Low-Tech to No-Tech is The Way

Analog all the way!
Paper don’t need batteries.

Tactical Wisdom

Being a public figure in the preparedness world, I get swamped with people asking me for my recommendations on the latest and coolest cool-guy Ultra-Tacticool gear. Which night vision should I buy, what’s the best range finder, and what rifle accessories do I need top the list.

While I give the best answers I can (and I’ll try to here), I always wonder if they’ve even read my first book, the Baseline Training Manual, where I spell out my philosophy on this. My philosophy is to go with no or low-tech options, every time. Technology is a point of failure. You’ll need batteries or repairs, so the answer is to learn to do without. You don’t need the $375 ultra-light backpacking tent; you need a tarp and some para-cord.

This is what the Lord says: “Stand at the crossroads and look; ask for the ancient paths, ask where the good way…

View original post 986 more words

On the Guerrilla, His Ecology and His Communications

On the Guerrilla, His Ecology and His Communications

The Guerrilla must recognize three critical points:

 

  1. He, and his local network, are his own supply line.

  2. He fights with what he has, not with what he wishes.

  3. He cannot fight as a conventional force.

 

If you have not already, be sure and order your copy of The Guerrilla’s Guide To The Baofeng Radio.

Take Heed and Prepare Accordingly.

 

Cyber-Security: WOROK – Powerful Malware Hidden in .PNG Images

WOROK: Powerful Malware Hidden in .PNG Images

 

“Unless it’s your first day on the internet, you’re probably aware that downloading certain files can be a serious mistake. It doesn’t take a cybersecurity expert to know that double-clicking the TotallyNotAVirus.exe file that mysteriously appeared in your downloads folder is a bad idea. If you’re a bit more security conscious, you probably also know that PDF files, Excel spreadsheets, and Word documents can also contain malicious code. But how many times have you considered the possibility of malware hidden inside an image file? A sophisticated hacking group known as Worok has developed a new type of malware that can be concealed in innocuous-looking PNG images, and they’ve been using it to target governments and large corporations around the world.”

 

The Surveillance State: The Simple Reason Why you should STOP🤚 🛑 using Gmail

The Simple Reason why you should Stop using Gmail

 

Would also highly recommend 7 Simple Steps to Online Privacy.

I dumped everything associated with Google (including Chrome) a long while ago.

Think OPSEC All The Time.

 

 

Common Tasks Testing (CTT), The Army’s “Everybody” Requirement

Common Tasks Testing (CTT), The Army’s “Everybody” Requirement

 

I know this is Army Doctrine (May God Forgive Me) but at the end of the day if it helps you PREPARE Better, who cares, right? ☺️

Prepare Accordingly.