The Surveillance State: Shot-Spotter



(click on above link to be re-directed)

With City, State and Federal Governments now outsourcing AUDIO surveillance to companies like this, it does not take too vivid an imagination to understand the next step in the TOTAL Surveillance plan which is recording your conversations in public.

And just think: This technology and the companies that exist because of it all started with the simple premise of keeping you SAFE through “Counter-Terrorism” and the Patriot Act when in truth “anti-crime” and “counter-terrorism” are just $5 dollar fear words so the Government Gangsters can justify spending hundreds of Millions in preparing for civil unrest and martial law they know are coming.

Stay Alert, Stay Armed and Stay Dangerous!

Surveillance State: Hackers Have Found a Pulsating New Way to Spy on You on Your Phone and FitBit


Hackers may be pickin’ up good vibrations from your phone. All the better to surveil you with, my dear.

Researchers at the Electrical and Computer Engineering school of the University of Illinois at Urbana-Champaign discovered that the vibration motor in your devices can operate like a microphone, according to the researchers’ paper. That means, if a hacker rewires your vibration motor (which TechCrunch reported could be executed “in a minute or two”), they can listen to what you’re saying.

The system, VibraPhone, works on any device with a vibration motor — which includes our phones and wearables.

Armed Civilian Corner: A Quick Reminder about OPSEC


When talking about OPSEC as it pertains to the Armed Civilian, here is what I mean:

Operations Security, or OPSEC,is the process by which we protect unclassified information that can be used against us. OPSEC should be used to protect information, and thereby deny the adversary the ability to act. Nearly 90% of the information collected comes from “Open Sources”. Any information that can be obtained freely, without breaking the law, is Open Source. It is social network sites, tweets, text messages, blogs, videos, photos, GPS mapping, newsletters, magazine or newspaper articles, your college thesis, or anything else that is publicly available.

In the age of social media, people are more at risk of being exploited regarding OPSEC than ever before. Think how many times you have seen a person’s tweets or Facebook post and in a span of eight hours or so have been able to basically draw a detailed GPS map of where they have been, who they talked to and in some instances what they did exactly. This is not good folks. Not good at all. And it’s not because most people have something to hide or are criminals per se, it is the opposite actually; it is because people with nefarious intentions could use this information to their advantage in a number of criminal misadventures. Now I know what most of you are going to say: “But I only have my FRIENDS able to see my post, people that I Know and Trust…” The problem with that kind of thinking folks is that even though you may know and trust them, your friends may not practice good OPSEC. They may “accidentally” talk to people you may not know; and most of the time it is not done in a vindictive manner, it is just something that slips out. How many times have you been in an elevator, lobby or doctors waiting room and you overhear a phone conversation that is just a bit TMI (Too Much Information)? Believe it or not folks there are people (criminals) that troll public places listening and looking for juicy intel just like this everyday of the week. Sometimes it may be targeted, other times it may be accidental.

Some recent examples of bad OPSEC includes:

  • A Family broadcast on FB and Twitter they are about to go on Vacation. With a bit of cross-referencing, a group of professional thieves find out the address and scope it out. When the family returns from the Bahamas two weeks later they return to an empty house.
  • A woman broadcast on FB the Place and Time of an exercise group that meets in a church. The group met rather early at 5am. Church surveillance cameras showed a man dressed in law enforcement SWAT clothes show up at around 4am hoping to catch the woman there alone. He did… and murdered her.
  • A notice about a six year old’s Child’s Birthday swimming Party is posted on Facebook. A local pedophile recently released from prison finds out about it through a family friend. The pedophile is discovered later to have taken several pictures of children in their bathing suits and posted them to a child sex website.

So bottom line guys Be Smart about what you say online, and who you say it too.

Stay Alert, Stay Armed and Stay Dangerous!

The Truth about Terrorist and Encryption Technology


Terrorists were using encryption technology to evade detection long before Snowden and the Paris attacks

By Natasha Bertrand

A wave of coordinated terror attacks that killed at least 130 people in Paris last week have had experts grappling with how French intelligence could have missed an operation that was most likely months in the making.

In recent days, the current and former heads of the CIA have hinted that the attacks might have been prevented had efforts not been made in the past few years to undermine the national-security apparatus.

Others have cast doubt on those assertions, noting that terror groups have been working for years to avoid surveillance.

During an appearance at the Center for Strategic and International Studies on Monday, CIA Director John Brennan denounced the recent “policy and legal efforts” to reign in government surveillance that have made it “much more challenging” for the intel community to uncover terrorists.

And on Wednesday, former acting head of the CIA Michael Morell placed blame for the rise of ISIS squarely on one man — Edward Snowden.

Read the Remainder at Business Insider

“Hamland” Security: Amateur Radio’s Place in Securing the Homeland


During times of disaster, homeland security resources at all levels of government are often stretched to capacity. The whole-of-government approach involving local, county, state and federal agencies is sometimes not enough, especially in the realm of communications. That is where a dedicated group of private hobbyists, known as amateur radio operators, or “hams” as they call themselves, come into play. This community of tinkerers, experimentalists and lovers of all things radio, operate their own licensed radio stations on which they communicate with other enthusiasts around the globe.

Having family members in the ham community, I can attest firsthand to the allure this hobby has over people. As a young boy, I saw my Dad feverishly tapping out Morse code to amateurs around the world. I watched in amazement as he communicated from his basement “shop” with my brother stationed in the Philippines during the Viet Nam war.

“Hams” use a variety of methods to communicate including, voice, computer and Morse code. They are adept at bouncing their signals off the upper levels of the atmosphere, satellites or even the moon for long distance communications. Their “rigs” include simple handheld radios up to a room full of gear.

Read the Remainder at Medium


%d bloggers like this: