OPSEC 101: Google Maps Lets You Blur Your Home. Here’s Why You Should

Google Maps Lets You Blur Your Home. Here’s Why You Should

Something that the average person does not even think about when considering operational and home security but in the 21st Century OPEN SOURCE INTELLIGENCE is the first thing criminals (and spies) do think about.

Learn How to Both use it and EDIT it to your advantage.

Prepare Accordingly.

 

The Invisible Drug Lord: Hunting the Ghost

The Invisible Drug Lord: Hunting the Ghost

For over a decade now I have been researching and studying how 21st century drug cartels and organized crime syndicates operate.

I do this mainly for two reasons:

  1. Research for my writing

  2. Considering freedom loving guerillas/partisans have always (and are currently) seen as criminals (ie domestic terrorist) anyway, observing the TTP of ‘successful’ criminal groups, both past and present is a no-brainer.

If you take one thing away from this study it should be this:

“Your best protection in the 21st century is not a private army but ANONYMITY.”

*I recommend downloading the full report to a flash drive for reference.

Stay Alert, Armed and Dangerous!

 

Crime Awareness: Joker’s Stash Carding Market to Call it Quits

Joker’s Stash Carding Market to Call it Quits

Good news for us decent folks: One of the largest shops for stolen credit card and identity information on the dark web is closing it’s doors.

Stay Alert, Armed and Dangerous!

 

Security Chart of Messaging Apps

Handy Info for Reference.

brushbeater

IntelTechniquesSecureE2EE CommsComparisonBeta v. 0.1October 2020
MessagingConfideDustJitsiiMessageMatrix/ElementSessionSignalSudoTelegramThreemaWhatsAppWickrWireNotes
E2EE Messaging (In-Network)YESYESYESYESOPTIONALYESYESYESYESYESPARTIAL*YESYES*Whatsapp cloud (Google) backups are not E2EE
Country of OwnershipUSAUSAUSAUSAUKAustraliaUSAUSAUAESwitzerlandUSAUSAUSAMany other cloud backups (Google, iCloud, etc) may not be E2EE
14-Eyes AssociationYESYESYESYESYESYESYESYESNONOYESYESYES
Open SourceNONOYESNOYESYESYESNOYESPARTIALNOPARTIALYES
3rd-Party MetadataYESYESYESYESNONONONOYESNOYESYESNO
3rd-Party AnalyticsYESYESYESYESNONONONOYESNOYESYESNO
FundingVariousMark Cuban8×8AppleMatrix/ElementLokiSignalAnonyome LabsVariousThreemaFacebookVarious

View original post 723 more words

26 Secrets an Identity Thief Definitely Doesn’t Want You to Know

26 Secrets an Identity Thief Definitely Doesn’t Want You to Know

Good information on a problem that effects thousands of people every month in this country.

Security begins with forming GOOD habits. If you are not doing the things suggested, start now!

Stay Alert, Stay Armed and Stay Dangerous!