U.S. Citizens May Be Banned From Purchasing and Owning Body Armor

My advice to all CO’s concerning this issue is the same as it is whenever lib-tards and the “powers that be” try to FLEX their fascist muscles and “CONTROL” our guns or “BAN” our ammo….GEAR UP NOW and KEEP GEARING UP; THINGS ARE NOT GOING TO GET ANY BETTER FROM HERE ON OUT.-SF


It’s time to remind US citizens again of HR 378, the Act that would “prohibit the purchase, ownership, or possession of enhanced body armor by civilians, with exceptions,” (source). The Act caused a stirwhen it was first reported on in early 2015, but has since dwindled in the media, and slipped through the cracks of the public’s attention. The proposal is still open, however, and those who are interested can track its progress through the (source) link above.

The Act was proposed on January 14, 2015 by Representatives Michael Honda (D-CA), Alcee Hastings (D-FL), Robin Kelly (D-IL), and Danny Davis (D-IL). According to washingtonwatch.com, other sponsors or cosponsors include Representatives Barbara Lee (D-CA), Eric Swalwell (D-CA), and Julia Brownley (D-CA).

The controversy surrounding the topic spills over into the gun-rights issue, but regardless of your opinion on guns, whether or not we have the right to protect ourselves from them should not be an issue. The fact is, armor itself doesn’t hurt anyone (it’s designed to do the opposite), so why is an Act being proposed to take a form of safety away?

The Act specifically focuses on level III armor and higher, which is mainly designed to withstand rifle ammunition. Unless you’re an avid big-game hunter, the average citizen may not find level III armor useful, and in fact some might consider it excessive, but that isn’t the point; there are some law-abiding citizens who find it useful, we’re supposed to be living in the “land of the free,” and the real question is, why are players in the government trying to prevent citizens from protecting themselves from rifle shots, which are intended to result in serious injury or death?

In a press release from Representative Michael Honda:

This bill allows law enforcement to respond to active shooting situations more effectively. The bill prohibits the purchase, sale, or possession of military-grade body armor by anyone except certain authorized users, such as first-responders and law enforcement.”

As mentioned in the Free Thought Project’s report, “this speaks to the heart of the law enforcement problem in America.” One of the lessons learnedfrom Ferguson is that law enforcement themselves should not have access to military-grade equipment, as they are not trained to use it properly, and they act like a bunch of pubescent teenage boys who just got a fully loaded, semi-automatic penis for Christmas, waving it around at anyone who pays them the slightest bit of attention.

The argument for the use of this equipment by law enforcement is that it’s intended to protect US citizens from “terrorism.” And yet, US citizens are not killed on a daily basis by terrorists, but they arekilled on a daily basis by U.S. police, leaving many to beg the question, who are the real terrorists here?

If the intended use of military equipment by law enforcement is to protect US citizens from terrorism, why is it being used when dealing with Americans themselves, such as we saw in Ferguson? Is the implication that the majority of US citizens are terrorists? And now there are State Representatives who aim to prevent citizens from potentially protecting themselves from this excessive force.

The next question we need to ask is, exactly how many “active shooting situations” are police dealing with to merit an Act that will prevent all Americans from theoretically protecting themselves? According to reports, an FBI study in 2014 showed that active shooter incidents (not to be confused with mass shooting incidents, of which there are much less) are on the rise, with an average of 16 incidents a year.

Of course, that’s 16 too many, but it puts things into perspective; police across the nation have been geared for war to supposedly protect US citizens from terrorists when they themselves kill thousands more Americans than terrorists do, and according to Representative Michael Honda, citizens should not be able to protect themselves from this level of law enforcement because there can potentially be around 16 active shooter incidents across the nation this year.

Either these politicians are complete idiots, or they think we are. If it’s to be insisted that military equipment should be used to handle the possible 16 active shooter incidents that may happen this year, why not have the men who were trained to use that equipment deal with the incident? One would think the National Guard, at the very least, could handle such situations. But there are many benefits this Act could bring to the government, all of which are accomplished by tightening its grip on the American people, and that’s precisely what is intended.

There is a bit of light at the end of the tunnel though; should this law pass, reports indicate there is a grandfather clause allowing you to keep armor you purchase beforehand. So for the military-survival Anons out there, group hunters, Ted Nugent, and anyone else willing to spend a couple hundred dollars on a vest: We suggest you track this proposal, and in the meantime, gear up.

Read the Original Article at ANONHQ


The Civilian Guide to Fighting ISIS Online


Anonymous Publishes Guide to ‘Fighting ISIS Online’ Since the FBI and CIA Won’t


In the wake of the Paris terror attacks, and several high-casualty acts of terrorism from the so-called Islamic State in the past week, Anonymous has come out with a series of guides for getting involved in the hacktivist group’s Operation ISIS (#OpISIS) and the related Operation Paris (#OpParis).

OpISIS has been going on for over a year now, as part of a far-reaching cyberwar campaign against ISIS.

Now, the how-to instructions released by Anonymous include methods to hack websites associated with the impostor Islamic State, as well as details on how one can identify and take down the group’s social media accounts, as #OpISIS has been doing by the tens of of thousands.

The International Business Times reports that:

Three guides were posted to an IRC channel used by Anonymous to share information on OpParis, encouraging anyone to get involved regardless of their computer skills. They include a “NoobGuide” for anyone wanting to learn how to hack, a “Reporter” guide that explains how to set up a Twitter bot for uncovering IS accounts, and a “Searcher” guide for finding IS websites.

Anonymous says: “Instead of sitting idle in the [chat] channel or lurking around and doing nothing, you can benefit greatly from the different tools and guides that have been provided to you.”

“Your contribution means a lot and we encourage you to partake in all of the Op’s activities if you can, the more the merrier,” the groupwrote.

Read the Remainder at Counter-Current News


Hackers can Disable a Sniper Rifle-or Change it’s Target

Welcome to the 5th Dimension of Warfare gents. We know about Sea, Air, Land and Space, now we get to truly be one of the first Generations to see how War plays out in the 5th Cyber Arena….Scary? You Bet your Ass. But if you take only one thing away from this article, don’t let it be fear, but this: Make it a point, RIGHT NOW in your life and your training to STOP depending on technology..it’s OK for it to supplement things and to be an aid, but we can never let it take the place of good ole fashioned human skill-set’s! For example, ditch the GPS and learn old school compass and map reading and oh yeah..NEVER depend on a “Smart” scope to make that accurate shot; put the time in and learn to shoot without it. If you don’t Depend on it, you can’t be manipulated by it, and the advantage stays in your court. -SF

The exposed circuitboards of the Tracking Point TP750 that Runa Sandvik and Michael Auger hacked to control where the rounds hit.

The exposed circuitboards of the Tracking Point TP750 that Runa Sandvik and Michael Auger hacked to control where the rounds hit.


PUT A COMPUTER on a sniper rifle, and it can turn the most amateur shooter into a world-class marksman. But add a wireless connection to that computer-aided weapon, and you may find that your smart gun suddenly seems to have a mind of its own—and a very different idea of the target.

At the Black Hat hacker conference in two weeks, security researchers Runa Sandvik and Michael Auger plan to present the results of a year of work hacking a pair of $13,000 TrackingPoint self-aiming rifles. The married hacker couple have developed a set of techniques that could allow an attacker to compromise the rifle via its Wi-Fi connection and exploit vulnerabilities in its software. Their tricks can change variables in the scope’s calculations that make the rifle inexplicably miss its target, permanently disable the scope’s computer, or even prevent the gun from firing. In a demonstration for WIRED (shown in the video above), the researchers were able to dial in their changes to the scope’s targeting system so precisely that they could cause a bullet to hit a bullseye of the hacker’s choosing rather than the one chosen by the shooter.

“You can make it lie constantly to the user so they’ll always miss their shot,” says Sandvik, a former developer for the anonymity software Tor. Or the attacker can just as easily lock out the user or erase the gun’s entire file system. “If the scope is bricked, you have a six to seven thousand dollar computer you can’t use on top of a rifle that you still have to aim yourself.”

Read the Remainder at Wired

Using a LiveCD (or LiveUSB) Operating System


By: HCS Technical Staff

(Author’s Note to the Reader: If there is any jargon that you do not know, please type the word into Wikipedia.)

What if you could try a new operating system on your computer without having to wait an hour or two for the operating system to install and not erase everything on your hard drive?

Thanks to advances made over the past ten years by open source software enthusiasts you can do such a thing.

For those who may feel a little lost here, think of open source software enthusiasts as the computer world’s equivalent of American gun tinkerers and geniuses like John Moses Browning.

There are reasons that you would want to use a LiveCD or LiveUSB operating system can basically boil down to:

  1. Using an unknown computer for work purposes (hotel business center, etc.) safely.
  2. Needing a place to quarantine a work file download (Word Document, Adobe PDF, etc.) to ensure that it is not carrying any malware (virus, trojan, worm, etc.)
  3. Examining files on a hard drive or backing up files from a disabled instance of Windows or other hard drive installed operating system.

In terms of selecting a Live Operating system to use on your computer there are hundreds of “distros” or variations out there made by enthusiasts and organizations with different goals and skill levels. 

Live Operating systems run completely in RAM and do not operate from the hard drive like Windows or MacOS X does.

Getting Started

CD-R Method

  1. The first thing you need to do is download an ISO Image file. ISO Image files (.iso) are needed to burn a DVD or data CD-ROM from a computer.
  2. To burn an ISO file to CD-ROM, go here http://windows.microsoft.com/en-US/windows7/Burn-a-CD-or-DVD-from-an-ISO-file
  3. After you have burned the ISO image file to a blank CD-R, shut down your computer and power it back on.
  4. As your computer turns on, access the boot menu in the BIOS (the screen with the black background and white text) by pressing the appropriate button (usually ESC, F2, F8, or F9).
  5. You will need to look up the make and model of your computer to find out how to access the boot menu.
  6. When you are in the boot menu, select the CD-ROM and press ENTER. The LiveCD operating system will start.

USB Stick Method

  1. Download UNetbootin
  2. Download your ISO image file
  3. Insert your blank and formatted USB stick
    • Be sure to note the drive letter
  4. Open UNetbootin
    • Select your ISO image file
    • Select your USB Drive’s Letter
  5. Click OK
  6. After you have burned the ISO image file to a USB stick, shut down your computer and power it back on.
  7. As your computer turns on, access the boot menu in the BIOS (the screen with the black background and white text) by pressing the appropriate button (usually ESC, F2, F8, or F9).
  8. You will need to look up the make and model of your computer to find out how to access the boot menu.
  9. When you are in the boot menu, select the USB stick and press ENTER. The LiveUSB operating system will start.

Things to Remember

  1. Use a USB stick or portable hard drive to save any documents you make on your LiveCD OS.
    • If the power goes out and you didn’t save your files to a USB stick or portable hard drive, then you are SOL.
  2. Not all LiveCD Operating systems will work with all hardware. Some laptop wireless cards will not work with your LiveCD OS and hardware older than 10 years or so may not run the LiveCD OS very well.

Major LiveCD Operating Systems

  • Ubuntu Linux at http://www.ubuntu.com
    • Pros
      • Compatible with most wireless cards and laptop hardware
      • Full software suite available (Office programs, Mozilla Firefox Web Browser, etc)
    • Cons
      • Large in size (Fills up about 670 MB out of 700MB available on a CD-R)
      • Needs at least 1 GB of RAM to run smoothly.
  • DOD Lightweight Portable Security at http://www.spi.dod.mil/lipose.htm
    • Pros
      • Small in size (about 130 MB)
      • Runs Very Fast
      • Full software suite (Office programs, Mozilla Firefox Web Browser, etc) available on 330MB .iso file version.
      • Compatible with Smart Card Readers for those who have to use them.
    • Cons
      • May not be compatible with all wireless hardware on all laptops
      • DoD built it so the paranoid may not want to use it
      • No apps to install
      • No TOR!
  • Puppy Linux at http://www.puppylinux.org
    • Pros
      • Small in size (about 130 MB)
        • This makes it great for restoring old computers
      • Runs very fast.
      • Large Support Community with lots of applications to install
      • Full Web Browser included (Just like Internet Explorer…)
    • Cons
      • Lots of variants with odd names may be confusing to the novice. (Puppy, Racy, Murga, etc…)
  • Temporary Amnesiac Incognito Live System at https://tails.boum.org
    • Pros
      • All communications are routed through TOR
        • Please read the literature out there about TOR
      • Fast to boot up
      • Includes Encryption tools
    • Cons
      • Security and Convenience are inversely related…

If anyone has any questions feel free to leave them in the comments and I can answer them to the best of my knowledge.


Your Old Computer and You: Part 1

By HCS Technical Staff

It was recently announced that Microsoft will be ending any and all support, including updates, for Windows XP in two short years. Nearly 45% of the world’s computers run Windows XP.

This announcement just made the day of every malware writer and botnet owner and cyber-villain out there…

Continue reading