Herbal Healing Wisdom: Nature’s Remedies for Lifelong Wellness Roots In The Concrete Jungle: A Guide To Urban Farming Success Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It Note: These offers are TIME SENSITIVE, so act quickly! Log Into your Amazon…
Category: Dark Arts For Good Guys
Reference Library: CIA’s Simple Sabotage Field Manual
CIA’s Simple Sabotage Field Manual (Via: HSDL) This historical document was originally published by the United States Office of Strategic Services (OSS; now the Central Intelligence Agency) in 1944, for use by OSS agents in motivating or recruiting potential foreign saboteurs. Agents were granted permission to print and disseminate portions of the document as…
Cyber-Crime 101: How Hacker’s Launder Their Stolen Loot
Hackers Use Online Casinos to Gamble Mountains of Cash They Steal from Victims I find it fascinating that despite how complex things become in the cyber-world, the fundamentals of crime remain the same. Criminals will always have to launder their ill-gotten gains somehow and casino’s, especially online casinos, provide the best way to do…
The Surveillance State: Just the Facts on “Geofencing”
Just the Facts on “Geofencing” As worshippers gathered at the Calvary Chapel in 2020, they were being watched from above. Satellites were locking in on cell phones owned by members of the nondenominational Protestant church in San Jose, California. Their location eventually worked its way to a private company, which then sold the information…
The Surveillance State: Leave Your Phone at Home
Red Alert for Android Users: Google Gives Police Your Identification If Police Say You Were Near a Crime Back in the day, cops had to put physical “bugs” (recording devices) in criminals’ houses and cars. Now, they just use your phone, especially if you’re on Android. No worries, even if you’re using Apple, you…
Clay Martin: Cyber Wolves
Tactical Employment of Smoke Grenades
Tactical Employment of Smoke Grenades Highly recommend you have a few of these Enola Gaye EG-18X Smoke Bombs handy in your kit. With things going the direction they are, they could be VERY handy soon.
Weaponized Drones: The Spread of Commercial Grade Flying IED’S
Weaponized Drones: The Spread of Commercial Grade Flying IED’S A look at how civilian quad-copters are being utilized by paramilitary groups, drug cartels and terrorist. This is the future of Asymmetrical Warfare. Prepare Accordingly.
Secret Messages – A Guide To Covert Communication
Secret Messages – A Guide To Covert Communication Nothing ground breaking here, just some “secret comm” fundamentals. Remember, having a Security mindset in today’s cyber-snooping world is just good common sense.