Cutting All Comms?

FCC ENFORCEMENT BUREAU SENDS:

Now it appears besides social media old reliable HAM sets and operators are under attack from the Communist Swamp Creatures and their Stasi henchman in “Law Enforcement”.

When unjust people populate the corridors of power, the “Law” is just another weapon for them to execute their immoral will which always leads to TYRANNY.

Prepare Accordingly and Get some Training while you still can.

Stay Alert, Armed and Dangerous!

 

The Forum Is Live!

The Forum Is Live!

 

Head on over to Brushbeater’s new forum, it’s a great place for likeminded patriots to educate and network.

Stay Alert, Armed and Dangerous!

 

4GW Cyber Warfare: U.S. Treasury Hacked in Far Reaching Espionage Campaign

Sen. Wyden: ‘Dozens of Email Accounts’ Were Hacked at Treasury

 

It appears Russia and China have been busy lately.

4GW never sleeps folks. It rages everyday.

Take a look at all the companies under the Solar Winds umbrella and then ask yourself if you think your personal data is SAFE?

Stay Alert, Armed and Dangerous!

An Addendum to ‘One Hundred and Fifty Questions to a Guerrilla’

This is where the rubber meets the road as far as Practical training goes.

Learn. Train. Repeat!

 

brushbeater

From a reader:

Just read your post on questions to ask a guerilla. One point not listed is that everyone is good at something. Identify what they are good at, and apply them. There are sleeper guys out there with skills a normal person would never think of. So ask the team applicants, what are you good at? In Afg, I was yackin one day with a Marine. He was assigned to the 155 battery at Kajaki dam. Turns out, the Marine had designed, and implemented the whole power grid for Southern California, in his real life. The Marines had him running a 155 unit??? In short order, a full understanding, and redesign of the Helmand Province power grid was at the Generals disposal. All from just yackin with the passenger in the seat next over. 
On your post about powering com systems/repeaters-
If you drive the border between Texas and…

View original post 125 more words

Security Chart of Messaging Apps

Handy Info for Reference.

brushbeater

IntelTechniquesSecureE2EE CommsComparisonBeta v. 0.1October 2020
MessagingConfideDustJitsiiMessageMatrix/ElementSessionSignalSudoTelegramThreemaWhatsAppWickrWireNotes
E2EE Messaging (In-Network)YESYESYESYESOPTIONALYESYESYESYESYESPARTIAL*YESYES*Whatsapp cloud (Google) backups are not E2EE
Country of OwnershipUSAUSAUSAUSAUKAustraliaUSAUSAUAESwitzerlandUSAUSAUSAMany other cloud backups (Google, iCloud, etc) may not be E2EE
14-Eyes AssociationYESYESYESYESYESYESYESYESNONOYESYESYES
Open SourceNONOYESNOYESYESYESNOYESPARTIALNOPARTIALYES
3rd-Party MetadataYESYESYESYESNONONONOYESNOYESYESNO
3rd-Party AnalyticsYESYESYESYESNONONONOYESNOYESYESNO
FundingVariousMark Cuban8×8AppleMatrix/ElementLokiSignalAnonyome LabsVariousThreemaFacebookVarious

View original post 723 more words