prey upon people who are looking for bargains. Typically, the scammers place fraudulent ads offering items for sale in the Want To Sell (WTS) category , or they respond to Want To Buy (WTB) ads. Some Red Flags that may indicate that you’ve been contacted by a Nigerian merchandise scammer: 1.) The seller …




The Folly of Hubris — A Cautionary Tale, by Mrs. S.

How do you balance the secrecy needed when prepping with letting your friends and relatives know that you are a prepper and encouraging them to become one too? Because when SHTF, you want your loved ones to be safe too. Wouldn’t it be wrong to prep in secret and not afford your favorite people the opportunity to prep like you? I know it is not wise to advertise to non-preppers that you are a prepper. But I did it anyway. I just wanted to start a conversation about prepping with my best friend. I was excited about prepping and I …




Three Letters Re: Forget Codes: Using Constructed Languages for Secure Communication

Jim: The article on constructed languages [by Snow Wolf] was fascinating. Just two concerns: An outsider might be able to crack your code based on repeated grammar. As was mentioned in the letter, “sentences follow the common subject-verb-object pattern”. This pattern is predictable and could help a very intelligent decoder. Also your activity can be observed after communication, helping one define terms. Both of these concerns can be mitigated with re-aligning, as mentioned in the letter. So take care not to overlook that step. Finally, if every tip in this article (such as re-aligning and custom grammar) were practiced, and …




Forget Codes: Using Constructed Languages for Secure Communication, by Snow Wolf

Egyptologists tell us that the last hieroglyphic inscription was carved in 394 A.D., and within a few decades all memory of the ancient Egyptian language was lost. For the next fifteen hundred years the world’s greatest scholars tried to translate hieroglyphics, but it was only when Jean-Francois Champollion had access to the Rosetta Stone in the 1820s that the dead language spoke once more. The Rosetta Stone, which had an identical inscription in three languages, was the key which allowed Champollion to begin translating the forgotten language. You may be wondering what this has to do with preparedness. I believe …




Secure Signals for a Survivalist, by Fred J.

This subject is a much overlooked area in the survival community and sorely neglected. I hope that the following synopses of this crucial topic will inspire an invigorating awakening in this area that I feel is vital to our collective success, without which our endeavor could well be doomed. Every country and every military around the world through the ages has employed codes, ciphers and signals as well as signets et cetera for security and authentication of messages. Sending messages via couriers, as well as during times of war and peacetime to prevent their opposition from learning their secrets and …




Technology Today, by KCLO4

Let me premise this by saying I am no expert in the material I will provide. I, like most everyone on this site, is an avid hobbyist in these matters. For some background on me though, I am a Mathematics and Computer Science Major in my fourth year of college, a phone and computer enthusiast, I enjoy white hat hacking and build computers for fun. Maybe not the average prepper, but I get by. I am writing this article as I have found almost nothing on modern technology in the several blogs that I visit on a daily basis, even …




Letter Re: Home Computer Security Tips

Hi James, I heard your recent radio interview with Alex Jones. It it you mentioned Darknets [such as Tor] and IP addresses. I happen to use the following tools for security. Perhaps they will be of use to SurvivalBlog readers: To make it easy to find IP addresses, I use ShowIP. This is a little tool add-on to Firefox and works a treat, makes saving favorite web site numeric addresses a breeze. Private VPN tunneling:  Normally this is difficult to say the least, by TunnelBlick is great, easy to use, and I use RiseUp for both secure anonymous e-mail and …




Letter Re: Curious Postal and Common Carrier Drivers

James Wesley: I was wondering if you could pose the question of “mail-order stuff” to the UPS or Fed-Ex drivers that read SurvivalBlog. Have they been told to “see something-say something”? Thanks, – Ed S. JWR Replies: I haven’t heard anything definitive on that topic in recent years. I’d appreciate UPS and FedEx drivers chiming in. FWIW, I should mention that David Koresh (of Waco) first came to the attention of the BATF because a UPS driver reported seeing “grenade casings” protruding from a ripped cardboard box that was sent to the Waco church address.  Well, those were actually inert …




10 Lessons Learned from the DoS Attack on SurvivalBlog, by The Orange Jeep Dad

On May 26, 2012 the SurvivalBlog.com server was attacked and knocked offline.  The method of attack used is commonly referred to as a Denial of Service or DoS attack. I won’t delve into who might have sprung the attack nor how it was done. Both topics have been covered.(1)  What will be discussed are the 10 lessons learned from the attack as it pertains to preparedness and survival. Lesson #1: We don’t know what we don’t know. We can’t all be experts in everything. Regardless of where you are in the preparedness journey, we’ve all realized at some point that …




Letter Re: Details on the Rawles Ranch

Mr. Rawles: I’ve noticed that you haven’t mentioned many details about where you live, or much about your daily life, like most other blogs do. Just curious. – R.K. in Alabama JWR Replies: I try not to clutter my blog with daily minutiae. Since SurvivalBlog is intended to be educational, I try to stick to the preparedness issues at hand, as much as possible. That means downplaying politics and minimizing posts with detailed descriptions of what I’m eating, the eccentricities of our pets, my favorite music, and so forth. There are plenty of other blogs out there in the blogosphere …




Letter Re: Home Invasion Defensive Planning

James: About a year ago I remember reading a personal account in SurvivalBlog about a home invasion/robbery in Florida that went terribly wrong. I remember thinking it was almost surreal in the way it unfolded and thought things like that only happened in third world countries. It was an eye opening experience and something that made me rethink the way I handled myself in a place I considered to be secure by default. A few months ago my eyes were opened again when someone in one of my coworker’s neighborhood went through a similar experience. I am not trying to …




Letter Re: The Exposed Backbone: The Risk of Cyber Attack

James: I too am a 25 year IT veteran with the last 14 years specializing in information security.  I am currently in process of completing a PhD in the field.  There is nothing that currently exists that can save us from the coming cyber attack that will devastate our infrastructure.  The security vulnerabilities are legion.  Our only hope is the Lord and using the good minds He gave us to become self-sufficient.  The vain attempts of Homeland Security and the National Security Agency has only resulted in a loss of our personal freedom and privacy.  The more I learn, the …




The Exposed Backbone: The Risk of Cyber Attack by LockedGate

Computers are the exposed backbone of America’s infrastructure. They are new technology with big holes that is under attack from very skilled and motivated people who mean our country harm.  Yet, we trust them to provide almost every service our modern life requires. I’ve spent the last 13 years as a computer security expert for a large telecom, and I would like to convince you that today your family’s ability to survive is dependent on fragile and over-trusted systems. Preppers have historically had distrust for computing technology. Y2K was a real risk, but since it seemed to be overblown, a catastrophic computer-centric risk has fallen off …