OPSEC 101: Google Maps Lets You Blur Your Home. Here’s Why You Should

Google Maps Lets You Blur Your Home. Here’s Why You Should

Something that the average person does not even think about when considering operational and home security but in the 21st Century OPEN SOURCE INTELLIGENCE is the first thing criminals (and spies) do think about.

Learn How to Both use it and EDIT it to your advantage.

Prepare Accordingly.

 

Low-Tech to No-Tech is The Way

Analog all the way!
Paper don’t need batteries.

Tactical Wisdom

Being a public figure in the preparedness world, I get swamped with people asking me for my recommendations on the latest and coolest cool-guy Ultra-Tacticool gear. Which night vision should I buy, what’s the best range finder, and what rifle accessories do I need top the list.

While I give the best answers I can (and I’ll try to here), I always wonder if they’ve even read my first book, the Baseline Training Manual, where I spell out my philosophy on this. My philosophy is to go with no or low-tech options, every time. Technology is a point of failure. You’ll need batteries or repairs, so the answer is to learn to do without. You don’t need the $375 ultra-light backpacking tent; you need a tarp and some para-cord.

This is what the Lord says: “Stand at the crossroads and look; ask for the ancient paths, ask where the good way…

View original post 986 more words

Cyber-Security: WOROK – Powerful Malware Hidden in .PNG Images

WOROK: Powerful Malware Hidden in .PNG Images

 

“Unless it’s your first day on the internet, you’re probably aware that downloading certain files can be a serious mistake. It doesn’t take a cybersecurity expert to know that double-clicking the TotallyNotAVirus.exe file that mysteriously appeared in your downloads folder is a bad idea. If you’re a bit more security conscious, you probably also know that PDF files, Excel spreadsheets, and Word documents can also contain malicious code. But how many times have you considered the possibility of malware hidden inside an image file? A sophisticated hacking group known as Worok has developed a new type of malware that can be concealed in innocuous-looking PNG images, and they’ve been using it to target governments and large corporations around the world.”

 

The Surveillance State: The Simple Reason Why you should STOP🤚 🛑 using Gmail

The Simple Reason why you should Stop using Gmail

 

Would also highly recommend 7 Simple Steps to Online Privacy.

I dumped everything associated with Google (including Chrome) a long while ago.

Think OPSEC All The Time.

 

 

The Surveillance State: Augury

US military using tool that captures ‘93% of the internet’ 

Multiple branches of the US military have bought access to “petabytes” of American citizens’ private online data via a tool called Augury, giving them access to an almost omniscient set of data points, Senator Ron Wyden (D-Oregon) claimed in a letter to the Office of the Inspector General (OIG) on Wednesday. The alleged data trove includes an individual’s email communications, browsing history, and other behavioral information, all on demand and without a warrant.

There is No such thing as Online Privacy.

Proceed with Caution.