Some Thoughts From A Reader

How Easy is it to Dupe somebody in the 21st Century?

This Easy.

Plan Accordingly.

Western Rifle Shooters Association

CA,

As the psyop and the ability to see what is going on is far more important than most other aspects, here are some links for you to use/post in whatever way you see fit and comports with the law:

https://www.wikihow.com/Create-a-Fake-Facebook-Profile

How to get a Google Voice number

Some tips for twitter:

>Use google voice to get two free phone numbers, additonal phone numbers will cost $10 each after the two free ones

>You can change your twitter handle at any time, meaning previous twitter handles/accounts will look like they were deleted. Changing your twitter handle also keeps your followers and following lists

>If you are suspected of being a fake account, lock your account, change your twitter handle, your twitter pictures and your profile description so it looks like you’re a new account altogether.

>Follow … accounts and organizations and follow other … accounts and they will follow and…

View original post 190 more words

‘Golden Age of SIGINT May Be Over’: New Encryption Foils IC Eavesdropping

‘Golden Age Of SIGINT May Be Over’: New Encryption Foils IC Eavesdropping

 

“Longstanding interest by US national security leaders has been heightened by Chinese advancements in quantum computing. For example, in 2017 China became the first country to demonstrate ‘quantum entanglement’ from a satellite to Earth. It could lead to much more secure communications between satellites and ground stations, as well as highly encrypted transponder feeds for communications.”

Stay Alert, Armed and Dangerous!

 

Google Removes The Mask: How Chrome Is Surveillance Software

Great Read.

Share it with someone you care about.

Beneath the Velvet Glove lay an Iron Fist- a digital one. So what’s Google been up to and what’s your course of action?

via Google Removes The Mask: How Chrome Is Surveillance Software — American Partisan

How to Find Hidden Cameras in Your Hotel Room

DCIM100GOPRO

How to Find Hidden Cameras In Your Airbnb or Hotel Room

As the world grows more and more technical, this is a Good piece of practical information to have in your toolbox.

Stay Alert, Armed and Dangerous!

A Few Ideas on Beating Facial Recognition

Facial recognition software is getting quite good, but it’s not perfect.

Source: A Few Ideas on Beating Facial Recognition

The Surveillance State: Drone Protection?

drone-zone

Who Will Protect You from Drone Surveillance?

(click on above link to be re-directed)

In a single word: YOU are responsible for both your Safety as well as your Privacy!

Plan now how you are going to guard against these things.

There is a ton of information out there but here is a decent article to start with on hiding and disabling drones.

Stay Alert, Stay Armed and Stay Dangerous!

Cyber-News: Pentagon Warns Against Using Chinese Computers Manufactured by Lenovo

lenovo

Military Warns Chinese Computer Gear Poses Cyber Spy Threat

(click on above link to be re-directed)

If any of you have read the fictional book Ghost Fleet by P.W. Singer, stories like this make it very real. Things like this pose a very REAL threat to National Security and Military Defense. Apart from the “spying” aspect, consider for a moment how many of the components and essential software for the new F-35 Fighter are Chinese manufactured? How easy it would be for them to hide malware or malicious code to essentially corrupt the system and cause it to crash in the middle of a mission? Not a pretty picture.

This is a new kind of war folks and it’s raging right now.

Stay Alert, Stay Armed and Stay Dangerous!