Given the current climate and direction of the United States, I believe all American Partisan readers would agree that knowing clandestine communication methods is a useful arrow to have in our qui… Source: Clandestine Communications Part Two: Steganography – A Smile is Worth A Thousand Words (Literally)! by Patriotman
Category: Communications
OSINT Resources
New Internet Search Resources (OSINT) When it comes to 4GW, Information and Intelligence are as much a weapon as a rifle. Learn how to use them to you advantage! Be sure and Bookmark these sites for future use. Stay Alert, Stay Armed and Stay Dangerous!
CO 101: Cybersecurity Pitfalls
Cybersecurity Experts: Stop Sending Troops Into Combat With Personal Tablets, Smartphones In the 21st Century, lessons like this are not just for the Military, but for the Civilian Operator as well. As long as we are dependent on tech, exploitation will always be there. Stay Alert, Stay Armed and Stay Dangerous!
ATM Skimmer Installed in Under a Minute – Steals over $5K
This is how easy thieves can steal your money nowadays if you are not paying attention folks. Remember, these skimmers can be placed ANYWHERE you use your Credit/Debit card: ATM’s Pay at the Pump Gas Pumps Point of Sale Terminals in Convenience Stores, Department Stores There are numerous videos and articles out there on how…
CO 101: Battlefield Intelligence
BATTLEFIELD INTELLIGENCE: A PRIMER ON COLLECTION & EXPLOITATION Extremely valuable primer on collecting intel in the field. Stay Alert, Stay Armed and Stay Dangerous!
True End-to-End Encryption for Proton Mail
TRUE END-TO-END ENCRYPTION WITH PROTONMAIL As a long time user of Proton, I gotta tell you, this is an absolute game changer when it comes to finally having a FREE email service with across the board encryption! Stay Alert, Stay Armed and Stay Dangerous!
Voice Phishing Scams Are Getting More Clever
Voice Phishing Scams Are Getting More Clever Stay Alert, Stay Armed and Stay Dangerous!
Future Warfare: China and the Big Hack
The Big Hack: How China Used a Tiny Chip to Infiltrate U.S. Companies Fourth Generation Warfare going on right under America’s nose. As one cyber-terrorist said: “You do not need a gun to wage war in the 21st Century. All you need is a laptop and a good internet connection.” Stay Alert, Stay Armed and…
When To Trust A Story That Uses Unnamed Sources
When To Trust A Story That Uses Unnamed Sources A Good read in the current fake news climate in which we live. Let us not forget that one of the KEY TACTICS of Fourth Generation Warfare (4GW) currently employed by countries such as Russia, China, Iran and North Korea is the use of Misdirection/Disinformation…
How Search Algorithims Manipulate You
A recent article about how Google and YouTube Search Algorithims are manipulated got me to thinking. So I emailed a good friend of mine, Mr. A, with my concerns. Mr. A works on the security side of the IT industry. Here is what he had to say: Technology and information warfare have reached a…