“Go to now, ye that say, To day or to morrow we will go into such a city, and continue there a year, and buy and sell, and get gain:
Whereas ye know not what shall be on the morrow. For what is your life? It is even a vapour, that appeareth for a little time, and then vanisheth away.
For that ye ought to say, If the Lord will, we shall live, and do this, or that.
But now ye rejoice in your boastings: all such rejoicing is evil.
Therefore to him that knoweth to do good, and doeth it not, to him it is sin.” – James 4:13-17 (KJV)
- Ad STRATEGIC RELOCATION REALTYFOR SALE: Self-sustaining Rural Property situated meticulously in serene locales distant from densely populated sanctuary cities. Remember…HISTORY Favors the PREPARED!
- Ad Trekker Water Station 1Gal Per MinuteCall us if you have Questions 800-627-3809
Notes from JWR:
The recent chemical spill in West Virginia is cause for concern, and should prompt prayer. A SurvivalBlog reader reports that there has been some store looting in Charleston, so state troopers have been posted at the doors of some stores. And as usual, grocery stores have sold out of bottled water. Here is a quote: buying one of the last jugs of water at a Walmart store. Tina May, a Charleston resident, even considered heading out of town for the weekend.
‘I’m not sure how long I can last without a shower. This is unbearable,’ she said.”
—
January 11th is the birthday of the late Gunnar Fridtjof Thurmann Sønsteby. (Born 1918.) He was the most decorated hero of the Norwegian resistance to the German occupation. He died May 10, 2012.
—
Today we present a lengthy and detailed entry for Round 50 of the SurvivalBlog non-fiction writing contest. The $9,700+ worth of prizes for this round include:
First Prize: A.) Gunsite Academy Three Day Course Certificate, good for any one, two, or three course. (A $1,195 value.) B.) A course certificate from onPoint Tactical. This certificate will be for the prize winner’s choice of three-day civilian courses. (Excluding those restricted for military or government teams.) Three day onPoint courses normally cost $795, and C.) Two cases of Mountain House freeze dried assorted entrees in #10 cans, courtesy of Ready Made Resources. (A $350 value.) D.) a $300 gift certificate from CJL Enterprize, for any of their military surplus gear, E.) A 9-Tray Excalibur Food Dehydrator from Safecastle.com (a $300 value), F.) A $300 Gift Certificate from Freeze Dry Guy. G.) A $250 gift certificate from Sunflower Ammo. H.) A roll of $10 face value in pre-1965 U.S. 90% silver quarters, courtesy of GoldAndSilverOnline.com. The current value of this roll is at least $225, I.) Both VPN tunnel and DigitalSafe annual subscriptions from Privacy Abroad. They have a combined value of $195. J.) KellyKettleUSA.com is donating both an AquaBrick water filtration kit and a Stainless Medium Scout Kelly Kettle Complete Kit with a combined retail value of $304. and K.) APEX Gun Parts is donating a $250 purchase credit.
Second Prize: A.) A gift certificate worth $1,000, courtesy of Spec Ops Brand, B.) A Glock form factor SIRT laser training pistol and a SIRT AR-15/M4 Laser Training Bolt, courtesy of Next Level Training. Together, these have a retail value of $589. C.) A FloJak EarthStraw “Code Red” 100 foot well pump system (a $500 value), courtesy of FloJak.com. D.) $300 worth of ammo from Patriot Firearms and Munitions. (They also offer a 10% discount for all SurvivalBlog readers with coupon code SVB10P.), E.) A $250 gift card from Emergency Essentials F.)A full set of all 26 of the books published by PrepperPress.com. This is a $270 value, G.) Two cases of Meals, Ready to Eat (MREs), courtesy of CampingSurvival.com (a $180 value). H.) EP Lowers, makers of 80% complete fiber composite polymer lowers for the AR-15 rifles is donating a $250 gift certificate, I.) Autrey’s Armory — specialists in AR-15, M4s, parts and accessories– is donating a $250 gift certificate, and J.) Dri-Harvestfoods.com in Bozeman, Montana is providing a prize bundle with Beans, Buttermilk Powder, Montana Hard Red Wheat, Drink Mixes, and White Rice, valued at $333.
Third Prize: A.) A Royal Berkey water filter, courtesy of Directive 21. (This filter system is a $275 value.), B.) A large handmade clothes drying rack, a washboard and a Homesteading for Beginners DVD, all courtesy of The Homestead Store, with a combined value of $206, C.) Expanded sets of both washable feminine pads and liners, donated by Naturally Cozy. This is a $185 retail value, D.) Two Super Survival Pack seed collections, a $150 value, courtesy of Seed for Security., E.) A MURS Dakota Alert Base Station Kit with a retail value of $240 from JRH Enterprises. F.) Mayflower Trading is donating a $200 gift certificate for homesteading appliances, and G.) Ambra Le Roy Medical Products in North Carolina is donating a bundle of their traditional wound care and first aid supplies. This assortment has a retail value of $208.
Round 50 ends on January 31st, so get busy writing and e-mail us your entry. Remember that there is a 1,500-word minimum, and that articles on practical “how to” skills for survival have an advantage in the judging.
- Ad Don't wait - get the ultimate US-made ultra-high performance US-made SIEGE Stoves and stunning hand-crafted SIEGE belts for Christmas. For stocking-stuffers see our amazing fire-starters. Gifts that can save lives. Big Sale!Every bespoke SIEGE buckle goes through an hours-long artisanal process resulting in a belt unlike anything else, with blazing fast performance and looks and comfort to match.
- Ad Survival RealtyFind your secure and sustainable home. The leading marketplace for rural, remote, and off-grid properties worldwide. Affordable ads. No commissions are charged!
Cybersecurity: A Systemvault Primer, by D.P.
Welcome to all the brave souls that didn’t scream and/or quickly scroll on when reading the title. I know a fair percentage of SurvivalBlog readers are concerned about OPSEC, but what about your electronic OPSEC? Is it as good as it should be? As good as it could be? I promise you won’t have to read the entire submission but you should take a look at the first few paragraphs to determine if its something you need to address. If you do, you can always try to find some trusted help in securing your systems. During the second half of last year I have spent a fair amount of time reading up on the subject and, as a result, have done a complete overhaul of my own computers. This is a description of some of the things I have learned and it might be useful for some of you.
So what are we up against? Actually many things depending on your time horizon. At the moment your biggest concern may be that your laptop contains information that you do not want to be made public when it gets stolen. This is the easiest to deal with because its unlikely that the thugs have much interest in your information; most likely they just want to make a quick buck at a pawnshop or on the black market. The situation gets more complicated when someone is after your bank/credit card information, etc. You will have to assume that these are more knowledgeable individuals that know what they are looking for and how to get it. The next layer up is industrial espionage, though I doubt many of you will have to worry about that. Real problems start when you are flagged by national security agencies (yes there are many NSAs) because you have to assume that they employ some of the most intelligent people and definitely have the most advanced equipment at their disposal to crack passwords, scan hard drives, scan working computers, backdoor access, etc. The biggest headaches are of course created by politicians and bureaucrats who these days seem to change laws any way they want whenever they feel like it. What is perfectly legal today may be outlawed next year. Even if you dutifully delete any ‘offending’ material from your hard drive at that point, I can guarantee you a low level scan of the drive has a good chance of recovering the documents afterwards. Which probably would still be used against you if someone was out to get you. Just another reason not to wait till the last moment to take action. How far will this go? Of course I don’t know but my gut feeling is that 10-15 years from now you could easily be labeled a terrorist because you have a copy of the KJV Bible on your hard drive. There are plenty of places where that is already the case today. Having a copy of the SurvivalBlog archives visible on your hard drive might land you in hot water, too.
The second challenge is the ever increasing ability of electronics to weave a web around us. I am sure you know by now to expect no privacy on your cell phone. Its encryption was cracked years ago and a call can probably be decrypted in real time. The same goes for just about anything you access on the internet. If you want to get visual confirmation of this, install the Lightbeam extension for Mozilla Firefox (it shows up as a tiny ‘cube’ at the lower right hand corner of the Firefox window’s add-on bar) and browse normally a few days. Then click on the cube and see how all the sites you visited are connected and by whom. You have probably read how the GPS data on your cell phone can be used to trace your whereabouts and perhaps even that at some airports travelers’ cell phones get taken out of their baggage to be ‘checked’. 20 minutes later they get them back; presumably minus the clone that was made from device’s internal data store. But it goes beyond that. How many of you have read about the shipment of Chinese electric water kettles that were held by Russian customs because they contained microprocessors and wi-fi chips capable of connecting to any wi-fi network within 650 ft. They could (and tried to) call home using the wi-fi connection. Now there is an interesting spy right inside your house.
But if the water kettle can do it, why not the fridge or your new alarm clock or … Do you have a laptop with a webcam? I’m sure the laptop has a microphone. Have you read that the tools to remotely control them are easily available on the Internet? If not, try this link. Do you have a shiny new XBox One? It can log you into your account when you walk into the room, so you are ready to resume playing your favorite on-line game the moment you hit the couch. Sounds nice, but think about it: it must have built-in facial recognition software and be connected to the internet to be able to do so. Do you really think no one has ever thought about inserting a remote control client in the system updates that are automatically pushed down to your hardware. Do you have a D-Link router? You can send it a special code string that allows you to bypass authentication when updating its settings. Very useful for when you forget your password. Apart from a numerical code, the string reads ‘editedbyjoelbackdoor’ backwards (I know: you can’t make this stuff up.)
Have you ever heard of WiSee? Its a technique that allows your wifi router to figure out where you are and what you are doing. I am quite sure there are many more innovations in the pipeline. Most (lets say 99%) of the people won’t think anything of it because they find it convenient. Eventually you might even be seen as a threat just because you refuse to put all these gadgets in your house: you must have something to hide. And as icing on the cake, see this and this.
What to do against all these threats? Well, becoming a Tibetan monk would be one option, though its a bit drastic. Actually if you’d rather stay home, the best thing to do is what I would call passive resistance because a bigger gun or more bullets isn’t going to get you anywhere with this. An understanding of your adversary’s tools and tactics, on the other hand, will give you a much better chance to escape unscathed. Let me try to explain the term passive resistance in more detail. During WWII in Europe’s occupied territories, most of the population was engaged in some form of passive resistance. A few engaged in active resistance but they were trained and knew what they were doing. Joe Sixpack did not have access to guns and dynamite but was mostly concerned with survival. That largely meant continuing to do whatever it was you were doing before the war with some modifications. For instance, some crops were supposed to be sold to the Germans, however official yields were rather low as part of the crop disappeared before ever making it to market. Sheep were all of a sudden very popular. If you were forced to do some work for the occupiers, slow and shoddy was the norm and preferably disappear overnight. People that housed refugees or downed pilots continued to go to work but never talked to anyone about what they hid. Things were done on a need to know basis: if you weren’t the family cook or provider you didn’t need to know how much food was kept in the basement. Fewer leaks that way. Another important point was to know the enemy: especially later in the war the bulk of the occupying force were conscripts: 16-18 year old kids that would have stayed home if given the choice. They were happy to leave you alone if you didn’t bother them so no need to antagonize them. My suggestion is that when it comes to cybersecurity you consider yourself Joe Sixpack and try to fly under the radar as much as you can.
Flying under the radar is as much a lifestyle change as it is about encrypting your USB stick. You can still use your iPhone, just assume someone is listening in and pick the subject of your conversations carefully. Same thing goes for email: don’t write anything that you wouldn’t say out loud in public. If you really have to have a confidential conversation do it in a place where microphones are few and far between. I read an account of someone from the west who wanted to visit a friend in Russia during the cold war. The Russian agreed to meet him somewhere on a street in town, they walked to the train station, took the train to the next town where they got off and walked out of town into a wide open plain where nothing but heather grew. Only there did his Russian companion think they were safe enough that they could talk without fear of repercussions.
A lot has been said and written about the NSA’s databases. I, too, wish they didn’t exist but I believe that we have to accept them as a fact of life. Regardless of what MSM is going to tell you, neither collection efforts nor databases will be abandoned or even scaled back. So it is important to understand what they can and cannot do with that information. And there is the rub. Computers are great for searching databases for a particular data item. Lets say the computer is told print all available information for your social security number, it will be spitting out page after page within seconds including things that you have long since forgotten and could probably pass a lie detector test denying them. If on the other hand you give a computer the task to ‘find me some terrorists’ it will fail gloriously. Yes, you will get a list of names but the chance that these people are real terrorists is practically zero. The problem is that computers have no intuition, no feeling if you wish. They simply take the criteria that you give them and look for matches. If you set the criteria too wide, you will be deluged with false positives. If you set the criteria too narrow, you will catch some hapless bystanders but not those people that have an expectation that you are looking for them and therefore have actively scattered their trails (think of someone walking through a brook to throw off any canines that come looking for him).
Occasionally one comes across references how all of this will radically change once quantum computers are in production in a few years. I believe that’s wishful thinking for several reasons: – The humans asking the questions haven’t changed. – A few qubits don’t make a fully functioning quantum computer capable of running advanced software. – A quantum computer is not your laptop at warp speed. It requires a totally different programming model that is being developed from scratch. This takes time to figure out, test and reliably implement. Time is in short supply. Otherwise you wouldn’t need to prep. Here is a reasonably accurate representation (as near as I can tell from reading other documents) of where we currently are.
I know there are lots of other types of analysis that can be done on a database (been there, done that) but at the end of the day the analysis is only as good as the person setting the criteria. This is the primary reason why MSM talk about so many studies that refute the studies they championed 6 months earlier. Any analyst worth their money can find what his/her paymaster wants to extract from a given database because only the headline result is reported, never the actual query that coughed up those results.
Now that you know this, how can you use this knowledge to your advantage? Let me give you a simplified example. You have never cared too much about prepping but something tipped you off: SHTF in 2 weeks. So you decide to visit every store in your area 3x each week to buy 2 jars of peanut butter. SHTF and the stores are empty the next day. The day after that a hungry crowd demands that police do something, so they run a database cross check on store receipts and quickly realize you must have a pantry full of peanut butter. And so you hear the dreaded knock on the door. Your neighbor who prepped for years bought an extra jar once a month (maybe two if there was a sale) for the last two years. They got way more peanut butter than you but nobody knocks on their door because their purchase pattern would be considered normal with not the slightest hint of hoarding activity. If you have a family of 2 and a baby and buy a large jar of peanut butter every week, that might be deemed suspicious also unless you sell peanut butter cookies. The same thing goes for all of sudden insisting on paying everything in cash at your regular grocery store. Paying cash at a store you visit once a year should be just fine. Like I said: scatter your trail; don’t create pattern breaks and don’t get too cute about it. Its all about optimizing effort/reward ratios: make sure you are not the low hanging fruit.
I will spare you the details about how databases work but you need to understand that, in the example above, the police were able to finger you so quickly because different databases can be easily and reliably connected by matching something called key fields. This could be your credit card number, customer number, store awards ID, etc. Running a tally on any one of these identifiers will quickly show how much of what you bought during a given time frame. Matching the store’s sales database against their customer database will deliver names and addresses. This is basically why the NSA only has to store the metadata of phone calls. Its all they need for their work because if you talked to a ‘person of interest’ you have also become a ‘person of interest’. The phone company maintains names and addresses on those phone numbers and can be made to cough them up one way or another. At which point you can be ‘interviewed’ or ‘bugged’ or ‘tapped’ for more information. Of course most people engaged in subversive activities are aware of this and use throw-away phones with cash pre-paid SIM cards bought in a store without video surveillance. You, on the other hand, had better hope that none of your contacts will ever be caught in a sting operation.
But you are still stuck with those documents that you want to protect for one reason or another. I will try to help you with those too, however things will become gradually more technical from here on. This cannot be helped but you may want to try to stay with it as best you can because having a false sense of security is worse than having no security. If you know that your system is insecure you may make a concerted effort to physically keep the documents from falling into the wrong hands. If you leave your documents on your laptop because they are ‘safely’ encrypted but do not realize that your encryption can be broken in two seconds, your position is a lot worse.
There are two ways that you can protect your documents: – lock down your systems so no one can get at them – lock down your documents so no one can get at them Recapping from what I mentioned earlier: there are simply too many threats to your system (from compromised clothing irons to malware) to seriously consider option 1. So we will focus on option 2: encrypting the documents. This has an added advantage that you can send them anywhere over the internet or even store them in the cloud and be reasonably certain no one but intended parties can access those documents. But you MUST encrypt them on the machine you create them on and not send them somewhere (even within your own house) to have them encrypted for you.
Now for some bad news: regardless what type of encryption scheme you want to use to protect your documents, YOU will always be the weakest link in your security chain. This is because you need a password. Whatever you choose it will orders of magnitude less secure than the computer generated key that encrypts your documents. People who study these things say that you will need a password of at least 40 random characters (think software activation keys) to match the strength of a widely used encryption key called AES-256. [If you happen to be one of the people who study these things: I know I am over-simplifying but this is intended for novices.]
The way most encryption schemes are working is that the document itself is encrypted by an established cipher for instance AES-256. The computer generated encryption key that is used for that purpose is, together with other relevant information, stored in a header that is added to the encrypted document. Document + header is usually referred to as a container; however a container can be much bigger and hold multiple documents or even an entire hard disk. In those cases all documents in the container are encrypted with the same key. Storing the encryption key with the encrypted document defeats the purpose of encryption unless you encrypt the encryption key with another cipher. This is were your password comes in: it is used to encrypt the document’s encryption key. So if you use a weak password the encryption key will be quickly recovered and the document can be as easily accessed as when you type in your password. In this scenario the use of AES-256 encryption simply gives you a false sense of security because no one in his right mind will try crack the encryption key: they will go after the way you have stored it.
In order to make your weak password stronger (i.e. harder to crack) most security algorithms add salt to it. In cryptography ‘salt’ refers to a random string that is concatenated to your password before it is encrypted through hashing. A hash function is a mathematical one-way street: you can store the hashed value in plain sight because no one has found a way to reverse the hashing function yet (at least that we know of). The next time you enter your password, the computer goes through the same hashing process; if the result is the same as the stored value you are granted access. Cryptographers not only use salt, sometimes they also use pepper. This refers to the use of a third input into the hashing function. This can be a static random number that is stored in a place that is not associated with the protected container. Programs like TrueCrypt have the ability to derive this third value from one or more files called key files, which opens up a whole new set of possibilities.
In my own setup key files play a very important part because: – they thwart any and all key loggers since no keys are pressed to access them. – I set the system up so it knows where the key files should be so I don’t have to worry about webcams looking at me selecting the files. – the key files do not need to be on the system: you can put them on a USB stick or wherever suits your needs. For instance I store one of the key files that protect my document vaults on my NAS (Network Attached Storage.) If my laptop gets stolen and taken beyond the range of my wireless router, its container locks up because the required key file is physically unavailable to the hashing process. The information in that container is now protected by 1536 bit encryption. That is the equivalent of a 192 character password and I wish the thief good luck trying to open the container. – In a similar arrangement you can put key files on a flash drive or (micro)SD card and carry them with you so only you can access the vaults, even if your password is easy to guess. A microSD card has the advantage that it can be easily disposed of in an emergency.
When you do use key files, make sure they are write protected. Even changing a single bit (i.e. changing a ‘d’ to an ‘e’ in a text file) will render your container permanently closed. The same goes if you use pictures as key files. Some viewers have a habit of updating exif data without asking. This will also permanently lock your data.
Because most of my containers are protected by two unique keyfiles, there is a lot of information to keep track of that I do not want to memorize. All this information is stored on the computer itself but in order to keep these things under wraps, they are stored in their own small container that I think of as a systemvault.
And how does it all work once its set up? Quite nicely actually. I have an icon on my desktop that I double click. Then the computer asks for the container’s password and, if I make no mistakes, opens the container to make all documents inside freely accessible. If I double click. the same icon again it closes the container. Doesn’t get much simpler than that.
There are other, more nefarious, threats to your encrypted document. Why would someone try to crack your encryption if they can simply read your password with a key logger or watch your fingers with a remote controlled webcam? There are many programs (called trojans) and viruses doing the rounds on the internet with only one purpose: to get your information. Passwords are worth money on the black market. The password to your encrypted vault may not be worth as much as that of your bank account but who knows what’s lurking out there. So you have antivirus software installed to keep those intruders at bay. [Remember who is the weakest link …] Now tell me honestly: how many backdoors are there in your computer’s operating system? They are not detectable by your antivirus software but grant complete access to your computer by anyone who knows how to exploit them. Someone could make a copy of your document as you are creating/reading it and send it to command central without you being aware that anything is going on. At least until they choose to notify you, possibly via the local SWAT team.
Now what do the paranoid do? Well, they stick to using open source software where the source code can be freely inspected by anyone interested [The really paranoid download the source code and then go on a customizing spree; no, I’m not kidding]. They refuse to load any software for which the source code has not been published. The latter usually being referred to as a binary blob. Most computers, tablets and cell phones run on binary blobs. All versions of Windows, OSX, iOS and Android are at least partially closed source. Some people insist that Microsoft has included backdoors since Windows95. The fact that Microsoft’s monopoly was never broken up (unlike AT&T) is considered more proof of nefarious activities. I am not saying that there are backdoors because that is hard to prove without access to the source code. I will say that the silence of US companies while complying with DOJ/NSA (at least until Mr. Snowden’s revelations caused their foreign clients to bolt) suggests that it is not a stretch to assume the worst about their products. And so I prefer to avoid them. And so should you if you are really into OPSEC. My personal opinion is that anyone who says he’s got a secure system while running one of those blobs is misguided at best. I am not even sure I would want to receive an encrypted document from him unless its in a way that’s not traceable. However that’s no different from getting a call from someone that sits in front of his XBox One. If you really want to improve your cybersecurity, you’ll have to run a Linux distro without any blobs. Please don’t read this as me saying that those distros cannot be compromised. Its software so, yes, of course it can be ‘adapted’. Its just that its a lot harder to do so unnoticed for any length of time and since Linux is used on fewer PCs/laptops such activities don’t deliver a lot of bang for the buck. Again its a matter of making sure you are not the low hanging fruit.
Next up I want to expand a bit on my systems’ overhaul. Three things were involved: -1- I switched the file system for my external drives to Btrfs. This isn’t security related but it provides checksums on files and folder structures and self-healing capabilities based on built-in redundancies. This should help preserve data in case a drive starts getting worn-out or external backups deteriorate faster than expected. I don’t think its all that useful for system drives yet because you need to run a separate command to release the space taken up by deleted files. -2- The installation of a number of virtual machines (VMs) for specific tasks like on-line banking, email and secure browsing. Since most of the VMs only take up 2GB-4GB in disk space its not a big deal to create a few extra. Mine actually reside on a USB stick with room to spare. The idea was to avoid cross contamination by programs or web sites trying to access cookies they did not put there. For instance the banking VM is only used to talk to my bank’s servers and to store bank account related passwords. -3- Creating a number of encrypted containers. Most of the VMs have their own container which stores passwords, documents, browser settings, cookies, etc. This container needs to be opened before the VM is all that useful. Other containers store documents permanently or are used to send documents over a local network in encrypted form.
After going through these steps and relocating a number of files, my systems are now very much plain vanilla if you start them up. They appear to be used for some general purpose web browsing, playing a few games and contain some music. One of them stores scans of old photographs. Nothing out of the ordinary. You won’t even find a copy of the text that you are reading at the moment.
Let’s take a bit more in-depth look at my setup: Step -1-: If you don’t know what I am talking about; just forget it. Step -2-: After reading up on my options (there are several VM vendors) I settled on Virtualbox. Its consistently ranks at or near the top in tests and is very user friendly. You install Virtualbox like any other application. I use version 4.2.18 from this site because that was the latest in the 4.2 series at the time. Don’t forget to download the correct extension pack from the same web page. The software is free. Why? Basically you are one of their beta testers, which is why you want latest stable build, not bleeding edge. The company makes its money by selling fully tested versions to enterprise customers. Once you run the program, it presents you with a wizard to take you through the steps of creating a VM; the wizard will warn you if you select the wrong settings.
If you don’t succeed the first time: a VM is just a specially formatted file on your computer; you can always delete it and start over to try again. Once you have created your virtual machine, you need to install an OS in it from an iso image just like you would on a normal hard drive. When the installation is complete you can click Virtualbox’ start button and the VM boots up just like a real computer. As with all powerful software there are a few extra things you should learn like how to share folders between VM and host, use a clipboard to copy documents in and out of the VM and optimizing the VM’s drivers and settings. You can get by without these but won’t be quite as productive. The minimum hardware configuration to run VMs without too many crashes/performance penalties seems to be: dual core CPU and 1 GB ram (though 2 GB works better). Step -3-: There are several programs that create encrypted containers in a variety of ways. After looking at them I decided to go with the Linux equivalent of TrueCrypt because it seemed to be the best fit for what I wanted to achieve. I know Truecrypt is open source but Linux distros generally stay away from it for licensing reasons. According to a person that was involved in vetting TrueCrypt’s license, it is worded in a way that allows the developers to sue you if you use it for its intended purpose. When the developers were alerted to this their response was along the lines of ‘So what?’. Another programmer took TrueCrypt’s documentation and from scratch wrote a program that creates TrueCrypt compatible containers. This wasn’t too difficult because the Linux version of TrueCrypt uses functionality available in newer Linux kernels for actual encryption/decryption work. The new program is called tcplay and is carried by most Linux distros. Just make sure you get version 1.1 or higher if you want to use it. The nice thing about that setup is that the Linux kernel provides enterprise strength encryption which is continually updated and improved. You get to hitch a ride for free.
Another benefit of the way Linux deals with encryption is that any information that is read or written is directly transferred between RAM and the container: any piece of information that exists outside of the computer’s memory is always encrypted. There is no program involved that could make an illicit copy before encrypting your information. In my setup I have made sure that the vaults are linked to memory locations (not locations on the hard drive) when they are opened. This is to ensure that no unencrypted data gets inadvertently written to disk.
As a final measure I implemented layered security where cracking one password only gets you some information but not all of it. Here is an example of getting to bank account passwords: – start computer and insert USB stick holding the VMs – start VM manager; requires computer’s admin password and systemvault password (the system vault contains a key file and routing data of the banking VM’s vault; the second key file is stored inside the VM allowing me to store backup copies of the vault in plain sight since they can only be opened inside the VM) – start banking VM; requires VM admin password and VM vault password (password file is stored inside VM vault) – decrypt password file; requires password and key file selection
All passwords are salted and hashed and most of them are peppered as well. So any attacker would need to use my computer and USB stick and then crack a series of passwords while blindly guessing one keyfile. I am counting on the fact that they will give up before they get that far, even though most of the passwords used are easy to type/remember (= inherently weak). In daily life it depends what I am working on but most of the time I only have to enter two passwords to be able to access my bank’s web site through a VM which to me is a reasonable trade-off for the added security. Is such an elaborate setup overkill? Perhaps, time will tell! But hopefully I have given you some ideas to work with.
Last but not least there is one thing you need to keep in mind when working with encrypted documents. If you have a habit of hibernating your computer, its memory contents will be written directly to a special area on your hard drive called swap space. This means that any open documents are recoverable from the swap space until its overwritten with other data. So you must close your documents before hibernating or encrypt your swap space to close that loophole.
—————————————
Next up, for the intrepid and those who wish to add to their skills (remember skills and knowledge are just about the only things that cannot be taken away from you), a step by step guide of what is required to get to the point of double clicking an icon to open/close a container. We will start completely from scratch by installing a Linux distro. I admit this is a bit of an experiment since some of the commands will wrap around to the next line on SurvivalBlog’s web page. However after some testing I am fairly confident they will be in the correct format when pasted into a text editor.
As I have mentioned in a previous submission, the best Linux distro to use when you are used to Windows (XP/Vista/7) is Linux Mint 13. This is their current long term supported (till 04/2017) Ubuntu derivative which means out-of-the-box support for most hardware. Version 14, 15 and 16 are also available but are really development snapshots with a short life cycle. You will also want to stay away from LMDE if you never tried Linux before. Mint focuses on keeping a productive desktop environment which means it looks very familiar if you are used to XP/Vista/7. The other Linux desktops come with a (sometimes much) higher learning curve. If you have never installed an operating system you probably should get someone to assist you in the following steps: -1- Download the iso image from the Linux Mint web site. In the following instructions I am assuming you are using the MATE desktop so you may want to download that version. If you don’t know if your computer can handle 64-bit code, just use the 32-bit version. -2A- Burn the downloaded image onto a DVD and start your computer from there, however this makes the system rather slow. -2B- Download the Windows version from a software package called Unetbootin. This allows you to transfer the downloaded iso image to a flash drive and boot your computer from that. This is much faster especially if you use (real) USB 3.0 drives. -3- Start the computer from your DVD or flash drive. -4A- Permanently install Linux on your hard drive – a 10GB partition is more than big enough. Backup ALL your data if you have never done this before because you will need to defragment Windows and then shrink your Windows partition. Linux installs its own bootloader that allows you to choose if you want to run Windows or Linux every time you (re)start your computer. -4B- Permanently install on an external drive. This can be a (8MB+) USB stick also. Make sure you install the bootloader on the external drive in this scenario, so your hard drive is untouched. This may be the better alternative because you can tell the installer to use the entire drive, saving you the partitioning process. If you are new to this the easiest way to tell which drive is your hard drive/external drive/etc. is to check their reported size. Note that Linux can read/write all Windows disk formats so you can use your primary hard drive to store containers if you wish. -5- During a permanent install Linux will make you enter a password. Write It Down! It is much more important than with most Windows installs and if you forget it you will be able to do nothing but re-install Linux. -6- Reboot the computer from the image you just installed.
To make your life a bit easier and more productive try the following steps (they are not critical though):
– Right click on the panel at the bottom of your screen
– Select ‘Add to Panel’
– Scroll down the window and select ‘Workspace Switcher’
– Click ‘Add’; click ‘Close’
You should see 4 gray rectangles on the panel. These represent 4 desktops, each just a mouse click away. You can run applications on each desktop and switch between them which is much nicer than having them all stacked on one desktop.
Now that you are up and running you need to install a few scripts and a program. The reason is that tcplay is a low level program that only takes care of the very basics through the command line. Opening, closing and modifying of a container from the user perspective is really a three step process and tcplay takes care of only one of those steps. Doing those steps out of order or skipping one has nasty consequences for your data or can even lock up your computer (trust me, I tried …:). Perhaps someday someone will write a nice GUI for a program that combines those steps but in the meantime we go with quick and dirty.
Though installing the scripts can be done using ‘ordinary’ (= point and click GUI) programs, I will use the command line interface. This way you can simply copy and paste the commands instead of having to learn to use new software. If you are not used to typing commands you should definitely use the copy/paste method since the commands are rather picky. For instance ‘echo #.. >>/etc/fstab’ is harmless but ‘echo #.. >/etc/fstab’ will make your system unbootable and you will have to install the Linux distro from scratch.
To use the command line interface you need to open a terminal: click on ‘Menu’ in the lower left hand corner of the screen and then click on ‘Terminal’. This should open up a new window with a blinking text cursor. This window has an ‘Edit’ menu that you can click on to use the ‘Paste’ function. Click on the terminal window to activate it. Depending on how you highlight text in your browser, the computer may or may not execute pasted commands right away. If it doesn’t, press the ‘ENTER’ key after pasting the command.
# We begin with the command: sudo su # and enter your password as required.
# Next commands (can be copy/pasted as a single block) are:
mkdir -pm755 /srv/tc
printf “tmpfs /tmp tmpfs defaults 0 0” >> /etc/fstab
printf “tmpfs /var/tmp tmpfs defaults 0 0” >> /etc/fstab
# To get tcplay you need an internet connection as you need to download a small file.
# For 64 bit OS:
wget
http://mirrors.kernel.org/ubuntu/pool/universe/t/tcplay/tcplay_1.1-1_amd64.deb
# – or –
# For 32 bit OS:
wget
http://mirrors.kernel.org/ubuntu/pool/universe/t/tcplay/tcplay_1.1-1_i386.deb
# To install the downloaded program:
gdebi tcplay*
# answer the prompt by pressing the ‘y’ key
# Now we need to create the scripts that execute the various tasks.
# Note that each of the files MUST start with the phrase #!/bin/bash as its very first line.
# Open a text editor:
pluma /srv/tc/MDV.sh 2>/dev/null
# Copy and paste the first script (below) into the text editor; then click the ‘save’ button and close the editor.
# We also need to make this script executable:
chmod 755 /srv/tc/MDV.sh
# Open the text editor again:
pluma /srv/tc/MUV 2>/dev/null
# Copy and paste the second script (below) into the text editor; save and close.
# Open the text editor a 3rd time:
pluma /srv/tc/CV 2>/dev/null
# Copy and paste the third script (below) into the text editor; save and close.
# switch to user mode (very important):
exit
# then (you can copy/paste the following commands in one block):
ln -s /var/tmp ./Desktop/vaults
printf “[Desktop Entry] Version=1.0 Type=Application ” >
./Desktop/MDV.desktop
printf “Terminal=false Exec=mate-terminal -e \”sudo /srv/tc/MDV.sh\” “
>> ./Desktop/MDV.desktop
printf “Name=MDV Icon=mate ” >> ./Desktop/MDV.desktop
printf “[Desktop Entry] Version=1.0 Type=Application ” >
./Desktop/documents.desktop
printf “Terminal=false Exec=mate-terminal -e \”sudo /srv/tc/MDV.sh toggle
documentvault\” ” >> ./Desktop/documents.desktop
printf “Name=documents Icon=/usr/share/pixmaps/gksu-icon.png ” >>
./Desktop/documents.desktop
Minimize the terminal window.
Double click on the MDV.desktop icon on your desktop. In the popup window click on ‘Mark as trusted launcher’.
Next we will create a system vault. If you run into trouble and the process aborts; you need to type the following command in your terminal window and start over again:
sudo rm /srv/tc/.SystemVault
Double click on the MDV icon on your desktop again and enter your password; then select ‘create’ in the popup window and click OK button. In the next popup window type ‘systemvault’ (without quotes; then click OK button).
Your computer will now create your systemvault after asking what hash function and what cipher(s) to use [see notes below]. It will also require a password for the vault. Write that password down too. The whole process can take anywhere from 1 to 15 minutes due to random seeding. You will just have to be patient and let it run.
Once your systemvault has been created, you need to open it as follows:
Double click on the MDV icon on your desktop and enter your password; then select ‘open’ in the popup window, click OK, type ‘systemvault’ (without quotes), click OK.
Now click on the ‘vaults’ icon on your desktop. The file browser window that opens up should show an entry ‘tc’. Double click on that and you should see an entry called ‘Lost + Found’ (if you don’t see it try <CTRL><H> to show hidden files). If you do you are looking into an empty vault.
# Now restore your minimized terminal window and copy/paste the following block of commands into it:
user=”`whoami`”
printf “containerlocation=/home/$user ” > /var/tmp/tc/documentvault.rc
printf “container=\”DOCvault\” ” >> /var/tmp/tc/documentvault.rc
printf “containersize=\”500M\” ” >> /var/tmp/tc/documentvault.rc
printf “key1=\”\$SVmountpoint/lake.jpg\” ” >> /var/tmp/tc/documentvault.rc
printf “key2=\”\$SVmountpoint/mountain.jpg\” ” >>
/var/tmp/tc/documentvault.rc
printf “backupdir=\”\$NASmountpoint/data\” ” >> /var/tmp/tc/documentvault.rc
Refresh the file browser window (click circular arrow). It should now show a file in your vault. This file is a called a resource file and you need to create one for each container you want to create and/or use. Double click the file to open it. If the system asks you to select a program, choose pluma. The first 3 lines are mandatory; the second 3 are optional and can be deleted (or commented out by putting a # in front of the line) if you don’t want to use key files and automatic container backups. With the sample resource file the computer will try to create/use a 500 MB container called DOCvault in your home directory. If you want to use key files you must define them (and make sure they exist) before trying to create the container or the process will fail.
Click on the MDV icon on your desktop. Select ‘close’ and again type: systemvault and select OK.
Refresh the file browser window and the ‘tc’ folder should now be empty or have disappeared altogether.
# During the installation process the tc folder was located on your disk and not yet in memory. So we will clean up with:
sudo rm -fR /var/tmp/*
# And by restarting the computer we move the /var/tmp folder into memory:
sudo reboot
# Which concludes your installation process.
If you want to create the container defined in the sample resource file, you go through the same steps as when you created the system vault. But you first need to copy two key files into your systemvault and make sure that the key1= and key2= entries in the documentvault.rc file contain the names of these files.
-Doubleclick on the MDV icon on your desktop, enter your password and then select ‘create’ in the popup window and click OK button.
-In the next popup window type ‘documentvault’ (without quotes; then click OK button).
If the computer can’t find the key files you specified, it will abort the process with an error message.
Once the creation process is complete, you can access the contents of this container by double clicking the ‘documents’ icon on the desktop. This container will show up as a folder beside the ‘tc’ folder that holds the system vault.
Technical Notes and Code to Copy/Paste:
By default the systemvault only uses a password. If you want to use a keyfile also change the line ‘tcpopts=””‘ in MDV.sh to ‘tcpopts=”-k $key1″‘ before creating the system vault. A key file can be added later by running MDV’s modify option. Once the modify operation has completed, you need to define tcpopts as shown above before you can open the systemvault again. To make this change in MDV.sh you must run your text editor with elevated privileges like so: sudo pluma /srv/tc/MDV.sh
To change key files for other containers you need to add lines defining key3 and key4 as the new key files to the container’s resource file. Then run MDV’s modify option. Then copy key3 and key4 definitions to the key1 and key2 definitions.
If you don’t want to use any key files, you need to change the line
‘tcpopts=”-k $key1 -k $key2″‘ in MDV.sh to ‘tcpopts=””‘.
To create additional icons on your desktop: right click the desktop and select ‘Create launcher’. You can check the properties of the existing MDV and ‘documents’ icons for an example of what to enter in the various fields. To find a fitting icon for your launcher, click on the button to the left of the text entry fields and browse the ‘pixmaps’ folder.
When you create a new icon make sure the container name mentioned in the ‘command’ field matches the name of an existing resource (.rc) file in the system vault.
$SVmountpoint and $NASmountpoint (as used in the sample resource file) are defined at the start of the MDV.sh script. Their values can be changed as required. $SVmountpoint will always point into the opened system vault wherever you want to store the vault. $NASmountpoint allows you to define the location of an external or network drive.
When creating a container you will be given some options on how to encrypt your key. You can choose from three hash functions and 8 cipher combinations. For hash functions (first menu) I only use options 1 and 2 based on their heritage. As far a the ciphers goes: the longer the cipher chain the stronger the encryption as each cipher adds 512 bits to the key length.
If you decide to use VMs also, do NOT try to create containers inside the VM. It will cause you nothing but grief. Create the container directly on your hardware and then copy it into the VM; after that it will work just fine.
The MDV script supports the following options:
– open : opens a container.
– close : closes a container.
– toggle : toggles between open and closed states.
– unload : closes all open containers (useful when hibernating/shutting
down your computer).
– opencopy : opens a (backup) copy of a container besides the current
copy. This allows you to compare contents or documents without having to
create an unencrypted copy somewhere.
– create : creates a new container.
– modify : allows you to change the container’s password and/or key files.
– backup : create a backup copy of the container.
– restore : restore a container’s primary header in case it has become
corrupted.
– info : display information about the container.
The scripts should work on any Linux distro but a few commands are hard coded for use with the MATE desktop. For instance ‘mate-terminal’ and ‘matedialog’ will have to be replaced by the appropriate commands for that distro/desktop. A final note regarding the scripts: they run fine on a daily basis on my systems but I do not believe all possible code paths have been fully tested so the road less traveled may be rocky.
License: The code is released under a FreeBSD license which means you can use, improve or cripple it in any way you want. You can even sell copies to your buddies. However the license also includes the magic formula: the code comes without any warranty. Its not even guaranteed to be fit for its intended purpose.
********** Save the following lines as MDV.sh ************
#!/bin/bash
tcsdir=”/srv/tc”
TCmountdir=”/var/tmp”
SVmountpoint=”$TCmountdir/tc”
NASmountpoint=”/mnt/NAS”
function SysVault {
container=SystemVault
containersize=12M
containerlocation=”$tcsdir”
backupfolder=”$TCmountdir/tcb”
mountname=”`basename “$SVmountpoint”`”
}
function OtherVaults {
filecount=0
[ -d “$SVmountpoint” ] && filecount=`ls “$SVmountpoint” | wc -l`
if [ $filecount -eq 0 ]; then
“$tcsdir”/MDV.sh open systemvault
[ $? == 0 ] || exit 1
echo
fi
resources=”$SVmountpoint/$vaultname.rc”
[ -r “$resources” ] || notify “Cannot retrieve $resources”
. “$resources”
mountname=”`echo $container | sed -e’s/^\.//g’`”
}
function OpenVault {
filecount=`ls “$TCmountdir” | grep “$mountname” | wc -l`
if [ $filecount -gt 0 ]; then
mountname=”$mountname$filecount”
vaultpath=”`matedialog –file-selection 2>/dev/null`”
container=”$container$filecount”
containerlocation=”/tmp”
ln -fs “$vaultpath” “$containerlocation/$container”
fi
mountpoint=”$TCmountdir/$mountname”
echo ” opening container on $mountpoint”
. “$tcsdir”/MUV mount
pause 0
}
function ToggleVault {
mounted=`cat /etc/mtab | grep “$container” | wc -l`
if [ $mounted -eq 0 ]; then
. “$tcsdir”/MUV mount
else
. “$tcsdir”/MUV unmount
fi
}
function UnloadVaults {
unset lastvault
while true; do
mounted=”`cat /etc/mtab | grep “/dev/mapper”| cut -d” ” -f1 | tail -1`”
[ -z “$mounted” ] && exit 0
vault=”`echo $mounted | cut -d/ -f4`”
[ “$vault” == “$lastvault” ] && exit 1
device=”`tcplay -j $vault | grep “Device:” | cut -d: -f2 | tr -d
[:space:]`”
mountpoint=”`cat /etc/mtab | grep “$mounted” | cut -d” ” -f2`”
umount “$mounted”
rmdir “$mountpoint”
tcplay -u “$vault”
losetup -d “$device”
lastvault=”$vault”
done
}
function GetKey {
echo “Select system vault key file”
key1=”`matedialog –file-selection 2>/dev/null`”
[ -z “$key1” ] && exit 1
}
function CheckKeyfileAccess {
file1=`echo “$key1” | grep “$NASmountpoint” | wc -l`
file2=`echo “$key2” | grep “$NASmountpoint” | wc -l`
NeedNAS=`echo $file1 + $file2 | bc -l`
if [ $NeedNAS -gt 0 ]; then
mounted=`cat /etc/mtab | grep “$NASmountpoint” | wc -l`
if [ $mounted -eq 0 ]; then
echo “mounting NAS …”
mount “$NASmountpoint”
[ $? == 0 ] || pause 1
fi
fi
if [ -n “$key1” ] && [ ! -r “$key1” ]; then
notify “unable to access keyfile $key1”
fi
if [ -n “$key2” ] && [ ! -r “$key2” ]; then
notify “unable to access keyfile $key2”
fi
}
function notify {
printf ” %s ” “$1”
pause 1
}
function pause {
printf “%s ” ” Press any key to exit”
read -n 1
exit $1
}
# ———————————————————-
# must be run as root
[ $EUID == 0 ] || notify “You need administrator rights. Try: sudo
/path/to/MDV.sh”
action=”$1″
vaultname=”$2″
if [ -z $action ]; then
action=”`matedialog –list –hide-header –text=”Select an action”
–column=action open close backup opencopy unload create info modify restore`”
[ -z “$action” ] && exit 1
fi
[ “$action” == “unload” ] && UnloadVaults
if [ -z $vaultname ]; then
vaultname=”`matedialog –entry –text=”Enter vault name”`”
[ -z “$vaultname” ] && exit 1
fi
SV=”`echo $vaultname | grep -i systemvault`”
if [ -n “$SV” ]; then
SysVault
tcpopts=””
tcpnewopts=”–new-keyfile=$key3″
else
OtherVaults
tcpopts=”-k $key1 -k $key2″
tcpnewopts=”–new-keyfile=$key3 –new-keyfile=$key4″
fi
mountpoint=”$TCmountdir/$mountname”
case “$action” in
“create”) . “$tcsdir”/CV;;
“open”) . “$tcsdir”/MUV mount;;
“close”) . “$tcsdir”/MUV unmount;;
“opencopy”) OpenVault;;
“unload”) UnloadVaults;;
“toggle”) ToggleVault;;
“info”) . “$tcsdir”/MUV info;;
“restore”) . “$tcsdir”/MUV restore;;
“modify”) . “$tcsdir”/MUV modify;;
“backup”) . “$tcsdir”/MUV backup;;
*) notify “unknown action: $action”;;
esac
************** Save the following lines as MUV **************
#!/bin/bash
action=”$1″
loopdevice=”`losetup -a | grep $container | cut -d: -f1 | tail -1`”
[ -f “$containerlocation/$container” ] || notify “container
$containerlocation/$container not available”
cd $containerlocation
# ———————————————————————
# back up container
if [ “$action” = “backup” ]; then
[ -z “$backupdir” ] && notify “backup folder not set up”
[ -w “$backupdir” ] || notify “$backupdir not accessible”
# compare file’s modification times
backupcopy=0
currentcopy=`stat -c %Y “$containerlocation/$container” | awk ‘{printf $1
” “}’`
if [ -f “$backupdir/$container” ]; then
backupcopy=`stat -c %Y “$backupdir/$container” | awk ‘{printf $1 ” “}’`
fi
if [ $backupcopy -eq $currentcopy ]; then
echo ” Container already backed up”
pause 0
fi
if [ $backupcopy -gt $currentcopy ]; then
echo ” Backup is newer – Do you really want to overwrite it? (y/n)”
answer=”`read -n 1 | tr [:upper:] [:lower:]`”
[ “$answer” == “y”] || exit 0
fi
# unmount container to make sure all caches have been flushed
mounted=`cat /etc/mtab | grep “$mountpoint” | wc -l`
if [ $mounted -gt 0 ]; then
echo closing container …
. $tcsdir/MUV unmount
fi
# copy container
echo “backing up container to $backupdir …”
cp -f “$containerlocation/$container” “$backupdir/$container”
[ $? == 0 ] || pause 1
chmod 644 “$backupdir/$container”
exit $?
fi
# ———————————————————————
if [ “$action” == “unmount” ]; then
# already unmounted
[ -z “$loopdevice” ] && return
# systemvault must be the last one to unmount
if [ “$vaultname” == “systemvault” ]; then
mounted=`cat /etc/mtab | grep “/dev/mapper” | wc -l`
sysmounts=`cat /etc/mtab | grep -i “$container” | wc -l`
[ $sysmounts -lt $mounted ] && notify “System vault in use: cannot close it”
fi
# remove user access
mounted=”`cat /etc/mtab | grep “$container” | cut -d” ” -f2 | tail -1`”
if [ -n “$mounted” ]; then
container=”`cat /etc/mtab | grep “$mounted” | cut -d” ” -f1 | cut -d/ -f4`”
umount “$mounted”
[ $? == 0 ] || pause 1
rmdir “$mounted”
fi
# remove encryption mapping
loopdevice=”`tcplay -j $container 2>/dev/null | grep “Device:” | cut -d:
-f2 | tr -d [:space:]`”
if [ -n “$loopdevice” ]; then
tcplay -u $container
[ $? == 0 ] || pause 1
fi
# release the loop device
losetup -d $loopdevice
return
fi
# ——- required for all following functionality ——–
# associate container with loop device
if [ -z “$loopdevice” ]; then
loopdevice=$(losetup -f)
losetup $loopdevice $container
[ $? == 0 ] || pause 1
fi
# ———————————————————————
if [ “$action” == “mount” ]; then
# already mounted?
mounted=`cat /etc/mtab | grep “$mountpoint” | grep $container | wc -l`
[ $mounted -eq 0 ] || notify “container $container already open”
# check key file availability
CheckKeyfileAccess
# create temp directories
if [ ! -d $mountpoint ]; then
mkdir $mountpoint
[ $? == 0 ] || pause 1
fi
if [ -n $backupfolder ] && [ ! -d $backupfolder ]; then
mkdir -m 777 $backupfolder
[ $? == 0 ] || pause 1
fi
# container already mapped?
mapped=”`tcplay -j $container 2>/dev/null | grep $loopdevice`”
if [ -z “$mapped” ]; then
# no: map it now
# release loop device if not successful
if [ “$vaultname” == “systemvault” ]; then
printf ” %s ” “opening system vault”
[ -n “$tcpopts” ] && GetKey
else
printf ” %s” “$container “
fi
tcplay $tcpopts -m $container -d $loopdevice
if [ $? != 0 ]; then
losetup -d $loopdevice
pause 1
fi
fi
# mount container
mount -o nosuid /dev/mapper/$container “$mountpoint”
[ $? == 0 ] || pause 1
# enable access by all users
chmod 777 $mountpoint
exit 0
fi
# ———————————————————————
# retrieve container info
if [ “$action” = “info” ]; then
[ -n “$tcpopts” ] && [ -z “$key1” ] && GetKey
CheckKeyfileAccess
tcplay $tcpopts -id $loopdevice
if [ $? != 0 ]; then
printf ” %s ” “Will try to access backup info:”
tcplay –use-backup $tcpopts -id $loopdevice
[ $? == 0 ] || pause 1
fi
pause 0
fi
# ———————————————————————
# restore header from backup
if [ “$action” = “restore” ]; then
[ -n “$tcpopts” ] && [ -z “$key1” ] && GetKey
CheckKeyfileAccess
tcplay –modify –restore-from-backup-hdr $tcpopts -d $loopdevice
[ $? == 0 ] || pause 1
pause 0
fi
# ———————————————————————
# modify password and/or keyfiles
if [ “$action” = “modify” ]; then
[ -n “$tcpopts” ] && [ -z “$key1” ] && GetKey
CheckKeyfileAccess
if [ -n “$tcpnewopts” ]; then
if [ -z “$key3” ]; then
holdkey=”$key1″ && GetKey
key3=”$key1″ && key1=”$holdkey”
fi
fi
if [ -n “$key3” ] && [ ! -r “$key3” ]; then
notify ” unable to access new keyfile $key3″
fi
if [ -n “$key4” ] && [ ! -r “$key4” ]; then
notify ” unable to access new keyfile $key4″
fi
tcplay –modify -d $loopdevice $tcpopts $tcpnewopts
pause 0
fi
************** Save the following lines as CV **************
#!/bin/bash
# vault already created
[ -f “$containerlocation/$container” ] && notify “container already exists”
# double check for old mounts just in case
mounted=`cat /etc/mtab | grep “$mountpoint” | grep $container | wc -l`
[ $mounted -eq 0 ] || notify “an older version of this container is already open”
CheckKeyfileAccess
# select PBKDF PRF algorithm while [ 1 ]; do
clear
printf ” Select the PBKDF PRF algorithm you want to use … “
PS3=”your choice: “
select i in “whirlpool” “RIPEMD160” “SHA512”
do case $i in
“whirlpool”) algorithm=”whirlpool”;;
“RIPEMD160″) algorithm=”RIPEMD160”;;
“SHA512″) algorithm=”SHA512”;;
*) unset algorithm;;
esac
break
done
if [ -z “$algorithm” ]; then
printf ” \t%s ” “Invalid input”
sleep 2
continue
fi
break
done
# select cipher chain
while [ 1 ]; do
clear
printf ” Select the cipher chain you want to use … “
PS3=”your choice: “
select i in AES-256-XTS TWOFISH-256-XTS SERPENT-256-XTS
TWOFISH-256-XTS,AES-256-XTS AES-256-XTS,SERPENT-256-XTS
SERPENT-256-XTS,TWOFISH-256-XTS
AES-256-XTS,TWOFISH-256-XTS,SERPENT-256-XTS
SERPENT-256-XTS,TWOFISH-256-XTS,AES-256-XTS
do case $i in
“AES-256-XTS”) cipher=”AES-256-XTS”;;
“TWOFISH-256-XTS”) cipher=”TWOFISH-256-XTS”;;
“SERPENT-256-XTS”) cipher=”SERPENT-256-XTS”;;
“TWOFISH-256-XTS,AES-256-XTS”) cipher=”TWOFISH-256-XTS,AES-256-XTS”;;
“AES-256-XTS,SERPENT-256-XTS”) cipher=”AES-256-XTS,SERPENT-256-XTS”;;
“SERPENT-256-XTS,TWOFISH-256-XTS”) cipher=”SERPENT-256-XTS,TWOFISH-256-XTS”;;
“AES-256-XTS,TWOFISH-256-XTS,SERPENT-256-XTS”) cipher=”AES-256-XTS,TWOFISH-256-XTS,SERPENT-256-XTS”;;
“SERPENT-256-XTS,TWOFISH-256-XTS,AES-256-XTS”) cipher=”SERPENT-256-XTS,TWOFISH-256-XTS,AES-256-XTS”;;
*) unset cipher;;
esac
break
done
if [ -z “$cipher” ]; then
printf ” \t%s ” “Invalid input”
sleep 2
continue
fi
echo
break
done
# create container
cd $containerlocation
dd if=/dev/zero of=$container bs=1 count=0 seek=$containersize
[ $? == 0 ] || pause 1
# setup loop device
loopdevice=”`losetup -a | grep $container | cut -d: -f1 | tail -1`”
if [ -z “$loopdevice” ]; then
loopdevice=$(losetup -f)
losetup $loopdevice $container
[ $? == 0 ] || pause 1
fi
# initialize container
[ -n “$tcpopts” ] && [ -z “$key1” ] && GetKey
printf ” %s ” “Select $container’s”
tcplay -c -d $loopdevice $tcpopts -a $algorithm -b $cipher
[ $? == 0 ] || pause 1
# mount on /dev/mapper
printf ” %s ” “Enter $container’s”
tcplay $tcpopts -m $container -d $loopdevice
[ $? == 0 ] || pause 1
# create a filesystem in it (ext2 for flash based devices)
mkfs.ext2 /dev/mapper/$container
[ $? == 0 ] || pause 1
pause 0
And that’s it, folks!
- Ad LifeSaver 20K JerryCan Water PurifierThe best water jerrycan you can buy on the market! Mention Survivalblog for a Free Filter ($130 Value)
- Ad USA Berkey Water Filters - Start Drinking Purified Water Today!#1 Trusted Gravity Water Purification System! Start Drinking Purified Water now with a Berkey water filtration system. Find systems, replacement filters, parts and more here.
Two Letters Re: Building Your Own No-FFL AR From an 80% Complete Receiver
Dear JWR,
Regarding the recent article by “Nomad”: I strongly urge all AR-15 owners to get an 80% complete lower receiver, even if you do not finish it now. [Under American jurisprudence,] if gun confiscation comes, the only thing that must be turned in is the stripped lower receiver. The BATFE recognizes that the stripped lower receiver constitutes the firearm as it contains the serial number. The rest IS NOT a “firearm”, by their own regulations. With the non-registered (as per regulations, again) lower receiver, you can build a fully functioning AR-15 that is not on their books. – Carl X.
James,
The letter on building your own AR-15 with a 80% receiver prompted me to write. I work for an FFL, and have lived through the four panic buying periods since Bush the First’s”Assault Weapons” import ban.
First: Unless you 1) work a sub-minimum wage job, and/or 2) live in a part of the country where licensing fees, FFL fees or the like are huge, then completing a ‘80%’ receiver is not worth the time. Even with the new polymer 80% blanks will take 1-2 hours to finish unless you have a real machine shop to work with.
Just before Christmas, several online sources were selling fully finished aluminum AR-15 receivers for $57 delivered to your FFL. Add in the $25-$40 FFL paperwork fee, and it’s at best a wash to spend hours finishing your 80% receiver. And if your Dremel slips, then you’re buying another receiver blank.
You also need to be aware that the term ‘80% receiver’ is made up by the industry and has no legal standing with BATF. I would strongly suggest that you ask for a copy of a determination letter that the manufacturer of the 80% receiver should have asked ATF for, that states that in the opinion of BATF, that the part you are purchasing is in fact not legally a firearm. If the manufacturer does not have, or will no provide you with a un-redacted copy of such a letter, stay away!
It is entirely possible that BATF, in the absence of such a letter, may make an determination that the 80% receiver was in fact too close to a full 100% receiver for BATF’s liking, and retroactively ban them, turning your receiver into contraband subject to summary forfeiture.
Second, the price of AR-15s is about to plunge. It’s done the same thing after every single panic in the past 30 years. We received a mailing from a lesser known AR-15 manufacturer before Christmas offering a package of 25 units of a basic AR-15, CAR, A3, 16″ bbl, for $599/each. This week that same package is offered at $499/each with shipping included.
Currently the only part of the AR-15 platform that is still in short supply is the bolt carrier group, and some trigger/hammer parts. Low end for Bolt Carrier Groups is currently running about $120. In normal times the low end for these units will be in the $70-ish range. So expect a drop of ~$50 for completed uppers in the near future, and $10-$20 drop on lower receiver parts kits.
The desperation indicated by manufacturers trying to push product out the door at low ball prices, indicates to me that these companies are sitting on a mountain of product that they built for the perceived demand. Now that that demand has subsided, the fire sale that will likely happen in late spring when these companies start to go bankrupt after failing dump their inventory, will bring the retail price of basic AR-15’s down to close to the $500 figure.
In addition, the 11% FET that is due on completed guns, can be avoided by the manufacturer if they sell the lower receiver and parts kits separately.
If you want to finish a 80% receiver blank for reasons other than economic ones, then the above does not apply to you. However, do be on the look out for SHOT Show specials (mid to late January) on parts kits and uppers and, perhaps, complete rifles.
Good shopping and happy new year. – C.
JWR Replies: There have been a lot of electrons spilled in cyberspace about the legalities of AR “build parties.” You are correct about the term “80% receiver.” In the eyes of the BATFE, what you hold in your hand is either a paperweight or a “firearm.” The point at which the former becomes the latter is fairly arbitrary, and it is frightening to think that the threshold (and enforcement thereof) is up to the whims of un-elected bureaucrats. (Just ask the folks at KT Ordnance, in Montana. They had huge legal bills, before they were exonerated.) To be on the safe side, some erstwhile “80%” makers are now selling “60%” lowers. Regardless, these incomplete lowers represent a good opportunity for people to exercise their Constitutional rights with privacy.
I think that some readers must have missed the key point of Nomad’s article. The primary goal is not just to save money. Rather, it is to free ourselves from the clutches of an increasingly paternalistic government. In many states it is now illegal to buy “firearms”–even used ones from private parties living in the same state–without filling out government paperwork. For folks in those states, I recommend that you do indeed “roll your own” AR-15 and AR-10 lower receivers. In all other states where you still have some privacy: Unless you are a tinkerer, I recommend that you simply frequent your in-state gun shows and pick up a half-dozen stripped or complete AR lowers whenever you find them for sale at reasonable prices on the tables of private parties, with no paperwork. Someday your children and grandchildren will thank you for your foresight!
- Ad Click Here --> Civil Defense ManualNOW BACK IN STOCK How to protect, you, your family, friends and neighborhood in coming times of civil unrest… and much more!
- Ad California Legal Rifles & Pistols!WBT makes all popular rifles compliant for your restrictive state. Choose from a wide range of top brands made compliant for your state.
Economics and Investing:
Six Reasons Why the Government Is Destroying the Dollar
Big COMEX Gold Withdrawals & New Record Low Dealer Inventory
K.F. flagged this: $10 Billion Bitcoin Goes Live On Overstock!
Items from The Economatrix:
15 Disappearing Middle-Class Jobs
Dr. Paul Craig Roberts-U.S. Markets Rigged by its Own Authorities–It Blows the Mind
- Ad Ready Made Resources, Trijicon Hunter Mk2$2000 off MSRP, Brand New in the case
- Ad USA Berkey Water Filters - Start Drinking Purified Water Today!#1 Trusted Gravity Water Purification System! Start Drinking Purified Water now with a Berkey water filtration system. Find systems, replacement filters, parts and more here.
Odds ‘n Sods:
Terry H. was the first to send: How to open a can with your bare hands. Oh, and if the can is short, then see this video.
o o o
Our friend Tam at the great View From The Porch blog mentioned that Colt has added a handy serial number lookup service to their web site.
o o o
R.B.S. sent: Like to Travel???? The Places You’re Most Likely to Get Kidnapped
o o o
Long-time content contributor KAF suggested this article in JAMA: Comparing Diabetes Medications: Where Do We Set the Bar?
o o o
Carmakers keep data on drivers’ locations. (Thanks to P.J. for the link.)
- Ad Civil Defense ManualClick Here --> The Civil Defense Manual... The A to Z of survival. Looks what's in it... https://civildefensemanual.com/whats-in-the-civil-defense-manual/
- Add Your Link Here
Jim’s Quote of the Day:
“Praise ye the LORD: for it is good to sing praises unto our God; for it is pleasant; and praise is comely
The LORD doth build up Jerusalem: he gathereth together the outcasts of Israel.
He healeth the broken in heart, and bindeth up their wounds.
He telleth the number of the stars; he calleth them all by their names.
Great is our Lord, and of great power: his understanding is infinite.
The LORD lifteth up the meek: he casteth the wicked down to the ground.
Sing unto the LORD with thanksgiving; sing praise upon the harp unto our God:
Who covereth the heaven with clouds, who prepareth rain for the earth, who maketh grass to grow upon the mountains.
He giveth to the beast his food, and to the young ravens which cry.
He delighteth not in the strength of the horse: he taketh not pleasure in the legs of a man.
The LORD taketh pleasure in them that fear him, in those that hope in his mercy.
Praise the LORD, O Jerusalem; praise thy God, O Zion.
For he hath strengthened the bars of thy gates; he hath blessed thy children within thee.
He maketh peace in thy borders, and filleth thee with the finest of the wheat.
He sendeth forth his commandment upon earth: his word runneth very swiftly.
He giveth snow like wool: he scattereth the hoarfrost like ashes.
He casteth forth his ice like morsels: who can stand before his cold?”- Psalm 147:1-17 (KJV)
Notes from JWR:
Please pray for the folks who are stranded by vehicles with dead batteries or frozen fuel lines, or without water, or cleaning up after burst pipes. All of these have happened with the recent severe cold spell in much of the United States. Hopefully folks have learned from this, and they will become better prepared.
—
Camping Survival has announced a “Free Shipping Friday”, with free shipping on orders over $150. This promotion is only running today (Friday 01/10/2014, from 12:01 a.m. through 11:59 p.m.) Some heavy items with minimal markup are excluded. (See their web site for details.) No promo code is required. (Free shipping will be automatic for all qualifying orders placed before midnight, Eastern time.)
—
Today we present a guest article that was too short for the judging in the SurvivalBlog non-fiction writing contest, but that is still quite informative:
Off-Grid Electronics, by D. Smith
When I am looking for electronics for my cabin that is so far back in the woods it is cost-prohibitive to get grid power, I look for certain things: Low energy use, flexibility of use,and a long service life.
I don’t have a lot of extra room in my cabin but I love to read, so I have an e-book reader. Several years ago, I bought a book scanner and scanned in most of my books to make them e-books. Some people say this is a legal gray area but I have no moral qualms about format shifting an item that I have purchased.
So I have quite a large number of e-books to read, but without an electric outlet most of the e book readers out there will go dead within in a week or so of use. Also, due to the format of my scanned books, they take up quite a lot of space so I need a e-book reader that would take removable memory like SD or micro-SD. Also, I wanted replaceable common batteries like AA or AAA.
The closest thing I have found to my dream product for my cabin is the ECTACO jetBook LITE. It takes SD cards and uses 4 AA batteries. I would like it even more if it had an e-ink display that uses less power, but it is still closest thing to my dream reader I have found. The device reads most of the common e book formats like .pdf and .epub, plus several others. It will show a couple of picture file types such as .jpg and .gif in black and white which comes in handy for maps and screen shots I wanted to save from my home computer plus family pictures. It will run over 20 hours on one set of rechargeable batteries. There are several place online to get free e-books. Most of them are older out-of-copyright books but some nice free ones can be found on Amazon.com and web pages can be saved for offline reading. I bought e reader for less than $60 and it allows me to have most of my at-home library to read when I am back in the woods.
Another similar device that I really enjoy and find endlessly useful is the Wiki reader. It is about 3-1/2 by 4 inches square and holds all the text of Wikipedia, all the text of Wikiquotes, all the text of Wikidictionary, and a huge number of free books from project Gutenberg. All of which runs for months on two AAA rechargeable batteries. To get all of this on the machine, I had to upgrade the micro SD card and download the files for free. This device only cost me $20 on a deals web site and it is great. Recently I was trying to remember how to find the diagonal of a square for laying out the footprint of a out building. Geometry was a LONG time ago for me. Five minutes of playing with my wiki reader and I found Pythagoras’s constant 1.414 and away I went. One night my wife and I were discussing history and wanted to figure who the last non-Germanic monarch of England was. It took about 10 minutes to find that out. Sometimes when I am alone at the cabin and don’t want to read a full book or listen to music I will read wikiquotes. Everything from great minds to television shows are in there. Fore example, I really love the Firefly quotes for light reading.
The one downside to either device is they don’t waste their batteries on light so after sundown you need a light. I prefer a head light that uses double a batteries so I don’t have to keep as many kinds of different cells around and since I recharge them, I usually have extras just waiting. A good solar battery charger is really important for my non-paper information needs. I couldn’t find one quite like what I wanted, so I found a nice battery charger that would charge AA and AAA off 12 volt and use either the solar cells for my cabin or the accessories plug in my truck when I have to go out.
The final electronic item that I use at my cabin is a RCA Lyra RD1028 MP3 player. It lets me listen to my favorite music and audio books, plus old radio shows. There are a ton of free non-copyright music and radio shows for downloading on the Internet. This device runs up to 20 hours on 1 AAA battery and takes, again an sd card so I have 6 different cards of audio books and music to listen to. It doesn’t have its’ own speaker, so I had to buy an external speaker and amplifier that runs on – you guessed – AA batteries, but that was a small price to pay. This way if I am working on my land I can put the player in an arm band or even a shirt pocket and use the ear buds. Then when I come home to the cabin, I plug it in and listen to a book or radio show.
All of these devices run on commonly-available batteries that can be purchased as one use or rechargeable. They also all use the standard SD or micro SD cards, so I can expand my collection all the time. They are all fairly cheap although some you must now purchase used. I find they are more useful in an off-the-grid situation than a smart phone or tablet or non-replaceable, non-expandable e-book reader. Since we now live in what’s been dubbed the information age, you can find a lot of free or cheap content to listen or read so you don’t end up bored out of your skull arguing with yourself.
So in short I look for devices that use replaceable common batteries. Expandable memory in the from of sd cards is very desirable. The ability to easily afford redundant back up with tech that is a few years old but still function wonderfully. If other people have devices other than the ones I mentioned that would fill this bill please let us know.
Letter Re: How To Use Your IRA /401k to Fund a Survival Retreat Property
Dear SurvivalBloggers,
How do you use your IRA /401k to fund survival property or fund a startup business in the area you want to exit to?
I have been running into many of my clients here in the north east, way outside the American Redoubt, that want to take greater control over their 401k or IRA’s that have accumulated over a period of time.
Being a reader of this web site for a number of years, I felt that I could explain to your readers thru a simple monograph of what an individual or group of individuals could accomplish with a little planning and action in regard to this premise: The stock market is not a place to have any of your assets. Let alone your retirement assets. How can you remove the assets from a stock or mutual fund based IRA or 401k ? You know you need to do something to protect you and your family soon, very soon, but you may not have the funds to accomplish this now. If you spend a few minutes to read through this to gain a small understanding that you don’t have to lose all your retirement contributions when the fall occurs you will be half way there. I must warn you up front that this will be a complex transaction. Extremely time consuming and hopefully the custodian you utilize along with your legal and financial advisors can handle it. This is a small overview, food for thought.
Face it, the retirement you in vision or hope for has a limited if at all chance of occurring. The financial actions of the last fourteen years of our federal government have just about removed the United States dollar from being the base currency of the world. It has also enslaved its populace by transferring economic growth for social programs. For better or worse this is not the government of our parents. We will have to live in it until the pendulum of normalcy swings back; or be prepared to deal with the consequences of it not occurring. Remember that inflation is coming. To what extent no one knows, hopefully, not the inflation of the late 1970’s or early 1980’s. When it occurs what will happen to your money? Your retirement funds which are locked down into money markets are probably not indexed for inflation. Should have, would have, and could have decision tree will all be told. This nest egg could be put into use right now not ten twenty years from now. You have heard and read enough here and other sites that the stock market is ripe for another correction. “Oh don’t worry good stocks will always come back” Or, you may have heard that if you put stop limit loss (which is basically a tool that if you own a stock you can direct your broker to sell the sock if it drops to a certain price) you will mitigate the loss on the price. Great Plan in a normal economic system. However, with over seventeen trillion in debt the financial china-syndrome is just around the corner, by the way, how will you get your money back from the brokerage house? Only those who diversified thru debt free real estate will have something of value. Especially if you start as soon as possible to put it into place a strategy.
This is where a self-directed IRA/401(k) can help. This will be the tool that you will be using to redirect your funds from the retirement vehicle into an ultimate safety net such as: farm land; timber land with cabins; survival retreats; horse farms; coal mine; a franchise, a startup business etc…I think you get the idea. How can you do this? It all started back in 1996 when the IRS lost in Tax court the Swanson case (Swanson v commissioner 106 TC 76 1996) this held that a newly established entity owned by an IRA and managed by the IRA owner may make investments using IRA funds without violating the prohibited transaction rules under Internal Revenue Code Section 4975. This allowed individuals to fund investments with their retirement funds and not consider this funding to be a prohibited transaction (explained later). This was subsequently affirmed by the IRS in Field Service Advice Memorandum (FSA) 200128011.
Enough technical stuff, just know that it is legal and you will have some hoops to go through, but look at the alternative. Your money stays were it is unable to be accessed without penalty until you reach 59 ½ years of age and then you would need to include it in ordinary income (taxed) on what you withdraw (unless of course you have a Roth) and hopefully able to access. So how do we take advantage of this? Many advisors and stock brokers are not aware of this method because it does not provide sufficient profit for themselves or for their institutions (surprise-surprise). However, there are many ways to accomplish this; I will present one that I have seen utilized to build and construct a 2,800 square foot underground bunker on 300 acres of land.
The first step in this process is to contact the entity in which you have your investment. This may be a bank, brokerage house, or your current employer. (As an aside: why would you have all your retirement funds invested in the company you work for? ask former Lehman Bros. employees if it worked for them!). If they allow you to accomplish this great if not then you need to find another custodian of your funds that will allow this to occur and transfer (rollover) your assets to that entity. Once allowed some of the questions you need to ask are: what is the setup fee? (Usually around $6,000—not cheap which must be paid with funds outside the IRA) what is the annual fee to manage such a task? How much cash must be kept within the IRA to fund future expenses of the investment? Once the fee structure is settled then your custodian must establish a business entity which will ultimately own the real estate. This is an easier process then you think, the entity used must be a C-Corporation and not a pass-through entity. To my understanding the LLC or S-Corporation (pass-through entities) are specifically not permitted to be used. Then, for simplicity sake, the IRA buys the stock of the C-corporation from the C-corporation, thereby transferring funds into that entity. The funds go from IRA/401(k) into a 401(k) entity that owns the stock of the corporation. It should be noted that the entity that your IRA invests in must meet the simple definition of an operating company. More than likely the Real Estate Operating Company that is created will purchase the land/farm/survival retreat and actively managing the property.
It is important here to discuss an operation company. An operating company is an entity that sells a service or a product. If the company is to be considered a Real Estate Operating company the entity must hold the property as inventory to sell it ; or, actively managing the property thru collection of rents, responsibility of repairing and general improvement. You cannot go and buy a farm and sell the commodities (wheat, corn, oats, hay, straw, beef, milk etc…) and keep the cash. The entity receives the proceeds. You are what the government considers a disqualified person. It can pay a fair wage, however you must be careful not to violate the prohibited transaction rules of IRC 4975. A disqualified person covers a range of people including those persons who have a fifty percent or more interest, a member of their family, or even an individual with a 10 percent or more interest. (I know 50% or more? 10 % or more interest this is why you need competent advisors). Because a prohibited transaction can happen if a sale, leasing, lending of money, furnishing of goods, services, facilities, or the transfer thereof to a disqualified person for their benefit can cause the whole plan to become nonexistent and all be taxed and penalized. Are we having fun yet?
Let me simplify: You your wife, your like-minded brother and his wife all agree that it is time to purchase a survival retreat. However, you all realize that you do not have the cash on hand to accomplish this without taking on a vast amount of debt. All four of you have IRAs or 401k. You all transfer your funds into one financial advisor. A new corporation entity is created. The corporation sponsors a 401(k). Existing retirement funds are rolled over into the new 401k . The new 401k purchases the farm/money producing entity. The entity is in existence to make money, so it has a business purpose. Its an operating company. It has filed its Articles of Incorporation with your state. You have obtained a tax identification number (EIN). You may have to register with the State for a sales/use tax ID number. You may need a business license or register with the local Ag agent. Since it is a viable business it will need workers. You then can pay yourself and the others a fair, competitive, arms-length wage. You may have a need to store items in a secure environment and build an underground facility to accomplish this.
Every corporation is responsible for keeping at its principal place of business accurate and complete books of records of accounts and minutes of the shareholders/directors.
This short narrative was written for informational purposes only. If you want to relocate to the American Redoubt and would like to open a business; purchase an existing business; buy a working farm; buy a timber outfit ; or just take control and have some retirement funds or have family or friends of like-mind this summary is for you. Please also keep in mind that your financial advisor and accountant does not need to know the true reason behind what you are accomplishing with your funds; nor, do they need to know that your underground storage facility is really a bunker. – An Anonymous CPA
Economics and Investing:
Reader C.J.C. suggested this piece by Lars Seier Christensen, the founder of Saxo Bank: What is the broader relevance of Ayn Rand for society?
Extreme Cold Weather Freezes US Fuel Supply
Items from The Economatrix:
Unemployment Benefits Clear Senate Hurdle
Employment Recovery? 1,600 Workers Apply For Just 36 Jobs At An Ice Cream Plant In Maryland
How Will The Economy Improve In 2014 If Almost Everyone Has Less Money To Spend?
Odds ‘n Sods:
I just heard about the Buckmaster, a 7 Band, 300 Watt ham radio off-center feed (OCF) antenna that currently sells at a special price of $207. (The regular list price is $273.) It is manufactured by the same folks who operate the widely-visited Ham Call web site that lists more than 9.8 million amateur radio call signs from over 200 countries, also available on DVD.
o o o
Reader K.A.F. mentioned an upcoming free online Survival Summit from January 20th to 26th, 2014.
o o o
B.B. sent this interesting news: 3D Printed metal gun hitting the market
o o o
Reader Dave W. mentioned that he found an item called FiberFix at his local Home Depot. It looks quite useful.
o o o
Bob G. liked this page: The Forgotten Technology
Jim’s Quote of the Day:
"The further a society drifts from truth the more it will hate those who speak it." – George Orwell
Note from JWR:
Today we present another entry for Round 50 of the SurvivalBlog non-fiction writing contest. The $9,700+ worth of prizes for this round include:
First Prize: A.) Gunsite Academy Three Day Course Certificate, good for any one, two, or three course. (A $1,195 value.) B.) A course certificate from onPoint Tactical. This certificate will be for the prize winner’s choice of three-day civilian courses. (Excluding those restricted for military or government teams.) Three day onPoint courses normally cost $795, and C.) Two cases of Mountain House freeze dried assorted entrees in #10 cans, courtesy of Ready Made Resources. (A $350 value.) D.) a $300 gift certificate from CJL Enterprize, for any of their military surplus gear, E.) A 9-Tray Excalibur Food Dehydrator from Safecastle.com (a $300 value), F.) A $300 Gift Certificate from Freeze Dry Guy. G.) A $250 gift certificate from Sunflower Ammo. H.) A roll of $10 face value in pre-1965 U.S. 90% silver quarters, courtesy of GoldAndSilverOnline.com. The current value of this roll is at least $225, I.) Both VPN tunnel and DigitalSafe annual subscriptions from Privacy Abroad. They have a combined value of $195. J.) KellyKettleUSA.com is donating both an AquaBrick water filtration kit and a Stainless Medium Scout Kelly Kettle Complete Kit with a combined retail value of $304. and K.) APEX Gun Parts is donating a $250 purchase credit.
Second Prize: A.) A gift certificate worth $1,000, courtesy of Spec Ops Brand, B.) A Glock form factor SIRT laser training pistol and a SIRT AR-15/M4 Laser Training Bolt, courtesy of Next Level Training. Together, these have a retail value of $589. C.) A FloJak EarthStraw “Code Red” 100 foot well pump system (a $500 value), courtesy of FloJak.com. D.) $300 worth of ammo from Patriot Firearms and Munitions. (They also offer a 10% discount for all SurvivalBlog readers with coupon code SVB10P.), E.) A $250 gift card from Emergency Essentials F.)A full set of all 26 of the books published by PrepperPress.com. This is a $270 value, G.) Two cases of Meals, Ready to Eat (MREs), courtesy of CampingSurvival.com (a $180 value). H.) EP Lowers, makers of 80% complete fiber composite polymer lowers for the AR-15 rifles is donating a $250 gift certificate, I.) Autrey’s Armory — specialists in AR-15, M4s, parts and accessories– is donating a $250 gift certificate, and J.) Dri-Harvestfoods.com in Bozeman, Montana is providing a prize bundle with Beans, Buttermilk Powder, Montana Hard Red Wheat, Drink Mixes, and White Rice, valued at $333.
Third Prize: A.) A Royal Berkey water filter, courtesy of Directive 21. (This filter system is a $275 value.), B.) A large handmade clothes drying rack, a washboard and a Homesteading for Beginners DVD, all courtesy of The Homestead Store, with a combined value of $206, C.) Expanded sets of both washable feminine pads and liners, donated by Naturally Cozy. This is a $185 retail value, D.) Two Super Survival Pack seed collections, a $150 value, courtesy of Seed for Security., E.) A MURS Dakota Alert Base Station Kit with a retail value of $240 from JRH Enterprises. F.) Mayflower Trading is donating a $200 gift certificate for homesteading appliances, and G.) Ambra Le Roy Medical Products in North Carolina is donating a bundle of their traditional wound care and first aid supplies. This assortment has a retail value of $208.
Round 50 ends on January 31st, so get busy writing and e-mail us your entry. Remember that there is a 1,500-word minimum, and that articles on practical “how to” skills for survival have an advantage in the judging.
Non-Internet Social Networking for TEOTWAWKI, by A.K. in Kansas
If you have finally decided to take the plunge and eliminate social networks from your life (Facebook, Twitter, etc.), the skills for maintaining interpersonal relationships should not be completely thrown by the wayside. Over the course of the last five years our “group” has created a network of people that has proven to be very valuable. One disclaimer that I must put forth is that the flippant nature of social networking on-line must be completely discounted as OPSEC is paramount. I would never bring someone into my home to have contact with my family or include them in my preps if I didn’t fully trust them. This is why most of the people in my network I have met through my church. Developing a relationship with other families who have similar values and beliefs has been the backbone of the group that we have formed. Although there are only a dozen active members (not including 14 children) we have developed a set of skills that crosses many areas of need come TEOTWAWKI. Aside from having a wide range of skills the ability to work together as a team, the members of our group encourage growth “as iron sharpens iron” (Prov. 27:17).
I have isolated six areas of preparation that our group network has been most beneficial:
1. Physical Training:
This has been the greatest area of growth for our group. Five years ago more than half of the members were overweight and only a few exercised on a daily basis. As a challenge to all of our group members we started our road to fitness with an eight week program similar to the Get Healthy Challenge. Group members kept in touch with each other on a daily basis to hold one another accountable. After this eight week program we decided to focus on strength and core training through the Hundred Push-ups and Two Hundred Sit-Ups challenges. While working on individual fitness goals group members encouraged and challenged each other with daily progress reports through e-mail, phone or text to see how the others were doing. Doing these challenges with our wives was also an eye opener, as many of the women took the challenges more seriously than the men. One of the wives actually won the Two Hundred Sit-up Challenge ending with 312 total reps. Over the course of the last year the physical training has been taken to a much more intense level. The majority of the group members participated in a Tough Mudder Event and a GORUCK Challenge. While not every member participated in these events due to ability, injury or pregnancy the bottom line is that all of us are in better shape today than we were five years ago. The average member has lost 20 pounds (I have personally lost 40) and we all have a regular schedule of physical activity that maintains strength, flexibility and endurance. The challenge, support and accountability that doing these types of activities as a group brings is immeasurable. I doubt that most people would see the same results if done individually. Working at the retreat property together has also been good physical training for the group. Bucking hay, cutting and hauling wood and other chores at one of the two sites we have as retreat properties can be grueling work. You really find out who your friends are when the hay needs to come in or several cords of wood needs to be put up. Physically the group dynamic is tested with hard physical labor, but working together completes the task sooner and builds relationships with group members.
2. Medical Training:
This has been the weakest area for our group as we need to increase our level of training. We do have a doctor (optometrist) and a registered nurse in our group. Although they both have medical training, by no means are we able to fulfill needs like trauma care or even general surgery. One of the goals is to get several of the members to take an EMT course at the local community college. This would not solve all of our needs for medical training, but it would be a start for gaining more knowledge concerning emergency medicine. This course will be a major undertaking, as 120 hours of classroom, observation and practicum is a commitment that will not be taken lightly by most families. Ultimately the benefit of the knowledge of life saving skills will have to outweigh the cost of loss of time with one’s family.
3. Food Preps:
Buying in bulk is always better when done as a group. Greater quantity means lower cost per unit and the most value for the money you invest into your preps. We bought beef from a local slaughterhouse, grains from the local co-op and worked on preserving them as a group. Whether it is canning, storing in Mylar with oxygen absorbers or dehydrating, it is always better to have more hands helping with the work. While most of the food preps were done successfully we have decided as a group to not try to brew beer anymore. After hours of labor and weeks of waiting we had a pretty nasty batch of skunk beer that was not worth the effort or resources allocated. Pickling has been discovered as a fun way to spend time together as a group. Many of the wives were looking for ways to put up excess garden produce, so pickling parties became the summer staple. Developing the mindset that putting food up was important became the norm.
4. Ammo/Shooting Preps:
Again working as a group to purchase ammo in bulk has always been better than trying to find the best deal for each individual. Utilizing common calibers as the group standard for our center fire rifle and pistol, 12 gauge shotshells and .22 LR we were able to accumulate adequate supplies of ammunition for each group member. The greatest resource to ammo preparation as a group has been reloading. Most of our group members did not know how to reload ammunition when we formed five years ago. Today most have at least a working knowledge if not their own presses and dies. We have worked together sorting range brass, going through the steps of case preparation and even pooled our resources during the recent shortage of components. Sharing load data and ballistics has also helped with refining the accuracy of the rounds we produce through reloading. It is always better to have someone else check your load data just to be safe when reloading. We have also purchased several sets of reactive steel targets for our shooting sessions. While I admit this is the area that the guys enjoy the most and pour the majority of their enthusiasm behind, the wives in our group have all taken classes (as husbands are often the worst firearms instructors for women) and are continuing to hone their skills with range time. The area for improvement would be to take a tactical course like one at Thunder Ranch or Gunsite Academy. We did participate in a 1,000 yard long range shooting match (which just demonstrated everyone’s then-current lack of ability beyond 400 yards) as a group, but this was more of a recreational activity, not tactical training. A couple of the guys do IPSC or IDPA, but the majority of the group is not involved in competitive shooting. To encourage group participation in a serious training course or a competitive shooting series is the goal for the future. While all group members have firearm proficiency, few have had shooting experiences under pressure.
5. Communications Preps
Our group started out with FRS/GMRS radios as our primary method of communication in the field, and then we got CBs which were slightly better, now most members have Ham radios. Studying and taking the ARRL tests together was also a good experience. While the technician test is not hard, it did require some studying to refresh knowledge of electronics and radios. It was also amazing all of the different FCC requirements and regulations that we needed to know. Pooling resources together to build antennas and radios is another good function for the group. A few members have actually joined a local club that maintains the repeater in our town. The next step would be to have more members go for their General licenses to increase the bandwidth we can access and broaden knowledge concerning Ham radio.
6. Spiritual Prep
As I mentioned earlier, all of our group members were found through our local church. We are not exclusive to church members (as some have left the church but are still a part of the group), however it was important to find people that all had similar values and beliefs. The group members have been a part of a couple of small group fellowships that meet at least once a week. There is a family Bible study, a women’s study and a men’s study that meets at different times on different days. This has been probably the most important area of our network. To “bear one another’s burdens (Gal. 6:2)” and not only hold each other accountable, but to support one another through trials and blessings is perhaps the greatest function of our group. One of our group members is active duty Army and has been deployed four times overseas. The group has rallied around his wife and children to provide support during his prolonged deployments, which to me fulfills the second greatest commandment (Matt. 22:39). While a group may be squared away with beans, bullets and Band-Aids if they are not squared away with their Maker then all is for naught.