Notes from JWR:

Lindon Farms is having their first ever sale up to 40% off all their freeze dried foods stored in buckets: Entrees, Fruits, Vegetables, and Meats.This sale runs from from January 12 to 24, 2014. I expect many Lindon Farms stocking dealers to be involved. (Check with our advertisers, for pricing. Several of them are Lindon Farms dealers.)

Today we present another entry for Round 50 of the SurvivalBlog non-fiction writing contest. The $9,700+ worth of prizes for this round include:

First Prize: A.) Gunsite Academy Three Day Course Certificate, good for any one, two, or three course. (A $1,195 value.) B.) A course certificate from onPoint Tactical. This certificate will be for the prize winner’s choice of three-day civilian courses. (Excluding those restricted for military or government teams.) Three day onPoint courses normally cost $795, and C.) Two cases of Mountain House freeze dried assorted entrees in #10 cans, courtesy of Ready Made Resources. (A $350 value.) D.) a $300 gift certificate from CJL Enterprize, for any of their military surplus gear, E.) A 9-Tray Excalibur Food Dehydrator from Safecastle.com (a $300 value), F.) A $300 Gift Certificate from Freeze Dry Guy. G.) A $250 gift certificate from Sunflower Ammo. H.) A roll of $10 face value in pre-1965 U.S. 90% silver quarters, courtesy of GoldAndSilverOnline.com. The current value of this roll is at least $225, I.) Both VPN tunnel and DigitalSafe annual subscriptions from Privacy Abroad. They have a combined value of $195. J.) KellyKettleUSA.com is donating both an AquaBrick water filtration kit and a Stainless Medium Scout Kelly Kettle Complete Kit with a combined retail value of $304. and K.) APEX Gun Parts is donating a $250 purchase credit.

Second Prize: A.) A gift certificate worth $1,000, courtesy of Spec Ops Brand, B.) A Glock form factor SIRT laser training pistol and a SIRT AR-15/M4 Laser Training Bolt, courtesy of Next Level Training. Together, these have a retail value of $589. C.) A FloJak EarthStraw “Code Red” 100 foot well pump system (a $500 value), courtesy of FloJak.com. D.) $300 worth of ammo from Patriot Firearms and Munitions. (They also offer a 10% discount for all SurvivalBlog readers with coupon code SVB10P.), E.) A $250 gift card from Emergency Essentials F.)A full set of all 26 of the books published by PrepperPress.com. This is a $270 value, G.) Two cases of Meals, Ready to Eat (MREs), courtesy of CampingSurvival.com (a $180 value). H.) EP Lowers, makers of 80% complete fiber composite polymer lowers for the AR-15 rifles is donating a $250 gift certificate, I.) Autrey’s Armory — specialists in AR-15, M4s, parts and accessories– is donating a $250 gift certificate, and J.) Dri-Harvestfoods.com in Bozeman, Montana is providing a prize bundle with Beans, Buttermilk Powder, Montana Hard Red Wheat, Drink Mixes, and White Rice, valued at $333.

Third Prize: A.) A Royal Berkey water filter, courtesy of Directive 21. (This filter system is a $275 value.), B.) A large handmade clothes drying rack, a washboard and a Homesteading for Beginners DVD, all courtesy of The Homestead Store, with a combined value of $206, C.) Expanded sets of both washable feminine pads and liners, donated by Naturally Cozy. This is a $185 retail value, D.) Two Super Survival Pack seed collections, a $150 value, courtesy of Seed for Security., E.) A MURS Dakota Alert Base Station Kit with a retail value of $240 from JRH Enterprises. F.) Mayflower Trading is donating a $200 gift certificate for homesteading appliances, and G.) Ambra Le Roy Medical Products in North Carolina is donating a bundle of their traditional wound care and first aid supplies. This assortment has a retail value of $208.

Round 50 ends on January 31st, so get busy writing and e-mail us your entry. Remember that there is a 1,500-word minimum, and that articles on practical “how to” skills for survival have an advantage in the judging.



Skills for the Coming Collapse by Jackie S.

I think we all, at one time or another, need to do a serious self-assessment to determine exactly where we stand in regards to the future and what it will mean to us on a life sustaining basis.  Most people reading this have already done this, to a degree.  After all, you are prepping bacon, beans and bullets, and it is an admirable and necessary pursuit that you are engaged in.  But, what about when (not if) the SHTF?  Sure, you have food, shelter, and the means to protect it, but what about when things settle down and life begins in the new normal?  Have you thought about what you can do to make a living, besides farming, hunting, fishing and bartering excess prep goods?  You might not have enough land to self sustain with farming, hunting will play out after a while with so many pursuing a limited amount of game, you might not be close to a body of water to fish in, and barter goods will eventually run out.  You will need something that is not self-depleting to be able to continue to eat and live.  You will need a skill, or skills, that you can barter for what you need to live.  Not everyone will need this, as some will be able to live well on a farm or ranch.  But for those without livestock or the land to live off of, you need to be able to barter with those who have so you will not be one of the have-nots.  Now, before the SHTF, is the time to self-assess and come to this conclusion.  Do a frank inventory of your skills to determine if what you would have to offer in a grid-down situation would be enough to sustain you and your family on a long term basis.  If you come to realize that you simply don’t have one of these skill, of which there are many, now is the time to acquire one.

As I ponder the coming collapse, TEOTWAWKI, I wonder “How on earth am I going to make a living?”  After all, everything that I depend on as a carpenter/cabinet maker now to make a living will be gone:  electricity grid, lumber yards, hardware stores, paint stores, glass shops, brick yards, metal roofing suppliers and a myriad of other suppliers of raw materials that I use on a daily basis.  How will I survive without all these supporting material suppliers?

I took a step back to get a better perspective of just what I might have to offer in a grid-down situation.  I have spent the last 35 years of my life building and remodeling residential buildings, commercial buildings, and industrial buildings, and building cabinets and furniture.  Before I became a building contractor, I had always had a shop where I gave my imagination free rein to build and create many things.  I developed many different skills during this phase, which began as a young boy and continues today, and used many of these skills when I became a building contractor.  I still like to try new things, things that many people call hobbies, but to me they are a part of my life itself.

What could I do that would provide a living for me and my family?  I am now semi-retired at 68 years old, and it is just me and my wife, so we wouldn’t need much.  The first thought that comes to mind is that I am a Master Carpenter.  While power tools are a great help in my work, my brain works without an electric grid.  I would still be able to do a great deal of carpentry work, cabinet work, and furniture building.  To continue to use power tools I would need a generator, which I have acquired.  After determining the minimum size that I would need based on the requirements of my largest power tools, I bought a 3000 watt generator.  This will allow me to use my table saw, compressor (for nail and staple guns), circular saw, drill, planer, jointer, miter or cut-off saw, and any other power tool I need.  Of course this will last only as long as the gasoline lasts, and then it will be back to the old way of working with hand tools only.  I am searching for a small diesel generator, which could extend its use by several years, as diesel can be stored much longer than gasoline, with the proper additives.  I haven’t had much luck finding one yet of an appropriate size.

In preparation for the day when the fuel runs out, I am expanding my supply of hand-powered tools:  hammers and mallets of all sizes, hand saws, with appropriate maintenance tools, hand drills and hand braces, assorted drill bits for use in these, hatchets, axes, chisels of all sizes, and even an adze.  At an estate sale I found an edge sharpening stone that is foot powered and water lubricated.  It is amazing what one of these old grind stones will do for an edged tool.  I’m also laying in a supply of all sizes of metal files and wood rasps, as well as a cedar shingle splitting tool.

After thinking about it a while, I realized that I had several other options that could provide work.  In the course of my contracting, I learned to lay brick, stone, concrete and hadite blocks and tile of all sorts and sizes.  Roofing installation and repair was always part of the job, as well.  There may not be much call for my skills as an electrician after a year or so, but plumbing will always be needed.  And, as long as materials are available, I can form, pour and finish concrete.  It will be much harder without modern finishing and digging tools, but that is what God gave us a strong back for.

“What else?” I’m thinking.  Well, I taught myself to cut and weld with an oxy-acetylene torch, and to make many things out of scrap metal.  Both of these gases store well, so I’ve put back several tanks of both, along with spare hoses, cutting heads, welding heads, welding rods, and gauges.  I have a 200 amp arc welder that would be useful as long as the fuel holds out.

Along the way, I learned a little blacksmithing, mainly using the cutting torch for heat.  I’ll have to acquire a good forge to continue this, but I can make all sorts of tools for use on the ranch, farm, or grid-down homestead.  I also learned how to make knives of all types, making the handles out of various woods, bone, antler, and metal, and how to work leather to make the sheaths and scabbards, as well as belts, rifle slings, pouches, moccasins and other useful things.  I have a couple of saddle stitching tools with spare needles and quite a bit of nylon cord used to stitch leather goods.  I even have a set of tools for decorating leather, and a tool that cuts leather strings out of a large piece of leather.  I really need to learn how to tan leather, as I think raw hides might be in greater supply than other types of material to make durable goods.

Upon further reflection, I realized that I can carve kitchen tools, such as spoons and forks, make candles out of paraffin or wax (for casting), make candle lamps out of old bottles with cotton string for a wick (for kerosene or lamp oil, or even vegetable oil), make bows, arrows and metal arrowheads suitable for hunting or self defense, make spears for fishing, hunting, or defense, with or without metal heads.  A lifetime of working with my hands, partly as hobby work, can lead to a great deal of serious work when the power is gone.  I thank God daily for those skills that he has seen fit to loan to me, and I use them whenever possible to his glory.

I realize that being 68 years old, I might not have many years to utilize all these skills, but I can teach some or all of them to other people.  I would like to be able to pass them along to younger generations.  So, with that in mind, I plan on setting up an apprentice program of sorts.  Some young people would learn some valuable skills and I would get some physical help.  I figure that after a year or so of a grid-down situation, young people will have forgotten their video games and be looking for something that will help them make a living.  I have two grandsons that I have been working with to teach them some of these useful skills, but I think that there would be room and time for several more willing students.

After this self-assessment, I feel better about my long term prospects for making a living when the SHTF.  It has also led me to see some shortcomings in my preps, allowing me to acquire those materials and supplies that will be necessary but will be in short supply once the supply lines shut down.  All I have to do now is live through this time leading up to TEOTWAWKI.  Continue prepping everyone, keep your powder dry, and God bless these United States.



Letter Re: Storing Ammunition

JWR,
I’ve been reloading for almost 30 years and have tried many solutions for boxing up all the ammo including bulk in zip lock bags as well as just filling ammo cans and of course hard plastic boxes. If it’s made, I’ve tried it and nothing really worked well nor are they very compact. Until now. I have stumbled on RepackBox.com and found their cardstock boxes great. So far I’ve loaded 5.56, 7.62×39, 9mm and .45 ACP. 

What I like is their boxes are made so the quantity will fit most standard magazines…i.e., the 5.56 box holds 30 rounds as does the 7.62×39. The 7.62×51 holds 20…just right to fit your FAL, M1A or PTR91 Their pistol boxes hold 50 rounds.

The only limiting thing is that they only make .223/5.56, 7.62×39, 7.62×51, 9mm, .40 S&W and .45 ACP. But when I first started buying them they selection was smaller, so they must be expanding to meet demand.

The best part about these boxes is that they hold the ammo tightly. No loose or sloppy ammo rattling around. And as such they pack tight in the green surplus ammo cans for storage. And these boxes are very sturdy. No cheap materials, so they can be reused many times.

Thanks! – GunrTim

JWR Replies: RepackBox.com has been mentioned before in SurvivalBlog. I recommend their products. And BTW, they also sell some handy rubber rifle muzzle covers.



Letter Re: Off-Grid Electronics

James,

EBook readers and many other small electronic devices can be charged/powered by AA batteries using external power packs like these, available at Amazon and from other Internet sellers.

[JWR Adds: And of course there are a plethora of photovoltaic AA battery chargers available. Well-prepared families should have the ability to charge size AA, CR-123, and 9-volt NiMH batteries without grid power. Those batteries will all prove crucial for operating short-range communications, night vision, smoke detectors, intrusion detection, and other gear.]

Also, the DIYBookscanner web site has some resources for book scanning using inexpensive digital cameras and free software.

Regards, – R.L.H. from Ohio



Economics and Investing:

War on Poverty 50 years on, victory nowhere in sight.

Snyder: “There Is Intense Competition For Virtually All Kinds Of Jobs”

Congresswoman Urges Welfare Name Change: “Transitional Living Fund”. [JWR’s Comment: As I see it, so long as charity is coerced and bureaucratized, the “transition” she describes is from my wallet to someone else’s wallet, without my consent. State-sponsored Robin Hoodism cannot to be found in the Constitution. It is a modern socialist construct, and little more than organized theft. Charity should be entirely voluntary and a function of church, not state.]

Items from The Economatrix:

Forecast 2014: Economic Trends

If You Are Waiting For An “Economic Collapse”, Just Look At What Is Happening To Europe

Say Hello To My Little Friend, Inflation: Shrinking Packages, Higher Tuition, Rising Healthcare Costs, Real Estate Values Jumping All The While Household Incomes Remain Stagnant.



Odds ‘n Sods:

Michael Z. Williamson, (SurvivalBlog’s Editor at Large) suggested this piece: Risk of supervolcano eruption big enough to ‘affect the world’ far greater than thought, scientists say

  o o o

Cause for concern: Future Health Care In America: The Abyss Of Gun Rights. (Thanks to B.B. for the link.)

   o o o

Reader M.V.R. suggested a good essay by Libertarian author L. Neil Smith, over at the JPFO site: ‘‘Pot And Kettle Projection’

   o o o

Fatal case of H5N1 bird flu in Canada. (Thankfully it has not mutated into an easily-transmissible form.)

   o o o

I heard from Nurse Amy that she has just released her Survival Medicine Handbook in a new Kindle edition.  If you already have the print version, you can get the digital version for only $2.99.  If not, the digital version is available at a good discount from the print version. (At $24.99 versus $35.99)

   o o o

Readers in Israel may find this new blog of interest: Israel * U R Prepped



Jim’s Quote of the Day:

“Go to now, ye that say, To day or to morrow we will go into such a city, and continue there a year, and buy and sell, and get gain:
Whereas ye know not what shall be on the morrow. For what is your life? It is even a vapour, that appeareth for a little time, and then vanisheth away.
For that ye ought to say, If the Lord will, we shall live, and do this, or that.
But now ye rejoice in your boastings: all such rejoicing is evil.
Therefore to him that knoweth to do good, and doeth it not, to him it is sin.” – James 4:13-17 (KJV)



Notes from JWR:

The recent chemical spill in West Virginia is cause for concern, and should prompt prayer. A SurvivalBlog reader reports that there has been some store looting in Charleston, so state troopers have been posted at the doors of some stores. And as usual, grocery stores have sold out of bottled water. Here is a quote: buying one of the last jugs of water at a Walmart store. Tina May, a Charleston resident, even considered heading out of town for the weekend.
‘I’m not sure how long I can last without a shower. This is unbearable,’ she said.”

January 11th is the birthday of the late Gunnar Fridtjof Thurmann Sønsteby. (Born 1918.) He was the most decorated hero of the Norwegian resistance to the German occupation. He died May 10, 2012.

Today we present a lengthy and detailed entry for Round 50 of the SurvivalBlog non-fiction writing contest. The $9,700+ worth of prizes for this round include:

First Prize: A.) Gunsite Academy Three Day Course Certificate, good for any one, two, or three course. (A $1,195 value.) B.) A course certificate from onPoint Tactical. This certificate will be for the prize winner’s choice of three-day civilian courses. (Excluding those restricted for military or government teams.) Three day onPoint courses normally cost $795, and C.) Two cases of Mountain House freeze dried assorted entrees in #10 cans, courtesy of Ready Made Resources. (A $350 value.) D.) a $300 gift certificate from CJL Enterprize, for any of their military surplus gear, E.) A 9-Tray Excalibur Food Dehydrator from Safecastle.com (a $300 value), F.) A $300 Gift Certificate from Freeze Dry Guy. G.) A $250 gift certificate from Sunflower Ammo. H.) A roll of $10 face value in pre-1965 U.S. 90% silver quarters, courtesy of GoldAndSilverOnline.com. The current value of this roll is at least $225, I.) Both VPN tunnel and DigitalSafe annual subscriptions from Privacy Abroad. They have a combined value of $195. J.) KellyKettleUSA.com is donating both an AquaBrick water filtration kit and a Stainless Medium Scout Kelly Kettle Complete Kit with a combined retail value of $304. and K.) APEX Gun Parts is donating a $250 purchase credit.

Second Prize: A.) A gift certificate worth $1,000, courtesy of Spec Ops Brand, B.) A Glock form factor SIRT laser training pistol and a SIRT AR-15/M4 Laser Training Bolt, courtesy of Next Level Training. Together, these have a retail value of $589. C.) A FloJak EarthStraw “Code Red” 100 foot well pump system (a $500 value), courtesy of FloJak.com. D.) $300 worth of ammo from Patriot Firearms and Munitions. (They also offer a 10% discount for all SurvivalBlog readers with coupon code SVB10P.), E.) A $250 gift card from Emergency Essentials F.)A full set of all 26 of the books published by PrepperPress.com. This is a $270 value, G.) Two cases of Meals, Ready to Eat (MREs), courtesy of CampingSurvival.com (a $180 value). H.) EP Lowers, makers of 80% complete fiber composite polymer lowers for the AR-15 rifles is donating a $250 gift certificate, I.) Autrey’s Armory — specialists in AR-15, M4s, parts and accessories– is donating a $250 gift certificate, and J.) Dri-Harvestfoods.com in Bozeman, Montana is providing a prize bundle with Beans, Buttermilk Powder, Montana Hard Red Wheat, Drink Mixes, and White Rice, valued at $333.

Third Prize: A.) A Royal Berkey water filter, courtesy of Directive 21. (This filter system is a $275 value.), B.) A large handmade clothes drying rack, a washboard and a Homesteading for Beginners DVD, all courtesy of The Homestead Store, with a combined value of $206, C.) Expanded sets of both washable feminine pads and liners, donated by Naturally Cozy. This is a $185 retail value, D.) Two Super Survival Pack seed collections, a $150 value, courtesy of Seed for Security., E.) A MURS Dakota Alert Base Station Kit with a retail value of $240 from JRH Enterprises. F.) Mayflower Trading is donating a $200 gift certificate for homesteading appliances, and G.) Ambra Le Roy Medical Products in North Carolina is donating a bundle of their traditional wound care and first aid supplies. This assortment has a retail value of $208.

Round 50 ends on January 31st, so get busy writing and e-mail us your entry. Remember that there is a 1,500-word minimum, and that articles on practical “how to” skills for survival have an advantage in the judging.



Cybersecurity: A Systemvault Primer, by D.P.

Welcome to all the brave souls that didn’t scream and/or quickly scroll on when reading the title. I know a fair percentage of SurvivalBlog readers are concerned about OPSEC, but what about your electronic OPSEC? Is it as good as it should be? As good as it could be? I promise you won’t have to read the entire submission but you should take a look at the first few paragraphs to determine if its something you need to address. If you do, you can always try to find some trusted help in securing your systems. During the second half of last year I have spent a fair amount of time reading up on the subject and, as a result, have done a complete overhaul of my own computers. This is a description of some of the things I have learned and it might be useful for some of you.

So what are we up against? Actually many things depending on your time horizon. At the moment your biggest concern may be that your laptop contains information that you do not want to be made public when it gets stolen. This is the easiest to deal with because its unlikely that the thugs have much interest in your information; most likely they just want to make a quick buck at a pawnshop or on the black market. The situation gets more complicated when someone is after your bank/credit card information, etc. You will have to assume that these are more knowledgeable individuals that know what they are looking for and how to get it. The next layer up is industrial espionage, though I doubt many of you will have to worry about that. Real problems start when you are flagged by national security agencies (yes there are many NSAs) because you have to assume that they employ some of the most intelligent people and definitely have the most advanced equipment at their disposal to crack passwords, scan hard drives, scan working computers, backdoor access, etc. The biggest headaches are of course created by politicians and bureaucrats who these days seem to change laws any way they want whenever they feel like it. What is perfectly legal today may be outlawed next year. Even if you dutifully delete any ‘offending’ material from your hard drive at that point, I can guarantee you a low level scan of the drive has a good chance of recovering the documents afterwards. Which probably would still be used against you if someone was out to get you. Just another reason not to wait till the last moment to take action. How far will this go? Of course I don’t know but my gut feeling is that 10-15 years from now you could easily be labeled a terrorist because you have a copy of the KJV Bible on your hard drive. There are plenty of places where that is already the case today. Having a copy of the SurvivalBlog archives visible on your hard drive might land you in hot water, too.

The second challenge is the ever increasing ability of electronics to weave a web around us. I am sure you know by now to expect no privacy on your cell phone. Its encryption was cracked years ago and a call can probably be decrypted in real time. The same goes for just about anything you access on the internet. If you want to get visual confirmation of this, install the Lightbeam extension for Mozilla Firefox (it shows up as a tiny ‘cube’ at the lower right hand corner of the Firefox window’s add-on bar) and browse normally a few days. Then click on the cube and see how all the sites you visited are connected and by whom. You have probably read how the GPS data on your cell phone can be used to trace your whereabouts and perhaps even that at some airports travelers’ cell phones get taken out of their baggage to be ‘checked’. 20 minutes later they get them back; presumably minus the clone that was made from device’s internal data store. But it goes beyond that. How many of you have read about the shipment of Chinese electric water kettles that were held by Russian customs because they contained microprocessors and wi-fi chips capable of connecting to any wi-fi network within 650 ft. They could (and tried to) call home using the wi-fi connection. Now there is an interesting spy right inside your house.

But if the water kettle can do it, why not the fridge or your new alarm clock or … Do you have a laptop with a webcam? I’m sure the laptop has a microphone. Have you read that the tools to remotely control them are easily available on the Internet? If not, try this link. Do you have a shiny new XBox One? It can log you into your account when you walk into the room, so you are ready to resume playing your favorite on-line game the moment you hit the couch. Sounds nice, but think about it: it must have built-in facial recognition software and be connected to the internet to be able to do so. Do you really think no one has ever thought about inserting a remote control client in the system updates that are automatically pushed down to your hardware. Do you have a D-Link router? You can send it a special code string that allows you to bypass authentication when updating its settings. Very useful for when you forget your password. Apart from a numerical code, the string reads ‘editedbyjoelbackdoor’ backwards (I know: you can’t make this stuff up.)

Have you ever heard of WiSee? Its a technique that allows your wifi router to figure out where you are and what you are doing. I am quite sure there are many more innovations in the pipeline. Most (lets say 99%) of the people won’t think anything of it because they find it convenient. Eventually you might even be seen as a threat just because you refuse to put all these gadgets in your house: you must have something to hide. And as icing on the cake, see this and this.

What to do against all these threats? Well, becoming a Tibetan monk would be one option, though its a bit drastic. Actually if you’d rather stay home, the best thing to do is what I would call passive resistance because a bigger gun or more bullets isn’t going to get you anywhere with this. An understanding of your adversary’s tools and tactics, on the other hand, will give you a much better chance to escape unscathed. Let me try to explain the term passive resistance in more detail. During WWII in Europe’s occupied territories, most of the population was engaged in some form of passive resistance. A few engaged in active resistance but they were trained and knew what they were doing. Joe Sixpack did not have access to guns and dynamite but was mostly concerned with survival. That largely meant continuing to do whatever it was you were doing before the war with some modifications. For instance, some crops were supposed to be sold to the Germans, however official yields were rather low as part of the crop disappeared before ever making it to market. Sheep were all of a sudden very popular. If you were forced to do some work for the occupiers, slow and shoddy was the norm and preferably disappear overnight. People that housed refugees or downed pilots continued to go to work but never talked to anyone about what they hid. Things were done on a need to know basis: if you weren’t the family cook or provider you didn’t need to know how much food was kept in the basement. Fewer leaks that way. Another important point was to know the enemy: especially later in the war the bulk of the occupying force were conscripts: 16-18 year old kids that would have stayed home if given the choice. They were happy to leave you alone if you didn’t bother them so no need to antagonize them. My suggestion is that when it comes to cybersecurity you consider yourself Joe Sixpack and try to fly under the radar as much as you can.

Flying under the radar is as much a lifestyle change as it is about encrypting your USB stick. You can still use your iPhone, just assume someone is listening in and pick the subject of your conversations carefully. Same thing goes for email: don’t write anything that you wouldn’t say out loud in public. If you really have to have a confidential conversation do it in a place where microphones are few and far between. I read an account of someone from the west who wanted to visit a friend in Russia during the cold war. The Russian agreed to meet him somewhere on a street in town, they walked to the train station, took the train to the next town where they got off and walked out of town into a wide open plain where nothing but heather grew. Only there did his Russian companion think they were safe enough that they could talk without fear of repercussions.

A lot has been said and written about the NSA’s databases. I, too, wish they didn’t exist but I believe that we have to accept them as a fact of life. Regardless of what MSM is going to tell you, neither collection efforts nor databases will be abandoned or even scaled back. So it is important to understand what they can and cannot do with that information. And there is the rub. Computers are great for searching databases for a particular data item. Lets say the computer is told print all available information for your social security number, it will be spitting out page after page within seconds including things that you have long since forgotten and could probably pass a lie detector test denying them. If on the other hand you give a computer the task to ‘find me some terrorists’ it will fail gloriously. Yes, you will get a list of names but the chance that these people are real terrorists is practically zero. The problem is that computers have no intuition, no feeling if you wish. They simply take the criteria that you give them and look for matches. If you set the criteria too wide, you will be deluged with false positives. If you set the criteria too narrow, you will catch some hapless bystanders but not those people that have an expectation that you are looking for them and therefore have actively scattered their trails (think of someone walking through a brook to throw off any canines that come looking for him).

Occasionally one comes across references how all of this will radically change once quantum computers are in production in a few years. I believe that’s wishful thinking for several reasons: – The humans asking the questions haven’t changed. – A few qubits don’t make a fully functioning quantum computer capable of running advanced software. – A quantum computer is not your laptop at warp speed. It requires a totally different programming model that is being developed from scratch. This takes time to figure out, test and reliably implement. Time is in short supply. Otherwise you wouldn’t need to prep. Here is a reasonably accurate representation (as near as I can tell from reading other documents) of where we currently are.

I know there are lots of other types of analysis that can be done on a database (been there, done that) but at the end of the day the analysis is only as good as the person setting the criteria. This is the primary reason why MSM talk about so many studies that refute the studies they championed 6 months earlier. Any analyst worth their money can find what his/her paymaster wants to extract from a given database because only the headline result is reported, never the actual query that coughed up those results.

Now that you know this, how can you use this knowledge to your advantage? Let me give you a simplified example. You have never cared too much about prepping but something tipped you off: SHTF in 2 weeks. So you decide to visit every store in your area 3x each week to buy 2 jars of peanut butter. SHTF and the stores are empty the next day. The day after that a hungry crowd demands that police do something, so they run a database cross check on store receipts and quickly realize you must have a pantry full of peanut butter. And so you hear the dreaded knock on the door. Your neighbor who prepped for years bought an extra jar once a month (maybe two if there was a sale) for the last two years. They got way more peanut butter than you but nobody knocks on their door because their purchase pattern would be considered normal with not the slightest hint of hoarding activity. If you have a family of 2 and a baby and buy a large jar of peanut butter every week, that might be deemed suspicious also unless you sell peanut butter cookies. The same thing goes for all of sudden insisting on paying everything in cash at your regular grocery store. Paying cash at a store you visit once a year should be just fine. Like I said: scatter your trail; don’t create pattern breaks and don’t get too cute about it. Its all about optimizing effort/reward ratios: make sure you are not the low hanging fruit.

I will spare you the details about how databases work but you need to understand that, in the example above, the police were able to finger you so quickly because different databases can be easily and reliably connected by matching something called key fields. This could be your credit card number, customer number, store awards ID, etc. Running a tally on any one of these identifiers will quickly show how much of what you bought during a given time frame. Matching the store’s sales database against their customer database will deliver names and addresses. This is basically why the NSA only has to store the metadata of phone calls. Its all they need for their work because if you talked to a ‘person of interest’ you have also become a ‘person of interest’. The phone company maintains names and addresses on those phone numbers and can be made to cough them up one way or another. At which point you can be ‘interviewed’ or ‘bugged’ or ‘tapped’ for more information. Of course most people engaged in subversive activities are aware of this and use throw-away phones with cash pre-paid SIM cards bought in a store without video surveillance. You, on the other hand, had better hope that none of your contacts will ever be caught in a sting operation.

But you are still stuck with those documents that you want to protect for one reason or another. I will try to help you with those too, however things will become gradually more technical from here on. This cannot be helped but you may want to try to stay with it as best you can because having a false sense of security is worse than having no security. If you know that your system is insecure you may make a concerted effort to physically keep the documents from falling into the wrong hands. If you leave your documents on your laptop because they are ‘safely’ encrypted but do not realize that your encryption can be broken in two seconds, your position is a lot worse.

There are two ways that you can protect your documents: – lock down your systems so no one can get at them – lock down your documents so no one can get at them Recapping from what I mentioned earlier: there are simply too many threats to your system (from compromised clothing irons to malware) to seriously consider option 1. So we will focus on option 2: encrypting the documents. This has an added advantage that you can send them anywhere over the internet or even store them in the cloud and be reasonably certain no one but intended parties can access those documents. But you MUST encrypt them on the machine you create them on and not send them somewhere (even within your own house) to have them encrypted for you.

Now for some bad news: regardless what type of encryption scheme you want to use to protect your documents, YOU will always be the weakest link in your security chain. This is because you need a password. Whatever you choose it will orders of magnitude less secure than the computer generated key that encrypts your documents. People who study these things say that you will need a password of at least 40 random characters (think software activation keys) to match the strength of a widely used encryption key called AES-256. [If you happen to be one of the people who study these things: I know I am over-simplifying but this is intended for novices.]

The way most encryption schemes are working is that the document itself is encrypted by an established cipher for instance AES-256. The computer generated encryption key that is used for that purpose is, together with other relevant information, stored in a header that is added to the encrypted document. Document + header is usually referred to as a container; however a container can be much bigger and hold multiple documents or even an entire hard disk. In those cases all documents in the container are encrypted with the same key. Storing the encryption key with the encrypted document defeats the purpose of encryption unless you encrypt the encryption key with another cipher. This is were your password comes in: it is used to encrypt the document’s encryption key. So if you use a weak password the encryption key will be quickly recovered and the document can be as easily accessed as when you type in your password. In this scenario the use of AES-256 encryption simply gives you a false sense of security because no one in his right mind will try crack the encryption key: they will go after the way you have stored it.

In order to make your weak password stronger (i.e. harder to crack) most security algorithms add salt to it. In cryptography ‘salt’ refers to a random string that is concatenated to your password before it is encrypted through hashing. A hash function is a mathematical one-way street: you can store the hashed value in plain sight because no one has found a way to reverse the hashing function yet (at least that we know of). The next time you enter your password, the computer goes through the same hashing process; if the result is the same as the stored value you are granted access. Cryptographers not only use salt, sometimes they also use pepper. This refers to the use of a third input into the hashing function. This can be a static random number that is stored in a place that is not associated with the protected container. Programs like TrueCrypt have the ability to derive this third value from one or more files called key files, which opens up a whole new set of possibilities.

In my own setup key files play a very important part because: – they thwart any and all key loggers since no keys are pressed to access them. – I set the system up so it knows where the key files should be so I don’t have to worry about webcams looking at me selecting the files. – the key files do not need to be on the system: you can put them on a USB stick or wherever suits your needs. For instance I store one of the key files that protect my document vaults on my NAS (Network Attached Storage.) If my laptop gets stolen and taken beyond the range of my wireless router, its container locks up because the required key file is physically unavailable to the hashing process. The information in that container is now protected by 1536 bit encryption. That is the equivalent of a 192 character password and I wish the thief good luck trying to open the container. – In a similar arrangement you can put key files on a flash drive or (micro)SD card and carry them with you so only you can access the vaults, even if your password is easy to guess. A microSD card has the advantage that it can be easily disposed of in an emergency.

When you do use key files, make sure they are write protected. Even changing a single bit (i.e. changing a ‘d’ to an ‘e’ in a text file) will render your container permanently closed. The same goes if you use pictures as key files. Some viewers have a habit of updating exif data without asking. This will also permanently lock your data.

Because most of my containers are protected by two unique keyfiles, there is a lot of information to keep track of that I do not want to memorize. All this information is stored on the computer itself but in order to keep these things under wraps, they are stored in their own small container that I think of as a systemvault.

And how does it all work once its set up? Quite nicely actually. I have an icon on my desktop that I double click. Then the computer asks for the container’s password and, if I make no mistakes, opens the container to make all documents inside freely accessible. If I double click. the same icon again it closes the container. Doesn’t get much simpler than that.

There are other, more nefarious, threats to your encrypted document. Why would someone try to crack your encryption if they can simply read your password with a key logger or watch your fingers with a remote controlled webcam? There are many programs (called trojans) and viruses doing the rounds on the internet with only one purpose: to get your information. Passwords are worth money on the black market. The password to your encrypted vault may not be worth as much as that of your bank account but who knows what’s lurking out there. So you have antivirus software installed to keep those intruders at bay. [Remember who is the weakest link …] Now tell me honestly: how many backdoors are there in your computer’s operating system? They are not detectable by your antivirus software but grant complete access to your computer by anyone who knows how to exploit them. Someone could make a copy of your document as you are creating/reading it and send it to command central without you being aware that anything is going on. At least until they choose to notify you, possibly via the local SWAT team.

Now what do the paranoid do? Well, they stick to using open source software where the source code can be freely inspected by anyone interested [The really paranoid download the source code and then go on a customizing spree; no, I’m not kidding]. They refuse to load any software for which the source code has not been published. The latter usually being referred to as a binary blob. Most computers, tablets and cell phones run on binary blobs. All versions of Windows, OSX, iOS and Android are at least partially closed source. Some people insist that Microsoft has included backdoors since Windows95. The fact that Microsoft’s monopoly was never broken up (unlike AT&T) is considered more proof of nefarious activities. I am not saying that there are backdoors because that is hard to prove without access to the source code. I will say that the silence of US companies while complying with DOJ/NSA (at least until Mr. Snowden’s revelations caused their foreign clients to bolt) suggests that it is not a stretch to assume the worst about their products. And so I prefer to avoid them. And so should you if you are really into OPSEC. My personal opinion is that anyone who says he’s got a secure system while running one of those blobs is misguided at best. I am not even sure I would want to receive an encrypted document from him unless its in a way that’s not traceable. However that’s no different from getting a call from someone that sits in front of his XBox One. If you really want to improve your cybersecurity, you’ll have to run a Linux distro without any blobs. Please don’t read this as me saying that those distros cannot be compromised. Its software so, yes, of course it can be ‘adapted’. Its just that its a lot harder to do so unnoticed for any length of time and since Linux is used on fewer PCs/laptops such activities don’t deliver a lot of bang for the buck. Again its a matter of making sure you are not the low hanging fruit.

Next up I want to expand a bit on my systems’ overhaul. Three things were involved: -1- I switched the file system for my external drives to Btrfs. This isn’t security related but it provides checksums on files and folder structures and self-healing capabilities based on built-in redundancies. This should help preserve data in case a drive starts getting worn-out or external backups deteriorate faster than expected. I don’t think its all that useful for system drives yet because you need to run a separate command to release the space taken up by deleted files. -2- The installation of a number of virtual machines (VMs) for specific tasks like on-line banking, email and secure browsing. Since most of the VMs only take up 2GB-4GB in disk space its not a big deal to create a few extra. Mine actually reside on a USB stick with room to spare. The idea was to avoid cross contamination by programs or web sites trying to access cookies they did not put there. For instance the banking VM is only used to talk to my bank’s servers and to store bank account related passwords. -3- Creating a number of encrypted containers. Most of the VMs have their own container which stores passwords, documents, browser settings, cookies, etc. This container needs to be opened before the VM is all that useful. Other containers store documents permanently or are used to send documents over a local network in encrypted form.

After going through these steps and relocating a number of files, my systems are now very much plain vanilla if you start them up. They appear to be used for some general purpose web browsing, playing a few games and contain some music. One of them stores scans of old photographs. Nothing out of the ordinary. You won’t even find a copy of the text that you are reading at the moment.

Let’s take a bit more in-depth look at my setup: Step -1-: If you don’t know what I am talking about; just forget it. Step -2-: After reading up on my options (there are several VM vendors) I settled on Virtualbox. Its consistently ranks at or near the top in tests and is very user friendly. You install Virtualbox like any other application. I use version 4.2.18 from this site because that was the latest in the 4.2 series at the time. Don’t forget to download the correct extension pack from the same web page. The software is free. Why? Basically you are one of their beta testers, which is why you want latest stable build, not bleeding edge. The company makes its money by selling fully tested versions to enterprise customers. Once you run the program, it presents you with a wizard to take you through the steps of creating a VM; the wizard will warn you if you select the wrong settings.

If you don’t succeed the first time: a VM is just a specially formatted file on your computer; you can always delete it and start over to try again. Once you have created your virtual machine, you need to install an OS in it from an iso image just like you would on a normal hard drive. When the installation is complete you can click Virtualbox’ start button and the VM boots up just like a real computer. As with all powerful software there are a few extra things you should learn like how to share folders between VM and host, use a clipboard to copy documents in and out of the VM and optimizing the VM’s drivers and settings. You can get by without these but won’t be quite as productive. The minimum hardware configuration to run VMs without too many crashes/performance penalties seems to be: dual core CPU and 1 GB ram (though 2 GB works better). Step -3-: There are several programs that create encrypted containers in a variety of ways. After looking at them I decided to go with the Linux equivalent of TrueCrypt because it seemed to be the best fit for what I wanted to achieve. I know Truecrypt is open source but Linux distros generally stay away from it for licensing reasons. According to a person that was involved in vetting TrueCrypt’s license, it is worded in a way that allows the developers to sue you if you use it for its intended purpose. When the developers were alerted to this their response was along the lines of ‘So what?’. Another programmer took TrueCrypt’s documentation and from scratch wrote a program that creates TrueCrypt compatible containers. This wasn’t too difficult because the Linux version of TrueCrypt uses functionality available in newer Linux kernels for actual encryption/decryption work. The new program is called tcplay and is carried by most Linux distros. Just make sure you get version 1.1 or higher if you want to use it. The nice thing about that setup is that the Linux kernel provides enterprise strength encryption which is continually updated and improved. You get to hitch a ride for free.

Another benefit of the way Linux deals with encryption is that any information that is read or written is directly transferred between RAM and the container: any piece of information that exists outside of the computer’s memory is always encrypted. There is no program involved that could make an illicit copy before encrypting your information. In my setup I have made sure that the vaults are linked to memory locations (not locations on the hard drive) when they are opened. This is to ensure that no unencrypted data gets inadvertently written to disk.

As a final measure I implemented layered security where cracking one password only gets you some information but not all of it. Here is an example of getting to bank account passwords: – start computer and insert USB stick holding the VMs – start VM manager; requires computer’s admin password and systemvault password (the system vault contains a key file and routing data of the banking VM’s vault; the second key file is stored inside the VM allowing me to store backup copies of the vault in plain sight since they can only be opened inside the VM) – start banking VM; requires VM admin password and VM vault password (password file is stored inside VM vault) – decrypt password file; requires password and key file selection

All passwords are salted and hashed and most of them are peppered as well. So any attacker would need to use my computer and USB stick and then crack a series of passwords while blindly guessing one keyfile. I am counting on the fact that they will give up before they get that far, even though most of the passwords used are easy to type/remember (= inherently weak). In daily life it depends what I am working on but most of the time I only have to enter two passwords to be able to access my bank’s web site through a VM which to me is a reasonable trade-off for the added security. Is such an elaborate setup overkill? Perhaps, time will tell! But hopefully I have given you some ideas to work with.

Last but not least there is one thing you need to keep in mind when working with encrypted documents. If you have a habit of hibernating your computer, its memory contents will be written directly to a special area on your hard drive called swap space. This means that any open documents are recoverable from the swap space until its overwritten with other data. So you must close your documents before hibernating or encrypt your swap space to close that loophole.

—————————————

Next up, for the intrepid and those who wish to add to their skills (remember skills and knowledge are just about the only things that cannot be taken away from you), a step by step guide of what is required to get to the point of double clicking an icon to open/close a container. We will start completely from scratch by installing a Linux distro. I admit this is a bit of an experiment since some of the commands will wrap around to the next line on SurvivalBlog’s web page. However after some testing I am fairly confident they will be in the correct format when pasted into a text editor.

As I have mentioned in a previous submission, the best Linux distro to use when you are used to Windows (XP/Vista/7) is Linux Mint 13. This is their current long term supported (till 04/2017) Ubuntu derivative which means out-of-the-box support for most hardware. Version 14, 15 and 16 are also available but are really development snapshots with a short life cycle. You will also want to stay away from LMDE if you never tried Linux before. Mint focuses on keeping a productive desktop environment which means it looks very familiar if you are used to XP/Vista/7. The other Linux desktops come with a (sometimes much) higher learning curve. If you have never installed an operating system you probably should get someone to assist you in the following steps: -1- Download the iso image from the Linux Mint web site. In the following instructions I am assuming you are using the MATE desktop so you may want to download that version. If you don’t know if your computer can handle 64-bit code, just use the 32-bit version. -2A- Burn the downloaded image onto a DVD and start your computer from there, however this makes the system rather slow. -2B- Download the Windows version from a software package called Unetbootin. This allows you to transfer the downloaded iso image to a flash drive and boot your computer from that. This is much faster especially if you use (real) USB 3.0 drives. -3- Start the computer from your DVD or flash drive. -4A- Permanently install Linux on your hard drive – a 10GB partition is more than big enough. Backup ALL your data if you have never done this before because you will need to defragment Windows and then shrink your Windows partition. Linux installs its own bootloader that allows you to choose if you want to run Windows or Linux every time you (re)start your computer. -4B- Permanently install on an external drive. This can be a (8MB+) USB stick also. Make sure you install the bootloader on the external drive in this scenario, so your hard drive is untouched. This may be the better alternative because you can tell the installer to use the entire drive, saving you the partitioning process. If you are new to this the easiest way to tell which drive is your hard drive/external drive/etc. is to check their reported size. Note that Linux can read/write all Windows disk formats so you can use your primary hard drive to store containers if you wish. -5- During a permanent install Linux will make you enter a password. Write It Down! It is much more important than with most Windows installs and if you forget it you will be able to do nothing but re-install Linux. -6- Reboot the computer from the image you just installed.

To make your life a bit easier and more productive try the following steps (they are not critical though):
– Right click on the panel at the bottom of your screen
– Select ‘Add to Panel’
– Scroll down the window and select ‘Workspace Switcher’
– Click ‘Add’; click ‘Close’
You should see 4 gray rectangles on the panel. These represent 4 desktops, each just a mouse click away. You can run applications on each desktop and switch between them which is much nicer than having them all stacked on one desktop.

Now that you are up and running you need to install a few scripts and a program. The reason is that tcplay is a low level program that only takes care of the very basics through the command line. Opening, closing and modifying of a container from the user perspective is really a three step process and tcplay takes care of only one of those steps. Doing those steps out of order or skipping one has nasty consequences for your data or can even lock up your computer (trust me, I tried …:). Perhaps someday someone will write a nice GUI for a program that combines those steps but in the meantime we go with quick and dirty.

Though installing the scripts can be done using ‘ordinary’ (= point and click GUI) programs, I will use the command line interface. This way you can simply copy and paste the commands instead of having to learn to use new software. If you are not used to typing commands you should definitely use the copy/paste method since the commands are rather picky. For instance ‘echo #.. >>/etc/fstab’ is harmless but ‘echo #.. >/etc/fstab’ will make your system unbootable and you will have to install the Linux distro from scratch.

To use the command line interface you need to open a terminal: click on ‘Menu’ in the lower left hand corner of the screen and then click on ‘Terminal’. This should open up a new window with a blinking text cursor. This window has an ‘Edit’ menu that you can click on to use the ‘Paste’ function. Click on the terminal window to activate it. Depending on how you highlight text in your browser, the computer may or may not execute pasted commands right away. If it doesn’t, press the ‘ENTER’ key after pasting the command.

# We begin with the command: sudo su # and enter your password as required.

# Next commands (can be copy/pasted as a single block) are:
mkdir -pm755 /srv/tc
printf “tmpfs /tmp tmpfs defaults 0 0” >> /etc/fstab
printf “tmpfs /var/tmp tmpfs defaults 0 0” >> /etc/fstab

# To get tcplay you need an internet connection as you need to download a small file.
# For 64 bit OS:
wget
http://mirrors.kernel.org/ubuntu/pool/universe/t/tcplay/tcplay_1.1-1_amd64.deb
# – or –
# For 32 bit OS:
wget
http://mirrors.kernel.org/ubuntu/pool/universe/t/tcplay/tcplay_1.1-1_i386.deb

# To install the downloaded program:
gdebi tcplay*
# answer the prompt by pressing the ‘y’ key

# Now we need to create the scripts that execute the various tasks.
# Note that each of the files MUST start with the phrase #!/bin/bash as its very first line.
# Open a text editor:
pluma /srv/tc/MDV.sh 2>/dev/null
# Copy and paste the first script (below) into the text editor; then click the ‘save’ button and close the editor.
# We also need to make this script executable:
chmod 755 /srv/tc/MDV.sh

# Open the text editor again:
pluma /srv/tc/MUV 2>/dev/null
# Copy and paste the second script (below) into the text editor; save and close.

# Open the text editor a 3rd time:
pluma /srv/tc/CV 2>/dev/null
# Copy and paste the third script (below) into the text editor; save and close.

# switch to user mode (very important):
exit

# then (you can copy/paste the following commands in one block):
ln -s /var/tmp ./Desktop/vaults
printf “[Desktop Entry] Version=1.0 Type=Application ” >
./Desktop/MDV.desktop
printf “Terminal=false Exec=mate-terminal -e \”sudo /srv/tc/MDV.sh\” “
>> ./Desktop/MDV.desktop
printf “Name=MDV Icon=mate ” >> ./Desktop/MDV.desktop
printf “[Desktop Entry] Version=1.0 Type=Application ” >
./Desktop/documents.desktop
printf “Terminal=false Exec=mate-terminal -e \”sudo /srv/tc/MDV.sh toggle
documentvault\” ” >> ./Desktop/documents.desktop
printf “Name=documents Icon=/usr/share/pixmaps/gksu-icon.png ” >>
./Desktop/documents.desktop

Minimize the terminal window.
Double click on the MDV.desktop icon on your desktop. In the popup window click on ‘Mark as trusted launcher’.

Next we will create a system vault. If you run into trouble and the process aborts; you need to type the following command in your terminal window and start over again:
sudo rm /srv/tc/.SystemVault

Double click on the MDV icon on your desktop again and enter your password; then select ‘create’ in the popup window and click OK button. In the next popup window type ‘systemvault’ (without quotes; then click OK button).

Your computer will now create your systemvault after asking what hash function and what cipher(s) to use [see notes below]. It will also require a password for the vault. Write that password down too. The whole process can take anywhere from 1 to 15 minutes due to random seeding. You will just have to be patient and let it run.

Once your systemvault has been created, you need to open it as follows:
Double click on the MDV icon on your desktop and enter your password; then select ‘open’ in the popup window, click OK, type ‘systemvault’ (without quotes), click OK.
Now click on the ‘vaults’ icon on your desktop. The file browser window that opens up should show an entry ‘tc’. Double click on that and you should see an entry called ‘Lost + Found’ (if you don’t see it try <CTRL><H> to show hidden files). If you do you are looking into an empty vault.

# Now restore your minimized terminal window and copy/paste the following block of commands into it:
user=”`whoami`”
printf “containerlocation=/home/$user ” > /var/tmp/tc/documentvault.rc
printf “container=\”DOCvault\” ” >> /var/tmp/tc/documentvault.rc
printf “containersize=\”500M\” ” >> /var/tmp/tc/documentvault.rc
printf “key1=\”\$SVmountpoint/lake.jpg\” ” >> /var/tmp/tc/documentvault.rc
printf “key2=\”\$SVmountpoint/mountain.jpg\” ” >>
/var/tmp/tc/documentvault.rc
printf “backupdir=\”\$NASmountpoint/data\” ” >> /var/tmp/tc/documentvault.rc

Refresh the file browser window (click circular arrow). It should now show a file in your vault. This file is a called a resource file and you need to create one for each container you want to create and/or use. Double click the file to open it. If the system asks you to select a program, choose pluma. The first 3 lines are mandatory; the second 3 are optional and can be deleted (or commented out by putting a # in front of the line) if you don’t want to use key files and automatic container backups. With the sample resource file the computer will try to create/use a 500 MB container called DOCvault in your home directory. If you want to use key files you must define them (and make sure they exist) before trying to create the container or the process will fail.

Click on the MDV icon on your desktop. Select ‘close’ and again type: systemvault and select OK.
Refresh the file browser window and the ‘tc’ folder should now be empty or have disappeared altogether.

# During the installation process the tc folder was located on your disk and not yet in memory. So we will clean up with:
sudo rm -fR /var/tmp/*
# And by restarting the computer we move the /var/tmp folder into memory:
sudo reboot
# Which concludes your installation process.

If you want to create the container defined in the sample resource file, you go through the same steps as when you created the system vault. But you first need to copy two key files into your systemvault and make sure that the key1= and key2= entries in the documentvault.rc file contain the names of these files.
-Doubleclick on the MDV icon on your desktop, enter your password and then select ‘create’ in the popup window and click OK button.
-In the next popup window type ‘documentvault’ (without quotes; then click OK button).
If the computer can’t find the key files you specified, it will abort the process with an error message.
Once the creation process is complete, you can access the contents of this container by double clicking the ‘documents’ icon on the desktop. This container will show up as a folder beside the ‘tc’ folder that holds the system vault.

Technical Notes and Code to Copy/Paste:

By default the systemvault only uses a password. If you want to use a keyfile also change the line ‘tcpopts=””‘ in MDV.sh to ‘tcpopts=”-k $key1″‘ before creating the system vault. A key file can be added later by running MDV’s modify option. Once the modify operation has completed, you need to define tcpopts as shown above before you can open the systemvault again. To make this change in MDV.sh you must run your text editor with elevated privileges like so: sudo pluma /srv/tc/MDV.sh

To change key files for other containers you need to add lines defining key3 and key4 as the new key files to the container’s resource file. Then run MDV’s modify option. Then copy key3 and key4 definitions to the key1 and key2 definitions.
If you don’t want to use any key files, you need to change the line
‘tcpopts=”-k $key1 -k $key2″‘ in MDV.sh to ‘tcpopts=””‘.

To create additional icons on your desktop: right click the desktop and select ‘Create launcher’. You can check the properties of the existing MDV and ‘documents’ icons for an example of what to enter in the various fields. To find a fitting icon for your launcher, click on the button to the left of the text entry fields and browse the ‘pixmaps’ folder.
When you create a new icon make sure the container name mentioned in the ‘command’ field matches the name of an existing resource (.rc) file in the system vault.

$SVmountpoint and $NASmountpoint (as used in the sample resource file) are defined at the start of the MDV.sh script. Their values can be changed as required. $SVmountpoint will always point into the opened system vault wherever you want to store the vault. $NASmountpoint allows you to define the location of an external or network drive.

When creating a container you will be given some options on how to encrypt your key. You can choose from three hash functions and 8 cipher combinations. For hash functions (first menu) I only use options 1 and 2 based on their heritage. As far a the ciphers goes: the longer the cipher chain the stronger the encryption as each cipher adds 512 bits to the key length.

If you decide to use VMs also, do NOT try to create containers inside the VM. It will cause you nothing but grief. Create the container directly on your hardware and then copy it into the VM; after that it will work just fine.

The MDV script supports the following options:
– open : opens a container.
– close : closes a container.
– toggle : toggles between open and closed states.
– unload : closes all open containers (useful when hibernating/shutting
down your computer).
– opencopy : opens a (backup) copy of a container besides the current
copy. This allows you to compare contents or documents without having to
create an unencrypted copy somewhere.
– create : creates a new container.
– modify : allows you to change the container’s password and/or key files.
– backup : create a backup copy of the container.
– restore : restore a container’s primary header in case it has become
corrupted.
– info : display information about the container.

The scripts should work on any Linux distro but a few commands are hard coded for use with the MATE desktop. For instance ‘mate-terminal’ and ‘matedialog’ will have to be replaced by the appropriate commands for that distro/desktop. A final note regarding the scripts: they run fine on a daily basis on my systems but I do not believe all possible code paths have been fully tested so the road less traveled may be rocky.

License: The code is released under a FreeBSD license which means you can use, improve or cripple it in any way you want. You can even sell copies to your buddies. However the license also includes the magic formula: the code comes without any warranty. Its not even guaranteed to be fit for its intended purpose.

********** Save the following lines as MDV.sh ************
#!/bin/bash

tcsdir=”/srv/tc”
TCmountdir=”/var/tmp”
SVmountpoint=”$TCmountdir/tc”
NASmountpoint=”/mnt/NAS”

function SysVault {
container=SystemVault
containersize=12M
containerlocation=”$tcsdir”
backupfolder=”$TCmountdir/tcb”
mountname=”`basename “$SVmountpoint”`”
}

function OtherVaults {
filecount=0
[ -d “$SVmountpoint” ] && filecount=`ls “$SVmountpoint” | wc -l`
if [ $filecount -eq 0 ]; then
“$tcsdir”/MDV.sh open systemvault
[ $? == 0 ] || exit 1
echo
fi

resources=”$SVmountpoint/$vaultname.rc”
[ -r “$resources” ] || notify “Cannot retrieve $resources”
. “$resources”
mountname=”`echo $container | sed -e’s/^\.//g’`”
}

function OpenVault {
filecount=`ls “$TCmountdir” | grep “$mountname” | wc -l`
if [ $filecount -gt 0 ]; then
mountname=”$mountname$filecount”
vaultpath=”`matedialog –file-selection 2>/dev/null`”
container=”$container$filecount”
containerlocation=”/tmp”
ln -fs “$vaultpath” “$containerlocation/$container”
fi

mountpoint=”$TCmountdir/$mountname”
echo ” opening container on $mountpoint”
. “$tcsdir”/MUV mount
pause 0
}

function ToggleVault {
mounted=`cat /etc/mtab | grep “$container” | wc -l`
if [ $mounted -eq 0 ]; then
. “$tcsdir”/MUV mount
else
. “$tcsdir”/MUV unmount
fi
}

function UnloadVaults {
unset lastvault
while true; do
mounted=”`cat /etc/mtab | grep “/dev/mapper”| cut -d” ” -f1 | tail -1`”
[ -z “$mounted” ] && exit 0
vault=”`echo $mounted | cut -d/ -f4`”
[ “$vault” == “$lastvault” ] && exit 1

device=”`tcplay -j $vault | grep “Device:” | cut -d: -f2 | tr -d
[:space:]`”
mountpoint=”`cat /etc/mtab | grep “$mounted” | cut -d” ” -f2`”
umount “$mounted”
rmdir “$mountpoint”
tcplay -u “$vault”
losetup -d “$device”
lastvault=”$vault”
done
}

function GetKey {
echo “Select system vault key file”
key1=”`matedialog –file-selection 2>/dev/null`”
[ -z “$key1” ] && exit 1
}

function CheckKeyfileAccess {
file1=`echo “$key1” | grep “$NASmountpoint” | wc -l`
file2=`echo “$key2” | grep “$NASmountpoint” | wc -l`
NeedNAS=`echo $file1 + $file2 | bc -l`
if [ $NeedNAS -gt 0 ]; then
mounted=`cat /etc/mtab | grep “$NASmountpoint” | wc -l`
if [ $mounted -eq 0 ]; then
echo “mounting NAS …”
mount “$NASmountpoint”
[ $? == 0 ] || pause 1
fi
fi

if [ -n “$key1” ] && [ ! -r “$key1” ]; then
notify “unable to access keyfile $key1”
fi

if [ -n “$key2” ] && [ ! -r “$key2” ]; then
notify “unable to access keyfile $key2”
fi
}

function notify {
printf ” %s ” “$1”
pause 1
}

function pause {
printf “%s ” ” Press any key to exit”
read -n 1
exit $1
}

# ———————————————————-
# must be run as root
[ $EUID == 0 ] || notify “You need administrator rights. Try: sudo
/path/to/MDV.sh”

action=”$1″
vaultname=”$2″

if [ -z $action ]; then
action=”`matedialog –list –hide-header –text=”Select an action”
–column=action open close backup opencopy unload create info modify restore`”
[ -z “$action” ] && exit 1
fi

[ “$action” == “unload” ] && UnloadVaults

if [ -z $vaultname ]; then
vaultname=”`matedialog –entry –text=”Enter vault name”`”
[ -z “$vaultname” ] && exit 1
fi

SV=”`echo $vaultname | grep -i systemvault`”
if [ -n “$SV” ]; then
SysVault
tcpopts=””
tcpnewopts=”–new-keyfile=$key3″
else
OtherVaults
tcpopts=”-k $key1 -k $key2″
tcpnewopts=”–new-keyfile=$key3 –new-keyfile=$key4″
fi

mountpoint=”$TCmountdir/$mountname”
case “$action” in
“create”) . “$tcsdir”/CV;;
“open”) . “$tcsdir”/MUV mount;;
“close”) . “$tcsdir”/MUV unmount;;
“opencopy”) OpenVault;;
“unload”) UnloadVaults;;
“toggle”) ToggleVault;;
“info”) . “$tcsdir”/MUV info;;
“restore”) . “$tcsdir”/MUV restore;;
“modify”) . “$tcsdir”/MUV modify;;
“backup”) . “$tcsdir”/MUV backup;;
*) notify “unknown action: $action”;;
esac

 

************** Save the following lines as MUV **************
#!/bin/bash

action=”$1″
loopdevice=”`losetup -a | grep $container | cut -d: -f1 | tail -1`”
[ -f “$containerlocation/$container” ] || notify “container
$containerlocation/$container not available”
cd $containerlocation

# ———————————————————————
# back up container
if [ “$action” = “backup” ]; then
[ -z “$backupdir” ] && notify “backup folder not set up”
[ -w “$backupdir” ] || notify “$backupdir not accessible”

# compare file’s modification times
backupcopy=0
currentcopy=`stat -c %Y “$containerlocation/$container” | awk ‘{printf $1
” “}’`
if [ -f “$backupdir/$container” ]; then
backupcopy=`stat -c %Y “$backupdir/$container” | awk ‘{printf $1 ” “}’`
fi
if [ $backupcopy -eq $currentcopy ]; then
echo ” Container already backed up”
pause 0
fi
if [ $backupcopy -gt $currentcopy ]; then
echo ” Backup is newer – Do you really want to overwrite it? (y/n)”
answer=”`read -n 1 | tr [:upper:] [:lower:]`”
[ “$answer” == “y”] || exit 0
fi

# unmount container to make sure all caches have been flushed
mounted=`cat /etc/mtab | grep “$mountpoint” | wc -l`
if [ $mounted -gt 0 ]; then
echo closing container …
. $tcsdir/MUV unmount
fi

# copy container
echo “backing up container to $backupdir …”
cp -f “$containerlocation/$container” “$backupdir/$container”
[ $? == 0 ] || pause 1
chmod 644 “$backupdir/$container”
exit $?
fi

# ———————————————————————
if [ “$action” == “unmount” ]; then
# already unmounted
[ -z “$loopdevice” ] && return

# systemvault must be the last one to unmount
if [ “$vaultname” == “systemvault” ]; then
mounted=`cat /etc/mtab | grep “/dev/mapper” | wc -l`
sysmounts=`cat /etc/mtab | grep -i “$container” | wc -l`
[ $sysmounts -lt $mounted ] && notify “System vault in use: cannot close it”
fi

# remove user access
mounted=”`cat /etc/mtab | grep “$container” | cut -d” ” -f2 | tail -1`”
if [ -n “$mounted” ]; then
container=”`cat /etc/mtab | grep “$mounted” | cut -d” ” -f1 | cut -d/ -f4`”
umount “$mounted”
[ $? == 0 ] || pause 1
rmdir “$mounted”
fi

# remove encryption mapping
loopdevice=”`tcplay -j $container 2>/dev/null | grep “Device:” | cut -d:
-f2 | tr -d [:space:]`”
if [ -n “$loopdevice” ]; then
tcplay -u $container
[ $? == 0 ] || pause 1
fi

# release the loop device
losetup -d $loopdevice
return
fi

# ——- required for all following functionality ——–
# associate container with loop device
if [ -z “$loopdevice” ]; then
loopdevice=$(losetup -f)
losetup $loopdevice $container
[ $? == 0 ] || pause 1
fi

# ———————————————————————
if [ “$action” == “mount” ]; then
# already mounted?
mounted=`cat /etc/mtab | grep “$mountpoint” | grep $container | wc -l`
[ $mounted -eq 0 ] || notify “container $container already open”

# check key file availability
CheckKeyfileAccess

# create temp directories
if [ ! -d $mountpoint ]; then
mkdir $mountpoint
[ $? == 0 ] || pause 1
fi
if [ -n $backupfolder ] && [ ! -d $backupfolder ]; then
mkdir -m 777 $backupfolder
[ $? == 0 ] || pause 1
fi

# container already mapped?
mapped=”`tcplay -j $container 2>/dev/null | grep $loopdevice`”
if [ -z “$mapped” ]; then

# no: map it now
# release loop device if not successful
if [ “$vaultname” == “systemvault” ]; then
printf ” %s ” “opening system vault”
[ -n “$tcpopts” ] && GetKey
else
printf ” %s” “$container “
fi
tcplay $tcpopts -m $container -d $loopdevice
if [ $? != 0 ]; then
losetup -d $loopdevice
pause 1
fi
fi

# mount container
mount -o nosuid /dev/mapper/$container “$mountpoint”
[ $? == 0 ] || pause 1

# enable access by all users
chmod 777 $mountpoint
exit 0
fi

# ———————————————————————
# retrieve container info
if [ “$action” = “info” ]; then
[ -n “$tcpopts” ] && [ -z “$key1” ] && GetKey
CheckKeyfileAccess
tcplay $tcpopts -id $loopdevice
if [ $? != 0 ]; then
printf ” %s ” “Will try to access backup info:”
tcplay –use-backup $tcpopts -id $loopdevice
[ $? == 0 ] || pause 1
fi
pause 0
fi

# ———————————————————————
# restore header from backup
if [ “$action” = “restore” ]; then
[ -n “$tcpopts” ] && [ -z “$key1” ] && GetKey
CheckKeyfileAccess
tcplay –modify –restore-from-backup-hdr $tcpopts -d $loopdevice
[ $? == 0 ] || pause 1
pause 0
fi

# ———————————————————————
# modify password and/or keyfiles
if [ “$action” = “modify” ]; then
[ -n “$tcpopts” ] && [ -z “$key1” ] && GetKey
CheckKeyfileAccess

if [ -n “$tcpnewopts” ]; then
if [ -z “$key3” ]; then
holdkey=”$key1″ && GetKey
key3=”$key1″ && key1=”$holdkey”
fi
fi
if [ -n “$key3” ] && [ ! -r “$key3” ]; then
notify ” unable to access new keyfile $key3″
fi

if [ -n “$key4” ] && [ ! -r “$key4” ]; then
notify ” unable to access new keyfile $key4″
fi

tcplay –modify -d $loopdevice $tcpopts $tcpnewopts
pause 0
fi

************** Save the following lines as CV **************
#!/bin/bash

# vault already created
[ -f “$containerlocation/$container” ] && notify “container already exists”

# double check for old mounts just in case
mounted=`cat /etc/mtab | grep “$mountpoint” | grep $container | wc -l`
[ $mounted -eq 0 ] || notify “an older version of this container is already open”

CheckKeyfileAccess

# select PBKDF PRF algorithm while [ 1 ]; do

clear
printf ” Select the PBKDF PRF algorithm you want to use … “
PS3=”your choice: “
select i in “whirlpool” “RIPEMD160” “SHA512”

do case $i in
“whirlpool”) algorithm=”whirlpool”;;
“RIPEMD160″) algorithm=”RIPEMD160”;;
“SHA512″) algorithm=”SHA512”;;
*) unset algorithm;;
esac
break
done

if [ -z “$algorithm” ]; then
printf ” \t%s ” “Invalid input”
sleep 2
continue
fi

break
done

# select cipher chain
while [ 1 ]; do

clear
printf ” Select the cipher chain you want to use … “
PS3=”your choice: “
select i in AES-256-XTS TWOFISH-256-XTS SERPENT-256-XTS
TWOFISH-256-XTS,AES-256-XTS AES-256-XTS,SERPENT-256-XTS
SERPENT-256-XTS,TWOFISH-256-XTS
AES-256-XTS,TWOFISH-256-XTS,SERPENT-256-XTS
SERPENT-256-XTS,TWOFISH-256-XTS,AES-256-XTS

do case $i in
“AES-256-XTS”) cipher=”AES-256-XTS”;;
“TWOFISH-256-XTS”) cipher=”TWOFISH-256-XTS”;;
“SERPENT-256-XTS”) cipher=”SERPENT-256-XTS”;;
“TWOFISH-256-XTS,AES-256-XTS”) cipher=”TWOFISH-256-XTS,AES-256-XTS”;;
“AES-256-XTS,SERPENT-256-XTS”) cipher=”AES-256-XTS,SERPENT-256-XTS”;;
“SERPENT-256-XTS,TWOFISH-256-XTS”) cipher=”SERPENT-256-XTS,TWOFISH-256-XTS”;;
“AES-256-XTS,TWOFISH-256-XTS,SERPENT-256-XTS”) cipher=”AES-256-XTS,TWOFISH-256-XTS,SERPENT-256-XTS”;;
“SERPENT-256-XTS,TWOFISH-256-XTS,AES-256-XTS”) cipher=”SERPENT-256-XTS,TWOFISH-256-XTS,AES-256-XTS”;;
*) unset cipher;;
esac
break
done

if [ -z “$cipher” ]; then
printf ” \t%s ” “Invalid input”
sleep 2
continue
fi

echo
break
done

# create container
cd $containerlocation
dd if=/dev/zero of=$container bs=1 count=0 seek=$containersize
[ $? == 0 ] || pause 1

# setup loop device
loopdevice=”`losetup -a | grep $container | cut -d: -f1 | tail -1`”
if [ -z “$loopdevice” ]; then
loopdevice=$(losetup -f)
losetup $loopdevice $container
[ $? == 0 ] || pause 1
fi

# initialize container
[ -n “$tcpopts” ] && [ -z “$key1” ] && GetKey

printf ” %s ” “Select $container’s”
tcplay -c -d $loopdevice $tcpopts -a $algorithm -b $cipher
[ $? == 0 ] || pause 1

# mount on /dev/mapper
printf ” %s ” “Enter $container’s”
tcplay $tcpopts -m $container -d $loopdevice
[ $? == 0 ] || pause 1

# create a filesystem in it (ext2 for flash based devices)
mkfs.ext2 /dev/mapper/$container
[ $? == 0 ] || pause 1
pause 0

And that’s it, folks!



Two Letters Re: Building Your Own No-FFL AR From an 80% Complete Receiver

Dear JWR,
Regarding the recent article by “Nomad”: I strongly urge all AR-15 owners to get an 80% complete lower receiver, even if you do not finish it now.  [Under American jurisprudence,] if gun confiscation comes, the only thing that must be turned in is the stripped lower receiver.  The BATFE recognizes that the stripped lower receiver constitutes the firearm as it contains the serial number.  The rest IS NOT a “firearm”, by their own regulations.  With the non-registered (as per regulations, again) lower receiver, you can build a fully functioning AR-15 that is not on their books. – Carl X.

James,
The letter on building your own AR-15 with a 80% receiver prompted me to write. I work for an FFL, and have lived through the four panic buying periods since Bush the First’s”Assault Weapons” import ban.

First: Unless you 1) work a sub-minimum wage job, and/or 2) live in a part of the country where licensing fees, FFL fees or the like are huge, then completing a ‘80%’ receiver is not worth the time. Even with the new polymer 80% blanks will take 1-2 hours to finish unless you have a real machine shop to work with.

Just before Christmas, several online sources were selling fully finished aluminum AR-15 receivers for $57 delivered to your FFL. Add in the $25-$40 FFL paperwork fee, and it’s at best a wash to spend hours finishing your 80% receiver. And if your Dremel slips, then you’re buying another receiver blank.

You also need to be aware that the term ‘80% receiver’ is made up by the industry and has no legal standing with BATF. I would strongly suggest that you ask for a copy of a determination letter that the manufacturer of the 80% receiver should have asked ATF for, that states that in the opinion of BATF, that the part you are purchasing is in fact not legally a firearm. If the manufacturer does not have, or will no provide you with a un-redacted copy of such a letter, stay away!

It is entirely possible that BATF, in the absence of such a letter, may make an determination that the 80% receiver was in fact too close to a full 100% receiver for BATF’s liking, and retroactively ban them, turning your receiver into contraband subject to summary forfeiture.

Second, the price of AR-15s is about to plunge. It’s done the same thing after every single panic in the past 30 years. We received a mailing from a lesser known AR-15 manufacturer before Christmas offering a package of 25 units of a basic AR-15, CAR, A3, 16″ bbl, for $599/each. This week that same package is offered at $499/each with shipping included.

Currently the only part of the AR-15 platform that is still in short supply is the bolt carrier group, and some trigger/hammer parts. Low end for Bolt Carrier Groups is currently running about $120. In normal times the low end for these units will be in the $70-ish range. So expect a drop of ~$50 for completed uppers in the near future, and $10-$20 drop on lower receiver parts kits.

The desperation indicated by manufacturers trying to push product out the door at low ball prices, indicates to me that these companies are sitting on a mountain of product that they built for the perceived demand. Now that that demand has subsided, the fire sale that will likely happen in late spring when these companies start to go bankrupt after failing dump their inventory, will bring the retail price of basic AR-15’s down to close to the $500 figure.

In addition, the 11% FET that is due on completed guns, can be avoided by the manufacturer if they sell the lower receiver and parts kits separately.

If you want to finish a 80% receiver blank for reasons other than economic ones, then the above does not apply to you. However, do be on the look out for SHOT Show specials (mid to late January) on parts kits and uppers and, perhaps, complete rifles.

Good shopping and happy new year. – C.

JWR Replies: There have been a lot of electrons spilled in cyberspace about the legalities of AR “build parties.” You are correct about the term “80% receiver.” In the eyes of the BATFE, what you hold in your hand is either a paperweight or a “firearm.” The point at which the former becomes the latter is fairly arbitrary, and it is frightening to think that the threshold (and enforcement thereof) is up to the whims of un-elected bureaucrats. (Just ask the folks at KT Ordnance, in Montana. They had huge legal bills, before they were exonerated.) To be on the safe side, some erstwhile “80%” makers are now selling “60%” lowers. Regardless, these incomplete lowers represent a good opportunity for people to exercise their Constitutional rights with privacy.

I think that some readers must have missed the key point of Nomad’s article. The primary goal is not just to save money. Rather, it is to free ourselves from the clutches of an increasingly paternalistic government. In many states it is now illegal to buy “firearms”–even used ones from private parties living in the same state–without filling out government paperwork. For folks in those states, I recommend that you do indeed “roll your own” AR-15 and AR-10 lower receivers. In all other states where you still have some privacy: Unless you are a tinkerer, I recommend that you simply frequent your in-state gun shows and pick up a half-dozen stripped or complete AR lowers whenever you find them for sale at reasonable prices on the tables of private parties, with no paperwork. Someday your children and grandchildren will thank you for your foresight!





Odds ‘n Sods:

Terry H. was the first to send: How to open a can with your bare hands. Oh, and if the can is short, then see this video.

   o o o

Our friend Tam at the great View From The Porch blog mentioned that Colt has added a handy serial number lookup service to their web site.

   o o o

R.B.S. sent: Like to Travel???? The Places You’re Most Likely to Get Kidnapped

   o o o

Long-time content contributor KAF suggested this article in JAMA: Comparing Diabetes Medications: Where Do We Set the Bar?

   o o o

Carmakers keep data on drivers’ locations. (Thanks to P.J. for the link.)



Jim’s Quote of the Day:

“Praise ye the LORD: for it is good to sing praises unto our God; for it is pleasant; and praise is comely
The LORD doth build up Jerusalem: he gathereth together the outcasts of Israel.
He healeth the broken in heart, and bindeth up their wounds.
He telleth the number of the stars; he calleth them all by their names.
Great is our Lord, and of great power: his understanding is infinite.
The LORD lifteth up the meek: he casteth the wicked down to the ground.
Sing unto the LORD with thanksgiving; sing praise upon the harp unto our God:
Who covereth the heaven with clouds, who prepareth rain for the earth, who maketh grass to grow upon the mountains.
He giveth to the beast his food, and to the young ravens which cry.
He delighteth not in the strength of the horse: he taketh not pleasure in the legs of a man.
The LORD taketh pleasure in them that fear him, in those that hope in his mercy.
Praise the LORD, O Jerusalem; praise thy God, O Zion.
For he hath strengthened the bars of thy gates; he hath blessed thy children within thee.
He maketh peace in thy borders, and filleth thee with the finest of the wheat.
He sendeth forth his commandment upon earth: his word runneth very swiftly.
He giveth snow like wool: he scattereth the hoarfrost like ashes.
He casteth forth his ice like morsels: who can stand before his cold?”- Psalm 147:1-17 (KJV)



Notes from JWR:

Please pray for the folks who are stranded by vehicles with dead batteries or frozen fuel lines, or without water, or cleaning up after burst pipes. All of these have happened with the recent severe cold spell in much of the United States. Hopefully folks have learned from this, and they will become better prepared.

Camping Survival has announced a “Free Shipping Friday”, with free shipping on orders over $150. This promotion is only running today (Friday 01/10/2014, from 12:01 a.m. through 11:59 p.m.) Some heavy items with minimal markup are excluded. (See their web site for details.) No promo code is required. (Free shipping will be automatic for all qualifying orders placed before midnight, Eastern time.)

Today we present a guest article that was too short for the judging in the SurvivalBlog non-fiction writing contest, but that is still quite informative:



Off-Grid Electronics, by D. Smith

When I am looking for electronics for my cabin that is so far back in the woods it is cost-prohibitive to get grid power, I look for certain things: Low energy use, flexibility of use,and a long service life.
I don’t have a lot of extra room in my cabin but I love to read, so I have an e-book reader. Several years ago, I bought a book scanner and scanned in most of my books to make them e-books. Some people say this is a legal gray area but I have no moral qualms about format shifting an item that I have purchased.

So I have quite a large number of e-books to read, but without an electric outlet most of the e book readers out there will go dead within in a week or so of use. Also, due to the format of my scanned books, they take up quite a lot of space so I need a e-book reader that would take removable memory like SD or micro-SD. Also, I wanted replaceable common batteries like AA or AAA.

The closest thing I have found to my dream product for my cabin is the ECTACO jetBook LITE. It takes SD cards and uses 4 AA batteries. I would like it even more if it had an e-ink display that uses less power, but it is still closest thing to my dream reader I have found. The device reads most of the common e book formats like .pdf and .epub, plus several others. It will show a couple of picture file types such as .jpg and .gif in black and white which comes in handy for maps and screen shots I wanted to save from my home computer plus family pictures. It will run over 20 hours on one set of rechargeable batteries. There are several place online to get free e-books. Most of them are older out-of-copyright books but some nice free ones can be found on Amazon.com and web pages can be saved for offline reading. I bought e reader for less than $60 and it allows me to have most of my at-home library to read when I am back in the woods.

Another similar device that I really enjoy and find endlessly useful is the Wiki reader. It is about 3-1/2 by 4 inches square and holds all the text of Wikipedia, all the text of Wikiquotes, all the text of Wikidictionary, and a huge number of free books from project Gutenberg. All of which runs for months on two AAA rechargeable batteries. To get all of this on the machine, I had to upgrade the micro SD card and download the files for free. This device only cost me $20 on a deals web site and it is great. Recently I was trying to remember how to find the diagonal of a square for laying out the footprint of a out building. Geometry was a LONG time ago for me. Five minutes of playing with my wiki reader and I found Pythagoras’s constant 1.414 and away I went. One night my wife and I were discussing history and wanted to figure who the last non-Germanic monarch of England was. It took about 10 minutes to find that out. Sometimes when I am alone at the cabin and don’t want to read a full book or listen to music I will read wikiquotes. Everything from great minds to television shows are in there. Fore example, I really love the Firefly quotes for light reading.

The one downside to either device is they don’t waste their batteries on light so after sundown you need a light. I prefer a head light that uses double a batteries so I don’t have to keep as many kinds of different cells around and since I recharge them, I usually have extras just waiting. A good solar battery charger is really important for my non-paper information needs. I couldn’t find one quite like what I wanted, so I found a nice battery charger that would charge AA and AAA off 12 volt and use either the solar cells for my cabin or the accessories plug in my truck when I have to go out.

The final electronic item that I use at my cabin is a RCA Lyra RD1028 MP3 player. It lets me listen to my favorite music and audio books, plus old radio shows. There are a ton of free non-copyright music and radio shows for downloading on the Internet. This device runs up to 20 hours on 1 AAA battery and takes, again an sd card so I have 6 different cards of audio books and music to listen to. It doesn’t have its’ own speaker, so I had to buy an external speaker and amplifier that runs on – you guessed – AA batteries, but that was a small price to pay. This way if I am working on my land I can put the player in an arm band or even a shirt pocket and use the ear buds. Then when I come home to the cabin, I plug it in and listen to a book or radio show.

All of these devices run on commonly-available batteries that can be purchased as one use or rechargeable. They also all use the standard SD or micro SD cards, so I can expand my collection all the time. They are all fairly cheap although some you must now purchase used. I find they are more useful in an off-the-grid situation than a smart phone or tablet or non-replaceable, non-expandable e-book reader. Since we now live in what’s been dubbed the information age, you can find a lot of free or cheap content to listen or read so you don’t end up bored out of your skull arguing with yourself.
So in short I look for devices that use replaceable common batteries. Expandable memory in the from of sd cards is very desirable. The ability to easily afford redundant back up with tech that is a few years old but still function wonderfully. If other people have devices other than the ones I mentioned that would fill this bill please let us know.