Trad Catholic Family Dragged Out of Home at Gunpoint, Locked in Van After FBI ‘Goaded’ Teen to Post Offensive Memes, Dad Says I challenge you to read this article without shaking your head in utter disgust or taking a sedative. “The FBI targeted the boy as part of a sting operation catfishing traditionalist Catholic…
Category: OPSEC
Tower and Antenna Search
H/T Lenny Ladner Antenna Search Know your Area of Operations! Locate local Comm and Radio towers, specifically 5G, and mark them on your AO map. DIY Hard Copy Maps HERE.
The Surveillance State: Leave Your Phone at Home
Red Alert for Android Users: Google Gives Police Your Identification If Police Say You Were Near a Crime Back in the day, cops had to put physical “bugs” (recording devices) in criminals’ houses and cars. Now, they just use your phone, especially if you’re on Android. No worries, even if you’re using Apple, you…
Crime Awareness: Thieves Going High Tech
Via: Area Ocho Thieves Going High Tech There is a new variation of an old crime that all of us need to be aware of: Fake traffic stops. It goes like this. A car with blue strobes slips in behind yours and attempts to pull you over. It isn’t a new crime. Fake…
OPSEC 101: Prepper’s Beware
Pay Attention Last week, my friend Mike Shelby of Forward Observer/GrayZone Activity put out a thread detailing the indictment of 61 far left activists for their activity at the Cop City protests. While many cheered on what seemed to be a far-overdue indictment against ANTIFA, what the indictment reveals are significant risks to those…
Psy-Op Cinema: The Joker Cycle
How Deep State Intelligence reinforces Archetypes and Manipulates Culture via Mass Media, Spectacular Crime and Hollywood The weeks leading up to the release of Todd Phillips’s 2019 film Joker were awash with hysterical corporate media warnings about insane killers shooting up theaters at screenings. But this hysteria was not a spontaneous reflex of the media hive mind: it…
The Surveillance State: Cell phone Surveillance, Can They Hear You Now?
CELL PHONE SURVEILLANCE: CAN THEY HEAR YOU NOW? It’s safe to assume our readers fall into one of two groups: you know your cell phone tracks you constantly without your permission, or you’re unaware of the potentially serious privacy risks from the neat little device in your pocket. Being in the latter category doesn’t make you wrong…
Low-Tech to No-Tech is The Way
Analog all the way! Paper don’t need batteries.
On the Guerrilla, His Ecology and His Communications
On the Guerrilla, His Ecology and His Communications The Guerrilla must recognize three critical points: He, and his local network, are his own supply line. He fights with what he has, not with what he wishes. He cannot fight as a conventional force. If you have not already, be sure and order your…
Cyber-Security: WOROK – Powerful Malware Hidden in .PNG Images
WOROK: Powerful Malware Hidden in .PNG Images “Unless it’s your first day on the internet, you’re probably aware that downloading certain files can be a serious mistake. It doesn’t take a cybersecurity expert to know that double-clicking the TotallyNotAVirus.exe file that mysteriously appeared in your downloads folder is a bad idea. If you’re a bit more security…