Something that the average person does not even think about when considering operational and home security but in the 21st Century OPEN SOURCE INTELLIGENCE is the first thing criminals (and spies) do think about.
Learn How to Both use it and EDIT it to your advantage.
Being a public figure in the preparedness world, I get swamped with people asking me for my recommendations on the latest and coolest cool-guy Ultra-Tacticool gear. Which night vision should I buy, what’s the best range finder, and what rifle accessories do I need top the list.
While I give the best answers I can (and I’ll try to here), I always wonder if they’ve even read my first book, the Baseline Training Manual, where I spell out my philosophy on this. My philosophy is to go with no or low-tech options, every time. Technology is a point of failure. You’ll need batteries or repairs, so the answer is to learn to do without. You don’t need the $375 ultra-light backpacking tent; you need a tarp and some para-cord.
This is what the Lord says: “Stand at the crossroads and look; ask for the ancient paths, ask where the good way…
“Unless it’s your first day on the internet, you’re probably aware that downloading certain files can be a serious mistake. It doesn’t take a cybersecurity expert to know that double-clicking the TotallyNotAVirus.exe file that mysteriously appeared in your downloads folder is a bad idea. If you’re a bit more security conscious, you probably also know that PDF files, Excel spreadsheets, and Word documents can also contain malicious code. But how many times have you considered the possibility of malware hidden inside an image file? A sophisticated hacking group known as Worok has developed a new type of malware that can be concealed in innocuous-looking PNG images, and they’ve been using it to target governments and large corporations around the world.”
Multiple branches of the US military have bought access to “petabytes” of American citizens’ private online data via a tool called Augury, giving them access to an almost omniscient set of data points, Senator Ron Wyden (D-Oregon) claimed in a letter to the Office of the Inspector General (OIG) on Wednesday. The alleged data trove includes an individual’s email communications, browsing history, and other behavioral information, all on demand and without a warrant.
You must be logged in to post a comment.