Letter Re: Proposed Executive Order Designating Certain Rifles for ‘Militia Purposes’

Gentlemen,

The problem with this proposed executive order is that it refers to members of the “militia” rather than the citizenry.

The militia is defined under law as follows:

(a)The militia of the United States consists of all able-bodied males at least 17 years of age and, except as provided in section 313 of title 32, under 45 years of age who are, or who have made a declaration of intention to become, citizens of the United States and of female citizens of the United States who are members of the National Guard.
(b) The classes of the militia are—
(1) the organized militia, which consists of the National Guard and the Naval Militia; and
(2) the unorganized militia, which consists of the members of the militia who are not members of the National Guard or the Naval Militia.

Could this not be used to restrict ownership of arms (by some weasel) based on a person being over 45 years of age?

Perhaps a lawyer could weigh in?



Economics and Investing:

A disaster in the making: Pension Benefit Guarantee Corporation Running Out Of Cash, Millions Affected – H.L.

o o o

Systems down all Thursday afternoon for multiple banks in Texas – S.L.

o o o

What’s Next For Gold Miners

o o o

Bank Of America Sets A Date For The Market’s “Great Fall” – B.B.

o o o

SurvivalBlog and its editors are not paid investment counselors or advisers. Please see our Provisos page for details.





Hugh’s Quote of the Day:

“They shall construct an ark of acacia wood two and a half cubits long, and one and a half cubits wide, and one and a half cubits high. You shall overlay it with pure gold, inside and out you shall overlay it, and you shall make a gold molding around it. You shall cast four gold rings for it and fasten them on its four feet, and two rings shall be on one side of it and two rings on the other side of it. You shall make poles of acacia wood and overlay them with gold. You shall put the poles into the rings on the sides of the ark, to carry the ark with them. The poles shall remain in the rings of the ark; they shall not be removed from it. You shall put into the ark the testimony which I shall give you.

“You shall make a mercy seat of pure gold, two and a half cubits long and one and a half cubits wide. You shall make two cherubim of gold, make them of hammered work at the two ends of the mercy seat. Make one cherub at one end and one cherub at the other end; you shall make the cherubim of one piece with the mercy seat at its two ends. The cherubim shall have their wings spread upward, covering the mercy seat with their wings and facing one another; the faces of the cherubim are to be turned toward the mercy seat. You shall put the mercy seat on top of the ark, and in the ark you shall put the testimony which I will give to you. There I will meet with you; and from above the mercy seat, from between the two cherubim which are upon the ark of the testimony, I will speak to you about all that I will give you in commandment for the sons of Israel.” Exodus 25:10-22 (KJV)



Notes for Friday – March 03, 2017

Today is remembered by Trekkers as the birthday of James Doohan, born in 1920. He played Montgomery (“Beam Me Up, Scotty”) Scott in the Star Trek television series and films. He was born in Vancouver, British Columbia. He passed way in 2005.

This is also the birthday of bluegrass musician Doc Watson. (He was born in 1923 and passed away in 2012.) His guitar work was phenomenal.

o o o

Today, we present another entry for Round 69 of the SurvivalBlog non-fiction writing contest. The nearly $15,000 worth of prizes for this round include:

First Prize:

  1. A $3000 gift certificate towards a Sol-Ark Solar Generator from Veteran owned Portable Solar LLC. The only EMP Hardened Solar Generator System available to the public.
  2. A Gunsite Academy Three Day Course Certificate that is good for any one, two, or three day course (a $1,195 value),
  3. A course certificate from onPoint Tactical for the prize winner’s choice of three-day civilian courses, excluding those restricted for military or government teams. Three day onPoint courses normally cost $795,
  4. DRD Tactical is providing a 5.56 NATO QD Billet upper with a hammer forged, chrome-lined barrel and a hard case to go with your own AR lower. It will allow any standard AR-type rifle to have a quick change barrel, which can be assembled in less than one minute without the use of any tools and a compact carry capability in a hard case or 3-day pack (an $1,100 value),
  5. An infrared sensor/imaging camouflage shelter from Snakebite Tactical in Eureka, Montana (A $350+ value),
  6. Gun Mag Warehouse is providing 20 Magpul PMAG 30-rd Magazines (a value of $300) and a Gun Mag Warehouse T-Shirt; (an equivalent prize will be awarded for residents in states with magazine restrictions),
  7. Two cases of Mountain House freeze-dried assorted entrees in #10 cans, courtesy of Ready Made Resources (a $350 value),
  8. A $250 gift certificate good for any product from Sunflower Ammo,
  9. Two cases of Meals, Ready to Eat (MREs), courtesy of CampingSurvival.com (a $180 value).

Second Prize:

  1. A Tactical Self-Contained 2-Series Solar Power Generator system from Always Empowered. This compact starter power system is packaged in a wheeled O.D. green EMP-shielded Pelican hard case (a $2,400 value),
  2. A Glock form factor SIRT laser training pistol and a SIRT AR-15/M4 Laser Training Bolt, courtesy of Next Level Training, which have a combined retail value of $589,
  3. A gift certificate for any two or three-day class from Max Velocity Tactical (a $600 value),
  4. A transferable certificate for a two-day Ultimate Bug Out Course from Florida Firearms Training (a $400 value),
  5. A Trekker IV™ Four-Person Emergency Kit from Emergency Essentials (a $250 value),
  6. A $200 gift certificate good towards any books published by PrepperPress.com,
  7. A pre-selected assortment of military surplus gear from CJL Enterprize (a $300 value),
  8. A selection of canned meats containing a 10 pack of 28oz cans of Premium Beef and a 5 pack of 28oz cans of Premium Pork from Wertz’s Farm Market (a $300 value),
  9. RepackBox is providing a $300 gift certificate to their site, and
  10. American Gunsmithing Institute (AGI) is providing a $300 certificate good towards any of their DVD training courses.

Third Prize:

  1. A Model 175 Series Solar Generator provided by Quantum Harvest LLC (a $439 value),
  2. A Royal Berkey water filter, courtesy of Directive 21 (a $275 value),
  3. A custom made Sage Grouse model utility/field knife from custom knife-maker Jon Kelly Designs, of Eureka, Montana,
  4. A large handmade clothes drying rack, a washboard, and a Homesteading for Beginners DVD, all courtesy of The Homestead Store, with a combined value of $206,
  5. Expanded sets of both washable feminine pads and liners, donated by Naturally Cozy (a $185 retail value),
  6. Two Super Survival Pack seed collections, a $150 value, courtesy of Seed for Security, LLC,
  7. Mayflower Trading is donating a $200 gift certificate for homesteading appliances,
  8. Montie Gear is donating a Y-Shot Slingshot and a $125 Montie gear Gift certificate.,
  9. Two 1,000-foot spools of full mil-spec U.S.-made 750 paracord (in-stock colors only) from www.TOUGHGRID.com (a $240 value), and
  10. Fifteen LifeStraws from SafeCastle (a $300 value).
  11. A $250 gift certificate to Tober’s Traditions, makers of all natural (organic if possible) personal care products, such as soap, tooth powder, deodorant, sunscreen, lotion, and more.

Round 69 ends on March 31st, so get busy writing and e-mail us your entry. Remember that there is a 1,500-word minimum, and that articles on practical “how to” skills for survival have an advantage in the judging.



Preparing for Cyber Warfare- Part 2, by Northwoods Prepper

One advantage that we all now have in addressing a cyber attack is awareness. During heightened tensions with other countries, you will be aware of the potential risk that these devices may pose and utilize your electronic equipment sparingly. Knowledge is power.

Defensive measures have two considerations. The first thing to ask is, how should I protect myself. The second is, how should I ensure my equipment and my property is not causing damage to my country or the general population. The best defense is to eliminate dependency. Minimizing or reducing our need for electronic devices is the most practical and cost effective way to mitigate this risk. For me (and I assume most of you as well, since you are reading a blog site), these modern tools provide advantages that allow us to produce, perform, and recreate easier and faster and provide greater returns for the effort. I know I utilize my computers for work and play and do not look forward to a day where I may have to give them up. Still, it should be strongly considered, and minimizing devices as much as possible provides protection.

If you have such devices, you may be relying on your security software. While again, I am not an expert, talking to those who have an understanding, the primary functions of these programs is to prevent theft and to prevent system malfunction. These are commercial and civilian programs, and they would be of extremely limited use for sophisticated nation state supported military sponsored software. In addition, if these programs are part of your hardware or are included in your software but are having no ill effects on the system, your security software will most likely not be a target for them. We must also consider that the nation states, with significant resources available, may actually corrupt the makers of these products. China demanded access to Microsoft’s operating system, threatening to come up with an alternative and prevent Microsoft from entering the lucrative Chinese market. Microsoft, after a prolonged defiance, eventually complied and has been cooperating with the Chinese government ever since. As of 2015, the Chinese government has also announced a plan to move away from Microsoft and Apple operating systems for all government installations. Software is continually redesigned and evolving, and security software is not pre-cognizant and is always responding to the problem. While it provides a defense against rogue hackers and some criminal elements, it is very limited protection from a true cyber attack.

What are the other options aside from eliminating my devices? Richard Clarke’s book identified nation state defenses and proposed a bevy of new spending and regulation. These are all designed to protect government and infrastructure, and secondarily to protect the local citizenry by continuing active utilities and government. Most of his suggestions do not translate to the average individual, but those that did have been shared. I would love to hear comments from the other readers of this blog. I have a few ideas that I believe may mitigate some issues.

Power Down

The first is to power down and disconnect from the Internet on a regular basis, especially when you are away from your home or asleep. Most of our computers, if connected to the Internet, even while powered down may reactivate in the early morning hours to update their systems on a regularly scheduled basis in order to provide us with a better user experience. So, to truly power down, it should be disconnected from the power source, such as utilizing a power surge protector with a switch. Now, if you do have dormant malware in your system, it most likely will need an activation code to start the process for which it was designed; otherwise, these programs would be consistently revealing themselves. Powering down or disconnecting from the Internet should prevent or delay an activation code. Also, if a virus is on your system and propagating to other computers, you are minimizing the ability for it to accomplish its mission. However, I could foresee a sophisticated program that activates at a specific date or thereafter. If you have powered down your equipment and there are concerns of a global attack, be wary as you decide to engage such equipment and take appropriate precautions.

Remove Battery/Fire Risk

It should mitigate risk to remove the battery in devices. The most combustible part and key ignition source for our mobile devices is the battery. Even new desktops do not have the power override button in the back anymore, and many of these have batteries as well. Removing it from the device should render them both relatively harmless. However, if you bought a laptop recently, the batteries are no longer removable; thus, even while powered down and disconnected, I would recommend storing these devices in a place that would not create an issue if they overheated. (You might consider a kitchen counter instead of on your desk amid a pile of papers.)

One Device At a Time

Consider starting or utilizing one device at a time. If you have multiple devices and they are all powered off, do not have everyone in the house activating multiple devices at the same time. If you are in dire need of outside communication and you are activating a device, do so considerately and pay attention to it closely.

Control Access To/Disconnect From the Internet

A technique that China has developed is to disconnect from the Internet leaving China Internet operational but independent from the web. The U.S. military has a stand-alone intranet separate from the web that was infiltrated by the Russians. Disconnecting the landline in your home and disabling your Wi-Fi may mitigate risk. Unfortunately the problem is that our devices seek any and all services. If your neighborhood coffee shop has Wi-Fi that is still active, your devices may continue to communicate and be infected or create problems. Some devices have physical switches to disconnect Wi-Fi, and all have the ability to do so via software. However, it is possible that the malware may be sophisticated enough to instruct the devices to reactivate Wi-Fi communication. In more remote locations, you may be the only Wi-Fi source and therefore have a greater control, but everyone should be aware of signal sources.

Take Smartphone and Vehicles Offline (OnStar, Et Cetera)

Our smartphone devices also pick up telecommunication signals and potentially even satellite. It will be nearly impossible to disrupt these signals. As above, some devices can be instructed to go offline (airplane mode) but the same caveats about malware apply. Many of our newer vehicles are connected and some have the potential to start the ignition or unlock doors. There are multiple tutorials on how to disconnect devices such as OnStar on YouTube. You should investigate regarding the make and model of your vehicle. Again, one of the truisms often discussed here about having an older vehicle takes care of this situation.

Use Surge Protectors

Surge protectors may have some value in this situation, and again I would like to know what the readers think about this issue. I don’t know how much transient voltage a device could create. The concern from surges would actually be from cyber attacks on the grid targeting generators and eliminating protective devices. This would obviously be a non-issue if you provided your own power and were not connected to the electrical grid. Whole house and individual device surge protectors would then be a secondary protection, but this would be from the effects of the attack and not protection from the software attack.

Software and Hardware

Choice of operating systems appears to be of no benefit.

I know people who build their own computers and that may ensure some hardware security, but there is still potential to have compromised components. Knowing your own computer would allow you to confirm disconnection from electric and Internet. I have not found U.S.-made CPU’s for sale anywhere, but it is my understanding there is a push to do so for government use. A difficult effort would be to understand programming, but that would take significant time away from other activities.

If anyone had additional thoughts I would enjoy reading them. The books and articles that I have been reading are more directed to corporate or governmental protection and policy than the concerns of individuals. This may be one of the newer and graver geopolitical threats that is rapidly evolving and could potentially impact everyone connected to the Internet.

Finally, I would like to close as I opened, with references to an EMP. Again, I did not go through all the preparations we would have for an EMP, and all of those would help. Also, much like an older model car without computer components at all, a Ham radio (while still requiring electricity) may be your best consideration for communications. Lastly, you may not be able to trust an “EMP protected device” and therefore require physical copies. If you are putting that off, these physical copies can be used without devices or electricity. As always, do your own homework, make your own decisions, and God bless.



Two Letters Re: Review Of The Jøtul F 50 TL Rangeley

Hello!

Regarding FT’s review of the Jotul stove and her concern about dealing with removing and cleaning out the ash pan daily as they advance in age, I can only share my own experience as a youngster in a small southern town in the winter. In keeping with her observations about the merchant trusting her to pay for the stovepipe after installation, might I suggest that in regard to respect for elders, you’re not in California anymore? I recall my parents advising (ordering?) me to go down the road to our elderly neighbors, Mr. and Mrs. Ward, every winter day after school to empty and clean their ash pan from what sounds like a similar stove for the same reasons. When I (foolishly) questioned my father as to why I had to do this on top of my regular chores, I was told “Because they can’t and you can, and that’s reason enough to help a neighbor”. If you make effort to engulf yourself in your new community, you might very well find things have not changed in Appalachia as much as you think. – Jason in TN

o o o

HJL,

We have heated with wood only for over 30 years. For the past 16 plus years we have used a Quadra Fire. It is EPA approved and is manufactured by Hearth and Home (in Colville, WA, where it used to be Aladdin Stoves). We can and do boil water on the top of it with no problem, so cooking would not be a problem. It heats our home just fine. It comes in various sizes, based on home square footage, and has a window in the door so is lovely to watch as well as cozy up near it. Also, I don’t have the name handy, but a company in (I think it was) North Idaho makes a non-electric pellet stove. I saw it at the Sustainable Preparedness Expo in Spokane. – G.S.



Economics and Investing:

The End Of A 100 Year Global Debt Super Cycle Is Way Overdue – B.B.

o o o

NEW UNCOVERED INFORMATION: Why Central Banks Were Forced To Rig The Gold Market

o o o

Saudi King Goes East In Search Of Friends And Cash. The King of Saudi Arabia is currently on a month-long trip round Asia, aiming to strengthen geopolitical ties as well as secure oil market share

o o o

Minnesota Democrat Pushes $200K in Annual Taxpayer Gifts for Gun Control Groups – H.L.

o o o

SurvivalBlog and its editors are not paid investment counselors or advisers. Please see our Provisos page for details.





Hugh’s Quote of the Day:

“If angels were to govern men, neither external nor internal controls on government would be necessary. In framing a government that is to be administered by men over men, the great difficulty lies in this: you must first enable the government to control the governed; and in the next place oblige it to control itself.” – James Madison



Notes for Thursday – March 02, 2017

On March 2nd, 1836, Texas declared its independence from Mexico. Today is coincidentally also the birthday of Sam Houston.

Today is also the birthday of Moe Berg, American baseball player and clandestine agent. (He died in 1972). His biography The Catcher Was a Spy is fascinating reading.

And this is the birthday of libertarian economist Murray Rothbard (born 1926, died 1995). His book For a New Liberty: The Libertarian Manifesto is highly recommended.

o o o

Today, we present another entry for Round 69 of the SurvivalBlog non-fiction writing contest. The nearly $15,000 worth of prizes for this round include:

First Prize:

  1. A $3000 gift certificate towards a Sol-Ark Solar Generator from Veteran owned Portable Solar LLC. The only EMP Hardened Solar Generator System available to the public.
  2. A Gunsite Academy Three Day Course Certificate that is good for any one, two, or three day course (a $1,195 value),
  3. A course certificate from onPoint Tactical for the prize winner’s choice of three-day civilian courses, excluding those restricted for military or government teams. Three day onPoint courses normally cost $795,
  4. DRD Tactical is providing a 5.56 NATO QD Billet upper with a hammer forged, chrome-lined barrel and a hard case to go with your own AR lower. It will allow any standard AR-type rifle to have a quick change barrel, which can be assembled in less than one minute without the use of any tools and a compact carry capability in a hard case or 3-day pack (an $1,100 value),
  5. An infrared sensor/imaging camouflage shelter from Snakebite Tactical in Eureka, Montana (A $350+ value),
  6. Gun Mag Warehouse is providing 20 Magpul PMAG 30-rd Magazines (a value of $300) and a Gun Mag Warehouse T-Shirt; (an equivalent prize will be awarded for residents in states with magazine restrictions),
  7. Two cases of Mountain House freeze-dried assorted entrees in #10 cans, courtesy of Ready Made Resources (a $350 value),
  8. A $250 gift certificate good for any product from Sunflower Ammo,
  9. Two cases of Meals, Ready to Eat (MREs), courtesy of CampingSurvival.com (a $180 value).

Second Prize:

  1. A Tactical Self-Contained 2-Series Solar Power Generator system from Always Empowered. This compact starter power system is packaged in a wheeled O.D. green EMP-shielded Pelican hard case (a $2,400 value),
  2. A Glock form factor SIRT laser training pistol and a SIRT AR-15/M4 Laser Training Bolt, courtesy of Next Level Training, which have a combined retail value of $589,
  3. A gift certificate for any two or three-day class from Max Velocity Tactical (a $600 value),
  4. A transferable certificate for a two-day Ultimate Bug Out Course from Florida Firearms Training (a $400 value),
  5. A Trekker IV™ Four-Person Emergency Kit from Emergency Essentials (a $250 value),
  6. A $200 gift certificate good towards any books published by PrepperPress.com,
  7. A pre-selected assortment of military surplus gear from CJL Enterprize (a $300 value),
  8. A selection of canned meats containing a 10 pack of 28oz cans of Premium Beef and a 5 pack of 28oz cans of Premium Pork from Wertz’s Farm Market (a $300 value),
  9. RepackBox is providing a $300 gift certificate to their site, and
  10. American Gunsmithing Institute (AGI) is providing a $300 certificate good towards any of their DVD training courses.

Third Prize:

  1. A Model 175 Series Solar Generator provided by Quantum Harvest LLC (a $439 value),
  2. A Royal Berkey water filter, courtesy of Directive 21 (a $275 value),
  3. A custom made Sage Grouse model utility/field knife from custom knife-maker Jon Kelly Designs, of Eureka, Montana,
  4. A large handmade clothes drying rack, a washboard, and a Homesteading for Beginners DVD, all courtesy of The Homestead Store, with a combined value of $206,
  5. Expanded sets of both washable feminine pads and liners, donated by Naturally Cozy (a $185 retail value),
  6. Two Super Survival Pack seed collections, a $150 value, courtesy of Seed for Security, LLC,
  7. Mayflower Trading is donating a $200 gift certificate for homesteading appliances,
  8. Montie Gear is donating a Y-Shot Slingshot and a $125 Montie gear Gift certificate.,
  9. Two 1,000-foot spools of full mil-spec U.S.-made 750 paracord (in-stock colors only) from www.TOUGHGRID.com (a $240 value), and
  10. Fifteen LifeStraws from SafeCastle (a $300 value).
  11. A $250 gift certificate to Tober’s Traditions, makers of all natural (organic if possible) personal care products, such as soap, tooth powder, deodorant, sunscreen, lotion, and more.

Round 69 ends on March 31st, so get busy writing and e-mail us your entry. Remember that there is a 1,500-word minimum, and that articles on practical “how to” skills for survival have an advantage in the judging.



Preparing for Cyber Warfare- Part 1, by Northwoods Prepper

As a regular follower of this blog, I, and as I imagine most readers, are very familiar with the results of an EMP. This is one of the most discussed topics in the survivalist blogosphere, for good reason. Electricity brings all of us a much easier life, and to prepare for the loss of such is difficult both physically and mentally, not to mention costly. With my electronic devices, those that I continue to use daily, my preparations lie between letting them become paper weights with the effects of an EMP to properly protecting those that are of value and having back-up copies of important documents (electronically and physically). From my understanding of an EMP or a similar event, like a strong solar flare, my limited preparations on this front should protect my key data with some devices reverting to expensively purchased junk.

What I had failed to take into consideration is the breakout of cyber warfare. An overview of the nature of cyber warfare is warranted, although before I start I would like to say my knowledge of such is limited. The majority of my previous knowledge came from corporate cyber attacks. However, I just finished reading Richard Clarke’s 2012 book Cyber War: The Next National Threat and What To Do About It Richard Clarke is the former National Coordinator for Security, Infrastructure Protection, and Counter-terrorism for the United States. Clarke worked for the State Department during the presidency of Ronald Reagan and has a good understanding of this subject. This book is an enlightening read (although politically slanted towards Democrats), and while I wanted to highlight a couple of key points it does not make the leap to the potential impact of the average individual. To summarize, cyber warfare is the directed attack against a nation from one or other nations or other collected rogue groups (such as ISIS or Anonymous). These attacks will take many forms, including denial of services, theft of knowledge, turning off critical infrastructure, and sabotage, but all of it will be the result of technical interference to our extremely wired world. Another good summary I just found yesterday is online.

At this time, the government is frantically trying to keep the genie in the bottle and has regular cyber attack exercises:

While the government is working to protect themselves and critical infrastructure, such as utilities and banking, the average citizen must rely on commercially available security and the Geek Squad at Best Buy. Many of these attacks will not be emanating directly from the foreign enemy but from Trojan programs, such as Logic Bombs, already implanted in domestic computers and similar devices, including all of the ones that we individually own. (Even if you claim to be off grid, you are reading this post somehow on some device.) These programs are implanted through multiple nefarious means from participation in websites, email, and every sort of inter-connectivity to the Internet.

The threat that I found more surprising is the self-destruct programs that may potentially be implanted in devices as well. Many routine household devices– phones, security, and appliances– and automobiles are becoming connected to the Internet. While this allows the usefulness of these devices to be increased, such as the ability to check your home security while out of town or something as simple as preheating your oven on the way home from work, there are also significant security breaches that are very rarely mentioned. Mr. Clarke provides an excellent, and from his understanding a completely feasible, example regarding cyber warfare. Imagine a copier within a company, which is bidding on a job. The copier, through an illegally implanted program using basic recognition software, is sending copies of any document with specific wording referencing the job off-site. At a certain point, those who are stealing the information believe they have enough to sabotage the bid and then send directions to the machine to overheat and start a fire with secondary effects of setting off the sprinkler system or worse.

In my limited dealings with cyber attacks, it is well known that hackers can penetrate and disable equipment from remotely operating someone’s camera to tapping into the electrical grid and other utilities, creating an EMP-like event. It has been also proven that many foreign organizations, most noticeably China, has made a concerted effort on corporate espionage and has been routinely stealing secrets. A good example of this is the Sony hack in 2014, where hackers demanded Sony’s release of the comedy film The Interview because the main plot was to assassinate the leader of North Korea, Kim Jong-Un. This hack was a wake-up call to the impact that nation states can have on cyberspace. It is disturbing to say the least.

Another aspect of cyber warfare is hardware modification. In the same book as referenced above, the U.S. intelligence agencies, through a Soviet defector, became aware of a list of sophisticated weapon components that the KGB was looking for. (The names used identify the timeframe.) Instead of preventing the KGB from acquiring the items, the CIA instead worked to funnel them the items on the list but with modifications that would be extremely difficult for anyone to interpret until the item was utilized, whereupon it would malfunction. While this plan was successful for the CIA, it has also become a known espionage tool, and it is impractical to believe that enemies would not utilize this tool or take it to the next level. This is relatively easy to do when some of the silicon chips today are imprinted with minute details. It is no secret that the majority of our commercial hardware, whether directed towards private citizens or government agents, is procured through China. While some may dismiss the potential change to every computer, only one change has to be made downstream and all computers are modified. It is more difficult to determine detrimental designs when they all look the same and work.

Additionally, in June of 2016, the U.S. government gave up authority over IANA (International Assigned Naming Authority) to a private company ICANN (Internet Corporation for Assigned Names and Numbers) without a great deal of fanfare from the media. Senator Ted Cruz opposed this transfer and as part of his press released suggested the plan would “allow 160 foreign governments to have increased influence over the management and operation of the Internet.” This was done by the Obama administration after a known hacking penetration of his presidential campaign by China. In September of 2016, this letter provided by the Free Beacon identifies the concerns of key intelligence officers in Washington regarding this transfer.

Walking through these various examples, it is not difficult to take a small leap and in the event of a hostile or open war with a foreign country, we could find those tools that we rely upon for information– our computers and televisions– to be interfered with, creating and replicating malware, and in a worst case scenario starting on fire or causing surges to the power grid. If it is possible to create a program that can wipe out your system or cause a fire, which I believe it is, why wouldn’t hostile governments try to implant into every device globally and activate as necessary. My own devices have software that detects virus and bugs on a regular basis. Larger corporations have hundreds to thousands of breeches on a weekly basis.

This has radically changed my thought process on electronic devices. Think of a government designing super weapons. A Chinese intelligent agent devises a plan that utilizes America’s weaknesses (dependency on television for information and foreign manufacturing of such devices) that would be fully activated in any emergency situation to propagate and disseminate attacks on government and primary civilian targets with a final blow to disable the device itself and hopefully creating secondary damages and further straining an already strained system. All of this could be accomplished at a fraction of the cost of a nuclear device but be significantly more devastating without poisoning the ocean or your atmosphere with a radioactive cloud. It would also have a crippling effect on communications and morale. It sounds like a game changer for any war. Any device that connects to the Internet, whether it is your smart phone, computer, or refrigerator, at some level must be considered compromised. It can be utilized for false propaganda, and it is not difficult to imagine all of our devices turning on at the same time and having communist-friendly, Hollywood bimbo share with us the advantages of cooperation and the benefit of the People’s Republic. It can be used as a surveillance device, utilizing recording and locating technology; however, even something without these recording and locating capabilities can still infer data. A television that is connected without any other technology can identify if you are watching something (i.e. somebody is there), that you still have power, and what you are watching. Finally, it can be utilized as a weapon, either propagating programs that are affecting someone else’s computers or potentially cause issues of their own.

So, I started this article discussing EMP; many of you are probably wondering why, at this point, as it has no reference to EMPs at all. A devastating cyber attack could result in an EMP scenario in two ways. First, the attack ultimately disables the grid, resulting in a power outage, or the attack is so disabling that the government mandates the temporary shutdown of the grid. Many of our preparations for an EMP, such as alternative communications, physical documents vs. electronic, protected devices, et cetera are equally useful for a cyber attack as well, and while some may need to be reviewed we can instead focus on preparations specifically designed around cyber attacks. In addition to an EMP thought process, a cyber attack may leave the grid operating but in a weakened state. It would be anticipated that certain functions will be targeted, such as government, banking, media, and logistics– all of which are very dependent upon cyberspace. The general motto of this site to be prepared should help insulate you and your family.



Letter Re: Review Of The Jøtul F 50 TL Rangeley

Hugh,

Our primary heat for our home is wood. When I bought our home in 2011, I replaced a used wood stove with a brand new Blaze King model called the King. The company offers the Princess, the Queen, and the King. All three can be regular or catalytic type. Ours is the catalytic version.

We will start burning wood in September and burn through mid-April, and we have done this since we installed the stove. We burn only birch wood that has been split and stacked for a minimum of two years aged. I buy a load of logs that will have 66 logs in the load. The wood supplier guarantees a minimum of five cords in each load; I’ve never had less than six cords. The cost is $880 per load, and we could go and cut it ourselves if we wanted. I’ve seen home heating oil sell up here for as high as $6.60/gallon and as low as $2.45/gallon. We loose power every winter for at least two weeks and one year for three weeks at a time.

The catalyst has held up now with no signs of failure, though I do keep a spare, and it cost $200 when I bought it. Our model came with a glass front, which was a waste of money. It hasn’t broken, but the manner that the stove operates causes creosote to form in the fire box. This then ignites and burns inside the fire box. The gases given off by the burning creosote ignite and burn inside the catalyst; as a result the glass is perpetually black.

I clean the chimney cap once a year at the end of the burning season; there has never been creosote in the pipe from one inch below the cap location. When the stove is fully lit and burning hot there is no smoke, and it is common to see brown ice sickles form from the humidity flowing down the side of the pipe when it is 40 to 60 degrees below zero. At 70 or more degrees below zero, there are no ice sickles present, as most of the humidity has evaporated out of the air.

I do have a metal piece that sits atop the stove, and my wife keeps a pot of stew on it occasionally so we can cook or heat water on the stove if needed. I have a heat-driven fan that circulates the hot air and is silent; it works absolutely great for the house. If the power goes out, so what. We have heat, can cook, the Aladdin lamps are great for light, and the Coleman stoves we have bought over the years work fine for cooking. This stove, all totaled up, cost $4500, including all new pipe and professional installation, but it has saved us thousands of dollars in oil costs. This year oil dropped to $2.45/gallon so I filled the 500-gallon house tank and the 300-gallon tank I keep for other use, since it was so cheap.

Since this stove is so efficient, we burn on average 4 1/2 to 5 1/2 cords a year depending on how cold it gets. The last three years, we have seen very warm temps averaging only 35 below zero at the lowest; this winter has seen on average 45 below with a three-day period a few weeks ago at 74 below zero. So far the power hasn’t gone out. I use a Honda E2000i generator for back up power since our needs are so few.

This is my first Blaze King. I talked to a lot of folks who lived here for many years and followed their advice for purchasing our stove. I have burned wood for over 30 years, and this is by far the best stove I’ve ever owned. We load it up usually around 9 PM before bed time, and it will burn almost to 11 AM the next day. The ash is a very fine dust and needs to be cleaned out only once a week, and this is a very easy in and out process. The wood is front load only, and I use 20″ length pieces of well-aged wood only. We never burn anything but well-dried wood in this stove, as it is our primary heat source.

We do not keep a water pot on the stove because the humidity will get into the crawl space in the roof, freeze, and collapse the ceiling; this is a very common problem in the arctic regions. The Blaze King company has contacted us in the past for advice on how to improve their product, but we cannot think of any way to do so. I did tell them the glass door option and gold trim is useless, except for sales, and that the electric fan option, which bolts onto the back of the stove, is equally as well useless since the heat driven fan we bought that sits on top of the stove is less expensive ($125.00 opposed to the $300.00 cost of the electric fan) and is silent in operation, even when the power is out.

In your areas “outside” USA, the Queen or Princess would be a good choice at less money and smaller size; however, when it hits 70 or more below, more heat is good. – M.H.



Economics and Investing:

US Auto Dealers Forced To Rent First “Overflow Lots” In 37 Years Amid Inventory Glut. Is this one of the canary in the coal mine of a struggling economy? I think so. – H.L.

o o o

America’s Share of the World Economy – G.T.

o o o

China’s Richest Win, Mexican Billionaires Lose With Trump Effect

o o o

Inflation Is Back, And Investors Are Again Turning To Gold

o o o

NY Teamsters’ Pension Fund Goes Belly Up

o o o

SurvivalBlog and its editors are not paid investment counselors or advisers. Please see our Provisos page for details.



Odds ‘n Sods:

Big Sur California Crisis. A few weeks of preparations for emergency isn’t enough for these Californians trapped without access to the outside world! The children probably don’t mind missing school, but only in Kalifornia would I imagine a $5,000 fine for trekking without permission! They treat their citizens as if they are mindless idiots! Maybe many are for electing the politicians they have who neglect their infrastructure while restricting such things as trekking, parental choice/rights, and guns in the hands of law-abiding citizens. – S.L.

o o o

Required reading for Men and Women. – T.P.

Ladies First: Taming The She-Beast

Guys, listen up: Manly Men

o o o

Oklahoma’s earthquake threat now equals California’s because of man-made temblors, USGS says – G.P.

o o o

First major “smart toys” data leak affects 2 million children – DSV

o o o

‘Tsunami of sewage spills’ in Tijuana fouls U.S. beaches, may have been intentional – P.M.